|
Authors
|
Title
|
| Aaron Tabor, Gerhard Dueck, Kenneth B. Kent |
Assessing the Suitability of Transactional Memory Synchronization in Concurrent GC |
| Abdullah J. Alzahrani and Ali A. Ghorbani |
SMS Mobile Botnet Detection Framework |
| Amirhossein Gharib and Ali A. Ghorbani |
Scalable Android Application Repackaging Detection |
| Amy Seo, Bradford G. Nickerson and Wei Song |
Indoor Localization Supporting Smartphone Advertising |
| Andi Fitriah A.Kadir, Natalia Stakhanova, Ali A.Ghorbani |
An Empirical Analysis of Android Banking Malware |
| Andrii Kuch, Kenneth B. Kent, Gerhard W. Dueck |
Reinforcement Learning in Garbage Collection |
| Bing Yang, Kenneth B. Kent, Eric Aubanel |
Multi-tier Data Synchronization Based on An Optimized Concurrent Linked-list |
| Chenwei Wang, Eric Aubanel, David Bremner, Michael Dawson |
Characterizing Concurrency of Java Programs |
| Daniel King and Bradford G. Nickerson |
Real-time Wireless Control via Ultra-Wideband (UWB) Communication |
| Dave Kell, Andrew McAllister, Steve O’Hara |
Identifying Data Flows Across Multiple Boundaries and Programming Languages |
| Fan Liang, Weichang Du |
Big Data Analytics Toolkit for Business Data |
| Fatemeh Razzaghi and Ali A. Ghorbani |
Context Free Frequently Asked Questions (FAQs) Detection using Machine Learning Techniques |
| Federico Sogaro, Kenneth B. Kent, Eric Aubanel, Peter Shipton |
MicroJIT: A Lightweight Just-in-Time Compiler to Improve Startup Times |
| Gerard D. Gil, Arash H. Lashkari, MSI Mamun, Ali A. Ghorbani |
Characterization of Encrypted and VPN Traffic Using Time-Related Features |
| Hamed Minaee and Ali A. Ghorbani |
Automatic Sarcasm Detection in Blog Posts |
| Hossein Hadian Jazi and Ali A. Ghorbani |
A Dynamic Graph-based Malware Classifier |
| Hugo Gonzalez, Andi A. Kadir, Natalia Stakhanova, Ali A. Ghorbani |
Exploring Reverse Engineering Symptoms in Android apps |
| Hugo Gonzalez, Natalia Stakhanova, Ali A. Ghorbani |
Automated Semi-supervised Authorship Attribution of Android Binaries |
| Jaleh sadat Mahdavi Moghaddam, Patricia A. Evans |
Inferring Political Preferences of Active Content Consumers in Twitter |
| Johannes Ilisei, Kenneth B. Kent, Gerhard W. Dueck |
Extending Balanced Garbage Collection by Reference Counting |
| Kamran Morovati, Natalia Stakhanova |
Authorship Attribution of Obfuscated Binaries |
| Karthikeyan Sugumar, Jay Buckler, Suprio Ray |
Big Data Systems for the Internet of Things (IoT) |
| Kenneth F. Mbah, Ali A. Ghorbani |
A New Phishing E-Mail Detection Approach |
| Konstantin Nasartschuk, Aleksander Micic, Kenneth B. Kent |
VM Internal Object Pools |
| Luke Dillman, James McManus, Scott Bateman |
Comparison of Absolute vs. Relative Position Tracking With and Without a 'Bubble Assist' Technique: A Fitts’s Law Analysis |
| Mahsa Kiani, Virendrakumar C. Bhavsar, and Harold Boley |
A Fuzzy Graph-Based Retrieval System for Health Research |
| Mallik I. Hassan, Kenneth B. Kent, Gerhard W. Dueck |
Region-Based Finalization |
| Maria Patrou, Panagiotis Patros, Kenneth B. Kent, Gerhard Dueck |
NUMA Aware Garbage Collection |
| Milton King, Paul Cook |
Supervised and Unsupervised Approaches to Word Usage Similarity |
| Nabil Fannoush, Patricia A. Evans |
Structure Based RNA Sequence Assembly |
| Panagiotis (Panos) Patros, Dayal Dilli, Stephen A. MacKay, Kenneth B. Kent, Michael Dawson |
Improving PaaS Multitenancy |
| Prasanna Iyengar, Jenna Tyler, Suprio Ray |
Recipe Recommendation Using Graph Databases: Personalized Nutrition, Ingredient Substitution, and More |
| Puya Memarzia, Virendra Bhavsar, and Suprio Ray |
Graph Similarity Computations on Large Graph Databases |
| Raphael Beaulieu, Elliot Coy |
Determining the Effectiveness of Alternate Controller Inputs for Aiming in Video Games |
| Rizwan Ali and Ali A. Ghorbani |
Bursty Topic Detection with application to Twitter |
| Shijie Xu, David Bremner |
Method Handle Graph JIT Compilation |
| SoHyun Park, Joshua Smith, Prasanna Iyengar |
A Comparative Study of Target Assistance For Pointing with a Camera Mouse |
| SoHyun Park, Afsaneh Fazly, Annie Lee, Brandon Seibel, Wenjie Zi, Paul Cook |
Classifying Out-Of-Vocabulary Terms in a Domain-Specific Social Media Corpus |
| Stuart A. MacGillivray and Bradford G. Nickerson |
Size Limited Bounding Polygons for Planar Point Sets |
| Taees Eimouri, Kenneth B. Kent, Aleksandar Micic, Karl Taylor |
Using Field Access Frequency to Optimize Layout of Objects in the JVM |
| Tim Beauchamp, Nathaniel Brewer, Maria Patrou, Suprio Ray |
Dynamic Declustering for Parallel Spatial Databases |
| Tristan Basa, Gerhard W. Dueck, Kenneth B. Kent |
Thread-based, Region-based Memory Management |
| Vaibhavi Kalgutkar, Natalia Stakhanova, Paul Cook |
Android authorship attribution through analysis of String n-grams |
| Waseem Gharbieh, Milton King, SoHyun Park, Paul Cook |
Semantic Textual Similarity: A Unified Framework for Semantic Processing and Evaluation |
| Yan Li, Natalia Stakhanova |
Android application classification based on meta-data |
| Yiming Zhao and Wei Song |
Social-Aware Energy-Efficient Data Dissemination with D2D Communications |