Authors
|
Title
|
Sana Oladi, Panagiotis Patros |
Arvin II: pressure analysis tool |
Waseem Gharbieh, Virendra Bhavsar, Paul Cook |
Multiword Expression Identification Using Deep Learning |
Menelaos Kotsollaris, William Liu, Emmanuel Stefanakis, Yun Zhang |
Implementing a Scalable Web Image Management System |
Li Ji, Weichang Du |
Distributed Ontology Reasoning |
Ismail Akbari, Yevgen Biletskiy, Weichang Du |
RIFEnge: A Rule Engine for RIF Language |
Xichen Zhang, Arash Habibi Lashkari, Ali A. Ghorbani |
Online Advertisement Detection by Lightweight URL Analysis |
Andi Fitriah A. Kadir, Natalia Stakhanova, Ali A.Ghorbani |
A Framework for Profiling and Detecting Android Financial Malware |
Arash Habibi Lashkari, Gerard Drapper Gil, Mohammad Mamun, Ali A. Ghorbani |
Detection and Characterization of Tor Encrypted Traffic |
Arash Habibi Lashkari, Amy Seo, Gerard Drapper Gil, and Ali A. Ghorbani |
An Artificial Intelligence-Based Online Ad Blocker |
Iman Sharafaldin, AmirhosseinGharib, ArashHabibiLashkari, Ali A. Ghorbani |
BotViz: A Memory Forensic-Based Botnet Detection and Visualization Approach |
Aaron Tabor, Alex Kienzle, Carly Smith, Alex Watson, David Hanna, Scott Bateman, Erik Scheme |
The Falling Of Momo: a Myoelectric Muscle Training Game |
Amirhossein Gharib, Arash Habibi Lashkari, Ali A. Ghorbani |
A Framework for Detecting Mobile Ransomware |
Rasoul Shahsavarifar, David Bremner |
Research on Data Depth |
Priyal Nagra, Paul Cook |
An Automatic Approach to Discover Lexical Semantic Differences in Varieties of English |
Taees Eimouri, Kenneth Kent, Aleksander Micic |
Object Layout Optimization in JVM |
Panagiotis Patros, K.B. Kent, M. Dawson, Jiapeng Zhu |
Performant PaaS Cloud |
Maria Patrou, Kenneth B. Kent, Gerhard Dueck, Charlie Gracie |
NUMA Awareness: Improving Memory and Thread Management in the JVM |
Panagiotis Patros, Maria Patrou, Maxim Uzun, Jiapeng Zhu, Kenneth B. Kent, Michael Dawson |
Optimizing and Integrating Node.js for the Cloud |
Bing Yang, Kenneth B. Kent, Eric Aubanel, Tobi Agila |
Multi-granularity Locking on Multi-tier Data Structures |
Sasha Williams, Kenneth B. Kent, Gerhard Dueck |
BALANCED COLLECTION SET IN GARCOSIM |
Scott Young, Gerhard Dueck, Kenneth B. Kent, Charlie Gracie |
Identifying and Grouping Cold Objects |
Konstantin Nasartschuk, Kenneth B. Kent, Aleksandar Micic, Charlie Gracie |
String Deduplication During Garbage Collection in Virtual Machines |
Shijie Xu, David Bremner, Daniel Heidinga |
GraphJIT: a dynamic graph bytecode JIT compiler |
Hugo Gonzalez, Natalia Stakhanova |
Fingerprinting Android Development Tools Using Visualization |
Samuel Kelley, Kenneth B. Kent, Gerhard Dueck |
Reordering Objects During Garbage Collection |
Johannes Ilisei, Kenneth B. Kent, Gerhard W. Dueck |
Killing Zombies –Generating Realistic Trace Files |
Jianguo Xie, Wei Song |
Collaborative Message Distribution via Device-to-Device (D2D) Communications |
Yiming Zhao, Wei Song |
Device-to-Device (D2D) Data Dissemination with Power Budget Constraints |
Nafiseh Izadi Yekta, Rongxing Lu |
Achieving Privacy-Preserving Query with Communication Efficiency in Internet of Things |
Hassan Mahdikhani, Rongxing Lu |
PMQ: Achieving Privacy-Preserving Multi Dot-Product Query in Fog Computing-Enhanced IoT |
Rongxing Lu, Kevin Heung, Arash. H. Lashkari, Ali A. Ghorbani |
A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT |
Saeed Shafiee, Jesus Alfonso Pereyra Duarte, Scott Wallace, Suprio Ray |
Parallel Spatio-textual Similarity Join with Spark |
Panagiotis Patros, K.B. Kent, M. Dawson, Jiapeng Zhu |
Performant PaaS Cloud |
Canadian Institute for Cybersecurity |
Fingerprinting Android Development Tools Using Visualization (Revised) |
Vaibhavi Kalgutkar, Natalia Stakhanova, Paul Cook |
Android authorship attribution through analysis of string n-grams |
Eltaher El-Shanta, Weichang Du |
Pattern Services for Service-Oriented Systems |
Vaibhavi Kalgutkar, Natalia Stakhanova, Paul Cook |
Android authorship attribution through analysis of string n-grams |
Hugo Gonzalez, Ye Ning, Yan Li, Ratinder Kaur, Natalia Stakhanova |
Detecting Obfuscation on Android Apps |
Daniel King, Bradford G. Nickerson, Wei Song |
Real-time Wireless Control via Ultra-Wideband (UWB) Communication |
Hugo Gonzalez, Natalia Stakhanova, Ali Ghorbani |
StructSignature: Empirical Analysis of Android Binary File Layout |
Hugo Gonzalez, Ratinder Kaur, Natalia Stakhanova |
Secure Platform for Collaborative Research |
Zhendong Sha, Patricia A. Evans |
Using tree decomposition for general pedigree inference |
Kris Bowman, Scott Bateman |
A Comparison of Pointing Assistance Techniques in Different Environments |
Jason Wuertz, Scott Bateman |
A Virtual Memory Palace to Facilitate Memorizing Information |