default search action
ACM Transactions on Management Information Systems, Volume 13
Volume 13, Number 1, March 2022
- Jerry Chun-Wei Lin, Nachiketa Sahoo, Gautam Srivastava, Weiping Ding:
Introduction to the Special Issue on Pattern-Driven Mining, Analytics, and Prediction for Decision Making, Part 1. 1:1-1:3 - Shui-Hua Wang, Xin Zhang, Yu-Dong Zhang:
DSSAE: Deep Stacked Sparse Autoencoder Analytical Model for COVID-19 Diagnosis by Fractional Fourier Entropy. 2:1-2:20 - Fan Chen, Jiaoxiong Xia, Honghao Gao, Huahu Xu, Wei Wei:
TRG-DAtt: The Target Relational Graph and Double Attention Network Based Sentiment Analysis and Prediction for Supporting Decision Making. 3:1-3:25 - M. Saqib Nawaz, Philippe Fournier-Viger, Unil Yun, Youxi Wu, Wei Song:
Mining High Utility Itemsets with Hill Climbing and Simulated Annealing. 4:1-4:22 - Shuteng Niu, Yushan Jiang, Bowen Chen, Jian Wang, Yongxin Liu, Houbing Song:
Cross-Modality Transfer Learning for Image-Text Information Management. 5:1-5:14 - Mu-Yen Chen, Min-Hsuan Fan, Li-Xiang Huang:
AI-Based Vehicular Network toward 6G and IoT: Deep Learning Approaches. 6:1-6:12 - Zhihan Lv, Ranran Lou, Hailin Feng, Dongliang Chen, Haibin Lv:
Novel Machine Learning for Big Data Analytics in Intelligent Support Information Management Systems. 7:1-7:21 - Ankit Kumar, Abhishek Kumar, Ali Kashif Bashir, Mamoon Rashid, Visvam Devadoss Ambeth Kumar, Rupak Kharel:
Distance Based Pattern Driven Mining for Outlier Detection in High Dimensional Big Dataset. 8:1-8:17 - Mohammad Ehsan Shahmi Chowdhury, Chowdhury Farhan Ahmed, Carson K. Leung:
A New Approach for Mining Correlated Frequent Subgraphs. 9:1-9:28
- Bo Wen, Paul Jen-Hwa Hu, Mohammadreza Ebrahimi, Hsinchun Chen:
Key Factors Affecting User Adoption of Open-Access Data Repositories in Intelligence and Security Informatics: An Affordance Perspective. 10:1-10:24 - Gamal Elkoumy, Stephan A. Fahrenkrog-Petersen, Mohammadreza Fani Sani, Agnes Koschmider, Felix Mannhardt, Saskia Nuñez von Voigt, Majid Rafiei, Leopold von Waldthausen:
Privacy and Confidentiality in Process Mining: Threats and Research Challenges. 11:1-11:17
Volume 13, Number 2, June 2022
- Bo Sun, Takeshi Takahashi, Tao Ban, Daisuke Inoue:
Detecting Android Malware and Classifying Its Families in Large-scale Datasets. 12:1-12:21 - Byron Marshall, Michael Curry, Robert E. Crossler, John Correia:
Machine Learning and Survey-based Predictors of InfoSec Non-Compliance. 13:1-13:20 - Jiaheng Xie, Bin Zhang, Jian Ma, Daniel Zeng, Jenny Lo-Ciganic:
Readmission Prediction for Patients with Heterogeneous Medical History: A Trajectory-Based Deep Learning Approach. 14:1-14:27 - Luo He, Hongyan Liu, Yinghui Yang, Bei Wang:
A Multi-attention Collaborative Deep Learning Approach for Blood Pressure Prediction. 15:1-15:20 - Yan Tang, Weilong Cui, Jianwen Su:
A Query Language for Workflow Logs. 16:1-16:28 - Shi-Ming Huang, David C. Yen, Ting Jyun Yan, Yi Ting Yang:
An Intelligent Mechanism to Automatically Discover Emerging Technology Trends: Exploring Regulatory Technology. 17:1-17:29 - Tomasz Miksa, Simon Oblasser, Andreas Rauber:
Automating Research Data Management Using Machine-Actionable Data Management Plans. 18:1-18:22 - Guangrui Li, Mike K. P. So, Kar Yan Tam:
Identifying the Big Shots - A Quantile-Matching Way in the Big Data Context. 19:1-19:30 - Xindong Wu, Xingquan Zhu, Minghui Wu:
The Evolution of Search: Three Computing Paradigms. 20:1-20:20 - Ning Zhang, Mohammadreza Ebrahimi, Weifeng Li, Hsinchun Chen:
Counteracting Dark Web Text-Based CAPTCHA with Generative Adversarial Learning for Proactive Cyber Threat Intelligence. 21:1-21:21 - Karl Werder, Balasubramaniam Ramesh, Rongen (Sophia) Zhang:
Establishing Data Provenance for Responsible Artificial Intelligence Systems. 22:1-22:23
Volume 13, Number 3, September 2022
- Jerry Chun-Wei Lin, Nachiketa Sahoo, Gautam Srivastava, Weiping Ding:
Introduction to the Special Issue on Pattern-Driven Mining, Analytics, and Prediction for Decision Making, Part II. 23:1-23:3 - Maryam Ebrahimi, Mohammad Hesam Tadayon, Mohammad Sayad Haghighi, Alireza Jolfaei:
A Quantitative Comparative Study of Data-oriented Trust Management Schemes in Internet of Things. 24:1-24:30 - Youxi Wu, Xiaohui Wang, Yan Li, Lei Guo, Zhao Li, Ji Zhang, Xindong Wu:
OWSP-Miner: Self-adaptive One-off Weak-gap Strong Pattern Mining. 25:1-25:23 - Yuan Gao, Laurence T. Yang, Yaliang Zhao, Jing Yang:
Feature Extraction of High-dimensional Data Based on J-HOSVD for Cyber-Physical-Social Systems. 26:1-26:21 - Hsun-Ping Hsieh, Fandel Lin, Nai-Yu Chen, Tzu-Hsin Yang:
A Decision Framework to Recommend Cruising Locations for Taxi Drivers under the Constraint of Booking Information. 27:1-27:30 - Anastasiia Pika, Chun Ouyang, Arthur H. M. ter Hofstede:
Configurable Batch-Processing Discovery from Event Logs. 28:1-28:25 - A. N. M. Bazlur Rashid, Mohiuddin Ahmed, Leslie F. Sikos, Paul S. Haskell-Dowland:
Anomaly Detection in Cybersecurity Datasets via Cooperative Co-evolution-based Feature Selection. 29:1-29:39 - Xin Liu, Liang Zheng, Weishan Zhang, Jiehan Zhou, Shuai Cao, Shaowen Yu:
An Evolutive Frequent Pattern Tree-based Incremental Knowledge Discovery Algorithm. 30:1-30:20
- Flavio Corradini, Alessandro Marcelletti, Andrea Morichetta, Andrea Polini, Barbara Re, Francesco Tiezzi:
Engineering Trustable and Auditable Choreography-based Systems Using Blockchain. 31:1-31:53 - M. Lisa Yeo, Erik Rolland, Jacquelyn Rees Ulmer, Raymond A. Patterson:
How Customer Demand Reactions Impact Technology Innovation and Security. 32:1-32:17 - Wanlun Ma, Xiangyu Hu, Chao Chen, Sheng Wen, Kim-Kwang Raymond Choo, Yang Xiang:
Social Media Event Prediction using DNN with Feedback Mechanism. 33:1-33:24
- Gediminas Adomavicius, Mochen Yang:
Integrating Behavioral, Economic, and Technical Insights to Understand and Address Algorithmic Bias: A Human-Centric Perspective. 34:1-34:27
Volume 13, Number 4, December 2022
- Mu-Yen Chen, Bhavani Thuraisingham, Erol Egrioglu, José de Jesús Rubio:
Introduction to the Special Issue on Smart Systems for Industry 4.0 and IoT. 35:1-35:3 - Esteban Elias Romero, Carlos David Camacho, Carlos Enrique Montenegro-Marín, Oscar Esneider Acosta Agudelo, Rubén González Crespo, Elvis Eduardo Gaona-García, Marcelo Herrera Martínez:
Integration of DevOps Practices on a Noise Monitor System with CircleCI and Terraform. 36:1-36:24 - Bin Ren, Yuquiang Chen, Fujie Wang:
Application Massive Data Processing Platform for Smart Manufacturing Based on Optimization of Data Storage. 37:1-37:20 - Genggeng Liu, Yuhan Zhu, Saijuan Xu, Hao Tang, Yeh-Cheng Chen:
Performance-Driven X-Architecture Routing Algorithm for Artificial Intelligence Chip Design in Smart Manufacturing. 38:1-38:20 - Zhihan Lv, Dongliang Chen, Hailin Feng, Amit Kumar Singh, Wei Wei, Haibin Lv:
Computational Intelligence in Security of Digital Twins Big Graphic Data in Cyber-physical Systems of Smart Cities. 39:1-39:17 - Rongli Chen, Xiaozhong Chen, Lei Wang, Jianxin Li:
The Core Industry Manufacturing Process of Electronics Assembly Based on Smart Manufacturing. 40:1-40:19 - Genggeng Liu, Ruping Zhou, Saijuan Xu, Yuhan Zhu, Wenzhong Guo, Yeh-Cheng Chen, Guolong Chen:
Two-Stage Competitive Particle Swarm Optimization Based Timing-Driven X-Routing for IC Design Under Smart Manufacturing. 41:1-41:26 - Xin Du, Songtao Tang, Zhihui Lu, Keke Gai, Jie Wu, Patrick C. K. Hung:
Scientific Workflows in IoT Environments: A Data Placement Strategy Based on Heterogeneous Edge-Cloud Computing. 42:1-42:26 - Qi Lin, Wensheng Gan, Yongdong Wu, Jiahui Chen, Chien-Ming Chen:
Smart System: Joint Utility and Frequency for Pattern Classification. 43:1-43:24 - Rohini Poolat Parameswarath, Prosanta Gope, Biplab Sikdar:
User-empowered Privacy-preserving Authentication Protocol for Electric Vehicle Charging Based on Decentralized Identity and Verifiable Credential. 44:1-44:21 - Mengxin Nong, Lingfeng Huang, Mingtao Liu:
Allocation of Resources for Cloud Survivability in Smart Manufacturing. 45:1-45:11 - Usman Ahmed, Jerry Chun-Wei Lin, Gautam Srivastava:
Heterogeneous Energy-aware Load Balancing for Industry 4.0 and IoT Environments. 46:1-46:23 - Yu-Chia Chen, Sin-Ye Jhong, Chih-Hsien Hsia:
Roadside Unit-based Unknown Object Detection in Adverse Weather Conditions for Smart Internet of Vehicles. 47:1-47:21
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.