William A. Wallace

According to our database1, William A. Wallace authored at least 107 papers between 1974 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Optimizing the recovery of disrupted single-sourced multi-echelon assembly supply chain networks.
IISE Trans., 2020

2019
Modelling the recovery of critical commercial services and their interdependencies on civil infrastructures.
Int. J. Crit. Infrastructures, 2019

2018
Actionable Information in Social Networks, Diffusion of.
Proceedings of the Encyclopedia of Social Network Analysis and Mining, 2nd Edition, 2018

Modeling Human Behavior on Social Media in Response to Significant Events.
IEEE Trans. Comput. Soc. Syst., 2018

2017
The Societal Responsibilities of Computational Modelers: Human Values and Professional Codes of Ethics.
J. Assoc. Inf. Sci. Technol., 2017

Dynamic resource allocation to support oil spill response planning for energy exploration in the Arctic.
Eur. J. Oper. Res., 2017

Agent-based simulation for teaching ethics.
Proceedings of the 2017 Winter Simulation Conference, 2017

2016
Predicting charitable donations using social media.
Soc. Netw. Anal. Min., 2016


On predicting social unrest using social media.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

2015
Factors underlying organizational resilience: The case of electric power restoration in New York City after 11 September 2001.
Reliab. Eng. Syst. Saf., 2015

Interdependent network restoration: On the value of information-sharing.
Eur. J. Oper. Res., 2015

Extracting Hidden Groups and their Structure from Streaming Interaction Data.
CoRR, 2015

The effect of a stand-alone ethics course in Chilean engineering students' attitudes.
IEEE Commun. Mag., 2015

Actions Are Louder than Words in Social Media.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

Detecting Deceptive Groups Using Conversations and Network Analysis.
Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing of the Asian Federation of Natural Language Processing, 2015

2014
The Emergence of Communities and Their Leaders on Twitter Following an Extreme Event.
Proceedings of the Social Network Analysis - Community Detection and Evolution, 2014

Actionable Information in Social Networks, Diffusion of.
Encyclopedia of Social Network Analysis and Mining, 2014

Collaborative Training Tools for Emergency Restoration of Critical Infrastructure Systems.
Proceedings of the New Perspectives in Information Systems and Technologies, 2014

The Nature of Communications and Emerging Communities on Twitter Following the 2013 Syria Sarin Gas Attacks.
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014

Leadership: Do networks matter?
Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2014

2013
Integrating restoration and scheduling decisions for disrupted interdependent infrastructure systems.
Ann. Oper. Res., 2013

The use of social media by local government in response to an extreme event: Del norte county, CA response to the 2011 Japan tsunami.
Proceedings of the 10th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2013

Evolution of communities on Twitter and the role of their leaders during emergencies.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
Restoring infrastructure systems: An integrated network design and scheduling (INDS) problem.
Eur. J. Oper. Res., 2012

Information cascades in social media in response to a crisis: a preliminary model and a case study.
Proceedings of the 21st World Wide Web Conference, 2012

Actionable Information during Extreme Events - Case Study: Warnings and 2011 Tohoku Earthquake.
Proceedings of the 2012 International Conference on Privacy, 2012

Graph search beyond text: Relational searches in semantic hyperlinked data.
Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics, 2012

Social Media and Warning Response Impacts in Extreme Events: Results from a Naturally Occurring Experiment.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

2011
Information Ethics Education for a Multicultural World.
J. Inf. Syst. Educ., 2011

The use of fuzzy logic and expert judgment in the R&D project portfolio selection process.
Int. J. Technol. Manag., 2011

Overlapping communities in social networks.
Int. J. Soc. Comput. Cyber Phys. Syst., 2011

Aborting a Message Flowing through Social Communities.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Decision modeling for resilient infrastructures.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

Collaborative learning of ethical decision-making via simulated cases.
Proceedings of the iConference 2011, 2011

Computational Modeling and Human Values: A Comparative Study of Corporate, Academic, and Government Research Labs.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

How values can reduce conflicts in the design process: Results from a multi-site mixed-method field study.
Proceedings of the Bridging the Gulf: Communication and Information in Society, Technology, and Work, 2011

CaseBuilder: A GUI Web App for building interactive teaching cases.
Proceedings of the Bridging the Gulf: Communication and Information in Society, Technology, and Work, 2011

2010
Simulating the Diffusion of Information: An Agent-Based Modeling Approach.
Int. J. Agent Technol. Syst., 2010

Value Conflicts in Computational Modeling.
Computer, 2010

Agent-based simulation of the diffusion of warnings.
Proceedings of the 2010 Spring Simulation Multiconference, 2010

Measuring behavioral trust in social networks.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2010

Automatic Text Analysis of Values in the Enron Email Dataset: Clustering a Social Network Using the Value Patterns of Actors.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

The Values of Computational Modelers and Professional Codes of Ethics: Results from a Field Study.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

2009
Approximate Nonmyopic Sensor Selection via Submodularity and Partitioning.
IEEE Trans. Syst. Man Cybern. Part A, 2009

Engineering for humanitarian development.
IEEE Technol. Soc. Mag., 2009

Ensuring transparency in computational modeling.
Commun. ACM, 2009

graphOnt: An ontology based library for conversion from semantic graphs to JUNG.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009

2008
ViSAGE: A <i>Vi</i>rtual Laboratory for <i>S</i>imulation and <i>A</i>nalysis of Social <i>G</i>roup <i>E</i>volution.
ACM Trans. Auton. Adapt. Syst., 2008

Visualization and model formulation: an analysis of the sketches of expert modellers.
J. Oper. Res. Soc., 2008

Trust in digital information.
J. Assoc. Inf. Sci. Technol., 2008

Reverse Engineering a Social Agent-Based Hidden Markov Model - VISAGE.
Int. J. Neural Syst., 2008

Communication Dynamics of Blog Networks.
Proceedings of the Advances in Social Network Mining and Analysis, 2008

A Generative Model for Statistical Determination of Information Content from Conversation Threads.
Proceedings of the Intelligence and Security Informatics, 2008

Values and information: An interdisciplinary examination.
Proceedings of the People Transforming Information - Information Transforming People, 2008

2007
A Cognitive Model of Improvisation in Emergency Management.
IEEE Trans. Syst. Man Cybern. Part A, 2007

Restoration of Services in Interdependent Infrastructure Systems: A Network Flows Approach.
IEEE Trans. Syst. Man Cybern. Part C, 2007

An industrial network flow information integration model for supply chain management and intelligent transportation.
Enterp. Inf. Syst., 2007

Decision support for ethical problem solving: A multi-agent approach.
Decis. Support Syst., 2007

SIGHTS: A Software System for Finding Coalitions and Leaders in a Social Network.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

Reverse Engineering an Agent-Based Hidden Markov Model for Complex Social Systems.
Proceedings of the Intelligent Data Engineering and Automated Learning, 2007

Discover the power of social and hidden curriculum to decision making: experiments with enron email and movie newsgroups.
Proceedings of the Sixth International Conference on Machine Learning and Applications, 2007

Learning What Makes a Society Tick.
Proceedings of the Workshops Proceedings of the 7th IEEE International Conference on Data Mining (ICDM 2007), 2007

Socio-Technological Systems Integration to Support Tsunami Warning and Evacuation.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

2006
Finding Hidden Group Structure in a Stream of Communications.
Proceedings of the Intelligence and Security Informatics, 2006

Ethical implications of values embedded in computational models: An exploratory study.
Proceedings of the Information Realities: Shaping the Digital Future for All, 2006

2005
A covenant with transparency: opening the black box of models.
Commun. ACM, 2005

2004
Impact of the 2001 World Trade Center attack on critical interdependent infrastructures.
Proceedings of the IEEE International Conference on Systems, 2004

Supporting ethical problem solving: an exploratory investigation.
Proceedings of the 2004 SIGMIS Conference on Computer Personnel Research: Careers, 2004

Discovering Hidden Groups in Communication Networks.
Proceedings of the Intelligence and Security Informatics, 2004

Assessing Vulnerability of Proposed Designs for Interdependent Infrastructure Systems.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

2003
Bad numbers: coping with flawed decision support.
J. Oper. Res. Soc., 2003

Locating Hidden Groups in Communication Networks Using Hidden Markov Models.
Proceedings of the Intelligence and Security Informatics, First NSF/NIJ Symposium, 2003

Evaluating Support for Improvisation in Simulated Emergency Scenarios.
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003

Trust in Electronic Environments.
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003

2002
Development of a Decision Logic to Support Group Improvisation: An Application to Emergency Response.
Proceedings of the 35th Hawaii International Conference on System Sciences (HICSS-35 2002), 2002

2001
Editor's Note.
Comput. Math. Organ. Theory, 2001

2000
Multi-expert operational risk management.
IEEE Trans. Syst. Man Cybern. Part C, 2000

Emotions in crisis management: an analysis of the organisational response of two natural disasters.
Int. J. Technol. Manag., 2000

Modeling Relationships among Multiple Graphical Structures.
Comput. Math. Organ. Theory, 2000

Visualization and the process of modeling: a cognitive-theoretic view.
Proceedings of the sixth ACM SIGKDD international conference on Knowledge discovery and data mining, 2000

1999
Visualizing modeling heuristics: an exploratory study.
Proceedings of the Twentieth International Conference on Information Systems, 1999

1997
The relationship between three-dimensional imaging and group decision making: an exploratory study.
IEEE Trans. Syst. Man Cybern. Part A, 1997

The effect of reasoning logics on real-time decision making.
IEEE Trans. Syst. Man Cybern. Part A, 1997

Elecitation of Knowledge from Multiple Experts Using Network Inference.
IEEE Trans. Knowl. Data Eng., 1997

Bridging the gap between business objectives and parameters of data mining algorithms.
Decis. Support Syst., 1997

1996
Understanding and facilitating group problem structuring and formulation: Mental representations, interaction, and representation aids.
Decis. Support Syst., 1996

Note to reviewers.
Comput. Math. Organ. Theory, 1996

1995
Classifying delinquent customers for credit collections: an application of probabilistic inductive learning.
Int. J. Hum. Comput. Stud., 1995

Editorial.
Comput. Math. Organ. Theory, 1995

An Assessment of PrIL.
Proceedings of the First International Conference on Knowledge Discovery and Data Mining (KDD-95), 1995

1994
Operational Risk Management: A New Paradigm for Decision Making.
IEEE Trans. Syst. Man Cybern. Syst., 1994

A prototype decision support system in hypermedia for operational control of hazardous material shipments.
Decis. Support Syst., 1994

1993
Induction of Rules Subject to a Quality Constraint: Probabilistic Inductive Learning.
IEEE Trans. Knowl. Data Eng., 1993

1992
The Effects on Decision Task Performance of Computer Synthetic Voice Output.
Int. J. Man Mach. Stud., 1992

Visual Modelling: A Knowledge Acquisition Method for Intelligent Process Control Systems.
Proceedings of the Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, 1992

1991
Focus Groups as a Knowledge Elicitation Technique: An Exploratory Survey.
IEEE Trans. Knowl. Data Eng., 1991

1990
Intelligent Interface Design: An Empirical Assessment of Knowledge Presentation in Expert Systems.
MIS Q., 1990

1989
An epistemological view of decision-aid technology with emphasis on expert systems.
IEEE Trans. Syst. Man Cybern., 1989

1987
Presenting uncertainty in expert systems: An issue in information portrayal.
Inf. Manag., 1987

1986
The Effects of 3D Imagery on Managerial Data Interpretation.
MIS Q., 1986

1985
Introducing microcomputers to managers in the people's Republic of China.
Inf. Manag., 1985

Decision support in a guaranteed student loan program: Design and implementation of a model-based system.
Inf. Manag., 1985

1984
An investigation of system design considerations for emergency management decision support.
IEEE Trans. Syst. Man Cybern., 1984

1979
A Reliability Theoretic Construct for Assessing Information Flow in Networks.
J. Am. Soc. Inf. Sci., 1979

1977
A Goal-Setting and Evaluation Model for Community Development.
IEEE Trans. Syst. Man Cybern., 1977

1974
Ellis A. Johnson, 1906-1973.
Oper. Res., 1974


  Loading...