Jump to:
Conference Proceedings
Papers in Preparation
If you are interested in receiving a copy of one of these publications, please email your request to publications@ccicada.org. Please be sure to include in your request specific information on the publication(s) you wish to receive (author(s), title, date, publication, etc.). Place ‘CCICADA Publications Request‘ in the subject line.
The following papers are listed in alphabetical order by author.
Journal Articles
Bai, G. & Gan X. (2010). The JIT Transportation problem. International Journal of System Sciences, 1-9, doi:10.1080/00207721003731603.
Bhagat, S., Cormode, G. & Muthukrishnan S. (2011). Node classification in social networks. In C. C. Aggarwal (Ed.) Social Network Data Analytics, (115-148), New York: Springer Publishing.
Boros, E., Goldberg, N., Kantor, P.B. & Word, J. (2011). Optimal Sequential Inspection Policies. Annals of Operations Research, 187(1), 89-119.
Carpenter, T., Cheng, J., Roberts, F. & Xie, M. (2010). Sensor management problems of nuclear detection, in safety and risk modeling and their applications. In H. Pham (Ed.), Safety and Risk Modeling and Its Applications (pp. 299-323). New York: Springer Publishing.
Chalupsky, H., DeMarco, R., Hovy, E., Kantor, P., Matlin, A., Mitra, P., Ozbas, B., Roberts, F., Wojtowicz, J., and Xie, M. (2013). Estimating violation risk for fisheries regulations, in Proceedings of International Conference on Algorithmic Decision Theory III. (P. Perny, M. Pirlot & A. Tsoukias Eds.), Lecture Notes in Computer Science, Springer, 297-308.
Chen, X. and Xie, M. (2013) A split and conquer approach for extraordinarily large data analysis. Statistica Sinica. Accepted for publication. (ICSA2012 Student Award Paper; Interface 2012 Junior Research Award Paper; 2012 Deming Student Scholar Award Paper)
Chen, S., Min, W. and Chen, R. (2013) Model identification for time series with dependent innovations. Statistica Sinica, 23, 873-899.
Cheng, J., Xie, M., Chen R., and Roberts, F. (2013). A latent source model to detect multiple spatial clusters with application in a mobile sensor network for surveillance of nuclear materials. Journal of the American Statistical Association. 108, 902-913.
Cormode, G. & Garofalakis, M. (2010). Histograms and wavelets on probabilistic data. IEEE Transactions on Knowledge and Data Engineering, 22(8), 1142-1157.
Cormode, G. & Hadjieleftheriou, M. (2010). Methods for finding frequent items in data streams. The VLDB Journal, 19(1) , 3-20.
Cormode, G., Jestes, J., Li, F. & Yi, K. (2010). Semantics of ranking queries for probabilistic data. IEEE Transactions on Knowledge and Data Engineering.
Cormode, G., Krishnamurthy, B. & Willinger, W. (2010). A manifesto for modeling and measurement in social media. First Monday, 15(9).
Cormode, G., Srivastava, D., Yu, T. & Zhang, Q. (2010). Anonymizing bipartite graph data using safe groupings. The VLDB Journal, 19(1), 115-139.
DeMarco, B., Hamm, A. & Kahn, J. (2013). On the triangle space of a random graph, Journal of Combinatorics, 4(2), 229-249
Dembele, B., Friedman , A. & Yakubu, A. (2010). Mathematical model for optimal use of sulfadoxine pyrimethane as a temporary vaccine rates. Bulletin of Mathematical Biology, 72, (2010), 914-930.
Do, Q., Roth. D., Sammons, M., Tu, Y. & Vinod Vydiswaran, V.G. (2010). Robust, Light-weight Approaches to compute Lexical Similarity. Computer Science Research & Technical Reports, University of Illinois.
Dobson, A. and Bekris, K.E. (2013). A Study on the Finite-Time Near-Optimality Properties of Sampling-Based Motion Planners. IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS). Tokyo, Japan.
Dobson, A. and Bekris, K.E. (2013). Improving Sparse Roadmap Spanners. IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS). Karlsruhe, Germany.
Doumitt, A. (2011). Technology will drive tomorrow’s homeland security. Earth Imaging Journal (http://eijournal.com/2011/technology-will-drive-tomorrows-homeland-security).
Edmonds, J., Gaubert, S., Gurvich, V. & Oster, M. (2010). More about scarf and sperner oiks. RUTCOR Research Report 15-2010.
Ellington, R., Wachira, J. & Nkwanta, A. (2010). RNA secondary structure prediction by using discrete mathematics: An interdisciplinary research experience for undergraduate students. Cell Biology Education (CBE) Life Science Education, 9(3), 348-356.
Fefferman, N.H., and Romero, L.M. (2013). Can physiological stress alter population persistence? A model with conservation implications. Conservation Physiology. 1(1): cot012. doi: 10.1093/conphys/cot012.
Fefferman, N.H. & Naumova, E.N. (2010). Innovation in observation: A vision for early outbreak detection. Emerging Health Threats Journal. 3:e6. doi: 10.3134/ehtj.10.006.
Franke, J. & Yakubu, A. (2011). Periodically forced discrete-time SIS epidemic model with disease induced mortality. Mathematical Biosciences in Engineering 8(2), 385-408.
Frazier, P. I. & Powell, W.B. (2010). Paradoxes in learning and the marginal value of information. Decision Analysis, 7(4), 378-403.
Frazier, P. I. & Powell, W.B. (2011). Convergence to global optimality with sequential bayesian sampling policies. Society for Industrial and Applied Mathematics (SIAM) Journal on Control and Optimization.
Gan X. & Bugajewski, D. (2011). On Formal Laurent Series. Bulletin of Brazilian Mathematical Society.
Gan X. & Bugajewski, D. (2010). A Note on Formal Power Series, Commentationes Mathematicae Universitatis Carolinae, 51(4), 595-604.
Ganiz, M. C., Pottenger, W. M. & George, C. (2011) Higher order na-nove bayes: A novel non-IID approach to text classification. IEEE Transactions of Knowledge and Data Engineering, 23(7), 1022-1034.
Goplalkrishnan, B., Kong, S., Barnes, E., Johnson, E.L. & Sokol, J.S. (2011). A Least-Squares Minimum-Cost Network Flow Algorithm. Annals of Operations Research, 186 (1) , 119-140.
Grelaudi, A., Mitra, P., Chen, R., and Xie, M. (2013). A dynamic system approach to real time nuclear source detection with mobile sensor networks. Technical Report. Department of Statistics, Rutgers University.
Gupta, M. & Han, J. (2011). Heterogeneous Network-Based Trust Analysis: A Survey. SIGKDD Explorations, 13(1), 60-77.
Gupta, M., Li, R., Yin, Z. & Han, J. (2011). An Overview of Social Tagging Techniques. In C. C. Aggarwal (Ed.), Social Network Data Analysis, (447-498) New York: Springer Publishing.
Hock, K., Ng, K.L. & Fefferman, N.H. (2010). Systems approach to studying animal sociality: individual position versus group organization in dynamic social network models. PLoS One. 5(12): e15789. doi:10.1371/journal.pone.0015789.
Hui, C., Goldberg, M., Magdon-Ismail, M. & Wallace, W.A. (2010). Simulating the diffusion of information: An agent-based modeling approach. Special Issue on Agent-Directed Simulation, International Journal of Agent Technologies and Systems, 2(3), 31-46.
Jagai, J., Fefferman, N.H. & Naumova, E.N. (2011). Waterborne Disease Surveillance. In J. Nriagu, S. Kcew, T. Kawamoto, J. Patz & D. Rennie (Eds.), Encyclopedia of Environmental Health. Maryland Heights, MO: Elsevier Science.
Jagannathan, G., Pillaipakkamnatt, K. & Wright, R.N (pending). A practical differentially private random decision tree classifier. Transactions on Data Privacy.
Kafai, Y.B. & Fefferman, N.H. (2010). Virtual epidemics as learning laboratories in virtual worlds. Journal of Virtual Worlds Research, 3(2), 2-15.
Kantor, P. & Boros, E. (2010). Deceptive detection methods for effective security with inadequate budgets: The testing power index risk analysis. Risk Analysis, 30 (4) , 663-673, doi: 10.1111/j.1539-6924.2010.01370.x
Kasik, D., Ebert, D., Lebanon, G., Park, H. & Pottenger, W. (2009). Data transformations and representations for information generation. Information Visualization 8(4), 275-285.
Li, W., Tan, Z., and Chen, R. (2013) Importance sampling with adaptive mixture proposals, Journal of American Statistical Association, 108, 1350-1360.
Lin, M., Chen, R. and Liu, J.S. (2013) Lookahead strategies for sequential Monte Carlo, Statistical Science, 28, 69-94.
Lofgren, E.T., Wenger, J.B., Fefferman, N.H., Bina, D., Gradus, S., Bhattacharyya, S., Naumov, Y.N., Gorski, J. & Naumova, E.N. (2010). Disproportional effects in populations of concern for pandemic influenza: Insights from seasonal epidemics in Wisconsin, 1967-2004. Influenza and Other Respiratory Diseases, 4, 205-212.
Mir, D., Muthukrishnan, S., Nikolov, A. & Wright, R. (2010). Pan-private algorithms: When memory does not help. ArXiv, arXiv:1009.1544v1 [cs.CR].
Negoescu, D., Frazier, P. & Powell, W.B. (2011). The knowledge gradient algorithm for sequencing experiments in drug discovery. Informs Journal on Computing, 23(3), 346-363.
Nelson, C., Pottenger, W. M. (2013). Optimization of Emergency Response Using Higher Order Learning and Clustering of 911 Text Messages. Proc. of 2013 IEEE International Conference on Technologies for Homeland Security. Waltham, MA.
Nelson, C., Keiler, H., Pottenger, W.M. (2013). Modeling Microtext with Higher Order Learning. In Proc. of 2013 AAAI Spring Symposium on AnalyzingMicrotext, Stanford, CA.
Nkwanta, A. (2010). Riordan matrices and higher-dimensional lattice walks. Journal of Statistical Planning and Inference, 140(8), 2321-2334.
Pankov, A. & Zhang, G. (2011). Standing wave solutions for discrete nonlinear Schrodinger equations with unbounded potentials and saturable nonlinearity. Journal of Mathematical Sciences, 177 (1), 73-84.
Phan, L., Fefferman, N.H., Hui, D. & Brugge, D. (2010). Impact of street crime on Boston Chinatown. Local Environment 15(5), 481-491.
Powell, W. B. (2010). The knowledge gradient for optimal learning. Encyclopedia for Operations Research and Management Science, doi:10.1002/9780470400531.eorms0444.
Roberts, F. (2013). Meaningful and meaningless statements in landscape ecology and environmental sustainability. Clusters, Orders, Trees: Methods and Applications. (P. Pardalos, B. Goldengorin, and F. Aleskerov (Eds.)). Springer, New York, NY.
Roberts, F. (2012). Meaningful and meaningless statements in epidemiology and public health. Measurements with Persons (B. Berglund, G. B. Rossi, J. Townsend and L. Pendrill (Eds.)). Psychology Press, Taylor and Francis. 75-95.
Roberts, F.S. (2011). The Port Reopening Scheduling Problem. In H. Kaul & H.M. Mulder (Eds.), Advances in Interdisciplinary Applied Discrete Mathematics, (119-210), World Scientific, Hackensack, NJ.
Roberts, F., Greenberg, M., Altiok, T., Fefferman, N., Georgopoulos, P., Lacy, M., Lahr, M., Lioy, P., Lowrie, K., Mayer, H., and Ozbas, B. (2011). A set of blended risk-based decision support tools for protecting passenger rail-centered transit corridors against cascading impacts of terrorist attacks. Journal of Homeland Security.
Roberts, F., Carpenter, T., Cheng, J. and Xie, M. (2011). Sensor management problems of nuclear detection. Safety and Risk Modeling and Their Applications. (H. Pham (Ed.)). Springer: London, 299-322.
Roberts, F.S., Madigan, D. & Mittal, S. (2011). Efficient sequential decision-making algorithms for container inspection operations. Naval Research Logistics, 58(7), 637-654.
Roberts, F.S. (2010). Greedy algorithms in economic epidemiology. In A. Gumel & S. Lenhart (Eds.), Modeling Paradigms and Analysis of Disease Transmission Models, (249-268). American Mathematical Society, Providence, RI.
Roberts, F. and Dryer, Jr., P.A. (2009). Irreversible k-threshold processes: Graph-theoretical threshold models of the spread of disease and of opinion. Discrete Applied Mathematics, 157, 1615-1627.
Robinson, O.J., Fefferman, N.H., and Lockwood, J.L. (2013). How to effectively manage invasive predators to protect their native prey. Biological Conservation 165, 146-153.
Ryzhov, I.O. & Powell, W.B. (2011). Information collection on a graph. Operations Research, 59(1), 188-201.
Ryzhov, I.O., Powell, W.B. & Frazier, P.I. (2011). The knowledge gradient algorithm for a general class of online learning problems. Operations Research 59(1), 188-201.
Sammons, M., Vinod Vydiswaran, V.G. & Roth, D. (2011). Recognizing Textual Entailment. In I. Zitouni & D. Bikel (Eds.), Multilingual Natural Language Applications: From Theory to Practice, Prentice Hall, Upper Saddle River, NJ.
Sun, Y. & Han, J. (2010). Integrating Clustering and Ranking for Heterogeneous Information Network Analysis. In P.S. Yu, J. Han & C. Faloutsos (Eds.), Link Mining: Models, Algorithms and Applications, (439-474), New York: Springer Publishing.
Xie, M., Singh, K. & Strawderman, W.E. (2011). Confidence distributions and a unified framework for meta-analysis. The Journal of the American Statistical Association, 106(493), 320-333.
Yakubu, A. (2010). Introduction to discrete-time epidemic models. In A. Gumel & S. Lenhart (Eds.), Modeling Paradigms & Analysis of Disease Transmission Models (DIMACS Series in Discrete and Theoretical Computer Science), 75, (83-109), Providence, RI: American Mathematical Society.
Young, C.M., Li, M., Zhu, Y., Xie, M., Elsayed E.A. & Asamov, T. (2010). Multi-objective optimization of a port-of-entry inspection policy. Institute of Electrical and Electronics Engineers (IEEE) Transactions on Automation Science and Engineering, 7(2), 392-400.
Yu, P.S., Han, J. & Faloutsos, C. (Eds.) (2010). Link Mining: Models, Algorithms & Applications, New York: Springer Publishing.
Zhang, G. (2011). Breather solutions of the discrete nonlinear Schrodinger equation with sign changing nonlinearity. Journal of Mathematical Physics, 52(043516).
Zhang, G. & Pankov, A. (2010). Standing waves of the discrete nonlinear Schrodinger equations with unbounded potentials, II. Applicable Analysis, 89, 1541-57.
Conference Proceedings
Abello, J. & Devanur, N. (2011, April). Discrepancy Experiments on IP Traffic Data Sets. Proceedings of the Command, Control, and Interoperability Center for Advanced Data Analysis (CCICADA)-Research Retreat, Morgan State University, Baltimore, MD.
Abello, J., Eliassi-Rad, T. & Devanur, N. (2010, December). Detecting Novel Discrepancies in Communication Networks, Proceedings of the Institute of Electrical and Electronics Engineers (IEEE) International Conference on Data Mining, Sidney, Australia.
Abello, J., Eliassi-Rad, T. & Devanur, N. (2010, September). Detecting Novel Discrepancies in Highly Dynamic Information Networks, Proceedings of the Workshop on Information Networks (WIN), New York University, New York City, NY and the Second CCICADA Retreat, Los Angeles, CA.
Abello, J. & Thompson, B. (2011, August). A Streaming Model for Anomaly Detection in Communication Networks: A Renewal Theory Approach. Proceedings of the Association for Computing Machinery – Knowledge, Discovery and Data Mining, San Diego, CA.
Adali, S., Escriva, R., Goldberg, M.K., Hayvanovych, M., Magdon-Ismail, M., Szymanski, B.K., Wallace, W.A. & Williams, G.T. (2010, May). Measuring Behavioral Trust in Social Networks. Proceedings of the Intelligence and Security Informatics Conference, Vancouver, BC, Canada.
Agarwal, P., Cormode, G., Huang, Z., Phillips, J., Wei, Z. & Yi, K. (2011, June). Mergeable coresets. Proceedings of the Third Workshop on Massive Data Algorithmics (MASSIVE), Paris, France.
Agarwal, G., Kabra, G. & Chang, K.C. (2010, June). Towards Rich Query Interpretation: Walking Back & Forth for Mining Query Templates. Proceedings of the World Wide Web Conference, Raleigh, NC.
Asamov, T., Yamangil, E., Boros, E., Kantor, P.B. & Roberts, F.S. (2011, January). Layered Defense Using Multiple Sensor Types. Proceedings of the Institute for Operations Research Computing Society Conference, Monterey, CA.
Berg, T., Sorokin, A., Wang, G., Forsyth, D., Hoiem, D., Endres, I. & Farhadi, A. (2010). It’s All about the Data. Proceedings of the IEEE, Special Issue on Internet Vision.
Bhagat, S., Cormode, G., Krishnamurthy, B. & Srivastava, D (2010, June). Prediction promotes privacy in dynamic social networks. Proceedings of the Workshop on Online Social Networks, Boston, MA.
Bhagat, S., Cormode, G., Krishnamurthy, B. & Srivastava, D. (2010, June). Privacy in dynamic social networks. Proceedings of the World Wide Web Conference, Raleigh, NC.
Cai, C. & Hovy, E. (2010). Using Eye-tracking to Quantitatively Measure the Readability of Text Summarization Output. Proceedings of the Association of Computational Linguistics Conference. Uppsala, Sweden.
Cai, C. & Hovy, E. (2011, March-April). Linking and Summarizing Textual Information in a Geo-Spatial Information Display System for Response and Recovery. Proceedings of the US Department of Homeland Security Science Conference Fifth Annual University Network Summit, Washington, DC.
Cai, C. & Hovy, E. (2011, April). Continuous Geospatial Monitoring of Catastrophic Natural Disasters using Twitter. Proceedings of the Command, Control, and Interoperability Center for Advanced Data Analysis Research Retreat, Morgan State University, Baltimore, MD.
Cai, C. & Hovy, E. (2011, April). Summarizing Textual Information In a Geo-Spatial Information Display System. Proceedings of the Command, Control, and Interoperability Center for Advanced Data Analysis Research Retreat, Morgan State University, Baltimore, MD.
Cai, C., Hovy, E. & Metzler, D. (2011, March-April). Continuous Geospatial Monitoring of Catastrophic Natural Disasters using Twitter. Proceedings of the US Department of Homeland Security Science Conference Fifth Annual University Network Summit, Washington, DC.
Cai, C. & Hovy, E. (2010, June). Summarizing Textual Information about Locations in a Geo-Spatial Information Display System. Proceedings of the Human Language Technology/North American Association of Computational Linguistics Conference, Los Angeles, CA.
Cao, L., Tian, Y., Liu, Z., Yao, B., Zhang, Z. & Huang, T. (2010). Action Detection using Multiple Spatial-Temporal Interest Point Features. Proceedings of the IEEE International Conference on Multimedia & Expo (ICME).
Chan, Y. & Roth, D. (2010, August). Exploiting Background Knowledge for Relation Extraction. Proceedings of the International Conference on Computational Linguistics, Beijing, China.
Chan, Y. & Roth, D. (2011, June). Exploiting Syntactico-Semantic Structures for Relation Extraction. Proceedings of the Annual Meeting of the Association of Computational Linguistics, Portland, OR.
Chang, M., Connor, M. & Roth. D. (2010, October). The Necessity of Combining Adaptation Methods. Proceedings of the Conference on Empirical Methods in Natural Language Processing, Cambridge, MA.
Chang, M., Goldwasser, D., Roth. D. & Srikumar, V. (2010, June). Discriminative Learning over Constrained Latent Representations. Proceedings of the Annual Meeting of the North American Association of Computational Linguistics, Los Angeles, CA.
Chang, M., Srikumar,V., Goldwasser, D. & Roth. D. (2010, June). Structured Output Learning with Indirect Supervision. Proceedings of the International Conference on Machine Learning, Haifa, Israel.
Charikar, M., Newman, A. & Nikolov, A. (2011, January). Tight Hardness Results for Minimizing Discrepancy. Proceedings of the Symposium on Discrete Algorithms, San Francisco.
Chen, S. & Tian, Y.L. (2011, April). Affect Segmentation and Recognition by Fusion of Facial Features and Body Gesture. Proceedings of the Command, Control, and Interoperability Center for Advanced Data Analysis Research Retreat, Morgan State University, Baltimore, MD.
Chen, C. & Tian, Y. (2010). Door Detection via Signage Context-based Hierarchical Compositional Model. Proceedings of the 2nd Workshop on Use of Context in Video Processing.
Chen, S., Tian, Y., Liu, Q. & Metaxas, D. (2011, March). Segment and Recognize Expression Phase by Fusion of Motion Area and Neutral Divergence Features. Proceedings of the Institute of Electrical and Electronics Engineers International Conference on Automatic Face and Gesture Recognition, Santa Barbara, CA.
Chen, X., Xie, M. & Zhang, C. (2010, July-August). A penalized regression approach in detection of nuclear materials in the shipments to the U.S. Proceedings of the American Statistical Association Joint Statistical Meetings, Vancouver, Canada.
Cheng, T. & Chang, K.C. (2010, March). Beyond Pages: Supporting Efficient, Scalable Entity Search. Proceedings of the International Conference on Extending Data Base Technology, Lausanne, Switzerland.
Cormode, G. (2011, August). Personal privacy vs. population privacy: Learning to attack anonymization. Proceedings of the Association for Computing Machinery – Knowledge, Special Interest Group on Discovery and Data Mining, San Diego, CA.
Cormode, G. (2011, March). Distributed Summaries. Center for Discrete Mathematics and Theoretical Computer Science DIMACS Workshop on Parallelism: A 2020 Vision, Piscataway, NJ.
Cormode, G., Karloff, H. & Wirth, T. (2010, October). Set cover algorithms for very large datasets. Proceedings of the Association for Computing Machinery Conference on Information and Knowledge Management, Toronto, Canada.
Cormode, G., Li, N., Li, T. & Srivastava, D. (2010, September). Minimizing minimality and maximizing utility: Analyzing method-based attacks on anonymized data. Proceedings of the International Conference on Very Large Data Bases, Republic of Singapore.
Cormode, G., McGregor, A., Chakrabati, A. & Kondrapally, R. (2010, October). Information cost tradeoffs for augmented index & streaming language recognition. Proceedings of the Institute of Electrical and Electronics Engineers Symposium on Foundations of Computer Science, Las Vegas, NV.
Cormode, G., Mitzenmacher, M. & Thaler, J. (2010, September). Streaming graph computations with a helpful advisor. Proceedings of the European Symposium on Algorithms, Liverpool, United Kingdom.
Cormode, G., Muthukrishnan, S., Yi, K. & Zhang, Q. (2010, June). Optimal sampling from distributed streams. Proceedings of the Association for Computing Machinery-Principles of Database Systems, Indianapolis, IN.
Cormode, G. & Yi, K. (2011, June). Tracking distributed aggregates over time-based sliding windows (brief announcement). Proceedings of the Association for Computing Machinery – Principles of Distributed Computing, San Jose, CA.
Deng, H., Han, J. & Zhao, B. (2011, July). Collective Topic Modeling for Heterogeneous Networks. Proceedings of the Association for Computing Machinery – International Conference on Research and Development in Information Retrieval, Beijing, China.
Ding, B., Winslett, M., Han, J. & Li, Z. (2011, June). Differentially Private Data Cube: Optimizing Noise Source and Consistency. Proceedings of the Association for Computing Machinery – Special Interest Group on Management of Data Conference, Athens, Greece.
Duan, H. & Zhai, C. (2011, April). Exploiting Thread Structure to Improve Smoothing of Language Models for Forum Post Retrieval. Proceedings of the Conference on Information Retrieval, Dublin, Ireland.
Edwards, A. & Pottenger, W.M. (2011, April). Higher Order Q-Learning. Proceedings of the Institute of Electrical and Electronics Engineers – Symposium on Adaptive Dynamic Programming and Reinforcement Learning, Paris, France.
Fang, Y. & Chang, K.C. (2011, February). Searching Patterns for Relation Extraction over the Web: Rediscovering the Pattern-Relation Duality. Proceedings of the Association for Computing Machinery – Web Search & Data Mining, Hong Kong, People’s Republic of China.
Farhadi, A., Hejrati, M., Sadeghi, A.M., Young, P., Rashtchian, C., Hockenmaier, J. & Forsyth, D. (2010, September). Every Picture tells a Story: Generating Sentences from Images. Proceedings of the European Conference on Computer Vision, Crete, Greece.
Farhadi, A. & Sadeghi, A. (2011, June). Recognition with Visual Phrases. Proceedings of the Institute of Electrical and Electronics Engineers (IEEE) Conference on Computer Vision and Pattern Recognition, Colorado Springs, CO.
Fefferman, N. (2011, April). Disasters and Risk Management – The Stadium Evacuation Project. Proceedings of the Command, Control, and Interoperability Center for Advanced Data Analysis Research Retreat, Morgan State University, Baltimore, MD.
File, C., Kantor, P., Naaman, M. & Roberts, F. (2011, April). The AWSoMe Project: Alerts and Warning with Social Media. Proceedings of the Command, Control, and Interoperability Center for Advanced Data Analysis Research Retreat, Morgan State University, Baltimore, MD.
Fink, E., Sharifi, M. & Carbonell, J.G. (2011). Applications of machine learning and crowdsourcing to detection of cybersecurity threats. Proceedings of the US Department of Homeland Security Science Conference Fifth Annual University Network Summit, Washington, DC.
Fink, E., Sharifi, M., & Carbonell, J.G. (2011, October). SmartNotes: Application of Crowdsourcing to the Detection of Web Threats. Proceedings of the Institute of Electrical and Electronics Engineers International Conference on Systems, Man, and Cybernetics, Anchorage, AK.
Gan, X. (2011, April). JIT-Transportation Model Applied to Homeland Security Problems. Proceedings of the Command, Control, and Interoperability Center for Advanced Data Analysis Research Retreat, Morgan State University, Baltimore, MD.
Ganesan, K., Zhai, C., & Han, J. (2010). Opinosis: A Graph Based Approach to Abstractive Summarization of Highly Redundant Opinions. Proceedings of the International Conference on Computational Linguistics, Beijing, China.
Gao, J., Liang, F., Fan, W., Wang, C., Sun, Y. & Han, J. (2010). Community Outliers and their Efficient Detection in Information Networks. Proceedings of the Association for Computing Machinery – Special Interest Group on Knowledge Discovery and Data Mining Conference on Knowledge Discovery and Data Mining, Washington DC.
Goldwasser, D., Reichart, R., Clarke, J. & Roth, D. (2011). Confidence Driven Unsupervised Semantic Parsing. Proceedings of the Annual Meeting of the Association of Computational Linguistics, Portland, OR.
Greenberg, B. (2011, April). Infectious Disease and Families: The evolution of social complexity in the face of epidemics. Proceedings of the Command, Control, and Interoperability Center for Advanced Data Analysis Research Retreat, Morgan State University, Baltimore, MD.
Greenberg, M., Altiok, T., Fefferman, N., Georgopoulos, P., Lacy, C., Lahr, M., Lioy, P., Lowrie, K., Mayer, H., Ozbas, B. & Roberts, F.S. (2011, March-April). A set of blended risk-based decision support tools for protecting passenger rail-centered transit corridors against cascading impacts of terrorist attacks. Proceedings of the US Department of Homeland Security Science Conference Fifth Annual University Network Summit, Washington, DC.
Grewe, C., Janneck, C. and Pottenger, W.M. (2011, November) Nuclear Detection Using Higher Order Learning. Proceedings of the Institute of Electrical and Electronics Engineers IEEE International Conference on Technologies for Homeland Security, Waltham, MA.
Grinberg, N. & Pottenger, W.M. (2011, April). Entity Resolution of Terrorist Incidents. Proceedings of the Command, Control, and Interoperability Center for Advanced Data Analysis Research Retreat, Morgan State University, Baltimore, MD.
Gupta, M., Aggarwal, C., Han, J. & Sun, Y. (2011, July). Evolutionary Clustering and Analysis of Bibliographic Networks. Proceedings of the International Conference on Advances in Social Network Analysis and Mining, Kaohsiung, Taiwan.
Gupta, M., Sun, Y. & Han, J. (2011, March-April). Trust Analysis with Clustering (poster paper). Proceedings of the International World Wide Web Conference, Hyderabad, India.
Gupte, M., Shankar, P., Li, J., Muthukrishnan, S. & Iftode, L. (2011, March-April). Emergence of hierarchy in directed online social networks. Proceedings of the International World Wide Web Conference, Hyderabad, India.
Han, J. (2010, July). Mining Useful Patterns: An Evolutionary View (Keynote Speech) . Proceedings of the Association for Computing Machinery – Special Interest Group on Knowledge Discovery and Data Mining, Workshop on Useful Patterns, Washington DC.
Han, J., Sun, Y., Yan, X. &Yu, P.S. (2010, June). Mining knowledge from databases: an information network analysis approach (tutorial). Proceedings of the Association for Computing Machinery – Special Interest Group on Management of Data Conference, Indianapolis, IN.
Huang, J., Sun, H., Han, J., Deng, H., Sun, Y. & Liu, Y. (2010, October). SHRINK: A Structural Clustering Algorithm for Detecting Hierarchical Communities in Networks. Proceedings of the Association for Computing Machinery – International Conference on Information and Knowledge Management, Toronto, Canada.
Hui, C., Goldberg, M., Magdon-Ismail, M. & Wallace, W.A. (2010, April). Agent-based Simulation of the Diffusion of Warnings. Proceedings of the Agent-Directed Simulation Symposium – Spring Simulation Multi-conference, Orlando, FL.
Hui, C., Magdon-Ismail, M., Goldberg, M. & Wallace, W.A. (2011, June). Effectiveness of Information Retraction. Proceedings of the Institute of Electrical and Electronics Engineers International Workshop on Network Science, West Point, NY.
Hui, C., Goldberg, M., Magdon-Ismail, M., & Wallace, W.A. (2010, May). Weak Ties and the Diffusion of Information in Dynamic Networks. Proceedings of the International School and Conference on Network Science, Boston, MA.
Hui, C., Magdon-Ismail, M., Wallace, W.A. & Goldberg, M. (2011, October). Aborting a Message Flowing Through Social Communities. Proceedings of the Institute of Electrical and Electronics Engineers International Conference on Social Computing, Cambridge, MA.
Hui, C., Magdon-Ismail, M., Wallace, W.A., & Goldberg, M. (2010, September). Importance of Ties in Information Diffusion. Proceedings of the Workshop on Information In Networks, New York, NY.
Jha, M.K., Udenta, F. & Kang, M.W. (2011, April). A Dynamic Capacitated Arc Routing Problem for Optimal Evacuation Strategies in Disasters. Proceedings of the Command, Control, and Interoperability Center for Advanced Data Analysis Research Retreat, Morgan State University, Baltimore, MD.
Ji, M., Han, J. & Danilevsky, M.(2011, August). Ranking-Based Classification of Heterogeneous Information Networks. Proceedings of the Association for Computing Machinery – Special Interest Group on Knowledge Discovery and Data Mining, San Diego, CA.
Ji, M., Sun, Y., Danilevsky, M., Han, J. & Gao, J. (2010, September). Graph Regularized Transductive Classification on Heterogeneous Information Networks. Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases, Barcelona, Spain.
Ji, M., Yan, J., He, X., Han, J. & Gu, S. (2011, July). Learning Search Tasks in Queries and Web Pages via Graph Regularization. Proceedings of the Association for Computing Machinery – International Conference on Research and Development in Information Retrieval, Beijing, China.
Jin, X., Wang, C., Luo, J., Yu, X. & Han, J. (2011, August). LikeMiner: A System for Mining the Power of Like in Social Media Networks. Proceedings of the Association for Computing Machinery – Special Interest Group on Knowledge Discovery and Data Mining, San Diego, CA.
Johri, N., Roth. D. & Tu, Y. (2010, June). Experts Retrieval with Multiword-Enhanced Author Topic Model. Proceedings of Human Language Technology/North American Association of Computational Linguistics Conference, Semantic Search Workshop, Los Angeles, CA.
Joyal, R.G. (2011, March-April). Urban Commerce & Security Study (U-CASS): Soliciting Stakeholder Groups & Eliciting Security Decision-Making Processes. Proceedings of the US Department of Homeland Security Science Conference Fifth Annual University Network Summit, Washington, DC.
Joyal, R.G. (2010). An Economic Review of Risk & Security. Command Control and Interoperability Center for Advanced Data Analysis, Rutgers, the State University of New Jersey, Piscataway, NJ.
Karimzadehgan, M. & Zhai, C. (2010, July). Estimation of Statistical Translation Models Based on Mutual Information for Ad Hoc Information Retrieval. Proceedings of the Association for Computing Machinery – International Conference on Research and Development in Information Retrieval, Geneva, Switzerland.
Kelly, C.A., Janneck, C.D. and Pottenger, W.M. (2011, August) Statistical Relational Learning Technologies for Microtext Applications. Proceedings of the Association for the Advancement of Artificial Intelligence Workshop on Microtext Analysis. San Francisco, CA.
Khac Le, H., Pasternack, J., Ahmadi, H., Gupta, M., Sun, Y., Abdelzaher, T., Han, J. & Roth, D. (2011, April). Apollo: Towards Factfinding in Participatory Sensing. Association for Computing Machinery – International Conference on Information Processing in Sensor Networks, Chicago, IL.
Kim, H.D., Zhai, C. & Han, J. (2010, March). Aggregation of Multiple Judgments for Evaluating Ordered Lists. Proceedings of the Conference on Information Retrieval, Milton Keynes, UK.
Kim, S., Kim, H., Weninger, T., Han, J. & Kim, H.D. (2011, July). Authorship Classification: A Discriminative Syntactic Tree Mining Approach. Proceedings of the Association for Computing Machinery – International Conference on Research and Development in Information Retrieval, Beijing, China.
Kotov, A. & Zhai, C. (2010, June). Towards Natural Question-Guided Search. Proceedings of the World Wide Web Conference, Raleigh, NC.
Li, C., Han, J., Jin, X., Sun, Y., Yu, Y. & Wu, T. (2010, March). Fast Computation of SimRank for Static and Dynamic Information Networks. Proceedings of the International Conference on Extending Data Base Technology, Lausanne, Switzerland.
Li, H., Liu, C., Liu, X., Diakite, M., Burge, L., Yakubu, A. & Southerland, W. (2010, December). Peptide Sequence Tag-Based Blind Identification-based SVM model. Proceedings of the Ninth International Conference on Machine Learning and Applications, Bethesda, MD.
Li, Z., Ding, B., Han, J., Kays, R. & Nye, P. (2010). Mining Periodic Behaviors for Moving Objects. Proceedings of the Association for Computing Machinery Special Interest Group on Knowledge, Discovery and Data Mining, Washington, DC.
Liu, C., Li, H., Leonce, A., Burge, L., Trimble, J., Keiller, P. & Yakubu, A. (2010, December) A Heuristic Algorithm for Finding the Longest Pathways in a Biochemical Network. Proceedings of the Ninth International Conference on Machine Learning and Applications, Bethesda, MD.
Lo, D., Ding, B., Lucia & Han, J. (2011, April). Bidirectional Mining of Non-Redundant Recurrent Rules from a Sequence Database. Proceedings of the International Conference on Data Engineering, Hannover, Germany.
Lu, Y., Duan, H., Wang, H. & Zhai, C. (2010, December). Exploiting Structured Ontology to Organize Scattered Online Opinions. Proceedings of the International Conference on Computational Linguistics, Beijing, China.
Lv, Y. & Zhai, C. (2010, July). Positional Relevance Model for Pseudo-Relevance Feedback. Proceedings of the Association for Computing Machinery – International Conference on Research and Development in Information Retrieval, Geneva, Switzerland.
Marszalek, A. (2011, April). A New Methodology for Outbreak Detection. Proceedings of the Command, Control, and Interoperability Center for Advanced Data Analysis Research Retreat, Morgan State University, Baltimore, MD.
Metzler, D., Cai, C. & Hovy, E.H. (2011, June). Microblog Event Retrieval using Temporal Query Expansion. Proceedings of the Annual Meeting of the Association of Computational Linguistics, Portland, OR.
Mir, D., Muthukrishnan, S., Nikolov, A. & Wright, R. (2011, June). Pan-private Algorithms via Statistics on Sketches. Proceedings of the Association for Computing Machinery Symposium on Principles of Database Systems, Athens, Greece.
Mir, D., Nikolov, A., Muthukrishnan, S. & Wright, R.N. (2011, June). Pan-private algorithms: When memory does not help. Proceedings of the Association for Computing Machinery Symposium on Principles of Database Systems, Athens, Greece.
Ness, L. (2011, April). Fast Multi-Scale Data Analysis Algorithms. Proceedings of the Command, Control, and Interoperability Center for Advanced Data Analysis Research Retreat, Morgan State University, Baltimore, MD.
Nkwanta, A. (2011). A contact waiting time metric for RNA folding. Proceedings of the Center for Discrete Mathematics and Theoretical Computer Science/Mathematical Biosciences Institute United States – African BioMathematics Initiative: Workshop on Genetics and Disease Control, Elmina, Ghana.
Oster, M. (2011, April). An Exact Algorithm for Scheduling Multi-track Conferences. Proceedings of the Command, Control, and Interoperability Center for Advanced Data Analysis Research Retreat, Morgan State University, Baltimore, MD.
Pasternack, J. & Roth, D. (2011, March-April). Generalized Fact-Finding. Proceedings of the International World Wide Web Conference, Hyderabad, India.
Pasternack, J. & Roth, D. (2010, November-December). Comprehensive Trust Metrics for Information Networks, Army Science Conference, Orlando, FL.
Pasternack, J. & Roth, D. (2010, December). Knowing What to Believe (When You Already Know Something). Proceedings of the International Conference on Computational Linguistics, Beijing, China.
Paul, M.J., Zhai, C. & Girju, R. (2010, October). Summarizing Contrastive Viewpoints In Opinionated Text. Proceedings of the 2010 Conference on Empirical Methods in Natural Language Processing, MIT, Massachusetts.
Pham, K.C., Rizzolo, N., Small, K., Chang, KC. & Roth, D. (2010, June). Object Search: Supporting Structured Queries in Web Search Engines. Proceedings of the Human Language Technologies Annual Conference of the North American Chapter of the Association for Computational Linguistics, Workshop on Semantic Search, Los Angeles, CA.
Polverini, A.B. & Pottenger, W.M. (2011, June). Using Clustering to Detect Chinese Censorware. Proceedings of the Institute of Electrical and Electronics Engineers Conference on Dependable Systems & Networks, Hong Kong, People’s Republic of China.
Polverini, A. B. & Pottenger, W. M. (2011, October). Using Clustering to Detect Chinese Censorware. 7th Annual Cyber Security and Information Intelligence Research Workshop, Oak Ridge, TN.
Pottenger, W.M., Kelly, C.A. & Willett, H. C. (2010, July). Emerging Applications of Statistical Relational Learning in Counterterrorism and Law Enforcement. Proceedings of the National Counterterrorism Center – Terrorism Incidents Conference.
Ratinov, L., Bengio, Y. & Turian, J. (2010, July). Word representations: A simple and general method for semi-supervised learning. Proceedings of the Annual Meeting of the Association of Computational Linguistics, Uppsala, Sweden.
Ryzhov, I.O. & Powell, W.B. (2010, October) Approximate Dynamic Programming with Correlated Bayesian Beliefs. Proceedings of the Forty-Eighth Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL.
Ryzhov, I.O., Frazier, P.I. & Powell, W.B. (2010, May). On the Robustness of a One-Period Look-ahead Strategy for Multi-armed Bandit Problems. Proceedings of the International Conference on Computer Science, Amsterdam, Netherlands.
Ryzhov, I.O. & Powell, W.B. (2011, April). Bayesian Active Learning with Basis Functions. Proceedings of the Institute of Electrical and Electronics Engineers Workshop on Adaptive Dynamic Programming and Reinforcement Learning, Paris, France.
Roberts, F.S. (2011, March-April). Urban Commerce and Security Study. Proceedings of the US Department of Homeland Security Science Conference Fifth Annual University Network Summit, Washington, DC.
Roberts, F., Cheng, J., and Xie, M. (2009). Design and deployment of a mobile sensor network for the surveillance of nuclear materials in metropolitan areas. Proceedings of 15th International Conference on Reliability and Quality of Design (ISSAT09)
Ryzhov, I. O., Valdez-Vivas, M. & Powell, W.B. (2010). Optimal Learning of Transition Probabilities for the Two-Agent Newsvendor Problem. Proceedings of the Electrical and Electronics Engineers Winter Simulation Conference, Baltimore, MD.
Samuel, G. (2011, April). Modeling the BP Oil Spill. Proceedings of the Command, Control, and Interoperability Center for Advanced Data Analysis Research Retreat, Morgan State University, Baltimore, MD.
Sammons, M., Vinod Vydiswaran, V.G. & Roth, D (2010, July). Ask not what Textual Entailment can do for you…. Proceedings of the Annual Meeting of the Association of Computational Linguistics, Uppsala, Sweden.
Scott, W., Powell, W.B. & Simao, H.P. (2010, December). Calibrating Simulation Models using the Knowledge Gradient with Continuous Parameters. Proceedings of the Electrical and Electronics Engineers Winter Simulation Conference, Baltimore, MD.
Senior, A., Tian, Y., & Lu, M. (2010). Interactive Motion Analysis for Video Surveillance and Long Term Scene Monitoring, Proceedings of the Tenth International Workshop on Visual Surveillance.
Sharifi, M., Fink, E. & Carbonell, J.G. (2011, August). Detection of Internet Scam Using Logistic Regression. Proceedings of the Conference on Artificial Intelligence, San Francisco, CA.
Sharifi, M., Fink, E. & Carbonell, J.G. (2011, August). SmartNotes: Application of Crowdsourcing to Detection of Web Threats. Proceedings of the Conference on Artificial Intelligence, San Francisco, CA.
Sharifi, M., Fink, E. & Carbonell, J.G. (2010, October). Learning of personalized security settings. Proceedings of the Institute of Electrical and Electronics Engineers International Conference on Systems, Man, and Cybernetics, Istanbul, Turkey. (Available at www.cs.cmu.edu/~eugene/research/full/security-assist.pdf.)
Sharifi, M., Morel, B., Fink, E. & Carbonell, J.G. (2010, October). A Graph-based Approach for Detection of Cross-site Request Forgery. Proceedings of the Institute of Electrical and Electronics Engineers International Conference on Systems, Man, and Cybernetics, Istanbul, Turkey.
Sondhi, P., Gupta, M. Zhai, C.-X. & Hockenmaier, J. (2010, December). Shallow Information Extraction from Medical Forum Data. Proceedings of the International Conference on Computational Linguistics, Beijing, China.
Sun, Y., Barber, R., Gupta, M., Aggarwal, C. & Han, J. (2011, July). Co-Author Relationship Prediction in Heterogeneous Bibliographic Networks. Proceedings of the International Conference on Advances in Social Network Analysis and Mining, Kaohsiung, Taiwan.
Sun, Y. & Han, J. (2011, April). When Will It Happen-Relationship Prediction in Heterogeneous Information Networks. Proceedings of the Command, Control, and Interoperability Center for Advanced Data Analysis Research Retreat, Morgan State University, Baltimore, MD.
Sun, Y., Han, J., Yan, X., Yu, P.S. & Wu, T. (2011, August). PathSim: Meta Path-Based Top-K Similarity Search in Heterogeneous Information Networks. Proceedings of the International Conference on Very Large Data Bases, Seattle, WA.
Sun, Y., Tang, J., Han, J., Gupta, M. & Zhao, B. (July, 2010). Community Evolution Detection in Dynamic Heterogeneous Information Networks. Proceedings of the Knowledge, Discovery and Data Mining Workshop on Mining and Learning with Graphs, Washington DC.
Tang, L.A., Yu, X., Kim, S., Han, J., Hung C.C. & Peng, W. (2010, December). Tru-Alarm: Trustworthiness Analysis of Sensor Networks in Cyber-Physical Systems. Proceedings of the Institute of Electrical and Electronics Engineers – International Conference on Data Mining, Sydney, Australia.
Tannouri, A., Tannouri, S. & Kauffman, B. (2011, April). Strategies to Deploy Temporary Ambulatory Medical Services in Response of a Catastrophic Event. Proceedings of the Command, Control, and Interoperability Center for Advanced Data Analysis Research Retreat, Morgan State University, Baltimore, MD.
Tian, Y., R. Feris, H. Liu, A. Hampapur, & Sun, M. (2010). Robust Detection of Abandoned and Removed Objects in Complex Surveillance Videos. Proceedings of the IEEE Transactions on Systems, Man, and Cybernetics–Part C: Applications and Reviews.
Tian, Y., Yang, X., & Arditi, A. (2010). Computer Vision-Based Door Detection for Accessibility of Unfamiliar Environments to Blind Persons. Proceedings of the 12th International Conference on Computers Helping People with Special Needs.
Tian, Y., Yi, C., & Arditi, A. (2010). Improving Computer Vision-Based Indoor Wayfinding for Blind Persons with Context Information. Proceedings of the 12th International Conference on Computers Helping People with Special Needs.
Tian, Y., & Yuan, S. (2010). Clothes Matching for Blind and Color Blind People. Proceedings of the 12th International Conference on Computers Helping People with Special Needs.
Titov, I, Klementiev, A., Small, K. & Roth, D. (2010, May). Unsupervised Aggregation for Classification Problems with Large Numbers of Categories. Proceedings of the 13th International Conference on Artificial Intelligence and Statistics, Sardinia, Italy.
Tran, D. & Forsyth, D. (2010, September). Improved Human Parsing with a Full Relational Model. Proceedings of the European Conference on Computer Vision, Crete, Greece.
Tratz, S. & Hovy, E. (2010, July). A Taxonomy, Dataset, and Classifier for Automatic Noun Compound Interpretation. Proceedings of the 48th Annual Meeting of the Association for Computational Linguistics, Uppsala, Sweden.
Tyshchuk, Y., Hui, C., Grabowski, M. & Wallace, W.A. (2012, January). Social Media and Warning Response Impacts in Extreme Events: Results from a Naturally Occurring Experiment. Proceedings of the Annual Hawaii International Conference on System Sciences, Grand Wailea, Maui, HI.
Tu, Y., Johri, N., Roth, D. & Hockenmaier, J. (2010, August). Citation Author Topic Model in Expert Search. Proceedings of the International Conference on Computational Linguistics, Beijing, China.
Udenta, F. (2011, April) A Dynamic Capacitated Arc Routing Problem for Optimal Evacuation Strategies in Disasters. Proceedings of the Command, Control, and Interoperability Center for Advanced Data Analysis Research Retreat, Morgan State University, Baltimore, MD.
Vassiliou, M.S. (2011, April). Innovation Patterns in Some Successful C2 Technologies. Proceedings of the Command, Control, and Interoperability Center for Advanced Data Analysis Research Retreat, Morgan State University, Baltimore, MD.
Vassiliou, M.S. (2011, April). The Evolution Towards Decentralized C2. Proceedings of the Command, Control, and Interoperability Center for Advanced Data Analysis Research Retreat, Morgan State University, Baltimore, MD.
Vinod Vydiswaran, V.G. & Roth, D. (2011, April). Evidence-based Trust Propagation Framework. Proceedings of the Command, Control, and Interoperability Center for Advanced Data Analysis Research Retreat, Morgan State University, Baltimore, MD.
Wang, H. & Hovy, E.H. (2011, April). Discovering Connections Between and Within DHS Centers of Excellence. Proceedings of the Command, Control, and Interoperability Center for Advanced Data Analysis Research Retreat, Morgan State University, Baltimore, MD.
Wang, H., Lu,Y. & Zhai, C. (2010). Latent Aspect Rating Analysis on Review Text Data: A Rating Regression Approach. Proceedings of the 17th Association for Computing Machinery’s Special Interest Group on Knowledge Discovery and Data Mining.
Wang, C., Raina, R., Fong, D., Zhou, D., Han, J. & Badros, G. (2011, July). Learning Relevance in a Heterogeneous Social Network and Its Application in Online Targeting. Proceedings of the Association for Computing Machinery – International Conference on Research and Development in Information Retrieval, Beijing, China.
Wang, C., Tang, J., Sun, J. & Han, J. (2011, July). Dynamic Social Influence Analysis through Time-Dependent Factor Graphs. Proceedings of the International Conference on Advances in Social Network Analysis and Mining, Kaohsiung, Taiwan.
Wang, H., Zhai, C.X., Han, J. & Wang, C. (2011, July). Learning Online Discussion Structures by Conditional Random Fields. Proceedings of the Association for Computing Machinery – International Conference on Research and Development in Information Retrieval, Beijing, China.
Wang, H., Zhang, D. & Zhai, C. (2011, June). Structural Topic Model for Latent Topical Structure Analysis. Proceedings of the Annual Meeting of the Association of Computational Linguistics, Portland, OR.
Weninger, T., Danilevsky, M., Fumarola, F., Hailpern, J., Han, J., Ji, M., Johnston, T.J., Kallumadi, S., Kim, H., Li, Z., McCloskey, D., Sun, Y., TeGrotenhuis, N.E., Wang, C. & Yu, X. (2011, June). WinaCS: Construction & Analysis of Web-Based Computer Science Information Networks. Proceedings of the Association for Computing Machinery – Special Interest Group on Management of Data: International Conference on Management of Data, Athens, Greece.
Wu, T. (2011, August). A Framework for Promotion Analysis in Multi-Dimensional Space. Proceedings of the Association for Computing Machinery – Knowledge, Special Interest Group on Discovery and Data Mining, San Diego, CA.
Wu, T., Sun, Y., Li, C. & Han, J. (2010, March). Region-based Online Promotion Analysis. Proceedings of the International Conference on Extending Data Base Technology, Lausanne, Switzerland.
Yang, X. & Tian, Y. (2010). Robust Door Detection in Unfamiliar Environments by Combining Edge and Corner Features. Proceedings of the 3rd Workshop on Computer Vision Applications for the Visually Impaired. San Francisco, CA.
Yang, X., Tian, Y., Yi, C., & Arditi, A. (2010). Context-based Indoor Object Detection as an Aid to Blind Persons Accessing Unfamiliar Environments. Proceedings of the International Conference on ACM Multimedia. Firenze, Italy.
Yang, Y., Sun, Y., Pandit, S., Chawla, N. & Han, J. (2011, July). Is Objective Function the Silver Bullet? A Case Study of Community Detection Algorithms on Social Networks. Proceedings of the International Conference on Advances in Social Network Analysis and Mining, Kaohsiung, Taiwan.
Yuan, S. & Tian, Y. (2010). Rotation and Illumination Invariant Texture Analysis: Matching Clothes with Complex Patterns for Blind People. Proceedings of the 3rd International Congress on Image and Signal Processing. Yantai, China.
Zhang, D., Mei, Q. & Zhai, C. (2010). Cross-Lingual Latent Topic Extraction. Proceedings of the 48th Annual Meeting of the Association for Computational Linguistics.
Zhang, G. (2011, April). Shape-free detection of hazard materials and its application to counter-terrorism. Proceedings of the Command, Control, and Interoperability Center for Advanced Data Analysis Research Retreat, Morgan State University, Baltimore, MD.
Zhang, G. (2011, May-June). Microlocal Analysis and Radar Imaging. Applied Mathematics and Image Processing Summer Workshop, Edinburg, TX.
Zhou, M., Cheng, T. & Chang, K.C-C. (2010, August). Data-oriented Content Query System: Searching for Data into Text on the Web. Proceedings of the Association for Computing Machinery – Web Search & Data Mining, Hong Kong, People’s Republic of China.
Zhu, F., Qu, Q., Lo, D., Yan, X., Han, J. & Yu, P.S. (2011, August). Mining Top-K Large Structural Patterns in a Massive Network. Proceedings of the International Conference on Very Large Data Bases, Seattle, WA.
Papers in Preparation
Abello, J. Tracking Network Evolution.
Abello, J. & Thompson, B. (2011). A Streaming Model for Anomaly Detection in Communication Networks. Proceedings of the 11th International Conference on Data Mining, Vancouver, Canada.
DeNegre, A. & Fefferman, N.H. Social Empathy as a Motivator towards Health Risks: A New Hypothesis for Young Adult Behaviors.
DeNegre, A., Fefferman, N.H., et al. (i.e., participating members of the November 16 – 18, 2009, Center for Discrete Mathematics and Theoretical Computer Science (DIMACS) workshop. Mathematical Modeling for Behavioral Epidemiology: Closing Existing Gaps & Finding Important New Directions, Piscataway, NJ.
Fefferman, N.H. & Hove-Musekwa, S. The Impact of Stress-related Immunosuppression in Disease Outbreak Dynamics.
Fefferman, N.H., Li, N., Blue, P. & Yakubu, A. Schrnvdinger’s Cat & Epidemiological Modeling: Human behavior & the estimation of etiological parameters from reported outbreaks.
Feng, Z., Liu, R., Qiu, Z., Rivera, J. & Yakubu, A. (2011). Coexistence of competitors in deterministic and stochastic patch environments. Journal of Biological Dynamics.
Fink, E., Sharifi, M. & Carbonell, J.G. (2011). Applications of machine learning and crowdsourcing to detection of cybersecurity threats. Journal of Homeland Security.
Fink, E., Sharifi, M., & Carbonell, J.G. Detection of internet scam using logistic regression.
Fink, E., Sharifi, M., Morel, B. & Carbonell, J.G. Learning to detect cross-site request forgery.
George, C. & Pottenger, W.M. (2011), First Order Na-Nove Bayes. Proceedings of the International Conference on Data Engineering and Internet Technology, Bali, Indonesia.
Janson, S., Nakamura, B. and Zeilberger, D.. On the Asymptotic Statistics of the Number of Occurrences of Multiple Permutation Patterns.
Jin, X., Luo, J., Yu, J., Wang, G., Joshi, D. & Han, J. (2011). Reinforced similarity integration in image-rich information networks. IEEE Transactions on Knowledge and Data Engineering.
Kulenovic, M.R.S., Nurkanovic, M. & Yakubu, A. (2011). Asymptotic behavior of a discrete-time density dependent SI epidemic model with constant recruitment. Journal of Differential Equations.
Li, N. & Yakubu, A. (2011). A Juvenile-adult discrete-time production model of exploited fishery systems. Natural Resource Modeling.
Lofgren, E. & Fefferman, N.H. The Impact of Climate Change on Endemic Rotavirus in the Developed World.
Newman, A. & Nikolov, A. A Counterexample to Beck’s Conjecture on the Discrepancy of Three Permutations.
Nikolov, A. & Pottenger, W.M. Higher-order modularity clustering for community discovery.
Roberts, F.S., Greenberg, M., Altiok, T., Fefferman, N., Georgopoulos, P., Lacy, C., Lahr, M., Lioy, P., Lowrie, K., Mayer, H. & Ozbas, B. A set of blended risk-based decision support tools for protecting passenger rail-centered transit corridors against cascading impacts of terrorist attacks. Journal of Homeland Security.
Pritsker, A., Kebir, A. & Fefferman, N.H. The Epidemiological Impact of Perceived Risk from Reported Incidence & Prevalence & Resulting Changes in Sexual Behavior for HIV/AIDS.
Ryzhov, I.O. & Powell, W.B. (2010). Information collection in a linear program. Mathematics of Operations Research.
Scott, W., Frazier, P. & Powell, W.B. (2010). The correlated knowledge gradient for maximizing expensive continuous functions with noisy observations using Gaussian process regression. Society for Industrial and Applied Mathematics (SIAM) Journal on Optimization.
Seiler, M.J., Collins, A.J., and N.H. Fefferman. Strategic Mortgage Default in the Context of a Social Network: An Epidemiological Approach. Journal of Real Estate Research.
Yamangil, E., Asamov, T., Boros, E., Roberts, F.S., Kantor, P.B. & Darlay, J. Design of Robust Ports.
Zhu, Y., Li, M., Young, C.M., Xie, M. & Elsayed, E.A. (2011). Port of entry inspection policies: Incorporation of measurement errors. Annals of Operations Research.
Zarandioon, S., Yao, D. & Ganapathy, V. (2011). Secure mashups for identity management with in-browser cryptography support. Identity in the Information Society.