Ashish Sureka

Orcid: 0000-0001-6084-9661

Affiliations:
  • Ashoka University, Haryana, India
  • ABB Corporate Research, Bangalore, India (former)
  • Indraprastha Institute of Information Technology, Delhi (IIIT-D), Software Analytics Research Lab
  • Infosys Technologies Ltd, Bangalore, India
  • North Carolina State University, Raleigh, Department of Computer Science


According to our database1, Ashish Sureka authored at least 160 papers between 2002 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Control-Flow based Anomaly Detection in the Bug-Fixing Process of Open-Source Projects.
Proceedings of the ISEC 2020: 13th Innovations in Software Engineering Conference, 2020

2019
Quality of service (QoS) parameters prediction for web services using hybrid neural network and ensemble methods.
Int. J. Syst. Assur. Eng. Manag., 2019

Three-level learning for improving cross-project logging prediction for if-blocks.
J. King Saud Univ. Comput. Inf. Sci., 2019

2018
An Experience Report on Workshop on Emerging Software Engineering Education.
ACM SIGSOFT Softw. Eng. Notes, 2018

Automatic email response suggestion for support departments within a university.
PeerJ Prepr., 2018

An empirical analysis of machine learning models for automated essay grading.
PeerJ Prepr., 2018

Deep learning for conflicting statements detection in text.
PeerJ Prepr., 2018

Effective fault prediction model developed using Least Square Support Vector Machine (LSSVM).
J. Syst. Softw., 2018

A Case Study on the Application of Case-Based Learning in Software Testing.
Proceedings of the 11th Innovations in Software Engineering Conference, ISEC 2018, Hyderabad, India, February 09, 2018

Feature Selection Techniques to Counter Class Imbalance Problem for Aging Related Bug Prediction: Aging Related Bug Prediction.
Proceedings of the 11th Innovations in Software Engineering Conference, ISEC 2018, Hyderabad, India, February 09, 2018

Teaching requirements engineering concepts using case-based learning.
Proceedings of the 2nd International Workshop on Software Engineering Education for Millennials, 2018

An Empirical Analysis on Web Service Anti-pattern Detection Using a Machine Learning Framework.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Potholes and bad road conditions: mining Twitter to extract information on killer roads.
Proceedings of the ACM India Joint International Conference on Data Science and Management of Data, 2018

2017
How healthy are DocEng, JCDL and UMAP series of conferences?
SIGWEB Newsl., 2017

How healthy are ACM SIGWEB sponsored conferences?
SIGWEB Newsl., 2017

A Bibliometric Study of ACM SIGSOFT Software Engineering Notes from 2007 to 2016.
ACM SIGSOFT Softw. Eng. Notes, 2017

Transfer Learning for Cross-Project Change-Proneness Prediction in Object-Oriented Software Systems: A Feasibility Analysis.
ACM SIGSOFT Softw. Eng. Notes, 2017

Minority ethnic groups in computer science research: what is the bibliography data telling us?
SIGCAS Comput. Soc., 2017

A general overview and bibliometric analysis of seven ACM hypertext and web conferences.
Int. J. Web Eng. Technol., 2017

ECLogger: Cross-Project Catch-Block Logging Prediction Using Ensemble of Classifiers.
e Informatica Softw. Eng. J., 2017

A Comparative Study of Different Source Code Metrics and Machine Learning Algorithms for Predicting Change Proneness of Object Oriented Systems.
CoRR, 2017

Parichayana: An Eclipse Plugin for Detecting Exception Handling Anti-Patterns and Code Smells in Java Programs.
CoRR, 2017

Using Source Code Metrics and Ensemble Methods for Fault Proneness Prediction.
CoRR, 2017

Graph or Relational Databases: A Speed Comparison for Process Mining Algorithm.
CoRR, 2017

Empirical Analysis on Comparing the Performance of Alpha Miner Algorithm in SQL Query Language and NoSQL Column-Oriented Databases Using Apache Phoenix.
CoRR, 2017

Investigating the Application of Common-Sense Knowledge-Base for Identifying Term Obfuscation in Adversarial Communication.
CoRR, 2017

Characterizing Linguistic Attributes for Automatic Classification of Intent Based Racist/Radicalized Posts on Tumblr Micro-Blogging Website.
CoRR, 2017

Using source code metrics to predict change-prone web services: A case-study on ebay services.
Proceedings of the 2017 IEEE Workshop on Machine Learning Techniques for Software Quality Evaluation, 2017

Investigating the Dynamics of Religious Conflicts by Mining Public Opinions on Social Media.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2017

Using Structured Text Source Code Metrics and Artificial Neural Networks to Predict Change Proneness at Code Tab and Program Organization Level.
Proceedings of the 10th Innovations in Software Engineering Conference, 2017

Empirical Analysis on Effectiveness of Source Code Metrics for Predicting Change-Proneness.
Proceedings of the 10th Innovations in Software Engineering Conference, 2017

A Collision of Beliefs: Investigating Linguistic Features for Religious Conflicts Identification on Tumblr.
Proceedings of the Distributed Computing and Internet Technology, 2017

CRUISE: A platform for crowdsourcing Requirements Elicitation and evolution.
Proceedings of the Tenth International Conference on Contemporary Computing, 2017

Neural network with multiple training methods for web service quality of service parameter prediction.
Proceedings of the Tenth International Conference on Contemporary Computing, 2017

Analyzing fault prediction usefulness from cost perspective using source code metrics.
Proceedings of the Tenth International Conference on Contemporary Computing, 2017

Investigation of IR based topic models on issue tracking systems to infer software-specific semantic related term pairs.
Proceedings of the Tenth International Conference on Contemporary Computing, 2017

Using Source Code Metrics and Multivariate Adaptive Regression Splines to Predict Maintainability of Service Oriented Software.
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017

SEABED: An Open-Source Software Engineering Case-Based Learning Database.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

An Empirical Analysis on Effective Fault Prediction Model Developed Using Ensemble Methods.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

Investigating the Role of Twitter in E-Governance by Extracting Information on Citizen Complaints and Grievances Reports.
Proceedings of the Big Data Analytics - 5th International Conference, 2017

Investigating the Effectiveness of Greedy Algorithm on Open Source Software Systems for Determining Refactoring Sequence.
Proceedings of the 5th International Workshop on Quantitative Approaches to Software Quality co-located with 24th Asia-Pacific Software Engineering Conference (APSEC 2017), 2017

Application of LSSVM and SMOTE on Seven Open Source Projects for Predicting Refactoring at Class Level.
Proceedings of the 24th Asia-Pacific Software Engineering Conference, 2017

Estimating Web Service Quality of Service Parameters using Source Code Metrics and LSSVM.
Proceedings of the 5th International Workshop on Quantitative Approaches to Software Quality co-located with 24th Asia-Pacific Software Engineering Conference (APSEC 2017), 2017

2016
A scientometric analysis of 9 ACM SIGWEB cooperating conferences.
SIGWEB Newsl., 2016

A glance at seven ACM SIGWEB series of conferences.
SIGWEB Newsl., 2016

A Nine Year Story of the India Software Engineering Conference from 2008 to 2016.
ACM SIGSOFT Softw. Eng. Notes, 2016

Insights from Mining Eleven Years of Scholarly Paper Publications in Requirements Engineering (RE) Series of Conferences.
ACM SIGSOFT Softw. Eng. Notes, 2016

Women in computer science research: what is the bibliography data telling us?
SIGCAS Comput. Soc., 2016

Improving Logging Prediction on Imbalanced Datasets: A Case Study on Open Source Java Projects.
Int. J. Open Source Softw. Process., 2016

Application of Case-Based Teaching and Learning in Compiler Design Course.
CoRR, 2016

A Bibliometric Study of Asia Pacific Software Engineering Conference from 2010 to 2015.
CoRR, 2016

Thirteen Years of Mining Software Repositories (MSR) Conference - What is the Bibliography Data Telling Us?
CoRR, 2016

An Experimental Study on the Learning Outcome of Teaching Elementary Level Children using Lego Mindstorms EV3 Robotics Education Kit.
CoRR, 2016

Spider and the Flies : Focused Crawling on Tumblr to Detect Hate Promoting Communities.
CoRR, 2016

An Experience Report on Teaching Compiler Design Concepts Using Case-Based and Project-Based Learning Approaches.
Proceedings of the Eighth IEEE International Conference on Technology for Education, 2016

An Experience Report on Teaching Programming and Computational Thinking to Elementary Level Children Using Lego Robotics Education Kit.
Proceedings of the Eighth IEEE International Conference on Technology for Education, 2016

Demonstration Abstract: IoTSuite - A Framework to Design, Implement, and Deploy IoT Applications.
Proceedings of the 15th ACM/IEEE International Conference on Information Processing in Sensor Networks, 2016

LogOpt: Static Feature Extraction from Source Code for Automated Catch Block Logging Prediction.
Proceedings of the 9th India Software Engineering Conference, 2016

Source code metrics for programmable logic controller (PLC) ladder diagram (LD) visual programming language.
Proceedings of the 7th International Workshop on Emerging Trends in Software Metrics, 2016

A More Efficient Algorithm to Mine Skyline Frequent-Utility Patterns.
Proceedings of the Genetic and Evolutionary Computing, 2016

Role of Author Personality Traits for Identifying Intent Based Racist Posts.
Proceedings of the 2016 European Intelligence and Security Informatics Conference, 2016

But I did not Mean It! - Intent Classification of Racist Posts on Tumblr.
Proceedings of the 2016 European Intelligence and Security Informatics Conference, 2016

It Takes Two to Tango: Deleted Stack Overflow Question Prediction with Text and Meta Features.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

LogOptPlus: Learning to Optimize Logging in Catch and If Programming Constructs.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Anvaya: An Algorithm and Case-Study on Improving the Goodness of Software Process Models Generated by Mining Event-Log Data in Issue Tracking Systems.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Investigating the Potential of Aggregated Tweets as Surrogate Data for Forecasting Civil Protests.
Proceedings of the 3rd IKDD Conference on Data Science, 2016

A Review of Six Years of Asia-Pacific Software Engineering Conference.
Proceedings of the 23rd Asia-Pacific Software Engineering Conference, 2016

Predicting Quality of Service (QoS) Parameters using Extreme Learning Machines with Various Kernel Methods.
Proceedings of the Joint Proceedings of the 4th International Workshop on Quantitative Approaches to Software Quality (QuASoQ 2016) and 1st International Workshop on Technical Debt Analytics (TDA 2016) co-located with the 23rd Asia-Pacific Software Engineering Conference (APSEC 2016), 2016

Got a Complaint?- Keep Calm and Tweet It!
Proceedings of the Advanced Data Mining and Applications - 12th International Conference, 2016

2015
A Report on Software Engineering Education Workshop (SEEW) 2014 Co-Located with Asia-Pacific Software Engineering Conference 2014.
ACM SIGSOFT Softw. Eng. Notes, 2015

Two Level Empirical Study of Logging Statements in Open Source Java Projects.
Int. J. Open Source Softw. Process., 2015

Survey Results on Threats To External Validity, Generalizability Concerns, Data Sharing and University-Industry Collaboration in Mining Software Repository (MSR) Research.
CoRR, 2015

Kernel Based Sequential Data Anomaly Detection in Business Process Event Logs.
CoRR, 2015

Intention-Oriented Process Model Discovery from Incident Management Event Logs.
CoRR, 2015

Anvaya: An Algorithm and Case-Study on Improving the Goodness of Software Process Models generated by Mining Event-Log Data in Issue Tracking System.
CoRR, 2015

Applying Social Media Intelligence for Predicting and Identifying On-line Radicalization and Civil Unrest Oriented Threats.
CoRR, 2015

University-industry collaboration and open source software (OSS) dataset in mining software repositories (MSR) research.
Proceedings of the 1st IEEE International Workshop on Software Analytics, 2015

Identifying Software Process Management Challenges: Survey of Practitioners in a Large Global IT Company.
Proceedings of the 12th IEEE/ACM Working Conference on Mining Software Repositories, 2015

A Topical Crawler for Uncovering Hidden Communities of Extremist Micro-Bloggers on Tumblr.
Proceedings of the the 5th Workshop on Making Sense of Microposts co-located with the 24th International World Wide Web Conference (WWW 2015), 2015

A Graph Processing Based Approach for Automatic Detection of Semantic Inconsistency Between BPMN Process Model and SBVR Rules.
Proceedings of the Mining Intelligence and Knowledge Exploration, 2015

A Report on Software Engineering Education Workshop (SEED) colocated with ISEC 2015.
Proceedings of the 8th India Software Engineering Conference, 2015

Ahaan: Software Process Intelligence: Mining Software Process Data for Extracting Actionable Information.
Proceedings of the 8th India Software Engineering Conference, 2015

Pravaaha: Mining Android Applications for Discovering API Call Usage Patterns and Trends.
Proceedings of the 8th India Software Engineering Conference, 2015

SARATHI: Characterization Study on Regression Bugs and Identification of Regression Bug Inducing Changes: A Case-Study on Google Chromium Project.
Proceedings of the 8th India Software Engineering Conference, 2015

Vishleshan: Performance Comparison and Programming Process Mining Algorithms in Graph-Oriented and Relational Database Query Languages.
Proceedings of the 19th International Database Engineering & Applications Symposium, 2015

Using KNN and SVM Based One-Class Classifier for Detecting Online Radicalization on Twitter.
Proceedings of the Distributed Computing and Internet Technology, 2015

Pariket: Mining Business Process Logs for Root Cause Analysis of Anomalous Incidents.
Proceedings of the Databases in Networked Information Systems, 2015

High Utility Rare Itemset Mining over Transaction Databases.
Proceedings of the Databases in Networked Information Systems, 2015

Topic-Specific YouTube Crawling to Detect Online Radicalization.
Proceedings of the Databases in Networked Information Systems, 2015

In Support of Peer Code Review and Inspection in an Undergraduate Software Engineering Course.
Proceedings of the 28th IEEE Conference on Software Engineering Education and Training, 2015

Using common-sense knowledge-base for detecting word obfuscation in adversarial communication.
Proceedings of the 7th International Conference on Communication Systems and Networks, 2015

Pragamana: Performance Comparison and Programming Alpha-miner Algorithm in Relational Database Query Language and NoSQL Column-Oriented Using Apache Phoenix.
Proceedings of the Eighth International C* Conference on Computer Science & Software Engineering, 2015

Efficient Skyline Itemsets Mining.
Proceedings of the Eighth International C* Conference on Computer Science & Software Engineering, 2015

Vidushi: Parallel Implementation of Alpha Miner Algorithm and Performance Analysis on CPU and GPU Architecture.
Proceedings of the Business Process Management Workshops - BPM 2015, 13th International Workshops, Innsbruck, Austria, August 31, 2015

Khanan: Performance Comparison and Programming \alpha α -Miner Algorithm in Column-Oriented and Relational Database Query Languages.
Proceedings of the Big Data Analytics - 4th International Conference, 2015

Utility-Based Control Flow Discovery from Business Process Event Logs.
Proceedings of the Big Data Analytics - 4th International Conference, 2015

Open Source Social Media Analytics for Intelligence and Security Informatics Applications.
Proceedings of the Big Data Analytics - 4th International Conference, 2015

EFSPredictor: Predicting Configuration Bugs with Ensemble Feature Selection.
Proceedings of the 2015 Asia-Pacific Software Engineering Conference, 2015

A Decision Support Platform for Guiding a Bug Triage for Resolver Recommendation Using Textual and Non-Textual Features.
Proceedings of the Joint Proceedings of the 3rd International Workshop on Quantitative Approaches to Software Quality (QuASoQ), 2015

A Case Study on Teaching Software Engineering Concepts using a Case-Based Learning Environment.
Proceedings of the Joint Proceedings of the 3rd International Workshop on Quantitative Approaches to Software Quality (QuASoQ), 2015

Anukarna: A Software Engineering Simulation Game for Teaching Practical Decision Making in Peer Code Review.
Proceedings of the Joint Proceedings of the 3rd International Workshop on Quantitative Approaches to Software Quality (QuASoQ), 2015

2014
Chaff from the wheat: characterization and modeling of deleted questions on stack overflow.
Proceedings of the 23rd International World Wide Web Conference, 2014

Mining YouTube metadata for detecting privacy invading harassment and misdemeanor videos.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Does Contributor Characteristics Influence Future Participation? A Case Study on Google Chromium Issue Tracking System.
Proceedings of the Open Source Software: Mobile Open Source Technologies, 2014

Process mining multiple repositories for software defect resolution from control and organizational perspective.
Proceedings of the 11th Working Conference on Mining Software Repositories, 2014

Learning to Classify Hate and Extremism Promoting Tweets.
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014

SamikshaViz: a panoramic view to measure contribution and performance of software maintenance professionals by mining bug archives.
Proceedings of the 7th India Software Engineering Conference, Chennai, 2014

Nirikshan: mining bug report history for discovering process maps, inefficiencies and inconsistencies.
Proceedings of the 7th India Software Engineering Conference, Chennai, 2014

Mining Peer Code Review System for Computing Effort and Contribution Metrics for Patch Reviewers.
Proceedings of the IEEE 4th Workshop on Mining Unstructured Data, 2014

Process mining software repositories from student projects in an undergraduate software engineering course.
Proceedings of the 36th International Conference on Software Engineering, 2014

SANAYOJAN: a framework for traceability link recovery between use-cases in software requirement specification and regulatory documents.
Proceedings of the 3rd International Workshop on Realizing Artificial Intelligence Synergies in Software Engineering, 2014

Mining issue tracking systems using topic models for trend analysis, corpus exploration, and understanding evolution.
Proceedings of the 3rd International Workshop on Realizing Artificial Intelligence Synergies in Software Engineering, 2014

A focused crawler for mining hate and extremism promoting videos on YouTube.
Proceedings of the 25th ACM Conference on Hypertext and Social Media, 2014

Kashvi: Process Mining Software Repositories.
Proceedings of the 20th International Conference on Management of Data, 2014

Requirements Prioritization and Next-Release Problem under Non-additive Value Conditions.
Proceedings of the 23rd Australian Software Engineering Conference, 2014

What Community Contribution Pattern Says about Stability of Software Project?
Proceedings of the 21st Asia-Pacific Software Engineering Conference, 2014

Migrated Question Prediction on StackExchange.
Proceedings of the 21st Asia-Pacific Software Engineering Conference, 2014

Process Cube for Software Defect Resolution.
Proceedings of the 21st Asia-Pacific Software Engineering Conference, 2014

2013
Solutions to Detect and Analyze Online Radicalization : A Survey
CoRR, 2013

A Case-Study on Teaching Undergraduate-Level Software Engineering Course Using Inverted-Classroom, Large-Group, Real-Client and Studio-Based Instruction Model.
CoRR, 2013

Contextual feature based one-class classifier approach for detecting video response spam on YouTube.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

Samiksha: mining issue tracking system for contribution and performance assessment.
Proceedings of the 6th India Software Engineering Conference, 2013

Fit or unfit: analysis and prediction of 'closed questions' on stack overflow.
Proceedings of the Conference on Online Social Networks, 2013

Copyright Infringement Detection of Music Videos on YouTube by Mining Video and Uploader Meta-data.
Proceedings of the Big Data Analytics - Second International Conference, 2013

Integrating Issue Tracking Systems with Community-Based Question and Answering Websites.
Proceedings of the 22nd Australian Conference on Software Engineering (ASWEC 2013), 2013

SamikshaUmbra: Contribution and Performance Assessment of Software Maintenance Professionals by Mining Software Repositories.
Proceedings of the 20th Asia-Pacific Software Engineering Conference, 2013

Samekana: A Browser Extension for Including Relevant Web Links in Issue Tracking System Discussion Forum.
Proceedings of the 20th Asia-Pacific Software Engineering Conference, 2013

2012
A report on software engineering education workshop.
ACM SIGSOFT Softw. Eng. Notes, 2012

Characterizing Pedophile Conversations on the Internet using Online Grooming
CoRR, 2012

Learning to Classify Bug Reports into Components.
Proceedings of the Objects, Models, Components, Patterns - 50th International Conference, 2012

WhACKY! - What anyone could know about you from Twitter.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012

Source code identifier splitting using Yahoo image and web search engine.
Proceedings of the First International KDD Workshop on Software Mining, 2012

A static technique for fault localization using character n-gram based information retrieval model.
Proceedings of the Proceeding of the 5th Annual India Software Engineering Conference, 2012

iTop: interaction based topic centric community discovery on twitter.
Proceedings of the 5th Ph.D. Workshop on Information and Knowledge Management, 2012

Comparison of Seven Bug Report Types: A Case-Study of Google Chrome Browser Project.
Proceedings of the 19th Asia-Pacific Software Engineering Conference, 2012

2011
Fuzzy based clustering algorithm for privacy preserving data mining.
Int. J. Bus. Inf. Syst., 2011

Mining User Comment Activity for Detecting Forum Spammers in YouTube
CoRR, 2011

Using social network analysis for mining collaboration data in a defect tracking system for risk and vulnerability analysis.
Proceedings of the Proceeding of the 4th Annual India Software Engineering Conference, 2011

Mining tweets for tag recommendation on social media.
Proceedings of the 3rd International CIKM Workshop on Search and Mining User-Generated Contents, 2011

Applying Fellegi-Sunter (FS) Model for Traceability Link Recovery between Bug Databases and Version Archives.
Proceedings of the 18th Asia Pacific Software Engineering Conference, 2011

2010
AccKW: An Efficient Access Control Scheme for Keyword-Based Search over RDBMS.
Proceedings of the Databases in Networked Information Systems, 6th International Workshop, 2010

Linguistic analysis of bug report titles with respect to the dimension of bug importance.
Proceedings of the 3rd Bangalore Annual Compute Conference, Compute 2010, 2010

Detecting Duplicate Bug Report Using Character N-Gram-Based Features.
Proceedings of the 17th Asia Pacific Software Engineering Conference, 2010

Mining YouTube to Discover Extremist Videos, Users and Hidden Communities.
Proceedings of the Information Retrieval Technology, 2010

2009
Polarity Classification of Subjective Words Using Common-Sense Knowledge-Base.
Proceedings of the Rough Sets, 2009

Automatic Index Generation of Technical Articles Using a Combination of Heuristics, Linguistic and Statistical Approach.
Proceedings of the 4th Indian International Conference on Artificial Intelligence, 2009

Table Extraction from PDF Files using combination of Heuristics and Machine Learning Techniques.
Proceedings of the 4th Indian International Conference on Artificial Intelligence, 2009

A rapid application development framework for rule-based named-entity extraction.
Proceedings of the 2nd Bangalore Annual Compute Conference, Compute 2009, 2009

Semantic Based Text Classification of Patent Documents to a User-Defined Taxonomy.
Proceedings of the Advanced Data Mining and Applications, 5th International Conference, 2009

2008
An Algorithm for Classifying Articles and Patent Documents Using Link Structure.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

An Empirical Study on the Effect of Different Similarity Measures on User-Based Collaborative Filtering Algorithms.
Proceedings of the PRICAI 2008: Trends in Artificial Intelligence, 2008

Mining Automotive Warranty Claims Data for Effective Root Cause Analysis.
Proceedings of the Database Systems for Advanced Applications, 2008

A generic software architecture of a text processing system for analyzing product warranty claims data.
Proceedings of the 1st Bangalore Annual Compute Conference, Compute 2008, 2008

Using Genetic Algorithms for Parameter Optimization in Building Predictive Data Mining Models.
Proceedings of the Advanced Data Mining and Applications, 4th International Conference, 2008

2005
Applying metaheuristic techniques to search the space of bidding strategies in combinatorial auctions.
Proceedings of the Genetic and Evolutionary Computation Conference, 2005

Using tabu best-response search to find pure strategy nash equilibria in normal form games.
Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), 2005

2003
Computing the outcome of proxy bidding in combinatorial auctions extended abstract.
Proceedings of the Proceedings 4th ACM Conference on Electronic Commerce (EC-2003), 2003

An algorithm for computing the outcome of combinatorial auctions with proxy bidding.
Proceedings of the 5th International Conference on Electronic Commerce, 2003

2002
Applying the Generalized Vickrey Auction to Pricing Reliable Multicasts.
Proceedings of the From QoS Provisioning to QoS Charging, 2002

Mining eBay: Bidding Strategies and Shill Detection.
Proceedings of the WEBKDD 2002, 2002


  Loading...