Hsinchun Chen

Orcid: 0000-0003-3251-2433

Affiliations:
  • University of Arizona, Tucson, USA


According to our database1, Hsinchun Chen authored at least 573 papers between 1987 and 2024.

Collaborative distances:

Awards

ACM Fellow

ACM Fellow 2015, "For contributions to he research and development of security informatics and health informatics systems.".

IEEE Fellow

IEEE Fellow 2006, "For contributions to the development of medical, intelligence, and security informatics.".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Evading Deep Learning-Based Malware Detectors via Obfuscation: A Deep Reinforcement Learning Approach.
CoRR, 2024

Introduction to the Minitrack on Cybersecurity in the Age of Artificial Intelligence, AI for Cybersecurity, and Cybersecurity for AI.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

2023
Heterogeneous Domain Adaptation With Adversarial Neural Representation Learning: Experiments on E-Commerce and Cybersecurity.
IEEE Trans. Pattern Anal. Mach. Intell., 2023

Deep Learning for Information Systems Research.
J. Manag. Inf. Syst., 2023

Large Language Models for Conducting Advanced Text Analytics Information Systems Research.
CoRR, 2023

The 3rd Workshop on Artificial Intelligence-enabled Cybersecurity Analytics.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

Mapping Exploit Code on Paste Sites to the MITRE ATT&CK Framework: A Multi-label Transformer Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2023

Disrupting Ransomware Actors on the Bitcoin Blockchain: A Graph Embedding Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2023

Evading Deep Learning-Based Malware Detectors via Obfuscation: A Deep Reinforcement Learning Approach.
Proceedings of the IEEE International Conference on Data Mining, 2023

Evading Deep Learning-Based Malware Detectors via Obfuscation: A Deep Reinforcement Learning Approach.
Proceedings of the IEEE International Conference on Data Mining, 2023

Benchmarking the Robustness of Phishing Email Detection Systems.
Proceedings of the 29th Americas Conference on Information Systems, 2023

2022
Linking Exploits from the Dark Web to Known Vulnerabilities for Proactive Cyber Threat Intelligence: An Attention-Based Deep Structured Semantic Model.
MIS Q., May, 2022

Cross-Lingual Cybersecurity Analytics in the International Dark Web with Adversarial Deep Representation Learning.
MIS Q., May, 2022

Counteracting Dark Web Text-Based CAPTCHA with Generative Adversarial Learning for Proactive Cyber Threat Intelligence.
ACM Trans. Manag. Inf. Syst., 2022

Key Factors Affecting User Adoption of Open-Access Data Repositories in Intelligence and Security Informatics: An Affordance Perspective.
ACM Trans. Manag. Inf. Syst., 2022

Explainable Artificial Intelligence for Cyber Threat Intelligence (XAI-CTI).
IEEE Trans. Dependable Secur. Comput., 2022

ACM KDD AI4Cyber/MLHat: Workshop on AI-enabled Cybersecurity Analytics and Deployable Defense.
Proceedings of the KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14, 2022

Multi-view Representation Learning from Malware to Defend Against Adversarial Variants.
Proceedings of the IEEE International Conference on Data Mining Workshops, 2022

An Adversarial Reinforcement Learning Framework for Robust Machine Learning-based Malware Detection.
Proceedings of the IEEE International Conference on Data Mining Workshops, 2022

2021
A Multi-Disciplinary Perspective for Conducting Artificial Intelligence-enabled Privacy Analytics: Connecting Data, Algorithms, and Systems.
ACM Trans. Manag. Inf. Syst., 2021

A Multimodal Event-Driven LSTM Model for Stock Prediction Using Online News.
IEEE Trans. Knowl. Data Eng., 2021

A Deep Learning Approach for Recognizing Activity of Daily Living (ADL) for Senior Care: Exploiting Interaction Dependency and Temporal Patterns.
MIS Q., 2021

Fall Detection with Wearable Sensors: A Hierarchical Attention-based Convolutional Neural Network Approach.
J. Manag. Inf. Syst., 2021

Linking Common Vulnerabilities and Exposures to the MITRE ATT&CK Framework: A Self-Distillation Approach.
CoRR, 2021

Binary Black-Box Attacks Against Static Malware Detectors with Reinforcement Learning in Discrete Action Spaces.
Proceedings of the IEEE Security and Privacy Workshops, 2021

ACM KDD AI4Cyber: The 1st Workshop on Artificial Intelligence-enabled Cybersecurity Analytics.
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021

Identifying and Categorizing Malicious Content on Paste Sites: A Neural Topic Modeling Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2021

Exploring the Evolution of Exploit-Sharing Hackers: An Unsupervised Graph Embedding Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2021

Automated PII Extraction from Social Media for Raising Privacy Awareness: A Deep Transfer Learning Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2021

Single-Shot Black-Box Adversarial Attacks Against Malware Detectors: A Causal Language Model Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2021

Distilling Contextual Embeddings Into A Static Word Embedding For Improving Hacker Forum Analytics.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2021

2020
A Deep Learning Architecture for Psychometric Natural Language Processing.
ACM Trans. Inf. Syst., 2020

Corrections to "NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks".
IEEE Trans. Knowl. Data Eng., 2020

Proactively Identifying Emerging Hacker Threats from the Dark Web: A Diachronic Graph Embedding Framework (D-GEF).
ACM Trans. Priv. Secur., 2020

Finding People with Emotional Distress in Online Social Media: A Design Combining Machine Learning and Rule-Based Classification.
MIS Q., 2020

Human Identification for Activities of Daily Living: A Deep Transfer Learning Approach.
J. Manag. Inf. Syst., 2020

Semi-Supervised Cyber Threat Identification in Dark Net Markets: A Transductive and Deep Learning Approach.
J. Manag. Inf. Syst., 2020

An Explorative Study on the Virtual World: Investigating the Avatar Gender and Avatar Age Differences in their Social Interactions for Help-Seeking.
Inf. Syst. Frontiers, 2020

Examining the impacts of mental workload and task-technology fit on user acceptance of the social media search system.
Inf. Syst. Frontiers, 2020

Binary Black-box Evasion Attacks Against Deep Learning-based Static Malware Detectors with Adversarial Byte-Level Language Model.
CoRR, 2020

Deep Learning for Information Systems Research.
CoRR, 2020

Detecting Cyber Threats in Non-English Hacker Forums: An Adversarial Cross-Lingual Knowledge Transfer Approach.
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020

A Generative Adversarial Learning Framework for Breaking Text-Based CAPTCHA in the Dark Web.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

Smart Vulnerability Assessment for Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

Identifying, Collecting, and Monitoring Personally Identifiable Information: From the Dark Web to the Surface Web.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

Identifying Vulnerable GitHub Repositories and Users in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

Linking Personally Identifiable Information from the Dark Web to the Surface Web: A Deep Entity Resolution Approach.
Proceedings of the 20th International Conference on Data Mining Workshops, 2020

2019
Emoticon Analysis for Chinese Social Media and E-commerce: The AZEmo System.
ACM Trans. Manag. Inf. Syst., 2019

Examining patterns of scientific knowledge diffusion based on knowledge cyber infrastructure: a multi-dimensional network approach.
Scientometrics, 2019

DICE-E: A Framework for Conducting Darknet Identification, Collection, Evaluation with Ethics.
MIS Q., 2019

Do Electronic Health Records Affect Quality of Care? Evidence from the HITECH Act.
Inf. Syst. Res., 2019

Identifying High-Impact Opioid Products and Key Sellers in Dark Net Marketplaces: An Interpretable Text Analytics Approach.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019

Dark-Net Ecosystem Cyber-Threat Intelligence (CTI) Tool.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019

Performance Modeling of Hyperledger Sawtooth Blockchain.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019

2018
The State-of-the-Art in Twitter Sentiment Analysis: A Review and Benchmark Evaluation.
ACM Trans. Manag. Inf. Syst., 2018

Supervised Topic Modeling Using Hierarchical Dirichlet Process-Based Inverse Regression: Experiments on E-Commerce Applications.
IEEE Trans. Knowl. Data Eng., 2018

Web Media and Stock Markets : A Survey and Future Directions from a Big Data Perspective.
IEEE Trans. Knowl. Data Eng., 2018

Hidden Markov Model-Based Fall Detection With Motion Sensor Orientation Calibration: A Case for Real-Life Home Monitoring.
IEEE J. Biomed. Health Informatics, 2018

Adoption of Social Media Search Systems: An IS Success Model Perspective.
Pac. Asia J. Assoc. Inf. Syst., 2018

A sequence-to-sequence model-based deep learning approach for recognizing activity of daily living for senior care.
J. Biomed. Informatics, 2018

Identifying SCADA Systems and Their Vulnerabilities on the Internet of Things: A Text-Mining Approach.
IEEE Intell. Syst., 2018

Incremental Hacker Forum Exploit Collection and Classification for Proactive Cyber Threat Intelligence: An Exploratory Study.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Benchmarking Vulnerability Assessment Tools for Enhanced Cyber-Physical System (CPS) Resiliency.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Vulnerability Assessment, Remediation, and Automated Reporting: Case Studies of Higher Education Institutions.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Detecting Cyber Threats in Non-English Dark Net Markets: A Cross-Lingual Transfer Learning Approach.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Identifying, Collecting, and Presenting Hacker Community Data: Forums, IRC, Carding Shops, and DNMs.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Motion Sensor-Based Assessment on Fall Risk and Parkinson's Disease Severity: A Deep Multi-Source Multi-Task Learning (DMML) Approach.
Proceedings of the IEEE International Conference on Healthcare Informatics, 2018

2017
Adverse drug reaction early warning using user search data.
Online Inf. Rev., 2017

Healthcare Predictive Analytics for Risk Profiling in Chronic Care: A Bayesian Multitask Learning Approach.
MIS Q., 2017

Exploring Emerging Hacker Assets and Key Hackers for Proactive Cyber Threat Intelligence.
J. Manag. Inf. Syst., 2017

Investigating the impacts of avatar gender, avatar age, and region theme on avatar physical activity in the virtual world.
Comput. Hum. Behav., 2017

Identifying vulnerabilities of consumer Internet of Things (IoT) devices: A scalable approach.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017

Assessing medical device vulnerabilities on the Internet of Things.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017

Identifying mobile malware and key threat actors in online hacker forums for proactive cyber threat intelligence.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017

Benchmarking vulnerability scanners: An experiment on SCADA devices and scientific instruments.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017

2016
A Tensor-Based Information Framework for Predicting the Stock Market.
ACM Trans. Inf. Syst., 2016

NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks.
IEEE Trans. Knowl. Data Eng., 2016

Identifying and Profiling Key Sellers in Cyber Carding Community: AZSecure Text Mining System.
J. Manag. Inf. Syst., 2016

Examining Hacker Participation Length in Cybercriminal Internet-Relay-Chat Communities.
J. Manag. Inf. Syst., 2016

Fall Detection with Orientation Calibration Using a Single Motion Sensor.
Proceedings of the Wireless Mobile Communication and Healthcare, 2016

Chinese underground market jargon analysis based on unsupervised learning.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

AZSecure Hacker Assets Portal: Cyber threat intelligence and malware analysis.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

Using social network analysis to identify key hackers for keylogging tools in hacker forums.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

Anonymous port scanning: Performing network reconnaissance through Tor.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

Targeting key data breach services in underground supply chain.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

Identifying the socio-spatial dynamics of terrorist attacks in the Middle East.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

Identifying devices across the IPv4 address space.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

SCADA honeypots: An in-depth analysis of Conpot.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

Exploring the online underground marketplaces through topic-based social network and clustering.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

Identifying top listers in Alphabay using Latent Dirichlet Allocation.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

Exploring key hackers and cybersecurity threats in Chinese hacker communities.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

Shodan visualized.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

Identifying language groups within multilingual cybercriminal forums.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

SilverLink: Developing an International Smart and Connected Home Monitoring System for Senior Care.
Proceedings of the Smart Health - International Conference, 2016

AZPharm MetaAlert: A Meta-learning Framework for Pharmacovigilance.
Proceedings of the Smart Health - International Conference, 2016

Identifying High Quality Carding Services in Underground Economy using Nonparametric Supervised Topic Model.
Proceedings of the International Conference on Information Systems, 2016

Deep Learning Based Topic Identification and Categorization: Mining Diabetes-Related Topics on Chinese Health Websites.
Proceedings of the Database Systems for Advanced Applications, 2016

2015
Stakeholder Analyses of Firm-Related Web Forums: Applications in Stock Return Prediction.
ACM Trans. Manag. Inf. Syst., 2015

Modeling knowledge diffusion in scientific innovation networks: an institutional comparison between China and US with illustration for nanotechnology.
Scientometrics, 2015

Enhancing Predictive Analytics for Anti-Phishing by Exploiting Website Genre Information.
J. Manag. Inf. Syst., 2015

A research framework for pharmacovigilance in health social media: Identification and evaluation of patient adverse drug event reports.
J. Biomed. Informatics, 2015

The roles of sharing, transfer, and public funding in nanotechnology knowledge-diffusion networks.
J. Assoc. Inf. Sci. Technol., 2015

Identifying Adverse Drug Events from Patient Social Media: A Case Study for Diabetes.
IEEE Intell. Syst., 2015

Exploring hacker assets in underground forums.
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015

Exploring threats and vulnerabilities in hacker web: Forums, IRC and carding shops.
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015

Developing understanding of hacker language through the use of lexical semantics.
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015

Chronic Disease Related Entity Extraction in Online Chinese Question and Answer Services.
Proceedings of the Smart Health - International Conference, 2015

Sentiment Analysis on Chinese Health Forums: A Preliminary Study of Different Language Models.
Proceedings of the Smart Health - International Conference, 2015

DiabeticLink: An Internationally Collaborative Cyber-Enabled Patient Empowerment Platform.
Proceedings of the Smart Health - International Conference, 2015

SilverLink: Smart Home Health Monitoring for Senior Care.
Proceedings of the Smart Health - International Conference, 2015

Health-Related Spammer Detection on Chinese Social Media.
Proceedings of the Smart Health - International Conference, 2015

Identifying Novel Adverse Drug Events from Health Social Media Using Distant Supervision.
Proceedings of the AMIA 2015, 2015

Tensor-Based Learning for Predicting Stock Movements.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

2014
Evaluating text visualization for authorship analysis.
Secur. Informatics, 2014

Text mining self-disclosing health information for public health service.
J. Assoc. Inf. Sci. Technol., 2014

Bridging the virtual and real: The relationship between web content, linkage, and geographical proximity of social movements.
J. Assoc. Inf. Sci. Technol., 2014

Time-to-Event Predictive Modeling for Chronic Conditions Using Electronic Health Records.
IEEE Intell. Syst., 2014

Smart and Connected Health [Guest editors' introduction].
IEEE Intell. Syst., 2014

Analyzing firm-specific social media and market: A stakeholder-based event analysis framework.
Decis. Support Syst., 2014

An integrated framework for analyzing multilingual content in Web 2.0 social media.
Decis. Support Syst., 2014

Analyzing market performance via social media: a case study of a banking industry crisis.
Sci. China Inf. Sci., 2014

Uninvited Connections: A Study of Vulnerable Devices on the Internet of Things (IoT).
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014

Identifying Top Sellers In Underground Economy Using Deep Learning-Based Sentiment Analysis.
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014

Time-to-Event Modeling for Predicting Hacker IRC Community Participant Trajectory.
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014

Descriptive Analytics: Examining Expert Hackers in Web Forums.
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014

Emoticon Analysis for Chinese Health and Fitness Topics.
Proceedings of the Smart Health - International Conference, 2014

HealthQA: A Chinese QA Summary System for Smart Health.
Proceedings of the Smart Health - International Conference, 2014

Collaborative Friendship Networks in Online Healthcare Communities: An Exponential Random Graph Model Analysis.
Proceedings of the Smart Health - International Conference, 2014

Identifying Adverse Drug Events from Health Social Media: A Case Study on Heart Disease Discussion Forums.
Proceedings of the Smart Health - International Conference, 2014

A Control Study on the Effects of HRV Biofeedback Therapy in Patients with Post-Stroke Depression.
Proceedings of the Smart Health - International Conference, 2014

DiabeticLink: An Integrated and Intelligent Cyber-Enabled Health Social Platform for Diabetic Patients.
Proceedings of the Smart Health - International Conference, 2014

Diabetes-Related Topic Detection in Chinese Health Websites Using Deep Learning.
Proceedings of the Smart Health - International Conference, 2014

A Multi-theoretical Framework for Hypotheses Testing of Temporal Network Patterns.
Proceedings of the International Conference on Information Systems, 2014

2013
Business Intelligence and Analytics: Research Directions.
ACM Trans. Manag. Inf. Syst., 2013

MedTime: A temporal information extraction system for clinical narratives.
J. Biomed. Informatics, 2013

Analyzing sentiments in Web 2.0 social media data in Chinese: experiments on business and marketing related Chinese Web forums.
Inf. Technol. Manag., 2013

Research note: Examining gender emotional differences in Web forum communication.
Decis. Support Syst., 2013

Recommendation as link prediction in bipartite graphs: A graph kernel-based machine learning approach.
Decis. Support Syst., 2013

Evaluating the Usefulness of Sentiment Information for Focused Crawlers.
CoRR, 2013

A Statistical Learning Based System for Fake Website Detection.
CoRR, 2013

Detecting Fake Escrow Websites using Rich Fraud Cues and Kernel Based Methods.
CoRR, 2013

Evaluating text visualization: An experiment in authorship analysis.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

Machine learning for attack vector identification in malicious source code.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

AZDrugMiner: An Information Extraction System for Mining Patient-Reported Adverse Drug Events in Online Patient Forums.
Proceedings of the Smart Health - International Conference, 2013

DiabeticLink: A Health Big Data System for Patient Empowerment and Personalized Healthcare.
Proceedings of the Smart Health - International Conference, 2013

Statistical Modeling of Nanotechnology Knowledge Diffusion Networks.
Proceedings of the International Conference on Information Systems, 2013

A Computational Approach to Detecting and Assessing Sustainability-related Communities in Social Media.
Proceedings of the International Conference on Information Systems, 2013

2012
Sentimental Spidering: Leveraging Opinion Information in Focused Crawlers.
ACM Trans. Inf. Syst., 2012

Credit Rating Change Modeling Using News and Financial Ratios.
ACM Trans. Manag. Inf. Syst., 2012

Business Intelligence and Analytics: From Big Data to Big Impact.
MIS Q., 2012

Theory-Informed Design and Evaluation of an Advanced Search and Knowledge Mapping System in Nanotechnology.
J. Manag. Inf. Syst., 2012

Artificial immune system for illicit content identification in social media.
J. Assoc. Inf. Sci. Technol., 2012

Evaluating sentiment in financial news articles.
Decis. Support Syst., 2012

Scalable sentiment classification across multiple Dark Web Forums.
Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics, 2012

Partially supervised learning for radical opinion identification in hate group web forums.
Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics, 2012

An event-driven SIR model for topic diffusion in web forums.
Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics, 2012

Using burst detection techniques to identify suspicious vehicular traffic at border crossings.
Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics, 2012

Evaluating an integrated forum portal for terrorist surveillance and analysis.
Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics, 2012

Securing cyberspace: Identifying key actors in hacker communities.
Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics, 2012

From Dark Web to GeoPolitical Web: Exploring the Value of Social Media Informatics.
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012

SHB 2012: international workshop on smart health and wellbeing.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012

Understanding Avatar Sentiments Using Verbal and Non-Verbal Cues.
Proceedings of the 18th Americas Conference on Information Systems, 2012

Dark Web - Exploring and Data Mining the Dark Side of the Web
30, Springer, ISBN: 978-1-4614-1556-5, 2012

2011
From Terrorism Informatics to Dark Web Research.
Proceedings of the Counterterrorism and Open Source Intelligence, 2011

Gender Classification for Web Forums.
IEEE Trans. Syst. Man Cybern. Part A, 2011

Special Issue on Social Media Analytics: Understanding the Pulse of the Society.
IEEE Trans. Syst. Man Cybern. Part A, 2011

Analyzing information systems researchers' productivity and impacts: A perspective on the H index.
ACM Trans. Manag. Inf. Syst., 2011

Editorial: Design science, grand challenges, and societal impacts.
ACM Trans. Manag. Inf. Syst., 2011

Selecting Attributes for Sentiment Classification Using Feature Relation Networks.
IEEE Trans. Knowl. Data Eng., 2011

Disease named entity recognition using semisupervised learning and conditional random fields.
J. Assoc. Inf. Sci. Technol., 2011

Determining inventor status and its effect on knowledge diffusion: A study on nanotechnology literature from China, Russia, and India.
J. Assoc. Inf. Sci. Technol., 2011

A multi-region empirical study on the internet presence of global extremist organizations.
Inf. Syst. Frontiers, 2011

Identity matching using personal and social identity features.
Inf. Syst. Frontiers, 2011

Introduction to special issue on terrorism informatics.
Inf. Syst. Frontiers, 2011

Trends and Controversies.
IEEE Intell. Syst., 2011

Law enforcement officers' acceptance of advanced e-government technology: A survey study of COPLINK Mobile.
Electron. Commer. Res. Appl., 2011

A hierarchical Naïve Bayes model for approximate identity matching.
Decis. Support Syst., 2011

Knowledge mapping for rapidly evolving domains: A design science approach.
Decis. Support Syst., 2011

Giving context to accounting numbers: The role of news coverage.
Decis. Support Syst., 2011

Enterprise risk and security management: Data, text and Web mining.
Decis. Support Syst., 2011

Designing, Implementing, and Evaluating Information Systems for Law Enforcement - A Long-Term Design-Science Research Project.
Commun. Assoc. Inf. Syst., 2011

Predicting Market Movements: From Breaking News to Emerging Social Media.
Proceedings of the Social Informatics - Third International Conference, SocInfo 2011, 2011

Dynamic user-level affect analysis in social media: Modeling violence in the Dark Web.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

An SIR model for violent topic diffusion in social media.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

The Geopolitical Web: Assessing societal risk in an uncertain world.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

The Dark Web Forum Portal: From multi-lingual to video.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

Senior Scholars' Forum.
Proceedings of the International Conference on Information Systems, 2011

Building a Social Media Digital Library: Collection, Management, and Analytics.
Proceedings of the Digital Libraries: For Cultural Heritage, Knowledge Dissemination, and Future Creation, 2011

Dark Web: Exploring and Mining the Dark Side of the Web.
Proceedings of the European Intelligence and Security Informatics Conference, 2011

2010
Social Network Data Mining: Research Questions, Techniques, and Applications.
Proceedings of the Data Mining for Social Network Data, 2010

Identifying High-Status Nodes in Knowledge Networks.
Proceedings of the Data Mining for Social Network Data, 2010

Framing Social Movement Identity with Cyber-Artifacts: A Case Study of the International Falun Gong Movement.
Proceedings of the Security Informatics, 2010

Burst Detection From Multiple Data Streams: A Network-Based Approach.
IEEE Trans. Syst. Man Cybern. Part C, 2010

Interaction Analysis of the ALICE Chatterbot: A Two-Study Investigation of Dialog and Domain Questioning.
IEEE Trans. Syst. Man Cybern. Part A, 2010

Editorial: Welcome to the first issue of <i>ACM TMIS</i>.
ACM Trans. Manag. Inf. Syst., 2010

Prospective Infectious Disease Outbreak Detection Using Markov Switching Models.
IEEE Trans. Knowl. Data Eng., 2010

Gene function prediction with gene interaction networks: a context graph kernel approach.
IEEE Trans. Inf. Technol. Biomed., 2010

ISI-KDD: SIGKDD workshop on intelligence and security informatics 2010.
SIGKDD Explor., 2010

Detecting Fake Websites: The Contribution of Statistical Learning Theory.
MIS Q., 2010

A Cyber-archaeology Approach to Social Movement Research: Framework and Case Study.
J. Comput. Mediat. Commun., 2010

Text-based video content classification for online video-sharing sites.
J. Assoc. Inf. Sci. Technol., 2010

Agency satisfaction with electronic record management systems: A large-scale survey.
J. Assoc. Inf. Sci. Technol., 2010

A focused crawler for Dark Web forums.
J. Assoc. Inf. Sci. Technol., 2010

Evaluating the use of search engine development tools in IT education.
J. Assoc. Inf. Sci. Technol., 2010

An Integrated Framework for Avatar Data Collection from the Virtual World.
IEEE Intell. Syst., 2010

Social Media Analytics and Intelligence.
IEEE Intell. Syst., 2010

A Lexicon-Enhanced Method for Sentiment Classification: An Experiment on Online Product Reviews.
IEEE Intell. Syst., 2010

AI and Opinion Mining.
IEEE Intell. Syst., 2010

AI and Security Informatics.
IEEE Intell. Syst., 2010

Business and Market Intelligence 2.0, Part 2.
IEEE Intell. Syst., 2010

Trends & Controversies.
IEEE Intell. Syst., 2010

Visualizing social network concepts.
Decis. Support Syst., 2010

A Discrete Stock Price Prediction Engine Based on Financial News.
Computer, 2010

Sports knowledge management and data mining.
Annu. Rev. Inf. Sci. Technol., 2010

Exploiting Emotions in Social Interactions to Detect Online Social Communities.
Proceedings of the Pacific Asia Conference on Information Systems, 2010

Comparing the virtual linkage intensity and real world proximity of social movements.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2010

Developing a Dark Web collection and infrastructure for computational and social sciences.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2010

Global disease surveillance using social media: HIV/AIDS content intervention in web forums.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2010

2009
Textual analysis of stock market prediction using breaking financial news: The AZFin text system.
ACM Trans. Inf. Syst., 2009

Topological Analysis of Criminal Activity Networks: Enhancing Transportation Security.
IEEE Trans. Intell. Transp. Syst., 2009

Using Open Web APIs in Teaching Web Mining.
IEEE Trans. Educ., 2009

Managing Knowledge in Light of Its Evolution Process: An Empirical Study on Citation Network - Based Patent Classification.
J. Manag. Inf. Syst., 2009

Identifying significant facilitators of dark network evolution.
J. Assoc. Inf. Sci. Technol., 2009

Arizona Literature Mapper: An integrated approach to monitor and analyze global bioterrorism research literature.
J. Assoc. Inf. Sci. Technol., 2009

Business stakeholder analyzer: An experiment of classifying stakeholders on the Web.
J. Assoc. Inf. Sci. Technol., 2009

Browsing the underdeveloped Web: An experiment on the Arabic Medical Web Directory.
J. Assoc. Inf. Sci. Technol., 2009

A comparison of fraud cues and classification methods for fake escrow website detection.
Inf. Technol. Manag., 2009

A quantitative stock prediction system based on financial news.
Inf. Process. Manag., 2009

Multilingual chief complaint classification for syndromic surveillance: An experiment with Chinese chief complaints.
Int. J. Medical Informatics, 2009

AI for Global Disease Surveillance.
IEEE Intell. Syst., 2009

AI and Global Science and Technology Assessment.
IEEE Intell. Syst., 2009

AI, E-government, and Politics 2.0.
IEEE Intell. Syst., 2009

Automatic online news monitoring and classification for syndromic surveillance.
Decis. Support Syst., 2009

A Comparison of Tools for Detecting Fake Websites.
Computer, 2009

The Strategic Co-Alignment for Implementing Information Systems in E-Government.
Proceedings of the Pacific Asia Conference on Information Systems, 2009

Recommendation as link prediction: a graph kernel-based machine learning approach.
Proceedings of the 2009 Joint International Conference on Digital Libraries, 2009

Dark web forums portal: Searching and analyzing jihadist forums.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009

Gender difference analysis of political web forums: An experiment on an international islamic women's forum.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009

Identification of extremist videos in online video sharing sites.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009

IEDs in the dark web: Lexicon expansion and genre classification.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009

Effect of Inventor Status on Intra-Organizational Innovation Evolution.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

Law enforcement officers' acceptance of advanced e-government technology: a survey study of COPLNK mobile.
Proceedings of the 11th International Conference on Electronic Commerce 2009, 2009

2008
Understanding the Nexus of Terrorist Web Sites.
Proceedings of the Intelligence and Security Informatics, Techniques and Applications, 2008

Exploring Gray Web Forums: Analysis and Investigation of Forum-Based Communities in Taiwan.
Proceedings of the Intelligence and Security Informatics, Techniques and Applications, 2008

Suspect Vehicle Identification for Border Safety.
Proceedings of the Intelligence and Security Informatics, Techniques and Applications, 2008

Sentiment analysis in multiple languages: Feature selection for opinion classification in Web forums.
ACM Trans. Inf. Syst., 2008

Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace.
ACM Trans. Inf. Syst., 2008

Guest Editors' Introduction: Special Section on Intelligence and Security Informatics.
IEEE Trans. Knowl. Data Eng., 2008

Affect Analysis of Web Forums and Blogs Using Correlation Ensembles.
IEEE Trans. Knowl. Data Eng., 2008

CyberGate: A Design Framework and System for Text Analysis of Computer-Mediated Communication.
MIS Q., 2008

Ontology-enhanced automatic chief complaint classification for syndromic surveillance.
J. Biomed. Informatics, 2008

Evaluating a news-aware quantitative trader: The effect of momentum and contrarian stock selection strategies.
J. Assoc. Inf. Sci. Technol., 2008

Using importance flooding to identify interesting networks of criminal activity.
J. Assoc. Inf. Sci. Technol., 2008

Kernel-based learning for biomedical relation extraction.
J. Assoc. Inf. Sci. Technol., 2008

A hybrid approach to Web forum interactional coherence analysis.
J. Assoc. Inf. Sci. Technol., 2008

Uncovering the dark Web: A case study of Jihad on the Web.
J. Assoc. Inf. Sci. Technol., 2008

Combining probability models and web mining models: a framework for proper name transliteration.
Inf. Technol. Manag., 2008

Organizing domain-specific information on the Web: An experiment on the Spanish business Web directory.
Int. J. Hum. Comput. Stud., 2008

Communication-Garden System: Visualizing a computer-mediated communication process.
Decis. Support Syst., 2008

Editors' introduction special issue on multilingual knowledge management.
Decis. Support Syst., 2008

Evaluating ontology mapping techniques: An experiment in public safety information sharing.
Decis. Support Syst., 2008

SpidersRUs: Creating specialized search engines in multiple languages.
Decis. Support Syst., 2008

A machine learning approach to web page filtering using content and structure analysis.
Decis. Support Syst., 2008

A stack-based prospective spatio-temporal data analysis approach.
Decis. Support Syst., 2008

The topology of dark networks.
Commun. ACM, 2008

Syndromic surveillance systems.
Annu. Rev. Inf. Sci. Technol., 2008

Examining Agencies' Satisfaction with Electronic Record Management Systems in e-Government: A Large-Scale Survey Study.
Proceedings of the Designing E-Business Systems. Markets, Services, and Networks, 2008

Botnets, and the cybercriminal underground.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

Bioterrorism event detection based on the Markov switching model: A simulated anthrax outbreak study.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

PRM-based identity matching using social context.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

Analysis of cyberactivism: A case study of online free Tibet activities.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

An integrated approach to mapping worldwide bioterrorism research capabilities.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

Cyber extremism in Web 2.0: An exploratory study of international Jihadist groups.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

Developing ideological networks using social network analysis and writeprints: A case study of the international Falun Gong movement.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

Sentiment and affect analysis of Dark Web forums: Measuring radicalization on the internet.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

IEDs in the Dark Web: Genre classification of improvised explosive device web pages.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

Discovery of improvised explosive device content in the Dark Web.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

Mapping Dark Web Geolocation.
Proceedings of the Intelligence and Security Informatics, 2008

Nuclear Threat Detection Via the Nuclear Web and Dark Web: Framework and Preliminary Study.
Proceedings of the Intelligence and Security Informatics, 2008

Homeland Security Data Mining Using Social Network Analysis.
Proceedings of the Intelligence and Security Informatics, 2008

BioPortal Infectious Disease Informatics research: disease surveillance and situational awareness.
Proceedings of the 9th Annual International Conference on Digital Government Research, 2008

Infectious Disease Informatics and Syndromic Surveillance.
Proceedings of the Digital Government: E-Government Research, 2008

Public Safety Information Sharing: An Ontological Perspective.
Proceedings of the Digital Government: E-Government Research, 2008

Business-Technology Alignments in e-Government: A Large-Scale Taiwan Government Electronic Record Management Systems Study.
Proceedings of the Digital Government: E-Government Research, 2008

2007
Incorporating Web Analysis Into Neural Networks: An Example in Hopfield Net Searching.
IEEE Trans. Syst. Man Cybern. Part C, 2007

User-Centered Evaluation of Arizona BioPathway: An Information Extraction, Integration, and Visualization System.
IEEE Trans. Inf. Technol. Biomed., 2007

Optimal Search-Based Gene Subset Selection for Gene Array Cancer Classification.
IEEE Trans. Inf. Technol. Biomed., 2007

System for Infectious Disease Information Sharing and Analysis: Design and Evaluation.
IEEE Trans. Inf. Technol. Biomed., 2007

Analyzing Consumer-Product Graphs: Empirical Findings and Applications in Recommender Systems.
Manag. Sci., 2007

Global mapping of gene/protein interactions in PubMed abstracts: A framework and an experiment with P53 interactions.
J. Biomed. Informatics, 2007

Automated criminal link analysis based on domain knowledge.
J. Assoc. Inf. Sci. Technol., 2007

Redips: Backlink search and analysis on the Web for business intelligence analysis.
J. Assoc. Inf. Sci. Technol., 2007

Mapping the contemporary terrorism research domain.
Int. J. Hum. Comput. Stud., 2007

Analyzing terror campaigns on the internet: Technical sophistication, content richness, and Web interactivity.
Int. J. Hum. Comput. Stud., 2007

An end user evaluation of query formulation and results review tools in three medical meta-search engines.
Int. J. Medical Informatics, 2007

A Comparison of Collaborative-Filtering Recommendation Algorithms for E-commerce.
IEEE Intell. Syst., 2007

An evaluation of the chat and knowledge delivery components of a low-level dialog system: The AZ-ALICE experiment.
Decis. Support Syst., 2007

Leveraging Question Answer technology to address terrorism inquiry.
Decis. Support Syst., 2007

Cyberinfrastructure for homeland security: Advances in information sharing, data mining, and collaboration systems.
Decis. Support Syst., 2007

Introduction to the special issue on decision support in medicine.
Decis. Support Syst., 2007

Enhancing border security: Mutual information analysis to identify suspect vehicles.
Decis. Support Syst., 2007

Large-scale regulatory network analysis from microarray data: modified Bayesian network learning and association rule mining.
Decis. Support Syst., 2007

Evaluating the efficacy of a terrorism question/answer system.
Commun. ACM, 2007

Analyzing and Visualizing Gray Web Forum Structure.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2007

Exploring Extremism and Terrorism on the Web: The Dark Web Project.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2007

Automatic patent classification using citation network information: an experimental study in nanotechnology.
Proceedings of the ACM/IEEE Joint Conference on Digital Libraries, 2007

Categorization and analysis of text in computer mediated communication archives using visualization.
Proceedings of the ACM/IEEE Joint Conference on Digital Libraries, 2007

The Arizona IDMatcher: A Probabilistic Identity Matching System.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

Medical Ontology-Enhanced Text Processing for Infectious Disease Informatics.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

Dynamic Social Network Analysis of a Dark Network: Identifying Significant Facilitators.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

Interaction Coherence Analysis for Dark Web Forums.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

Affect Intensity Analysis of Dark Web Forums.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

Building a Directory for the Underdeveloped Web: An Experiment on the Arabic Medical Web Directory.
Proceedings of the Asian Digital Libraries. Looking Back 10 Years and Forging New Frontiers, 2007

Collection of U.S. Extremist Online Forums: A Web Mining Approach.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

The Arizona IDMatcher: developing an identity matching tool for law enforcement.
Proceedings of the 8th Annual International Conference on Digital Government Research, 2007

Predicting criminal relationships using multivariate survival analysis.
Proceedings of the 8th Annual International Conference on Digital Government Research, 2007

Global Foot-and-Mouth Disease Surveillance Using BioPortal.
Proceedings of the Intelligence and Security Informatics: Biosurveillance, 2007

Chinese Chief Complaint Classification for Syndromic Surveillance.
Proceedings of the Intelligence and Security Informatics: Biosurveillance, 2007

A Web-Based System for Infectious Disease Data Integration and Sharing: Evaluating Outcome, Task Performance Efficiency, User Information Satisfaction, and Usability.
Proceedings of the Intelligence and Security Informatics: Biosurveillance, 2007

Incorporating Geographical Contacts into Social Network Analysis for Contact Tracing in Epidemiology: A Study on Taiwan SARS Data.
Proceedings of the Intelligence and Security Informatics: Biosurveillance, 2007

Graph Kernel-Based Learning for Gene Function Prediction from Gene Interaction Network.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2007

A Framework for Stylometric Similarity Detection in Online Settings.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

2006
Summary in context: Searching versus browsing.
ACM Trans. Inf. Syst., 2006

Aggregating Automatically Extracted Regulatory Pathway Relations.
IEEE Trans. Inf. Technol. Biomed., 2006

Moving digital libraries into the student learning space: The GetSmart experience.
ACM J. Educ. Resour. Comput., 2006

A framework for authorship identification of online messages: Writing-style features and classification techniques.
J. Assoc. Inf. Sci. Technol., 2006

Multilingual Web retrieval: An experiment in English-Chinese business intelligence.
J. Assoc. Inf. Sci. Technol., 2006

Evaluating mass knowledge acquisition using the ALICE chatterbot: The AZ-ALICE dialog system.
Int. J. Hum. Comput. Stud., 2006

Efficient scheduling of periodic information monitoring requests.
Eur. J. Oper. Res., 2006

CMedPort: An integrated approach to facilitating Chinese medical information seeking.
Decis. Support Syst., 2006

Process-driven collaboration support for intra-agency crime analysis.
Decis. Support Syst., 2006

Matching knowledge elements in concept maps using a similarity flooding algorithm.
Decis. Support Syst., 2006

Expertise visualization: An implementation and study based on cognitive fit theory.
Decis. Support Syst., 2006

Fighting cybercrime: a review and the Taiwan experience.
Decis. Support Syst., 2006

Supporting non-English Web searching: An experiment on the Spanish business and the Arabic medical intelligence portals.
Decis. Support Syst., 2006

Intelligence and security informatics: information systems perspective.
Decis. Support Syst., 2006

Building a scientific knowledge web portal: The NanoPort experience.
Decis. Support Syst., 2006

From fingerprint to writeprint.
Commun. ACM, 2006

A framework of integrating gene relations from heterogeneous data sources: an experiment on <i>Arabidopsis thaliana</i>.
Bioinform., 2006

Intelligence and security informatics.
Annu. Rev. Inf. Sci. Technol., 2006

Unraveling International Terrorist Groups' Exploitation of the Web: Technical Sophistication, Media Richness, and Web Interactivity.
Proceedings of the Intelligence and Security Informatics, International Workshop, 2006

Ontology-Based Automatic Chief Complaints Classification for Syndromic Surveillance.
Proceedings of the IEEE International Conference on Systems, 2006

Examining the Business-Technology Alignment in Government Agencies: A Study of Electronic Record Management Systems in Taiwan.
Proceedings of the Pacific Asia Conference on Information Systems, 2006

Exploring the Dark Side of the Web: Collection and Analysis of U.S. Extremist Online Forums.
Proceedings of the Intelligence and Security Informatics, 2006

A Review of Public Health Syndromic Surveillance Systems.
Proceedings of the Intelligence and Security Informatics, 2006

On the Topology of the Dark Web of Terrorist Groups.
Proceedings of the Intelligence and Security Informatics, 2006

A Framework for Exploring Gray Web Forums: Analysis of Forum-Based Communities in Taiwan.
Proceedings of the Intelligence and Security Informatics, 2006

A Multi-layer Naïve Bayes Model for Approximate Identity Matching.
Proceedings of the Intelligence and Security Informatics, 2006

Content Analysis of Jihadi Extremist Groups' Videos.
Proceedings of the Intelligence and Security Informatics, 2006

Using Importance Flooding to Identify Interesting Networks of Criminal Activity.
Proceedings of the Intelligence and Security Informatics, 2006

Spatial-Temporal Cross-Correlation Analysis: A New Measure and a Case Study in Infectious Disease Informatics.
Proceedings of the Intelligence and Security Informatics, 2006

Suspect Vehicle Identification for Border Safety with Modified Mutual Information.
Proceedings of the Intelligence and Security Informatics, 2006

Visualizing Authorship for Identification.
Proceedings of the Intelligence and Security Informatics, 2006

Using Social Contextual Information to Match Criminal Identities.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

A probabilistic model for approximate identity matching.
Proceedings of the 7th Annual International Conference on Digital Government Research, 2006

Target vehicle identification for border safety with modified mutual information.
Proceedings of the 7th Annual International Conference on Digital Government Research, 2006

The BioPortal project: a national center of excellence for infectious disease informatics.
Proceedings of the 7th Annual International Conference on Digital Government Research, 2006

COPLINK center: social network analysis and identity deception detection for law enforcement and homeland security intelligence and security informatics: a crime data mining approach to developing border safe research.
Proceedings of the 7th Annual International Conference on Digital Government Research, 2006

Textual Analysis of Stock Market Prediction Using Financial News Articles.
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006

Identity Matching Based on Probabilistic Relational Models.
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006

2005
CrimeNet explorer: a framework for criminal network knowledge discovery.
ACM Trans. Inf. Syst., 2005

A Visual Framework for Knowledge Discovery on the Web: An Empirical Study of Business Intelligence Exploration.
J. Manag. Inf. Syst., 2005

Genescene: An ontology-enhanced integration of linguistic and co-occurrence based relations in biomedical texts.
J. Assoc. Inf. Sci. Technol., 2005

User acceptance of Intelligence and Security Informatics technology: A study of COPLINK.
J. Assoc. Inf. Sci. Technol., 2005

Introduction to the special topic issue: Intelligence and security informatics.
J. Assoc. Inf. Sci. Technol., 2005

Evaluating event visualization: a usability study of COPLINK spatio-temporal visualizer.
Int. J. Hum. Comput. Stud., 2005

US Domestic Extremist Groups on the Web: Link and Content Analysis.
IEEE Intell. Syst., 2005

Guest Editors' Introduction: Artificial Intelligence for Homeland Security.
IEEE Intell. Syst., 2005

Applying Authorship Analysis to Extremist-Group Web Forum Messages.
IEEE Intell. Syst., 2005

Using 3D interfaces to facilitate the spatial knowledge retrieval: a geo-referenced knowledge repository system.
Decis. Support Syst., 2005

Frame-based argumentation for group decision task generation and identification.
Decis. Support Syst., 2005

Visualizing criminal relationships: comparison of a hyperbolic tree and a hierarchical list.
Decis. Support Syst., 2005

Newsmap: a knowledge map for online news.
Decis. Support Syst., 2005

Criminal network analysis and visualization.
Commun. ACM, 2005

Information visualization.
Annu. Rev. Inf. Sci. Technol., 2005

Linking Ontological Resources Using Aggregatable Substance Identifiers to Organize Extracted Relations.
Proceedings of the Biocomputing 2005, 2005

Studying the presence of terrorism on the web: an knowledge portal approach.
Proceedings of the ACM/IEEE Joint Conference on Digital Libraries, 2005

BioPortal: a case study in infectious disease informatics.
Proceedings of the ACM/IEEE Joint Conference on Digital Libraries, 2005

Terror tracker system: a web portal for terrorism research.
Proceedings of the ACM/IEEE Joint Conference on Digital Libraries, 2005

Visualizing aggregated biological pathway relations.
Proceedings of the ACM/IEEE Joint Conference on Digital Libraries, 2005

Link prediction approach to collaborative filtering.
Proceedings of the ACM/IEEE Joint Conference on Digital Libraries, 2005

SpidersRUs: automated development of vertical search engines in different domains and languages.
Proceedings of the ACM/IEEE Joint Conference on Digital Libraries, 2005

BioPortal: Sharing and Analyzing Infectious Disease Information.
Proceedings of the Intelligence and Security Informatics, 2005

Discovering Identity Problems: A Case Study.
Proceedings of the Intelligence and Security Informatics, 2005

Question Answer TARA: A Terrorism Activity Resource Application.
Proceedings of the Intelligence and Security Informatics, 2005

Collecting and Analyzing the Presence of Terrorists on the Web: A Case Study of Jihad Websites.
Proceedings of the Intelligence and Security Informatics, 2005

Mapping the Contemporary Terrorism Research Domain: Researchers, Publications, and Institutions Analysis.
Proceedings of the Intelligence and Security Informatics, 2005

The Dark Web Portal Project: Collecting and Analyzing the Presence of Terrorist Groups on the Web.
Proceedings of the Intelligence and Security Informatics, 2005

Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network.
Proceedings of the Intelligence and Security Informatics, 2005

BorderSafe: Cross-Jurisdictional Information Sharing, Analysis, and Visualization.
Proceedings of the Intelligence and Security Informatics, 2005

Evaluating an Infectious Disease Information Sharing and Analysis System.
Proceedings of the Intelligence and Security Informatics, 2005

Applying Authorship Analysis to Arabic Web Content.
Proceedings of the Intelligence and Security Informatics, 2005

Digital Library Development in the Asia Pacific.
Proceedings of the Digital Libraries: Implementing Strategies and Sharing Experiences, 2005

Multilingual Web Retrieval: An Experiment on a Multilingual Business Intelligence Portal.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

Using Genetic Algorithm in Building Domain-Specific Collections: An Experiment in the Nanotechnology Domain.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

Supporting Information Seeking in Multinational Organizations: A Knowledge Portal Approach.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

BioPortal: an integrated infectious disease information sharing and analysis environment.
Proceedings of the 2005 National Conference on Digital Government Research, 2005

Topological analysis of criminal activity networks in multiple jurisdictions.
Proceedings of the 2005 National Conference on Digital Government Research, 2005

A national center of excellence for infectious disease informatics: project summary.
Proceedings of the 2005 National Conference on Digital Government Research, 2005

Coplink center: social network analysis and identity deception detection for law enforcement and homeland security intelligence and security informatics: a crime data mining approach to developing border safe research.
Proceedings of the 2005 National Conference on Digital Government Research, 2005

BorderSafe: cross-jurisdictional information sharing, analysis, and visualization.
Proceedings of the 2005 National Conference on Digital Government Research, 2005

Visualization in law enforcement.
Proceedings of the Extended Abstracts Proceedings of the 2005 Conference on Human Factors in Computing Systems, 2005

Building Knowledge Management System for Researching Terrorist Groups on the Web.
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005

Studying the Structure of Terrorist Networks: A Web Structural Mining Approach.
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005

Optimal Search Based Gene Selection for Cancer Prognosis.
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005

Building Web Directories in Different Languages for Decision Support: A Semi-Automatic Approach.
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005

Transforming Open-Source Documents to Terror Networks: The Arizona TerrorNet.
Proceedings of the AI Technologies for Homeland Security, 2005

2004
Applying associative retrieval techniques to alleviate the sparsity problem in collaborative filtering.
ACM Trans. Inf. Syst., 2004

Intelligence and security informatics for homeland security: information, communication, and transportation.
IEEE Trans. Intell. Transp. Syst., 2004

Digital library research in the US: an overview with a knowledge management perspective.
Program, 2004

Introduction to the Journal on Digital Libraries special issue on Asian digital libraries.
Int. J. Digit. Libr., 2004

EBizPort: Collecting and analyzing business intelligence information.
J. Assoc. Inf. Sci. Technol., 2004

A graph model for E-commerce recommender systems.
J. Assoc. Inf. Sci. Technol., 2004

Internet searching and browsing in a multilingual world: An experiment on the Chinese Business Intelligence Portal (CBizPort).
J. Assoc. Inf. Sci. Technol., 2004

Fighting organized crimes: using shortest-path algorithms to identify associations in criminal networks.
Decis. Support Syst., 2004

Credit rating analysis with support vector machines and neural networks: a market comparative study.
Decis. Support Syst., 2004

Crime Data Mining: A General Framework and Some Examples.
Computer, 2004

Automatically detecting deceptive criminal identities.
Commun. ACM, 2004

Extracting gene pathway relations using a hybrid grammar: the Arizona Relation Parser.
Bioinform., 2004

Web mining: Machine learning for web applications.
Annu. Rev. Inf. Sci. Technol., 2004

Experiments on Chinese-English Cross-language Retrieval at NTCIR-4.
Proceedings of the Fourth NTCIR Workshop on Research in Information Access Technologies Information Retrieval, 2004

West Nile Virus and Botulism Portal: A Case Study in Infectious Disease Informatics.
Proceedings of the Intelligence and Security Informatics, 2004

Analyzing and Visualizing Criminal Network Dynamics: A Case Study.
Proceedings of the Intelligence and Security Informatics, 2004

Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism.
Proceedings of the Intelligence and Security Informatics, 2004

Information Sharing and Collaboration Policies within Government Agencies.
Proceedings of the Intelligence and Security Informatics, 2004

Biomedical Informatics and Security Informatics Research in Digital Library.
Proceedings of the Digital Libraries: International Collaboration and Cross-Fertilization, 2004

Using Content-Based and Link-Based Analysis in Building Vertical Search Engines.
Proceedings of the Digital Libraries: International Collaboration and Cross-Fertilization, 2004

Segmentation of Lecture Videos Based on Text: A Method Combining Multiple Linguistic Features.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

Visualizing the Expertise Space.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

Towards A National Infectious Disease Information Infrastructure: A Case Study in West Nile Virus and Botulism.
Proceedings of the 2004 Annual National Conference on Digital Government Research, 2004

Sharing and Visualizing Infectious Disease Datasets Using the WNV-BOT Portal System.
Proceedings of the 2004 Annual National Conference on Digital Government Research, 2004

BioPortal: Sharing, Analyzing & Visualizing Infectious Disease Datasets.
Proceedings of the 2004 Annual National Conference on Digital Government Research, 2004

Cross-Jurisdictional Activity Networks to Support Criminal Investigations.
Proceedings of the 2004 Annual National Conference on Digital Government Research, 2004

Digital Government Portal: A Tool for Digital Government Research.
Proceedings of the 2004 Annual National Conference on Digital Government Research, 2004

COPLINK Center: Information and Knowledge Management for Law Enforcement.
Proceedings of the 2004 Annual National Conference on Digital Government Research, 2004

A Link Analysis Approach to Recommendation under Sparse Data.
Proceedings of the 10th Americas Conference on Information Systems, 2004

2003
The use of dynamic context to improve casual internet searching.
ACM Trans. Inf. Syst., 2003

A Methodology for Analyzing Web-Based Qualitative Data.
J. Manag. Inf. Syst., 2003

Teaching key topics in computer science and information systems through a web search engine project.
ACM J. Educ. Resour. Comput., 2003

A shallow parser based on closed-class words to capture relations in biomedical text.
J. Biomed. Informatics, 2003

elpfulMed: Intelligent searching for medical information over the internet.
J. Assoc. Inf. Sci. Technol., 2003

Introduction to the JASIST Special Topic issue on web retrieval and mining: A machine learning perspective.
J. Assoc. Inf. Sci. Technol., 2003

Testing a Cancer Meta Spider.
Int. J. Hum. Comput. Stud., 2003

Visualization of large category map for Internet browsing.
Decis. Support Syst., 2003

COPLINK Connect: information and knowledge management for law enforcement.
Decis. Support Syst., 2003

Digital Government: technologies and practices.
Decis. Support Syst., 2003

Special issue: "Web retrieval and mining".
Decis. Support Syst., 2003

Design and evaluation of a multi-agent collaborative Web mining system.
Decis. Support Syst., 2003

Comparison of Three Vertical Search Spiders.
Computer, 2003

COPLINK: manging law enforcement data and knowledge.
Commun. ACM, 2003

CMedPort: A Cross-Regional Chinese Medical Portal.
Proceedings of the ACM/IEEE 2003 Joint Conference on Digital Libraries (JCDL 2003), 2003

NanoPort: An Example for Building Knowledge Portals for Scientific Domains.
Proceedings of the ACM/IEEE 2003 Joint Conference on Digital Libraries (JCDL 2003), 2003

Convergence of Knowledge Management and E-Learning: The GetSmart Experience.
Proceedings of the ACM/IEEE 2003 Joint Conference on Digital Libraries (JCDL 2003), 2003

Genescene: Biomedical Text And Data Mining.
Proceedings of the ACM/IEEE 2003 Joint Conference on Digital Libraries (JCDL 2003), 2003

EconPort: A Digital Library for Microeconomics Education.
Proceedings of the ACM/IEEE 2003 Joint Conference on Digital Libraries (JCDL 2003), 2003

Authorship Analysis in Cybercrime Investigation.
Proceedings of the Intelligence and Security Informatics, First NSF/NIJ Symposium, 2003

Collaborative Workflow Management for Interagency Crime Analysis.
Proceedings of the Intelligence and Security Informatics, First NSF/NIJ Symposium, 2003

COPLINK Agent: An Architecture for Information Monitoring and Sharing in Law Enforcement.
Proceedings of the Intelligence and Security Informatics, First NSF/NIJ Symposium, 2003

Untangling Criminal Networks: A Case Study.
Proceedings of the Intelligence and Security Informatics, First NSF/NIJ Symposium, 2003

CrimeLink Explorer: Using Domain Knowledge to Facilitate Automated Crime Association Analysis.
Proceedings of the Intelligence and Security Informatics, First NSF/NIJ Symposium, 2003

Examining Technology Acceptance by Individual Law Enforcement Officers: An Exploratory Study.
Proceedings of the Intelligence and Security Informatics, First NSF/NIJ Symposium, 2003

An International Perspective on Fighting Cybercrime.
Proceedings of the Intelligence and Security Informatics, First NSF/NIJ Symposium, 2003

A Spatio Temporal Visualizer for Law Enforcement.
Proceedings of the Intelligence and Security Informatics, First NSF/NIJ Symposium, 2003

CMedPort: Intelligent Searching for Chinese Medical Information.
Proceedings of the Digital Libraries: Technology and Management of Indigenous Knowledge for Global Access, 2003

Supporting Multilingual Information Retrieval in Web Applications: An English-Chinese Web Portal Experiment.
Proceedings of the Digital Libraries: Technology and Management of Indigenous Knowledge for Global Access, 2003

Business Intelligence Explorer: A Knowledge Map Framework for Discovering Business Intelligence on the Web.
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003

DGPort: A Web Portal for Digital Government.
Proceedings of the 2003 Annual National Conference on Digital Government Research, 2003

Technology Implementation Management in Law Enforcement: COPLINK System Usability and User Acceptance Evaluations.
Proceedings of the 2003 Annual National Conference on Digital Government Research, 2003

Crime Data Mining: An Overview and Case Studies.
Proceedings of the 2003 Annual National Conference on Digital Government Research, 2003

COPLINK: Visualization for Crime Analysis.
Proceedings of the 2003 Annual National Conference on Digital Government Research, 2003

2002
COPLINK - Arming Law Enforcement with New Knowledge Management Technologies.
Proceedings of the Advances in Digital Government - Technology, Human Factors, and Policy, 2002

CI Spider: a tool for competitive intelligence on the Web.
Decis. Support Syst., 2002

Using Coplink to Analyze Criminal-Justice Data.
Computer, 2002

Filling Preposition-Based Templates to Capture Information from Medical Abstracts.
Proceedings of the 7th Pacific Symposium on Biocomputing, 2002

MedTextus: an intelligent web-based medical meta-search system.
Proceedings of the ACM/IEEE Joint Conference on Digital Libraries, 2002

Visualizing the archive of a computer mediated communication process.
Proceedings of the ACM/IEEE Joint Conference on Digital Libraries, 2002

Using sentence-selection heuristics to rank text segments in TXTRACTOR.
Proceedings of the ACM/IEEE Joint Conference on Digital Libraries, 2002

A graph-based recommender system for digital library.
Proceedings of the ACM/IEEE Joint Conference on Digital Libraries, 2002

NanoPort: a web portal for nanoscale science and technology.
Proceedings of the ACM/IEEE Joint Conference on Digital Libraries, 2002

Comparison of two approaches to building a vertical search tool: a case study in the nanotechnology domain.
Proceedings of the ACM/IEEE Joint Conference on Digital Libraries, 2002

Internet Browsing: Visualizing Category Map by Fisheye and Fractal Views.
Proceedings of the 2002 International Symposium on Information Technology (ITCC 2002), 2002

From Digital Library to Digital Government: A Case Study in Crime Data Mapping and Mining.
Proceedings of the Digital Libraries: People, 2002

Using Shortest Path Algorithms to Identify Criminal Associations.
Proceedings of the 2002 Annual National Conference on Digital Government Research, 2002

Examining User Acceptance of COPLINK Technologies by Law Enforcement Officers: A Survey Study.
Proceedings of the 2002 Annual National Conference on Digital Government Research, 2002

COPLINK: Visualization and Collaboration for Law Enforcement.
Proceedings of the 2002 Annual National Conference on Digital Government Research, 2002

COPLINK Overview.
Proceedings of the 2002 Annual National Conference on Digital Government Research, 2002

Extracting Meaningful Entities from Police Narrative Reports.
Proceedings of the 2002 Annual National Conference on Digital Government Research, 2002

2001
Meeting medical terminology needs-the ontology-enhanced Medical Concept Mapper.
IEEE Trans. Inf. Technol. Biomed., 2001

Concept-based searching and browsing: a geoscience experiment.
J. Inf. Sci., 2001

MetaSpider: Meta-searching and categorization on the Web.
J. Assoc. Inf. Sci. Technol., 2001

Information navigation on the web by clustering and summarizing query results.
Inf. Process. Manag., 2001

Digital libraries supporting digital government.
Proceedings of the ACM/IEEE Joint Conference on Digital Libraries, 2001

Personalized spiders for web search and analysis.
Proceedings of the ACM/IEEE Joint Conference on Digital Libraries, 2001

2000
Creating a large-scale content-based airphoto image digital library.
IEEE Trans. Image Process., 2000

Verifying the Proximity and Size Hypothesis for Self-Organizing Maps.
J. Manag. Inf. Syst., 2000

Validating a geographical image retrieval system.
J. Am. Soc. Inf. Sci., 2000

Comparing noun phrasing techniques for use with medical digital library tools.
J. Am. Soc. Inf. Sci., 2000

Introduction to the special topic issue: Digital Libraries - Part 2.
J. Am. Soc. Inf. Sci., 2000

Introduction to the special topic issue: Digital Libraries - Part 1.
J. Am. Soc. Inf. Sci., 2000

Intelligent internet searching agent based on hybrid simulated annealing.
Decis. Support Syst., 2000

Estimating drug/plasma concentration levels by applying neural networks to pharmacokinetic data sets.
Decis. Support Syst., 2000

Exploring the use of concept spaces to improve medical information retrieval.
Decis. Support Syst., 2000

The MindMine Comment Analysis Tool for Collaborative Attitude Solicitation, Analysis, Sense-Making and Visualization.
Proceedings of the 33rd Annual Hawaii International Conference on System Sciences (HICSS-33), 2000

Intelligent Software Agents for Electronic Commerce.
Proceedings of the Handbook on Electronic Commerce, 2000

Electronic Commerce and Digital Libraries.
Proceedings of the Handbook on Electronic Commerce, 2000

1999
A Collection of Visual Thesauri for Browsing Large Collections of Geographic Images.
J. Am. Soc. Inf. Sci., 1999

Document clustering for electronic meetings: an experimental comparison of two techniques.
Decis. Support Syst., 1999

Multidimensional scaling for group memory visualization.
Decis. Support Syst., 1999

Creating a Large-Scale Digital Library for Georeferenced Information.
D Lib Mag., 1999

Semantic Research for Digital Libraries.
D Lib Mag., 1999

Federated Search of Scientific Literature.
Computer, 1999

Digital Libraries: Technological Advances and Social Impacts (Guest Editors' Introduction).
Computer, 1999

Medical Data Mining on the Internet: Research on a Cancer Information System.
Artif. Intell. Rev., 1999

Digital Libraries: Social issues and technological advances.
Adv. Comput., 1999

Visualizing Internet Search Results with Adaptive Self-Organizing Maps (demonstration abstract).
Proceedings of the SIGIR '99: Proceedings of the 22nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 1999

Interactive Internet Search through Automatic Clustering (poster abstract): an empirical study.
Proceedings of the SIGIR '99: Proceedings of the 22nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 1999

Support concept-based multimedia information retrieval: a knowledge management approach.
Proceedings of the Twentieth International Conference on Information Systems, 1999

Coplink: a case of intelligent analysis and knowledge management.
Proceedings of the Twentieth International Conference on Information Systems, 1999

Collaborative Information Retrieval Environment: Integration of Information Retrieval with Group Support Systems.
Proceedings of the 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), 1999

Verifying the Proximity Hypothesis for Self-organizing Maps.
Proceedings of the 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), 1999

Create a Large-Scale Digital Library for Geo-Referenced Information.
Proceedings of the Fourth ACM conference on Digital Libraries, 1999

Visualization Tools for Self-Organizing Maps.
Proceedings of the Fourth ACM conference on Digital Libraries, 1999

Medical Information Access for the New Millenium: UMLS-enhanced Semantic Parsing and Personalized Medical Agent.
Proceedings of the Fourth ACM conference on Digital Libraries, 1999

1998
Semantic indexing and searching using a Hopfield net.
J. Inf. Sci., 1998

A Machine Learning Approach to Inductive Query by Examples: An Experiment Using Relevance Feedback, ID3, Genetic Algorithms, and Simulated Annealing.
J. Am. Soc. Inf. Sci., 1998

Alleviating Search Uncertainty Through Concept Associations: Automatic Indexing, Co-Occurrence Analysis, and Parallel Computing.
J. Am. Soc. Inf. Sci., 1998

Internet Browsing and Searching: User Evaluations of Category Map and Concept Space Techniques.
J. Am. Soc. Inf. Sci., 1998

A Smart Itsy Bitsy Spider for the Web.
J. Am. Soc. Inf. Sci., 1998

Introduction to the Special Topic Issue: Artificial Intelligence Techniques for Emerging Information Systems Applications.
J. Am. Soc. Inf. Sci., 1998

An intelligent personal spider (agent) for dynamic Internet/Intranet searching.
Decis. Support Syst., 1998

Information Visualization for Collaborative Computing.
Computer, 1998

Intelligent Internet Searching Engine Based on Hybrid Simulated Annealing.
Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences, 1998

Multilingual Input System for the Web - An Open Multimedia Approach of Keyboard and Handwriting Recognition for Chinese and Japanese.
Proceedings of the IEEE Forum on Research and Technology Advances in Digital Libraries, 1998

1997
A Geographic Knowledge Representation System for Multimedia Geospatial Retrieval and Analysis.
Int. J. Digit. Libr., 1997

A Graphical, Self-Organizing Approach to Classifying Electronic Meeting Output.
J. Am. Soc. Inf. Sci., 1997

A Concept Space Approach to Addressing the Vocabulary Problem in Scientific Information Retrieval: An Experiment on the Worm Community System.
J. Am. Soc. Inf. Sci., 1997

Visual SOM (Abstract).
Proceedings of the SIGIR '97: Proceedings of the 20th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 1997

Semantic Search and Semantic Categorization (Abstract).
Proceedings of the SIGIR '97: Proceedings of the 20th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 1997

Intelligent Spider for Internet Searching.
Proceedings of the 30th Annual Hawaii International Conference on System Sciences (HICSS-30), 1997

The Itsy Bitsy Spider (Poster).
Proceedings of the 2nd ACM International Conference on Digital Libraries, 1997

GeoScience Self-Organizing Map and Concept Space (Poster).
Proceedings of the 2nd ACM International Conference on Digital Libraries, 1997

Internet Browsing and Searching: User Evaluations of Category Map and Concept Space Techniques (Poster).
Proceedings of the 2nd ACM International Conference on Digital Libraries, 1997

Medical Information Retrieval (Poster).
Proceedings of the 2nd ACM International Conference on Digital Libraries, 1997

1996
An automatic indexing and neural network approach to concept retrieval and classification of multilingual (Chinese-English) documents.
IEEE Trans. Syst. Man Cybern. Part B, 1996

A Parallel Computing Approach to Creating Engineering Concept Spaces for Semantic Retrieval: The Illinois Digital Library Initiative Project.
IEEE Trans. Pattern Anal. Mach. Intell., 1996

Internet Categorization and Search: A Self-Organizing Approach.
J. Vis. Commun. Image Represent., 1996

Federating Diverse Collections of Scientific Literature.
Computer, 1996

Building Large-Scale Digital Libraries - Guest Editors' Introduction.
Computer, 1996

Toward Intelligent Meeting Agents.
Computer, 1996

Interactive Term Suggestion for Users of Digital Libraries: Using Subject Thesauri and Co-occurrence Lists for Information Retrieval.
Proceedings of the 1st ACM International Conference on Digital Libraries, 1996

1995
GANNET: A Machine Learning Approach to Document Retrieval.
J. Manag. Inf. Syst., 1995

Using Backpropagation Networks for the Estimation of Aqueous Activity Coefficients of Aromatic Organic Compounds.
J. Chem. Inf. Comput. Sci., 1995

Automatic Thesaurus Generation for an Electronic Community System.
J. Am. Soc. Inf. Sci., 1995

An Algorithmic Approach to Concept Exploration in a Large Knowledge Network (Automatic Thesaurus Consultation): Symbolic Branch-and-Bound Search vs. Connectionist Hopfield Net Activation.
J. Am. Soc. Inf. Sci., 1995

Machine Learning for Information Retrieval: Neural Networks, Symbolic Learning, and Genetic Algorithms.
J. Am. Soc. Inf. Sci., 1995

1994
Expert Prediction, Symbolic Learning, and Neural Networks: An Experiment on Greyhound Racing.
IEEE Expert, 1994

Collaborative Systems: Solving the Vocabulary Problem.
Computer, 1994

Automatic Concept Classification of Text from Electronic Meetings.
Commun. ACM, 1994

Inductive Query by Examples (IQBE): A Machine Learning Approach.
Proceedings of the 27th Annual Hawaii International Conference on System Sciences (HICSS-27), 1994

A Machine Learning Approach to Document Retrieval: An Overview and an Experiment.
Proceedings of the 27th Annual Hawaii International Conference on System Sciences (HICSS-27), 1994

1993
Generating, integrating, and activating thesauri for concept-based document retrieval.
IEEE Expert, 1993

1992
Automatic construction of networks of concepts characterizing document databases.
IEEE Trans. Syst. Man Cybern., 1992

Browsing in hypertext: a cognitive study.
IEEE Trans. Syst. Man Cybern., 1992

Knowledge-based document retrieval: framework and design.
J. Inf. Sci., 1992

The Landscape of International Computing.
Adv. Comput., 1992

1991
Cognitive process as a basis for intelligent retrieval systems design.
Inf. Process. Manag., 1991

1990
User Misconceptions of Information Retrieval Systems.
Int. J. Man Mach. Stud., 1990

Online Query Refinement on Information Retrieval Systems: A Process Model of Searcher/System Interactions.
Proceedings of the SIGIR'90, 1990

A Knowledge-Based Design for Hypertext-Based Document Retrieval Systems.
Proceedings of the International Conference on Database and Expert Systems Applications, 1990

A knowledge-based approach to the design of document-based retrieval systems.
Proceedings of the ACM SIGOIS and IEEE CS TC-OA Conference on Office Information Systems, 1990

1987
Reducing Indeterminism in Consultation: A Cognitive Model of User/Librarian Interactions.
Proceedings of the 6th National Conference on Artificial Intelligence. Seattle, 1987


  Loading...