Selected Publications

Research in the College of Information Sciences and Technology explores topics across a variety of core and cross-cutting domains. Filter the list below by publication author, research area, and year to explore recent publications from IST researchers.

  • Smitha
  • Sundareswaran
  • Anna C.
  • Squicciarini
, 2010
, Security and Privacy in Communication Networks - 6th Iternational ICST Conference, SecureComm 2010, Proceedings
on p. 199-216
  • Shaoting
  • Zhang
  • Junzhou
  • Huang
  • Dimitris
  • Metaxas
  • Wei
  • Wang
  • Xiaolei
  • Huang
, 2010
, 2010 7th IEEE International Symposium on Biomedical Imaging
on p. 133-136
  • John M.
  • Carroll
  • Marcela
  • Borge
  • Craig
  • Ganoe
  • Hao
  • Jiang
, 2010
, 2010 IEEE Education Engineering Conference, EDUCON 2010
on p. 1585-1594
  • Yubo
  • Kou
  • Yukun
  • Li
  • Xiaofeng
  • Meng
, 2010
, Web-Age Information Management - 11th International Conference, WAIM 2010, Proceedings
on p. 297-308
  • Ganesh Ram
  • Santhanam
  • Samik
  • Basu
  • Vasant
  • Honavar
, 2010
, Principles of Knowledge Representation and Reasoning
on p. 590-592
  • Jian
  • Huang
  • Pucktada
  • Treeratpituk
  • Sarah M.
  • Taylor
  • C. Lee
  • Giles
, 2010
, Coling 2010 - 23rd International Conference on Computational Linguistics, Proceedings of the Conference
on p. 483-491
  • Yang
  • Sun
  • C. Lee
  • Giles
, 2010
, Proceedings of the 19th International Conference on World Wide Web, WWW '10
on p. 1189-1190
  • Ronald
  • Metoyer
  • Simone
  • Stumpf
  • Christoph
  • Neumann
  • Jonathan
  • Dodge
  • Jill
  • Cao
  • Aaron
  • Schnabel
, 2010
on p. 249-262
  • Sumit
  • Bhatia
  • Prasenjit
  • Mitra
  • C. Lee
  • Giles
, 2010
, Proceedings of the 19th International Conference on World Wide Web, WWW '10
on p. 1061-1062
  • Eun Yeong
  • Ahn
  • Tracy
  • Mullen
  • John
  • Yen
, 2010
, Proceedings of the 12th Annual Genetic and Evolutionary Computation Conference, GECCO '10 - Companion Publication
on p. 2061-2062
  • Xiang
  • Zhang
  • Feng
  • Pan
  • Wei
  • Wang
, 2010
, Link Mining
on p. 505-534
  • Anna C.
  • Squicciarini
  • Federica
  • Paci
  • Elisa
  • Bertino
  • Alberto
  • Trombetta
  • Stefano
  • Braghin
, 2010
, IEEE Transactions on Parallel and Distributed Systems
on p. 1473-1486
  • Bhavesh
  • Sanghvi
  • Neeraj
  • Koul
  • Vasant
  • Honavar
, 2010
, On the Move to Meaningful Internet Systems, OTM 2010 - Confederated International Conferences
on p. 999-1008
  • Smitha
  • Sundareswaran
  • Anna C.
  • Squicciarini
, 2010
  • Honglu
  • Du
  • Hao
  • Jiang
  • Mary Beth
  • Rosson
  • John M.
  • Carroll
, 2010
, Proceedings - 10th IEEE International Conference on Advanced Learning Technologies, ICALT 2010
on p. 372-377
  • C. Lee
  • Giles
  • Yang
  • Sun
  • Isaac G.
  • Councill
, 2010
, Proceedings of the 19th International Conference on World Wide Web, WWW '10
on p. 1101-1102
  • Hongsheng
  • Li
  • Edward
  • Kim
  • Xiaolei
  • Huang
  • Lei
  • He
, 2010
, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, CVPR 2010
on p. 1641-1648
  • Huajing
  • Li
  • Yuan
  • Tian
  • Wang Chien
  • Lee
  • C. Lee
  • Giles
  • Meng Chang
  • Chen
, 2010
, Proceedings - SocialCom 2010
on p. 96-103
  • Anna C.
  • Squicciarini
  • Mohamed
  • Shehab
  • Joshua
  • Wede
, 2010
, VLDB Journal
on p. 777-796
  • Daren
  • Zha
  • Jiwu
  • Jing
  • Peng
  • Liu
  • Jingqiang
  • Lin
  • Xiaoqi
  • Jia
, 2010
, Computational Science and Its Applications - ICCSA 2010 - International Conference, Proceedings
on p. 468-481
  • Yoon Chan
  • Jhi
  • Peng
  • Liu
  • Lunquan
  • Li
  • Qijun
  • Gu
  • Jiwu
  • Jing
  • George
  • Kesidis
, 2010
, Security and Communication Networks
on p. 334-354
  • Neela
  • Sawant
  • Ritendra
  • Datta
  • Jia
  • Li
  • James Z.
  • Wang
, 2010
, MIR 2010 - Proceedings of the 2010 ACM SIGMM International Conference on Multimedia Information Retrieval
on p. 231-240
  • Yasser
  • EL-Manzalawy
  • Vasant
  • Honavar
, 2010
, Immunome Research
  • Ming Ming
  • Cheng
  • Fang Lue
  • Zhang
  • Niloy J.
  • Mitra
  • Xiaolei
  • Huang
  • Shi Min
  • Hu
, 2010
, ACM Transactions on Graphics
  • Jia
  • Tao
  • Giora
  • Slutzki
  • Vasant
  • Honavar
, 2010
, Web Reasoning and Rule Systems - Fourth International Conference, RR 2010, Proceedings
on p. 195-203
  • Carleen
  • Maitland
  • Andrea H.
  • Tapia
  • Louis Marie Ngamassi
  • Tchouakeu
  • Kang
  • Zhao
  • Edgar
  • Maldonado
, 2010
, ISCRAM 2010 - 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings
  • Elisa
  • Bertino
  • Lorenzo D.
  • Martino
  • Federica
  • Paci
  • Anna C.
  • Squicciarini
, 2010
  • Xinran
  • Wang
  • Chi Chun
  • Pan
  • Peng
  • Liu
  • Sencun
  • Zhu
, 2010
, IEEE Transactions on Dependable and Secure Computing
on p. 65-79
  • Liang
  • Gou
  • Xiaolong
  • Zhang
  • Hung Hsuan
  • Chen
  • Jung Hyun
  • Kim
  • C. Lee
  • Giles
, 2010
, JCDL'10 - Digital Libraries - 10 Years Past, 10 Years Forward, a 2020 Vision
on p. 313-322
  • Yann
  • Riche
  • Jonathan
  • Dodge
  • Ronald A.
  • Metoyer
, 2010
on p. 1995-1998
  • Xiaolong
  • Zhang
  • Timothy W.
  • Simpson
  • Mary
  • Frecker
  • George
  • Lesieutre
, 2010
, Proceedings of the ASME International Design Engineering Technical Conferences and Computers and Information in Engineering Conference 2009, DETC2009
on p. 1341-1353
  • Lynette
  • Kvasny
  • Roderick
  • Lee
, 2010
, New Media and Society
on p. 619-636
  • Hadi
  • Hosseini
  • Gerhard W.
  • Dueck
, 2010
, ISMVL 2010 - 40th IEEE International Symposium on Multiple-Valued Logic
on p. 173-178
  • Peng
  • Xie
  • Jason H.
  • Li
  • Xinming
  • Ou
  • Peng
  • Liu
  • Renato
  • Levy
, 2010
, Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2010
on p. 211-220
  • Xiaoqi
  • Jia
  • Xi
  • Xiong
  • Jiwu
  • Jing
  • Peng
  • Liu
, 2010
, Information Security Practice and Experience - 6th International Conference, ISPEC 2010, Proceedings
on p. 153-171
  • Kang
  • Zhao
  • Akhil
  • Kumar
  • Massimiliano
  • Spaziani
  • John
  • Yen
, 2010
, Proceedings of 20th Annual Workshop on Information Technologies and Systems
  • Honglu
  • Du
  • Mary Beth
  • Rosson
  • John
  • Carroll
  • Craig
  • Ganoe
, 2009
, GROUP'09 - Proceedings of the 2009 ACM SIGCHI International Conference on Supporting Group Work
on p. 233-242
  • Sue E.
  • Kase
  • Frank E.
  • Ritter
, 2009
, 18th Annual Conference on Behavior Representation in Modeling and Simulation 2009, BRiMS 2009
on p. 39-46
  • Jonathan H.
  • Morgan
  • Geoffrey P.
  • Morgan
  • Frank E.
  • Ritter
  • Vincent Poncelin
  • De Raucourt
, 2009
, 18th Annual Conference on Behavior Representation in Modeling and Simulation 2009, BRiMS 2009
on p. 128-135
  • David
  • Wolf
  • Timothy W.
  • Simpson
  • Xiaolong
  • Zhang
, 2009
, ASME 2009 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference, IDETC/CIE2009
on p. 1361-1371
  • Mary Beth
  • Rosson
  • Anastassia
  • Ioujanina
  • Timothy
  • Paone
  • Gretel
  • Sheasley
  • Hansa
  • Sinha
  • Craig
  • Ganoe
  • John
  • Carroll
  • Jan
  • Mahar
, 2009
, SIGCSE'09 - Proceedings of the 40th ACM Technical Symposium on Computer Science Education
on p. 226-230
  • Guoray
  • Cai
  • Anna
  • Squicciarini
, 2009
, Collaborative Computing
on p. 425-438
  • Wanyu
  • Zang
  • Qijun
  • Gu
  • Meng
  • Yu
  • Peng
  • Liu
, 2009
, NBiS 2009 - 12th International Conference on Network-Based Information Systems
on p. 246-253
  • Hyunyoung
  • Kil
  • Wonhong
  • Nam
  • Dongwon
  • Lee
, 2009
, WWW'09 - Proceedings of the 18th International World Wide Web Conference
on p. 1121-1122
  • Shengzhi
  • Zhang
  • Xi
  • Xiong
  • Xiaoqi
  • Jia
  • Peng
  • Liu
, 2009
, Proceedings of the 1st ACM Workshop on Virtual Machine Security, VMSec '09, Co-located with the 16th ACM Computer and Communications Security Conference, CCS'09
on p. 43-48
  • Peng
  • Liu
  • Thomas F.
  • LaPorta
  • Kameswari
  • Kotapati
, 2009
, Computer and Information Security Handbook
on p. 183-203
  • Anna
  • Wu
  • Xiaolong
  • Zhang
  • Gregorio
  • Convertino
  • John
  • Carroll
, 2009
, GROUP'09 - Proceedings of the 2009 ACM SIGCHI International Conference on Supporting Group Work
on p. 273-276
  • Adrian
  • Silvescu
  • Cornelia
  • Caragea
  • Vasant
  • Honavar
, 2009
, ICDM 2009 - The 9th IEEE International Conference on Data Mining
on p. 986-991
  • Neeraj
  • Koul
  • Vasant
  • Honavar
, 2009
, ICTAI 2009 - 21st IEEE International Conference on Tools with Artificial Intelligence
on p. 214-218