Authors
|
Title
|
Aaron Tabor, Gerhard Dueck, Kenneth B. Kent |
Assessing the Suitability of Transactional Memory Synchronization in Concurrent GC |
Abdullah J. Alzahrani and Ali A. Ghorbani |
SMS Mobile Botnet Detection Framework |
Amirhossein Gharib and Ali A. Ghorbani |
Scalable Android Application Repackaging Detection |
Amy Seo, Bradford G. Nickerson and Wei Song |
Indoor Localization Supporting Smartphone Advertising |
Andi Fitriah A.Kadir, Natalia Stakhanova, Ali A.Ghorbani |
An Empirical Analysis of Android Banking Malware |
Andrii Kuch, Kenneth B. Kent, Gerhard W. Dueck |
Reinforcement Learning in Garbage Collection |
Bing Yang, Kenneth B. Kent, Eric Aubanel |
Multi-tier Data Synchronization Based on An Optimized Concurrent Linked-list |
Chenwei Wang, Eric Aubanel, David Bremner, Michael Dawson |
Characterizing Concurrency of Java Programs |
Daniel King and Bradford G. Nickerson |
Real-time Wireless Control via Ultra-Wideband (UWB) Communication |
Dave Kell, Andrew McAllister, Steve O’Hara |
Identifying Data Flows Across Multiple Boundaries and Programming Languages |
Fan Liang, Weichang Du |
Big Data Analytics Toolkit for Business Data |
Fatemeh Razzaghi and Ali A. Ghorbani |
Context Free Frequently Asked Questions (FAQs) Detection using Machine Learning Techniques |
Federico Sogaro, Kenneth B. Kent, Eric Aubanel, Peter Shipton |
MicroJIT: A Lightweight Just-in-Time Compiler to Improve Startup Times |
Gerard D. Gil, Arash H. Lashkari, MSI Mamun, Ali A. Ghorbani |
Characterization of Encrypted and VPN Traffic Using Time-Related Features |
Hamed Minaee and Ali A. Ghorbani |
Automatic Sarcasm Detection in Blog Posts |
Hossein Hadian Jazi and Ali A. Ghorbani |
A Dynamic Graph-based Malware Classifier |
Hugo Gonzalez, Andi A. Kadir, Natalia Stakhanova, Ali A. Ghorbani |
Exploring Reverse Engineering Symptoms in Android apps |
Hugo Gonzalez, Natalia Stakhanova, Ali A. Ghorbani |
Automated Semi-supervised Authorship Attribution of Android Binaries |
Jaleh sadat Mahdavi Moghaddam, Patricia A. Evans |
Inferring Political Preferences of Active Content Consumers in Twitter |
Johannes Ilisei, Kenneth B. Kent, Gerhard W. Dueck |
Extending Balanced Garbage Collection by Reference Counting |
Kamran Morovati, Natalia Stakhanova |
Authorship Attribution of Obfuscated Binaries |
Karthikeyan Sugumar, Jay Buckler, Suprio Ray |
Big Data Systems for the Internet of Things (IoT) |
Kenneth F. Mbah, Ali A. Ghorbani |
A New Phishing E-Mail Detection Approach |
Konstantin Nasartschuk, Aleksander Micic, Kenneth B. Kent |
VM Internal Object Pools |
Luke Dillman, James McManus, Scott Bateman |
Comparison of Absolute vs. Relative Position Tracking With and Without a 'Bubble Assist' Technique: A Fitts’s Law Analysis |
Mahsa Kiani, Virendrakumar C. Bhavsar, and Harold Boley |
A Fuzzy Graph-Based Retrieval System for Health Research |
Mallik I. Hassan, Kenneth B. Kent, Gerhard W. Dueck |
Region-Based Finalization |
Maria Patrou, Panagiotis Patros, Kenneth B. Kent, Gerhard Dueck |
NUMA Aware Garbage Collection |
Milton King, Paul Cook |
Supervised and Unsupervised Approaches to Word Usage Similarity |
Nabil Fannoush, Patricia A. Evans |
Structure Based RNA Sequence Assembly |
Panagiotis (Panos) Patros, Dayal Dilli, Stephen A. MacKay, Kenneth B. Kent, Michael Dawson |
Improving PaaS Multitenancy |
Prasanna Iyengar, Jenna Tyler, Suprio Ray |
Recipe Recommendation Using Graph Databases: Personalized Nutrition, Ingredient Substitution, and More |
Puya Memarzia, Virendra Bhavsar, and Suprio Ray |
Graph Similarity Computations on Large Graph Databases |
Raphael Beaulieu, Elliot Coy |
Determining the Effectiveness of Alternate Controller Inputs for Aiming in Video Games |
Rizwan Ali and Ali A. Ghorbani |
Bursty Topic Detection with application to Twitter |
Shijie Xu, David Bremner |
Method Handle Graph JIT Compilation |
SoHyun Park, Joshua Smith, Prasanna Iyengar |
A Comparative Study of Target Assistance For Pointing with a Camera Mouse |
SoHyun Park, Afsaneh Fazly, Annie Lee, Brandon Seibel, Wenjie Zi, Paul Cook |
Classifying Out-Of-Vocabulary Terms in a Domain-Specific Social Media Corpus |
Stuart A. MacGillivray and Bradford G. Nickerson |
Size Limited Bounding Polygons for Planar Point Sets |
Taees Eimouri, Kenneth B. Kent, Aleksandar Micic, Karl Taylor |
Using Field Access Frequency to Optimize Layout of Objects in the JVM |
Tim Beauchamp, Nathaniel Brewer, Maria Patrou, Suprio Ray |
Dynamic Declustering for Parallel Spatial Databases |
Tristan Basa, Gerhard W. Dueck, Kenneth B. Kent |
Thread-based, Region-based Memory Management |
Vaibhavi Kalgutkar, Natalia Stakhanova, Paul Cook |
Android authorship attribution through analysis of String n-grams |
Waseem Gharbieh, Milton King, SoHyun Park, Paul Cook |
Semantic Textual Similarity: A Unified Framework for Semantic Processing and Evaluation |
Yan Li, Natalia Stakhanova |
Android application classification based on meta-data |
Yiming Zhao and Wei Song |
Social-Aware Energy-Efficient Data Dissemination with D2D Communications |