Research Output 1963 2019

Filter
Conference contribution
2019

Abacaas: Attribute-based access control as a service

Meshram, A., Das, S., Sural, S., Vaidya, J. & Atluri, V., Mar 13 2019, CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 153-155 3 p. (CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Access control
Costs

Complex resistivity (Cr) monitoring of tracer tests for assessing mass transfer and sorption in low permeability media

Slater, L., Day-Lewis, F. & Parker, B., Jan 1 2019, 32nd Symposium on the Application of Geophysics to Engineering and Environmental Problems, SAGEEP 2019. J and N Group, Ltd., 1 p. (Proceedings of the Symposium on the Application of Geophyics to Engineering and Environmental Problems, SAGEEP; vol. 2019-March).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

sorption
mass transfer
tracers
Sorption
electrical resistivity

Crime Prediction Model using Deep Neural Networks

Chun, S. A., Pathak, R., Paturu, V. A., Atluri, V., Yuan, S. & Adam, N., Jun 18 2019, Proceedings of the 20th Annual International Conference on Digital Government Research: Governance in the Age of Artificial Intelligence, dg.o 2019. Chen, Y-C., Salem, F. & Zuiderwijk, A. (eds.). Association for Computing Machinery, p. 512-514 3 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Crime
Neural networks
Learning systems
History
Deep neural networks

Debiasing the human-recommender system feedback loop in collaborative filtering

Sun, W., Nasraoui, O., Khenissi, S. & Shafto, P., May 13 2019, The Web Conference 2019 - Companion of the World Wide Web Conference, WWW 2019. Association for Computing Machinery, Inc, p. 645-651 7 p. (The Web Conference 2019 - Companion of the World Wide Web Conference, WWW 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Collaborative filtering
Recommender systems
Feedback
Factorization

Discovering events from social media for emergency planning

Naseem, M., Shafiq, B., Chun, S. A., Shamail, S. & Adam, N., Jun 18 2019, Proceedings of the 20th Annual International Conference on Digital Government Research: Governance in the Age of Artificial Intelligence, dg.o 2019. Chen, Y-C., Salem, F. & Zuiderwijk, A. (eds.). Association for Computing Machinery, p. 109-116 8 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Planning
Information retrieval
Disasters
Information management
Semantics

PolTree: A data structure for making efficient access decisions in ABAC

Nath, R., Das, S., Sural, S., Vaidya, J. & Atluri, V., May 28 2019, SACMAT 2019 - Proceedings of the 24th ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, p. 25-35 11 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Data structures
Scalability
Control systems

Social media communication of public sector organizations: A case study of northeast US

Yaqub, U., Atluri, V., Chun, S. A. & Vaidya, J., Jun 18 2019, Proceedings of the 20th Annual International Conference on Digital Government Research: Governance in the Age of Artificial Intelligence, dg.o 2019. Chen, Y-C., Salem, F. & Zuiderwijk, A. (eds.). Association for Computing Machinery, p. 248-253 6 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Communication
Broadcasting
2018
2 Citations (Scopus)

Analysis and visualization of subjectivity and polarity of twitter location data

Yaqub, U., Sharma, N., Pabreja, R., Chun, S. A., Atluri, V. & Vaidya, J., May 30 2018, Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age, DG.O 2018. Hinnant, C. C. & Zuiderwijk, A. (eds.). Association for Computing Machinery, a67. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Visualization

ASSEMBLE: A collaborative business process development tool

Afzal, A., Akhtar, A., Ishfaq, N., Shafiq, B., Shamail, S., Elahraf, A., Vaidya, J. & Adam, N., May 27 2018, Proceedings - International Conference on Software Engineering. IEEE Computer Society, p. 376-377 2 p. (Proceedings - International Conference on Software Engineering).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Industry
Middleware
Semantics
Engines
2 Citations (Scopus)

Decentralized computation of effective resistances and acceleration of consensus algorithms

Aybat, N. S. & Gurbuzbalaban, M., Mar 7 2018, 2017 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2017 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 538-542 5 p. (2017 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2017 - Proceedings; vol. 2018-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Parallel algorithms
Markov processes
Linear systems

Emergency response plan recommendation and composition system (ERPRCS)

Afzal, A., Shafiq, B., Shamail, S., Elahraf, A., Vaidya, J. & Adam, N., May 30 2018, Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age, DG.O 2018. Hinnant, C. C. & Zuiderwijk, A. (eds.). Association for Computing Machinery, a41. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Chemical analysis
Interoperability
Dynamic response
Planning
2 Citations (Scopus)

Enabling the deployment of ABAC policies in RBAC systems

Batra, G., Atluri, V., Vaidya, J. & Sural, S., Jan 1 2018, Data and Applications Security and Privacy XXXII - 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Proceedings. Paraboschi, S. & Kerschbaum, F. (eds.). Springer Verlag, p. 51-68 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10980 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Role-based Access Control
Control Policy
Access Control
Access control
Attribute

Geophysical and geochemical attenuated signatures associated with hydrocarbon contaminated site undergoing bioremediation

Che-Alota, V., Atekwana, E., Atekwana, E., Sauck, W. A., Rossbach, S., Davis, C., Nolan, J., Slater, L. & Werkema, D., Jan 1 2018, 78th Society of Exploration Geophysicists International Exposition and Annual Meeting, SEG 2008. Society of Exploration Geophysicists, p. 2719-2723 5 p. (78th Society of Exploration Geophysicists International Exposition and Annual Meeting, SEG 2008).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

ground penetrating radar
bioremediation
hydrocarbons
signatures
hydrocarbon
1 Citation (Scopus)

Iterated algorithmic bias in the interactive machine learning process of information filtering

Sun, W., Nasraoui, O. & Shafto, P., Jan 1 2018, IC3K 2018 - Proceedings of the 10th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management. Fred, A. & Filipe, J. (eds.). SciTePress, p. 110-118 9 p. (IC3K 2018 - Proceedings of the 10th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Information filtering
Learning systems
Learning algorithms
Labels
User interfaces
1 Citation (Scopus)

Poster: Using gini impurity to mine attribute-based access control policies with environment attributes

Das, S., Sural, S., Vaidya, J. & Atluri, V., Jun 7 2018, SACMAT 2018 - Proceedings of the 23rd ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, p. 213-215 3 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Impurities
Control systems

PrCP: Pre-recommendation counter-polarization

Badami, M., Nasraoui, O. & Shafto, P., Jan 1 2018, IC3K 2018 - Proceedings of the 10th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management. Fred, A. & Filipe, J. (eds.). SciTePress, p. 282-289 8 p. (IC3K 2018 - Proceedings of the 10th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Recommender systems
Learning algorithms
Learning systems
Polarization
Collaborative filtering

Preface

Vaidya, J. & Li, J., Jan 1 2018, Algorithms and Architectures for Parallel Processing - 18th International Conference, ICA3PP 2018, Proceedings. Vaidya, J. & Li, J. (eds.). Springer Verlag, p. V-VI (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11335 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Privacy Preserving Probabilistic Record Linkage Without Trusted Third Party

Lazrig, I., Ong, T. C., Ray, I., Ray, I., Jiang, X. & Vaidya, J., Oct 29 2018, 2018 16th Annual Conference on Privacy, Security and Trust, PST 2018. Deng, R. H., Marsh, S., Nurse, J., Lu, R., Sezer, S., Miller, P., Chen, L., McLaughlin, K. & Ghorbani, A. (eds.). Institute of Electrical and Electronics Engineers Inc., 8514192. (2018 16th Annual Conference on Privacy, Security and Trust, PST 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Networks (circuits)
Communication
Privacy preserving
Record linkage
Benchmark

Reducing communication in proximal Newton methods for sparse least squares problems

Soori, S., Demmel, J., Devarakonda, A., Gurbuzbalaban, M., Blanco, Z. & Mehri Dehnavi, M., Aug 13 2018, Proceedings of the 47th International Conference on Parallel Processing, ICPP 2018. Association for Computing Machinery, a22. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Newton-Raphson method
Communication
Electric sparks
Learning systems
Scalability
8 Citations (Scopus)

Web-based application for sentiment analysis of live tweets

Sharma, N., Pabreja, R., Yaqub, U., Atluri, V., Ae Chun, S. & Vaidya, J., May 30 2018, Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age, DG.O 2018. Hinnant, C. C. & Zuiderwijk, A. (eds.). Association for Computing Machinery, a120. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Visualization
2017
2 Citations (Scopus)

A double incremental aggregated gradient method with linear convergence rate for large-scale optimization

Mokhtari, A., Gurbuzbalaban, M. & Ribeiro, A., Jun 16 2017, 2017 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2017 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 4696-4700 5 p. 7953047. (ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Gradient methods
2 Citations (Scopus)

An administrative model for collaborative management of ABAC systems and its security analysis

Jha, S., Sural, S., Atluri, V. & Vaidya, J., Jan 6 2017, Proceedings - 2016 IEEE 2nd International Conference on Collaboration and Internet Computing, IEEE CIC 2016. Institute of Electrical and Electronics Engineers Inc., p. 64-73 10 p. 7809693. (Proceedings - 2016 IEEE 2nd International Conference on Collaboration and Internet Computing, IEEE CIC 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
control system
Control systems
management
flexibility

Balanced embedding of degenerating Abelian varieties

Wang, X. & Zhang, Y., Jan 1 2017, proceedings of the conference String-Math, 2015. Song, W., Lian, B. H., Li, S. & Yau, S-T. (eds.). American Mathematical Society, p. 247-263 17 p. (Proceedings of Symposia in Pure Mathematics; vol. 96).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abelian Variety
Base Change
Theta Functions
Degeneration
Projective Space

Collaborative differentially private outlier detection for categorical data

Asif, H., Talukdar, T., Vaidya, J., Shafiq, B. & Adam, N., Jan 6 2017, Proceedings - 2016 IEEE 2nd International Conference on Collaboration and Internet Computing, IEEE CIC 2016. Institute of Electrical and Electronics Engineers Inc., p. 92-101 10 p. 7809696. (Proceedings - 2016 IEEE 2nd International Conference on Collaboration and Internet Computing, IEEE CIC 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

privacy
Experiments
guarantee
experiment
Values
2 Citations (Scopus)

Detecting polarization in ratings: An automated pipeline and a preliminary quantification on several benchmark data sets

Badami, M., Nasraoui, O., Sun, W. & Shafto, P., Jul 1 2017, Proceedings - 2017 IEEE International Conference on Big Data, Big Data 2017. Nie, J-Y., Obradovic, Z., Suzumura, T., Ghosh, R., Nambiar, R., Wang, C., Zang, H., Baeza-Yates, R., Baeza-Yates, R., Hu, X., Kepner, J., Cuzzocrea, A., Tang, J. & Toyoda, M. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 2682-2690 9 p. (Proceedings - 2017 IEEE International Conference on Big Data, Big Data 2017; vol. 2018-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Quantification
Polarization
Pipelines
Benchmark
Recommender Systems
6 Citations (Scopus)

Efficient Bottom-Up Mining of Attribute Based Access Control Policies

Talukdar, T., Batra, G., Vaidya, J., Atluri, V. & Sural, S., Dec 9 2017, Proceedings - 2017 IEEE 3rd International Conference on Collaboration and Internet Computing, CIC 2017. Institute of Electrical and Electronics Engineers Inc., p. 339-348 10 p. (Proceedings - 2017 IEEE 3rd International Conference on Collaboration and Internet Computing, CIC 2017; vol. 2017-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Bottom-up
Scalability
flexibility
candidacy

EmojiTCHA: Using emotion recognition to tell computers and humans apart

Lorenzi, D., Vaidya, J., Aich, A., Sural, S., Atluri, V. & Calca, J., Jan 1 2017, ICT Systems Security and Privacy Protection - 32nd IFIP TC 11 International Conference, SEC 2017, Proceedings. De Capitani di Vimercati, S. & Martinelli, F. (eds.). Springer New York LLC, p. 281-295 15 p. (IFIP Advances in Information and Communication Technology; vol. 502).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programming interfaces (API)
Web services
Scalability
Emotion
Usability

Evaluating the privacy implications of frequent itemset disclosure

Serra, E., Vaidya, J., Akella, H. & Sharma, A., Jan 1 2017, ICT Systems Security and Privacy Protection - 32nd IFIP TC 11 International Conference, SEC 2017, Proceedings. De Capitani di Vimercati, S. & Martinelli, F. (eds.). Springer New York LLC, p. 506-519 14 p. (IFIP Advances in Information and Communication Technology; vol. 502).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Privacy
Disclosure
Privacy concerns
Heuristics
NP-hard

Evaluation on social media user's knowledge behavior model

Shwartz-Asher, D., Chun, S. A. & Adam, N., Jun 7 2017, DG.O 2017 - Proceedings of the 18th Annual International Conference on Digital Government Research: Innovations and Transformations in Government. Hinnant, C. C. & Ojo, A. (eds.). Association for Computing Machinery, p. 590-591 2 p. (ACM International Conference Proceeding Series; vol. Part F128275).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Communication
Information management

Friends are forever? Evolution of active friendship clusters in online social networks

Gupta, H., Sural, S., Ganguly, N. & Vaidya, J., Jun 9 2017, 2017 9th International Conference on Communication Systems and Networks, COMSNETS 2017. Institute of Electrical and Electronics Engineers Inc., p. 558-563 6 p. 7945453. (2017 9th International Conference on Communication Systems and Networks, COMSNETS 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Policy Adaptation in Attribute-Based Access Control for Inter-Organizational Collaboration

Das, S., Sural, S., Vaidya, J. & Atluri, V., Dec 9 2017, Proceedings - 2017 IEEE 3rd International Conference on Collaboration and Internet Computing, CIC 2017. Institute of Electrical and Electronics Engineers Inc., p. 136-145 10 p. (Proceedings - 2017 IEEE 3rd International Conference on Collaboration and Internet Computing, CIC 2017; vol. 2017-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Inter-organizational collaboration
control system
heuristics
Computational complexity
5 Citations (Scopus)

Poster: Constrained policy mining in attribute based access control

Gautam, M., Jha, S., Sural, S., Vaidya, J. & Atluri, V., Jun 7 2017, SACMAT 2017 - Proceedings of the 22nd ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, p. 121-123 3 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT; vol. Part F128644).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Control systems
Experiments
1 Citation (Scopus)

Preventing unauthorized data flows

Uzun, E., Parlato, G., Atluri, V., Ferrara, A. L., Vaidya, J., Sural, S. & Lorenzi, D., Jan 1 2017, Data and Applications Security and Privacy XXXI - 31st Annual IFIP WG 11.3 Conference, DBSec 2017, Proceedings. Zhu, S. & Livraga, G. (eds.). Springer Verlag, p. 41-62 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10359 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data Flow
Access control
Confidentiality
Integrity
Transitive Closure
1 Citation (Scopus)

Risk-averse control of continuous-time markov chains

Dentcheva, D. & Ruszczynski, A., Jan 1 2017, Proceedings of the SIAM Conference on Control and Its Applications, CT 2017. Society for Industrial and Applied Mathematics Publications, p. 78-85 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Markov processes
Ordinary differential equations
Differential equations
Derivatives
Costs

Rule-enhanced penalized regression by column generation using rectangular maximum agreement

Eckstein, J., Goldberg, N. & Kagawa, A., Jan 1 2017, 34th International Conference on Machine Learning, ICML 2017. International Machine Learning Society (IMLS), p. 1762-1770 9 p. (34th International Conference on Machine Learning, ICML 2017; vol. 3).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Linear programming
Costs

Secure and efficient k-NN queries

Asif, H., Vaidya, J., Shafiq, B. & Adam, N., Jan 1 2017, ICT Systems Security and Privacy Protection - 32nd IFIP TC 11 International Conference, SEC 2017, Proceedings. De Capitani di Vimercati, S. & Martinelli, F. (eds.). Springer New York LLC, p. 155-170 16 p. (IFIP Advances in Information and Communication Technology; vol. 502).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Query
Investment portfolio
Financial sector
Data base
Ranking
12 Citations (Scopus)

Sentiment based Analysis of Tweets during the US Presidential Elections

Yaqub, U., Atluri, V., Chun, S. A. & Vaidya, J., Jun 7 2017, DG.O 2017 - Proceedings of the 18th Annual International Conference on Digital Government Research: Innovations and Transformations in Government. Hinnant, C. C. & Ojo, A. (eds.). Association for Computing Machinery, p. 1-10 10 p. (ACM International Conference Proceeding Series; vol. Part F128275).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Communication

Strong duality in horn minimization

Boros, E., Čepek, O. & Makino, K., Jan 1 2017, Fundamentals of Computation Theory - 21st International Symposium, FCT 2017, Proceedings. Zeitoun, M. & Klasing, R. (eds.). Springer Verlag, p. 123-135 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10472 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Strong Duality
Boolean functions
Minimization Problem
Polynomials
Directed Hypergraphs

The double-edged sword of government role in innovation systems: A case study in the development of policy-led University Science Parks in China

Zhang, Y., Dong, J., Cao, Y. & Cantwell, J., Jul 31 2017, 2017 IEEE Technology and Engineering Management Society Conference, TEMSCON 2017. Institute of Electrical and Electronics Engineers Inc., p. 7-12 6 p. 7998346. (2017 IEEE Technology and Engineering Management Society Conference, TEMSCON 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Lead
Innovation
Education
Industry
Innovation system
2016
2 Citations (Scopus)

Agent driving behavior modeling for traffic simulation and emergency decision support

Yuan, S., Liu, Y., Zhang, H., Ae Chun, S. & Adam, N. R., Feb 16 2016, 2015 Winter Simulation Conference, WSC 2015. Institute of Electrical and Electronics Engineers Inc., p. 312-323 12 p. 7408174. (Proceedings - Winter Simulation Conference; vol. 2016-February).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Behavior Modeling
Traffic Simulation
Evacuation
Decision Support
Emergency

A privacy-sensitive collaborative approach to business process development

Irshad, H., Shafiq, B., Vaidya, J., Bashir, M. A., Asif, H. S., Ghayyur, S., Shamail, S. & Adam, N., Jan 1 2016, E-Business and Telecommunications - 12th International Joint Conference, ICETE 2015, Revised Selected Papers. Obaidat, M. S. & Lorenz, P. (eds.). Springer Verlag, p. 318-342 25 p. (Communications in Computer and Information Science; vol. 585).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Business Process
Privacy
Industry
Recommendations
Chemical analysis
12 Citations (Scopus)

Big data-based smart city platform: Real-Time crime analysis

Ghosh, D., Ae Chun, S., Adam, N. R. & Shafiq, B., Jun 8 2016, dg.o 2016 - Proceedings of the 17th Annual International Conference on Digital Government Research - Internet Plus Government: New Opportunities to Solve Public Problems. Kim, Y. & Liu, S. M. (eds.). Association for Computing Machinery, p. 58-66 9 p. (ACM International Conference Proceeding Series; vol. 08-10-June-2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Crime
Risk analysis
Learning systems
Decision making
History
3 Citations (Scopus)

Deciphering text from touchscreen key taps

Gupta, H., Sural, S., Atluri, V. & Vaidya, J., Jan 1 2016, Data and Applications Security and Privacy - 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Proceedings. Ranise, S. & Swarup, V. (eds.). Springer Verlag, p. 3-18 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9766).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Side Channel Attacks
Touch screens
Countermeasures
Mobile Phone
Probable
5 Citations (Scopus)

Depth-Reduction for Composites

Chen, S. & Papakonstantinou, P. A., Dec 14 2016, Proceedings - 57th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2016. IEEE Computer Society, p. 99-108 10 p. 7782922. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS; vol. 2016-December).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Networks (circuits)
Composite materials
Polynomials

Efficient evaluation of authorizations for video data

Yaqub, U., Atluri, V. & Vaidya, J., Jul 20 2016, Proceedings of the 9th International Conference on Security of Information and Networks, SIN 2016. Association for Computing Machinery, p. 16-23 8 p. (ACM International Conference Proceeding Series; vol. 20-22-July-2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Security of data
Specifications

Emergency management and smart safety workshop (EM-SS 2016)

Zhang, H., Liu, Y. & Adam, N. R., Jun 8 2016, dg.o 2016 - Proceedings of the 17th Annual International Conference on Digital Government Research - Internet Plus Government: New Opportunities to Solve Public Problems. Kim, Y. & Liu, S. M. (eds.). Association for Computing Machinery, p. 544-545 2 p. (ACM International Conference Proceeding Series; vol. 08-10-June-2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cloud computing
Disasters
Information management
Big data
Internet of things

Fast best-effort search on graphs with multiple attributes

Roy, S. B., Eliassi-Rad, T. & Papadimitriou, S., Jun 22 2016, 2016 IEEE 32nd International Conference on Data Engineering, ICDE 2016. Institute of Electrical and Electronics Engineers Inc., p. 1574-1575 2 p. 7498432. (2016 IEEE 32nd International Conference on Data Engineering, ICDE 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Query processing
Data mining
Learning systems
Graph
Top-k
2 Citations (Scopus)

High-resolution EEG source imaging of one-year-old children

Acar, Z. A., Ortiz-Mantilla, S., Benasich, A. & Makeig, S., Oct 13 2016, 2016 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBC 2016. Institute of Electrical and Electronics Engineers Inc., p. 117-120 4 p. 7590654. (Proceedings of the Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBS; vol. 2016-October).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electroencephalography
Skull
Imaging techniques
Head
Independent component analysis
6 Citations (Scopus)

Human-recommender systems: From benchmark data to benchmark cognitive models

Shafto, P. & Nasraoui, O., Sep 7 2016, RecSys 2016 - Proceedings of the 10th ACM Conference on Recommender Systems. Association for Computing Machinery, Inc, p. 127-130 4 p. (RecSys 2016 - Proceedings of the 10th ACM Conference on Recommender Systems).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Recommender systems
Learning systems
Benchmarking
Learning algorithms
Labels
3 Citations (Scopus)

Local search for hard sat formulas: The strength of the polynomial law

Liu, S. & Papakonstantinou, P., Jan 1 2016, 30th AAAI Conference on Artificial Intelligence, AAAI 2016. AAAI press, p. 732-738 7 p. (30th AAAI Conference on Artificial Intelligence, AAAI 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Polynomials