David B. Skillicorn

According to our database1, David B. Skillicorn authored at least 146 papers between 1980 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
Copresence networks.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

2017
DBNorm: normalizing high-density oligonucleotide microarray data based on distributions.
BMC Bioinformatics, 2017

The Altruistic Robot: Do What I Want, Not Just What I Say.
Proceedings of the Scalable Uncertainty Management - 11th International Conference, 2017

Estimating Personality from Social Media Posts.
Proceedings of the 2017 IEEE International Conference on Data Mining Workshops, 2017

Comparing SVD and word2vec for analysis of malware forum posts.
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017

2016
Beyond the Castle Model of cyber-risk and cyber-security.
Government Information Quarterly, 2016

Discovering structure in Islamist postings using systemic nets.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

Spectral graph-based semi-supervised learning for imbalanced classes.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

Understanding alliance and opposition among violent groups.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

2015
Deception in Speeches of Candidates for Public Office.
JDMDH, 2015

Spectral Embedding of Signed Networks.
Proceedings of the 2015 SIAM International Conference on Data Mining, Vancouver, BC, Canada, April 30, 2015

Empirical assessment of al qaeda, ISIS, and taliban propaganda.
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015

Analysis of criminal social networks with typed and directed edges.
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015

Signed Directed Social Network Analysis Applied to Group Conflict.
Proceedings of the IEEE International Conference on Data Mining Workshop, 2015

Comparing SVD and SDAE for Analysis of Islamist Forum Postings.
Proceedings of the IEEE International Conference on Data Mining Workshop, 2015

Clustering Heterogeneous Semi-structured Social Science Datasets.
Proceedings of the International Conference on Computational Science, 2015

Spectral Embedding of Directed Networks.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2014
Global Structure in Social Networks with Directed Typed Edges.
Proceedings of the Social Networks: Analysis and Case Studies, 2014

Modeling dynamic social networks using spectral embedding.
Social Netw. Analys. Mining, 2014

Language use in the Jihadist magazines inspire and Azan.
Security Informatics, 2014

Understanding South Asian Violent Extremist Group-group interactions.
Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2014

2013
Inferring the mental state of influencers.
Social Netw. Analys. Mining, 2013

Using heuristics to estimate an appropriate number of latent topics in source code analysis.
Sci. Comput. Program., 2013

Individual Exploration, Sensemaking, and Innovation: A Design for the Discovery of Novel Information.
Decision Sciences, 2013

Language use in Inspire magazine.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

Detecting deception in interrogation settings.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

Spectral embedding for dynamic social networks.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

Improving the language of influence.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
Ranking documents by internal variability.
Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics, 2012

Outlier detection using semantic sensors.
Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics, 2012

Vectors of extremism across the Canada-US border.
Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics, 2012

Detecting Fraud in Financial Reports.
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012

Using Topic Models to Support Software Maintenance.
Proceedings of the 16th European Conference on Software Maintenance and Reengineering, 2012

Global Similarity in Social Networks with Typed Edges.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012

The Mental State of Influencers.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012

Lessons from a Jihadi Corpus.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012

Understanding High-Dimensional Spaces.
Springer Briefs in Computer Science, Springer, ISBN: 978-3-642-33397-2, 2012

2011
A Framework for Analyst Focus from Computed Significance.
Proceedings of the Counterterrorism and Open Source Intelligence, 2011

Classification Using Streaming Random Forests.
IEEE Trans. Knowl. Data Eng., 2011

Mitigating the linkability problem in anonymous reputation management.
J. Internet Services and Applications, 2011

Computational approaches to suspicion in adversarial settings.
Information Systems Frontiers, 2011

Contextualized semantic analysis of web services.
Proceedings of the 13th IEEE International Symposium on Web Systems Evolution, 2011

Reverse Engineering Co-maintenance Relationships Using Conceptual Analysis of Source Code.
Proceedings of the 18th Working Conference on Reverse Engineering, 2011

Novel Idea Generation, Collaborative Filtering, and Group Innovation Processes.
Proceedings of the International Conference on Information Systems, 2011

Interestingness - Directing Analyst Focus to Significant Data.
Proceedings of the European Intelligence and Security Informatics Conference, 2011

2010
Patterns of Word Use for Deception in Testimony.
Proceedings of the Security Informatics, 2010

The case for service provider anonymity.
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2010

Structures in collaborative tagging: an empirical analysis.
Proceedings of the Computer Science 2010, 2010

2009
Adversarial Knowledge Discovery.
IEEE Intelligent Systems, 2009

Hardening adversarial prediction with anomaly tracking.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009

Guarantee-Based Access Control.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Integrative Visual Data Mining of Biomedical Data: Investigating Cases in Chronic Fatigue Syndrome and Acute Lymphoblastic Leukaemia.
Proceedings of the Visual Data Mining - Theory, Techniques and Tools for Visual Analytics, 2008

Detecting Word Substitutions in Text.
IEEE Trans. Knowl. Data Eng., 2008

Distributed prediction from vertically partitioned data.
J. Parallel Distrib. Comput., 2008

Automated Concept Location Using Independent Component Analysis.
Proceedings of the WCRE 2008, 2008

Detecting deception in testimony.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

Hiding clusters in adversarial settings.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

Subverting prediction in adversarial settings.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

Classifying Evolving Data Streams Using Dynamic Streaming Random Forests.
Proceedings of the Database and Expert Systems Applications, 19th International Conference, 2008

2007
Novel information discovery for intelligence and counterterrorism.
Decision Support Systems, 2007

Matching for Mobile Users in the Publish/Subscribe Paradigm.
Proceedings of the WINSYS 2007, 2007

Detecting word substitutions: PMI vs. HMM.
Proceedings of the SIGIR 2007: Proceedings of the 30th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 2007

Detecting Anomalies in Graphs.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

Streaming Random Forests.
Proceedings of the Eleventh International Database Engineering and Applications Symposium (IDEAS 2007), 2007

Positive Matching of Resources in Computational Grids.
Proceedings of the 2007 International Conference on Grid Computing & Applications, 2007

Finding the Positive Nearest-Neighbor in Recommender Systems.
Proceedings of the 2007 International Conference on Data Mining, 2007

2006
Measures to Detect Word Substitution in Intercepted Communication.
Proceedings of the Intelligence and Security Informatics, 2006

Adaptiveness in well-typed Java bytecode verification.
Proceedings of the 2006 conference of the Centre for Advanced Studies on Collaborative Research, 2006

Improving a textual deception detection model.
Proceedings of the 2006 conference of the Centre for Advanced Studies on Collaborative Research, 2006

Programming with heterogeneous structures: manipulating XML data using bondi.
Proceedings of the Computer Science 2006, 2006

Social Network Analysis Via Matrix Decompositions.
Proceedings of the Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006

2005
Special Issue on DataMining Large Scale Temporal Data-Bases: Letter from the Special Issue Editors.
Computational & Mathematical Organization Theory, 2005

Structure in the Enron Email Dataset.
Computational & Mathematical Organization Theory, 2005

Special Issue on Analyzing Large Scale Networks: The Enron Corpus.
Computational & Mathematical Organization Theory, 2005

Beyond Keyword Filtering for Message and Conversation Detection.
Proceedings of the Intelligence and Security Informatics, 2005

Detecting unusual email communication.
Proceedings of the 2005 conference of the Centre for Advanced Studies on Collaborative Research, 2005

Emotions as a metaphor for altering operational behavior in autonomic computing.
Proceedings of the 2005 conference of the Centre for Advanced Studies on Collaborative Research, 2005

2004
Extracting and Explaining Biological Knowledge in Microarray Data.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2004

Large-Scale Resource Selection in Grids.
Proceedings of the On the Move to Meaningful Internet Systems 2004: OTM 2004 Workshops: OTM Confederated International Workshops and Posters, 2004

Finding Unusual Correlation Using Matrix Decompositions.
Proceedings of the Intelligence and Security Informatics, 2004

Topic 5: Parallel and Distributed Databases, Data Mining and Knowledge Discovery.
Proceedings of the Euro-Par 2004 Parallel Processing, 2004

Developing a characterization of business intelligence workloads for sizing new database systems.
Proceedings of the DOLAP 2004, 2004

Information discovery within organizations using the Athens system.
Proceedings of the 2004 conference of the Centre for Advanced Studies on Collaborative research, 2004

Mobile services discovery and selection in the publish/subscribe paradigm.
Proceedings of the 2004 conference of the Centre for Advanced Studies on Collaborative research, 2004

Building predictors from vertically distributed data.
Proceedings of the 2004 conference of the Centre for Advanced Studies on Collaborative research, 2004

2003
Navigating mazes in a virtual environment.
Proceedings of the Human Vision and Electronic Imaging VIII, 2003

Topic Introduction.
Proceedings of the Euro-Par 2003. Parallel Processing, 2003

2002
Parallel frequent set counting.
Parallel Computing, 2002

Mining Large Data Sets on Grids: Issues and Prospects.
Computers and Artificial Intelligence, 2002

The Case for Datacentric Grids.
Proceedings of the 16th International Parallel and Distributed Processing Symposium (IPDPS 2002), 2002

Parallel and Distributed Databases, Data Mining and Knowledge Discovery.
Proceedings of the Euro-Par 2002, 2002

Motivating Computational Grids.
Proceedings of the 2nd IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2002), 2002

Semidiscrete Decomposition: A Bump Hunting Technique.
Proceedings of the 15th Australian Joint Conference on Artificial Intelligence 2002, 2002

2001
Parallel and Sequential Algorithms for Data Mining Using Inductive Logic.
Knowl. Inf. Syst., 2001

Coordinating Programs in the Network of Tasks Model.
Journal of Systems Integration, 2001

The Spider Model of Agents.
Proceedings of the Mobile Agents for Telecommunication Applications, 2001

2000
BSP clusters: High performance, reliable and very low cost.
Parallel Computing, 2000

Treeworld: A Conceptual Model for Large-Scale Hypermedia.
J. UCS, 2000

Building Programs in the Network of Tasks Model.
Proceedings of the Applied Computing 2000, 2000

1999
Strategies for parallel data mining.
IEEE Concurrency, 1999

Predictable communication on unpredictable networks: implementing BSP over TCP/IP and UDP/IP.
Concurrency - Practice and Experience, 1999

Parallel Predictor Generation.
Proceedings of the Large-Scale Parallel Data Mining, 1999

Exploiting Global Structure for Performance on Clusters.
Proceedings of the 13th International Parallel Processing Symposium / 10th Symposium on Parallel and Distributed Processing (IPPS / SPDP '99), 1999

Performance Results for a Reliable Low-Latency Cluster Communication Protocol.
Proceedings of the Parallel and Distributed Processing, 1999

High Performance Data Mining and Knowledge Discovery - Introduction.
Proceedings of the Euro-Par '99 Parallel Processing, 5th International Euro-Par Conference, Toulouse, France, August 31, 1999

1998
Models and Languages for Parallel Computation.
ACM Comput. Surv., 1998

Practical barrier synchronisation.
PDP, 1998

Building BSP Programs Using the Refinement Calculus.
IPPS/SPDP Workshops, 1998

Using the BSP Cost Model to Optimise Parallel Neural Network Training.
IPPS/SPDP Workshops, 1998

Communication Performance Optimisation Requires Minimising Variance.
Proceedings of the High-Performance Computing and Networking, 1998

Optimizing Data-Parallel Programs Using the BSP Cost Model.
Proceedings of the Euro-Par '98 Parallel Processing, 1998

Predictable Communication on Unpredictable Networks: Implementing BSP over TCP/IP.
Proceedings of the Euro-Par '98 Parallel Processing, 1998

Static Scheduling Using Task Replication for LogP and BSP Models.
Proceedings of the Euro-Par '98 Parallel Processing, 1998

1997
Questions and Answers about BSP.
Scientific Programming, 1997

Structured Parallel Parallel Computation in Structured Documents.
J. UCS, 1997

Lessons Learned from Implementing BSP.
Proceedings of the High-Performance Computing and Networking, 1997

1996
Parallel Implementation of Tree Skeletons.
J. Parallel Distrib. Comput., 1996

A Parallel Tree Difference Algorithm.
Inf. Process. Lett., 1996

Using Distributed Hypermedia for Collaborative Learning in Universities.
Comput. J., 1996

1995
Calculating Recurrences Using the Bird-Meertens Formalism.
Parallel Processing Letters, 1995

Data Parallel Geometric Operations on Lists.
Parallel Computing, 1995

A Cost Calculus for Parallel Functional Programming.
J. Parallel Distrib. Comput., 1995

1994
Efficient Parallel Algorithms for Tree Accumulations.
Sci. Comput. Program., 1994

The Categorial Data Type Approach to General-Purpose Parallel Computation.
Proceedings of the Technology and Foundations - Information Processing '94, Volume 1, Proceedings of the IFIP 13th World Computer Congress, Hamburg, Germany, 28 August, 1994

Is there a future for functional languages in parallel programming?
Proceedings of the IEEE Computer Society 1994 International Conference on Computer Languages, 1994

Building Categorical Data Type Programs.
Proceedings of the Specification of Parallel Algorithms, 1994

1993
Deriving Parallel Programs from specification Susing Cost Information.
Sci. Comput. Program., 1993

Compiling in Parallel.
J. Parallel Distrib. Comput., 1993

1992
Context-Free Parsing on O(n) Processors.
Comput. Lang., 1992

1991
Models for practical parallel computation.
International Journal of Parallel Programming, 1991

Associative Operators for Language Recognition.
Bulletin of the EATCS, 1991

Practical Concurrent Programming for Parallel Machines.
Comput. J., 1991

1990
Pipelining Tree-Structured Algorithms on Simd Architectures.
Inf. Process. Lett., 1990

Architecture-Independent Parallel Computation.
IEEE Computer, 1990

1989
Real-Time Specification Using Lucid.
IEEE Trans. Software Eng., 1989

Automatic compilation of parallelism in visual object recognition.
Microprocessors and Microsystems - Embedded Hardware Design, 1989

A Global Measure of Network Connectivity.
J. Parallel Distrib. Comput., 1989

Parallel Parsing on the Connection Machine.
Inf. Process. Lett., 1989

Techniques for Compiling and Executing Dataflow Graphs.
IFIP Congress, 1989

1988
A New Class of Fault-Tolerant Static Interconnection Networks.
IEEE Trans. Computers, 1988

A Taxonomy for Computer Architectures.
IEEE Computer, 1988

Using Higher-order Logic for Modular Specification of Real-time Distributed Systems.
Proceedings of the Formal Techniques in Real-Time and Fault-Tolerant Systems, 1988

1987
A Fast Multiprocessor Message Passing Implementation.
Inf. Process. Lett., 1987

1984
The directed packing numbers DD (t, v, v), t>=;4.
Combinatorica, 1984

1982
More generalized packing numbers.
Discrete Mathematics, 1982

1980
All Directed BIBDs with k = 3 Exist.
J. Comb. Theory, Ser. A, 1980


  Loading...