| 
       Authors 
       | 
      
       Title 
       | 
    
    
      | Aaron Tabor, Gerhard Dueck, Kenneth B. Kent | 
      Assessing the Suitability of Transactional Memory Synchronization in Concurrent GC | 
    
    
      | Abdullah J. Alzahrani and Ali A. Ghorbani | 
      SMS Mobile Botnet Detection Framework | 
    
    
      | Amirhossein Gharib and Ali A. Ghorbani | 
      Scalable Android Application Repackaging Detection | 
    
    
      | Amy Seo, Bradford G. Nickerson and Wei Song | 
      Indoor Localization Supporting Smartphone Advertising | 
    
    
      | Andi Fitriah A.Kadir, Natalia Stakhanova, Ali A.Ghorbani | 
      An Empirical Analysis of Android Banking Malware | 
    
    
      | Andrii Kuch, Kenneth B. Kent, Gerhard W. Dueck | 
      Reinforcement Learning in Garbage Collection | 
    
    
      | Bing Yang, Kenneth B. Kent, Eric Aubanel | 
      Multi-tier Data Synchronization Based on An Optimized Concurrent Linked-list | 
    
    
      | Chenwei Wang, Eric Aubanel, David Bremner, Michael Dawson | 
      Characterizing Concurrency of Java Programs | 
    
    
      | Daniel King and Bradford G. Nickerson | 
      Real-time Wireless Control via Ultra-Wideband (UWB) Communication | 
    
    
      | Dave Kell, Andrew McAllister, Steve O’Hara | 
      Identifying Data Flows Across Multiple Boundaries and Programming Languages | 
    
    
      | Fan Liang, Weichang Du | 
      Big Data Analytics Toolkit for Business Data | 
    
    
      | Fatemeh Razzaghi and Ali A. Ghorbani | 
      Context Free Frequently Asked Questions (FAQs) Detection using Machine Learning Techniques | 
    
    
      | Federico Sogaro, Kenneth B. Kent, Eric Aubanel, Peter Shipton | 
      MicroJIT: A Lightweight Just-in-Time Compiler to Improve Startup Times | 
    
    
      | Gerard D. Gil, Arash H. Lashkari, MSI Mamun, Ali A. Ghorbani | 
      Characterization of Encrypted and VPN Traffic Using Time-Related Features | 
    
    
      | Hamed Minaee and Ali A. Ghorbani | 
      Automatic Sarcasm Detection in Blog Posts | 
    
    
      | Hossein Hadian Jazi and Ali A. Ghorbani | 
      A Dynamic Graph-based Malware Classifier | 
    
    
      | Hugo Gonzalez, Andi A. Kadir, Natalia Stakhanova, Ali A. Ghorbani | 
      Exploring Reverse Engineering Symptoms in Android apps | 
    
    
      | Hugo Gonzalez, Natalia Stakhanova, Ali A. Ghorbani | 
      Automated Semi-supervised Authorship Attribution of Android Binaries | 
    
    
      | Jaleh sadat Mahdavi Moghaddam, Patricia A. Evans | 
      Inferring Political Preferences of Active Content Consumers in Twitter | 
    
    
      | Johannes Ilisei, Kenneth B. Kent, Gerhard W. Dueck | 
      Extending Balanced Garbage Collection by Reference Counting | 
    
    
      | Kamran Morovati, Natalia Stakhanova | 
      Authorship Attribution of Obfuscated Binaries | 
    
    
      | Karthikeyan Sugumar, Jay Buckler, Suprio Ray | 
      Big Data Systems for the Internet of Things (IoT) | 
    
    
      | Kenneth F. Mbah, Ali A. Ghorbani | 
      A New Phishing E-Mail Detection Approach | 
    
    
      | Konstantin Nasartschuk, Aleksander Micic, Kenneth B. Kent | 
      VM Internal Object Pools | 
    
    
      | Luke Dillman, James McManus, Scott Bateman | 
      Comparison of Absolute vs. Relative Position Tracking With and Without a 'Bubble Assist' Technique: A Fitts’s Law Analysis | 
    
    
      | Mahsa Kiani, Virendrakumar C. Bhavsar, and Harold Boley | 
      A Fuzzy Graph-Based Retrieval System for Health Research | 
    
    
      | Mallik I. Hassan, Kenneth B. Kent, Gerhard W. Dueck | 
      Region-Based Finalization | 
    
    
      | Maria Patrou, Panagiotis Patros, Kenneth B. Kent, Gerhard Dueck | 
      NUMA Aware Garbage Collection | 
    
    
      | Milton King, Paul Cook | 
      Supervised and Unsupervised Approaches to Word Usage Similarity | 
    
    
      | Nabil Fannoush, Patricia A. Evans | 
      Structure Based RNA Sequence Assembly | 
    
    
      | Panagiotis (Panos) Patros, Dayal Dilli, Stephen A. MacKay, Kenneth B. Kent, Michael Dawson | 
      Improving PaaS Multitenancy | 
    
    
      | Prasanna Iyengar, Jenna Tyler, Suprio Ray | 
      Recipe Recommendation Using Graph Databases: Personalized Nutrition, Ingredient Substitution, and More | 
    
    
      | Puya Memarzia, Virendra Bhavsar, and Suprio Ray | 
      Graph Similarity Computations on Large Graph Databases | 
    
    
      | Raphael Beaulieu, Elliot Coy | 
      Determining the Effectiveness of Alternate Controller Inputs for Aiming in Video Games | 
    
    
      | Rizwan Ali and Ali A. Ghorbani | 
      Bursty Topic Detection with application to Twitter | 
    
    
      | Shijie Xu, David Bremner | 
      Method Handle Graph JIT Compilation | 
    
    
      | SoHyun Park, Joshua Smith, Prasanna Iyengar | 
      A Comparative Study of Target Assistance For Pointing with a Camera Mouse | 
    
    
      | SoHyun Park, Afsaneh Fazly, Annie Lee, Brandon Seibel, Wenjie Zi, Paul Cook | 
      Classifying Out-Of-Vocabulary Terms in a Domain-Specific Social Media Corpus | 
    
    
      | Stuart A. MacGillivray and Bradford G. Nickerson | 
      Size Limited Bounding Polygons for Planar Point Sets | 
    
    
      | Taees Eimouri, Kenneth B. Kent, Aleksandar Micic, Karl Taylor | 
      Using Field Access Frequency to Optimize Layout of Objects in the JVM | 
    
    
      | Tim Beauchamp, Nathaniel Brewer, Maria Patrou, Suprio Ray | 
      Dynamic Declustering for Parallel Spatial Databases | 
    
    
      | Tristan Basa, Gerhard W. Dueck, Kenneth B. Kent | 
      Thread-based, Region-based Memory Management | 
    
    
      | Vaibhavi Kalgutkar, Natalia Stakhanova, Paul Cook | 
      Android authorship attribution through analysis of String n-grams | 
    
    
      | Waseem Gharbieh, Milton King, SoHyun Park, Paul Cook | 
      Semantic Textual Similarity: A Unified Framework for Semantic Processing and Evaluation | 
    
    
      | Yan Li, Natalia Stakhanova | 
      Android application classification based on meta-data | 
    
    
      | Yiming Zhao and Wei Song | 
      Social-Aware Energy-Efficient Data Dissemination with D2D Communications |