Antonio Sanfilippo
#110,529
Most Influential Person Across History
Researcher
Antonio Sanfilippo's AcademicInfluence.com Rankings
Antonio Sanfilippocomputer-science Degrees
Computer Science
#2780
Historical Rank
Computational Linguistics
#46
Historical Rank
Machine Learning
#179
Historical Rank
Artificial Intelligence
#316
Historical Rank

Download Badge
Computer Science
Antonio Sanfilippo's Degrees
- PhD Computer Science Stanford University
- Masters Computer Science University of California, Berkeley
- Bachelors Computer Science University of California, Berkeley
Similar Degrees You Can Earn
Why Is Antonio Sanfilippo Influential?
(Suggest an Edit or Addition)Antonio Sanfilippo's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Business Intelligence and Analytics: From Big Data to Big Impact (2012) (4759)
- Sentiment analysis in multiple languages: Feature selection for opinion classification in Web forums (2008) (1005)
- Credit rating analysis with support vector machines and neural networks: a market comparative study (2004) (990)
- Textual analysis of stock market prediction using breaking financial news: The AZFin text system (2009) (776)
- A framework for authorship identification of online messages: Writing-style features and classification techniques (2006) (745)
- Applying associative retrieval techniques to alleviate the sparsity problem in collaborative filtering (2004) (697)
- Crime data mining: a general framework and some examples (2004) (552)
- The information content of mandatory risk factor disclosures in corporate filings (2010) (497)
- Social Media Analytics and Intelligence (2010) (481)
- Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace (2008) (472)
- Applying authorship analysis to extremist-group Web forum messages (2005) (428)
- Link prediction approach to collaborative filtering (2005) (425)
- Internet Browsing and Searching: User Evaluations of Category Map and Concept Space Techniques (1998) (336)
- Criminal network analysis and visualization (2005) (307)
- Machine Learning for Information Retrieval: Neural Networks, Symbolic Learning, and Genetic Algorithms (1995) (307)
- Evaluating sentiment in financial news articles (2012) (300)
- Parser evaluation: a survey and a new proposal (1998) (292)
- AI and Opinion Mining (2010) (291)
- CrimeNet explorer: a framework for criminal network knowledge discovery (2005) (270)
- A Lexicon-Enhanced Method for Sentiment Classification: An Experiment on Online Product Reviews (2010) (257)
- A graph-based recommender system for digital library (2002) (256)
- Internet Categorization and Search: A Self-Organizing Approach (1996) (254)
- A machine learning approach to web page filtering using content and structure analysis (2008) (250)
- Automatic construction of networks of concepts characterizing document databases (1992) (249)
- A graph model for E-commerce recommender systems (2004) (241)
- A Comparison of Collaborative-Filtering Recommendation Algorithms for E-commerce (2007) (238)
- A Visual Framework for Knowledge Discovery on the Web: An Empirical Study of Business Intelligence Exploration (2005) (232)
- Browsing in hypertext: a cognitive study (1992) (226)
- Recommendation as link prediction in bipartite graphs: A graph kernel-based machine learning approach (2013) (225)
- COPLINK: managing law enforcement data and knowledge (2003) (215)
- Selecting Attributes for Sentiment Classification Using Feature Relation Networks (2011) (207)
- Longitudinal Patent Analysis for Nanoscale Science and Engineering: Country, Institution and Technology Field (2003) (207)
- CyberGate: A Design Framework and System for Text Analysis of Computer-Mediated Communication (2008) (203)
- Detecting Fake Websites: The Contribution of Statistical Learning Theory (2010) (199)
- The topology of dark networks (2008) (196)
- COPLINK Connect: information and knowledge management for law enforcement (2003) (188)
- CI Spider: a tool for competitive intelligence on the Web (2002) (185)
- A quantitative stock prediction system based on financial news (2009) (179)
- A Concept Space Approach to Addressing the Vocabulary Problem in Scientific Information Retrieval: An Experiment on the Worm Community System (1997) (179)
- From fingerprint to writeprint (2006) (178)
- US domestic extremist groups on the Web: link and content analysis (2005) (174)
- Uncovering the dark Web: A case study of Jihad on the Web (2008) (170)
- Comparing noun phrasing techniques for use with medical digital library tools (2000) (170)
- Automatic concept classification of text from electronic meetings (1994) (158)
- A comparison of collaborative-filtering algorithms for ecommerce (2007) (158)
- Extracting Meaningful Entities from Police Narrative Reports (2002) (158)
- Automatic Thesaurus Generation for an Electronic Community System (1995) (156)
- Medical Informatics: Knowledge Management and Data Mining in Biomedicine (Operations Research/Computer Science Interfaces) (2005) (155)
- Business Intelligence and Analytics: Research Directions (2013) (154)
- Visualization of large category map for Internet browsing (2003) (151)
- Fighting organized crimes: using shortest-path algorithms to identify associations in criminal networks (2004) (151)
- Using Coplink to Analyze Criminal-Justice Data (2002) (151)
- A shallow parser based on closed-class words to capture relations in biomedical text (2003) (146)
- International nanotechnology development in 2003: Country, institution, and technology field analysis based on USPTO patent database (2004) (146)
- Automatically detecting deceptive criminal identities (2004) (145)
- Affect Analysis of Web Forums and Blogs Using Correlation Ensembles (2008) (143)
- A Methodology for Analyzing Web-Based Qualitative Data (2003) (142)
- Analyzing Consumer-Product Graphs: Empirical Findings and Applications in Recommender Systems (2005) (135)
- Newsmap: a knowledge map for online news (2005) (133)
- Authorship Analysis in Cybercrime Investigation (2003) (132)
- Affect Intensity Analysis of Dark Web Forums (2007) (126)
- Document clustering for electronic meetings: an experimental comparison of two techniques (1999) (125)
- A Parallel Computing Approach to Creating Engineering Concept Spaces for Semantic Retrieval: The Illinois Digital Library Initiative Project (1996) (123)
- Patent citation network in nanotechnology (1976–2004) (2007) (122)
- Textual Analysis of Stock Market Prediction Using Financial News Articles (2006) (120)
- The State-of-the-Art in Twitter Sentiment Analysis (2018) (118)
- AZDrugMiner: An Information Extraction System for Mining Patient-Reported Adverse Drug Events in Online Patient Forums (2013) (118)
- Uninvited Connections: A Study of Vulnerable Devices on the Internet of Things (IoT) (2014) (117)
- Interactive term suggestion for users of digital libraries: using subject thesauri and co-occurrence lists for information retrieval (1996) (116)
- Generating, integrating, and activating thesauri for concept-based document retrieval (1993) (115)
- Cognitive process as a basis for intelligent retrieval systems design (1991) (115)
- A Machine Learning Approach to Inductive Query by Examples: An Experiment Using Relevance Feedback, ID3, Genetic Algorithms, and Simulated Annealing (1998) (115)
- A focused crawler for Dark Web forums (2010) (111)
- Design and evaluation of a multi-agent collaborative Web mining system (2003) (110)
- A Scalable Self-organizing Map Algorithm for Textual Classification: A Neural Network Approach to Thesaurus Generation (1998) (110)
- Comparison of Three Vertical Search Spiders (2003) (109)
- A Graphical, Self-Organizing Approach to Classifying Electronic Meeting Output (1997) (108)
- A Smart Itsy Bitsy Spider for the Web (1998) (107)
- Digital Government: technologies and practices (2003) (106)
- Exploring Emerging Hacker Assets and Key Hackers for Proactive Cyber Threat Intelligence (2017) (106)
- Web mining: Machine learning for web applications (2005) (106)
- Social Web mining and exploitation for serious applications: Technosocial Predictive Analytics and related technologies for public health, environmental and national security surveillance (2010) (105)
- Building Large-Scale Digital Libraries - Guest Editors' Introduction (1996) (104)
- IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS Editor-In-Chief (2005) (104)
- Worldwide nanotechnology development: a comparative study of USPTO, EPO, and JPO patents (1976–2004) (2007) (104)
- Trends in nanotechnology patents. (2008) (104)
- Crime Data Mining: An Overview and Case Studies (2003) (103)
- Meeting medical terminology needs-the ontology-enhanced Medical Concept Mapper (2001) (103)
- Convergence of knowledge management and e-learning: the GetSmart experience (2003) (102)
- Healthcare Predictive Analytics for Risk Profiling in Chronic Care: A Bayesian Multitask Learning Approach (2017) (101)
- An intelligent personal spider (agent) for dynamic Internet/Intranet searching (1998) (99)
- Trends in worldwide nanotechnology patent applications: 1991 to 2008 (2009) (98)
- Information navigation on the web by clustering and summarizing query results (2001) (98)
- Intelligence and security informatics for homeland security: information, communication, and transportation (2004) (97)
- Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security (2008) (95)
- MetaSpider: Meta-searching and categorization on the Web (2001) (95)
- Federating Diverse Collections of Scientific Literature (1996) (93)
- Collaborative Systems: Solving the Vocabulary Problem (1994) (93)
- Analyzing terror campaigns on the internet: Technical sophistication, content richness, and Web interactivity (2007) (89)
- Exploring threats and vulnerabilities in hacker web: Forums, IRC and carding shops (2015) (89)
- Extracting gene pathway relations using a hybrid grammar: the Arizona Relation Parser (2004) (88)
- Global nanotechnology development from 1991 to 2012: patents, scientific publications, and effect of NSF funding (2013) (86)
- Knowledge Management, Data Mining, and Text Mining in Medical Informatics (2005) (84)
- Filling Preposition-Based Templates to Capture Information from Medical Abstracts (2001) (83)
- Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network (2005) (83)
- Visualizing Authorship for Identification (2006) (79)
- Knowledge Management Systems: A Text Mining Perspective (2001) (78)
- Business intelligence explorer: a knowledge map framework for discovering business intelligence on the Web (2003) (77)
- Intelligent Internet searching engine based on hybrid simulated annealing (1998) (77)
- Kernel-based learning for biomedical relation extraction (2008) (75)
- Trends for nanotechnology development in China, Russia, and India (2009) (74)
- Analyzing and Visualizing Criminal Network Dynamics: A Case Study (2004) (74)
- Automatic online news monitoring and classification for syndromic surveillance (2009) (74)
- Mapping the contemporary terrorism research domain (2007) (74)
- Untangling Criminal Networks: A Case Study (2003) (73)
- Using sentence-selection heuristics to rank text segments in TXTRACTOR (2002) (72)
- Collaborative information retrieval environment: integration of information retrieval with group support systems (1999) (72)
- Digital Government: E-Government Research, Case Studies, and Implementation (2008) (71)
- A Discrete Stock Price Prediction Engine Based on Financial News (2010) (71)
- Web Media and Stock Markets : A Survey and Future Directions from a Big Data Perspective (2018) (70)
- Exploring hacker assets in underground forums (2015) (70)
- Infectious Disease Informatics: Syndromic Surveillance for Public Health and BioDefense (2009) (70)
- Identifying vulnerabilities of consumer Internet of Things (IoT) devices: A scalable approach (2017) (68)
- A Tensor-Based Information Framework for Predicting the Stock Market (2016) (68)
- Digital Libraries: Technology and Management of Indigenous Knowledge for Global Access (2004) (67)
- Updateable PAT-Tree Approach to Chinese Key PhraseExtraction using Mutual Information: A Linguistic Foundation for Knowledge Management (1999) (65)
- Enhancing Predictive Analytics for Anti-Phishing by Exploiting Website Genre Information (2015) (65)
- User acceptance of Intelligence and Security Informatics technology: A study of COPLINK (2005) (65)
- Epidemic model for information diffusion in web forums: experiments in marketing exchange and political dialog (2016) (64)
- Evaluating ontology mapping techniques: An experiment in public safety information sharing (2008) (64)
- Longitudinal Nanotechnology Development (1991--2002): National Science Foundation Funding and its Impact on Patents (2005) (64)
- EBizPort: Collecting and analyzing business intelligence information (2004) (64)
- Text‐based video content classification for online video‐sharing sites (2010) (63)
- Connecting systems, data, and people: A multidisciplinary research roadmap for chronic disease management (2020) (63)
- Sports Data Mining (2010) (62)
- Internet searching and browsing in a multilingual world: An experiment on the Chinese Business Intelligence Portal (CBizPort) (2004) (62)
- An automatic indexing and neural network approach to concept retrieval and classification of multilingual (Chinese-English) documents (1996) (62)
- Applying Authorship Analysis to Arabic Web Content (2005) (62)
- Personalized spiders for web search and analysis (2001) (61)
- Securing cyberspace: Identifying key actors in hacker communities (2012) (61)
- Verifying the Proximity and Size Hypothesis for Self-Organizing Maps (1999) (61)
- Fighting cybercrime: a review and the Taiwan experience (2006) (61)
- Prospective Infectious Disease Outbreak Detection Using Markov Switching Models (2010) (61)
- Visualizing social network concepts (2010) (60)
- Federated Search of Scientific Literature (1999) (60)
- Multimedia Content Coding and Analysis: Unraveling the Content of Jihadi Extremist Groups' Videos (2008) (60)
- Expertise visualization: An implementation and study based on cognitive fit theory (2006) (59)
- MedTime: A temporal information extraction system for clinical narratives (2013) (58)
- Visualizing criminal relationships: comparison of a hyperbolic tree and a hierarchical list (2005) (58)
- Building a scientific knowledge web portal: The NanoPort experience (2006) (58)
- Medical Data Mining on the Internet: Research on a Cancer Information System (1999) (58)
- Identifying and Profiling Key Sellers in Cyber Carding Community: AZSecure Text Mining System (2016) (56)
- Optimal Search-Based Gene Subset Selection for Gene Array Cancer Classification (2007) (56)
- Toward Intelligent Meeting Agents (1996) (56)
- Identifying Top Sellers In Underground Economy Using Deep Learning-Based Sentiment Analysis (2014) (56)
- SCADA honeypots: An in-depth analysis of Conpot (2016) (56)
- Intelligence and Security Informatics for International Security: Information Sharing and Data Mining (Integrated Series in Information Systems) (2006) (56)
- A Multimodal Event-Driven LSTM Model for Stock Prediction Using Online News (2021) (56)
- Law enforcement officers' acceptance of advanced e-government technology: a survey study of COPLNK mobile (2009) (55)
- Creating a large-scale content-based airphoto image digital library (2000) (55)
- The Acquisition of Lexical Knowledge from Combined Machine-Readable Dictionary Sources (1992) (55)
- Large-scale regulatory network analysis from microarray data: modified Bayesian network learning and association rule mining (2007) (55)
- Syndromic surveillance systems (2008) (54)
- Information Visualization for Collaborative Computing (1998) (54)
- User Misconceptions of Information Retrieval Systems (1988) (53)
- A research framework for pharmacovigilance in health social media: Identification and evaluation of patient adverse drug event reports (2015) (53)
- Descriptive Analytics: Examining Expert Hackers in Web Forums (2014) (53)
- Impact of grid-tied large-scale photovoltaic system on dynamic voltage stability of electric power grids (2017) (53)
- Dark Web: Exploring and Data Mining the Dark Side of the Web (2011) (53)
- Ontology-enhanced automatic chief complaint classification for syndromic surveillance (2008) (53)
- Knowledge mapping for rapidly evolving domains: A design science approach (2011) (53)
- A Comparison of Tools for Detecting Fake Websites (2009) (53)
- Genescene: An ontology-enhanced integration of linguistic and co-occurrence based relations in biomedical texts (2005) (52)
- Analysis of the long-term solar potential for electricity generation in Qatar (2017) (51)
- Sentimental Spidering: Leveraging Opinion Information in Focused Crawlers (2012) (51)
- Recommendation as link prediction: a graph kernel-based machine learning approach (2009) (50)
- Examining Hacker Participation Length in Cybercriminal Internet-Relay-Chat Communities (2016) (50)
- Home Energy Management System Concepts, Configurations, and Technologies for the Smart Grid (2020) (50)
- Alleviating Search Uncertainty Through Concept Associations: Automatic Indexing, Co-Occurrence Analysis, and Parallel Computing (1998) (50)
- Digital Libraries: People, Knowledge, and Technology (2002) (49)
- Segmentation of lecture videos based on text: a method combining multiple linguistic features (2004) (48)
- Summary in context: Searching versus browsing (2006) (48)
- Technology Implementation Management in Law Enforcement (2004) (48)
- Multilingual Lexical Representation (1993) (48)
- The use of dynamic contexts to improve casual internet searching (2003) (48)
- Guest Editors' Introduction: Artificial Intelligence for Homeland Security (2005) (48)
- Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism (2004) (48)
- Personalized and Focused Web Spiders (2003) (48)
- Matching knowledge elements in concept maps using a similarity flooding algorithm (2006) (48)
- Exploring the use of concept spaces to improve medical information retrieval (2000) (47)
- Expert prediction, symbolic learning, and neural networks. An experiment on greyhound racing (1994) (47)
- Automated criminal link analysis based on domain knowledge (2007) (46)
- PNNL: A Supervised Maximum Entropy Approach to Word Sense Disambiguation (2007) (46)
- Business stakeholder analyzer: An experiment of classifying stakeholders on the Web (2009) (46)
- A longitudinal analysis of nanotechnology literature: 1976–2004 (2008) (45)
- Sentiment and affect analysis of Dark Web forums: Measuring radicalization on the internet (2008) (45)
- Do Electronic Health Records Affect Quality of Care? Evidence from the HITECH Act (2019) (45)
- Evaluating event visualization: a usability study of COPLINK spatio-temporal visualizer (2005) (45)
- Hidden Markov Model-Based Fall Detection With Motion Sensor Orientation Calibration: A Case for Real-Life Home Monitoring (2018) (45)
- AZSecure Hacker Assets Portal: Cyber threat intelligence and malware analysis (2016) (45)
- Incorporating Geographical Contacts into Social Network Analysis for Contact Tracing in Epidemiology: A Study on Taiwan SARS Data (2007) (44)
- A framework of integrating gene relations from heterogeneous data sources: an experiment on Arabidopsis thaliana (2006) (44)
- A comparison of fraud cues and classification methods for fake escrow website detection (2009) (44)
- Dark web forums portal: Searching and analyzing jihadist forums (2009) (44)
- Identity matching using personal and social identity features (2011) (44)
- AI, E-government, and Politics 2.0 (2009) (44)
- Collecting and Analyzing the Presence of Terrorists on the Web: A Case Study of Jihad Websites (2005) (43)
- Evaluating a news-aware quantitative trader: The effect of momentum and contrarian stock selection strategies (2008) (43)
- Tensor-Based Learning for Predicting Stock Movements (2015) (43)
- Identifying significant facilitators of dark network evolution (2009) (43)
- Cyber extremism in Web 2.0: An exploratory study of international Jihadist groups (2008) (43)
- A comparative study of spatio-temporal hotspot analysis techniques in security informatics (2004) (43)
- Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques (2016) (43)
- Intelligence and Security Informatics (2013) (43)
- elpfulMed: Intelligent searching for medical information over the internet (2003) (42)
- Connecting NSF funding to patent innovation in nanotechnology (2001–2004) (2006) (42)
- Mapping Nanotechnology Innovations and Knowledge: Global and Longitudinal Patent and Literature Analysis (2008) (42)
- An evaluation of the chat and knowledge delivery components of a low-level dialog system: The AZ-ALICE experiment (2007) (42)
- Cyberinfrastructure for homeland security: Advances in information sharing, data mining, and collaboration systems (2004) (42)
- Performance Modeling of Hyperledger Sawtooth Blockchain (2019) (41)
- Building an Infrastructure for Law Enforcement Information Sharing and Collaboration: Design Issues and Challenges (2001) (41)
- User-Generated Content on Social Media: Predicting Market Success with Online Word-of-Mouth (2010) (41)
- Data Mining for Social Network Data (2010) (41)
- Call for Papers MISQ Special Issue on (2010) (41)
- Infectious Disease Informatics and Biosurveillance (2012) (40)
- Business and Market Intelligence 2.0 (2010) (40)
- Analyzing firm-specific social media and market: A stakeholder-based event analysis framework (2014) (40)
- Automatic patent classification using citation network information: an experimental study in nanotechnology (2007) (40)
- DICE-E: A Framework for Conducting Darknet Identification, Collection, Evaluation with Ethics (2019) (40)
- Identifying adverse drug events from patient social media: A case study for diabetes (2015) (39)
- A Deep Learning Architecture for Psychometric Natural Language Processing (2020) (38)
- A Cyber-archaeology Approach to Social Movement Research: Framework and Case Study (2010) (37)
- HelpfulMed: Intelligent Searching for Medical Informationover the Internet (2003) (37)
- A geographic knowledge representation system for multimedia geospatial retrieval and analysis (1997) (36)
- GANNET: A Machine Learning Approach to Document Retrieval (1994) (35)
- Incorporating Web Analysis Into Neural Networks: An Example in Hopfield Net Searching (2007) (35)
- A Multi-Agent View of Strategic Planning Using Group Support Systems and Artificial Intelligence (1997) (35)
- A multi-region empirical study on the internet presence of global extremist organizations (2011) (35)
- Process-driven collaboration support for intra-agency crime analysis (2006) (35)
- A Unified Recommendation Framework Based on Probabilistic Relational Models (2005) (34)
- Coplink: a case of intelligent analysis and knowledge management (1999) (34)
- Redips: Backlink search and analysis on the Web for business intelligence analysis (2007) (34)
- Assessing medical device vulnerabilities on the Internet of Things (2017) (34)
- Criminal Identity Deception and Deception Detection in Law Enforcement (2004) (34)
- Comparison of two approaches to building a vertical search tool: a case study in the nanotechnology domain (2002) (34)
- Identifying mobile malware and key threat actors in online hacker forums for proactive cyber threat intelligence (2017) (34)
- A hybrid approach to Web forum interactional coherence analysis (2008) (34)
- Framing Social Movement Identity with Cyber-Artifacts: A Case Study of the International Falun Gong Movement (2010) (33)
- Evaluating mass knowledge acquisition using the ALICE chatterbot: The AZ-ALICE dialog system (2006) (33)
- LKB encoding of lexical knowledge (1994) (33)
- Categorization and analysis of text in computer mediated communication archives using visualization (2007) (33)
- Longitudinal study on patent citations to academic research articles in nanotechnology (1976–2004) (2007) (33)
- Using Backpropagation Networks for the Estimation of Aqueous Activity Coefficients of Aromatic Organic Compounds (1995) (33)
- Information Visualization for Decision Support (2008) (33)
- Prospective spatio-temporal data analysis for security informatics (2005) (32)
- Gender Classification for Web Forums (2011) (32)
- Information Sharing and Collaboration Policies within Government Agencies (2004) (32)
- Developing a Dark Web collection and infrastructure for computational and social sciences (2010) (32)
- Frame-based argumentation for group decision task generation and identification (2005) (32)
- System for Infectious Disease Information Sharing and Analysis: Design and Evaluation (2007) (32)
- Managing Emerging Infectious Diseases with Information Systems: Reconceptualizing Outbreak Management Through the Lens of Loose Coupling (2011) (32)
- Digital Libraries: Technological Advances and Social Impacts (Guest Editors' Introduction) (1999) (31)
- Research note: Examining gender emotional differences in Web forum communication (2013) (31)
- Intelligence and security informatics: information systems perspective (2006) (31)
- Visualization in law enforcement (2005) (31)
- Modeling residential adoption of solar energy in the Arabian Gulf Region (2018) (31)
- Identification and Validation of Ifit1 as an Important Innate Immune Bottleneck (2012) (31)
- Finding People with Emotional Distress in Online Social Media: A Design Combining Machine Learning and Rule-Based Classification (2020) (31)
- An SIR model for violent topic diffusion in social media (2011) (31)
- Topological Analysis of Criminal Activity Networks: Enhancing Transportation Security (2009) (30)
- Examining the impacts of mental workload and task-technology fit on user acceptance of the social media search system (2018) (30)
- Managing Knowledge in Light of Its Evolution Process: An Empirical Study on Citation Network-Based Patent Classification (2009) (30)
- Exploring Extremism and Terrorism on the Web: The Dark Web Project (2007) (30)
- Gene Function Prediction With Gene Interaction Networks: A Context Graph Kernel Approach (2022) (29)
- On the Topology of the Dark Web of Terrorist Groups (2006) (29)
- The ACQUILEX LKB: an introduction (1994) (29)
- An adaptive multi-modeling approach to solar nowcasting (2016) (29)
- Business and Market Intelligence 2.0, Part 2 (2010) (29)
- Using Open Web APIs in Teaching Web Mining (2009) (29)
- A Link Analysis Approach to Recommendation under Sparse Data (2004) (29)
- Online query refinement on information retrieval systems: a process model of searcher/system interactions (1989) (28)
- Estimating drug/plasma concentration levels by applying neural networks to pharmacokinetic data sets (2000) (28)
- Proactively Identifying Emerging Hacker Threats from the Dark Web (2020) (28)
- Verifying the proximity hypothesis for self-organizing maps (1999) (28)
- Disease named entity recognition using semisupervised learning and conditional random fields (2011) (28)
- The Dynamics of Terrorist Networks: Understanding the Survival Mechanisms of Global Salafi Jihad (2009) (28)
- Identifying, Collecting, and Presenting Hacker Community Data: Forums, IRC, Carding Shops, and DNMs (2018) (28)
- Identifying Adverse Drug Events from Health Social Media: A Case Study on Heart Disease Discussion Forums (2014) (28)
- Modeling Interactions in (2014) (27)
- A stack-based prospective spatio-temporal data analysis approach (2008) (27)
- Challenges and Future Directions (2009) (27)
- The roles of sharing, transfer, and public funding in nanotechnology knowledge‐diffusion networks (2015) (27)
- Multidimensional scaling for group memory visualization (1999) (27)
- Teaching key topics in computer science and information systems through a web search engine project (2003) (26)
- An International Perspective on Fighting Cybercrime (2003) (26)
- CMedPort: An integrated approach to facilitating Chinese medical information seeking (2006) (26)
- Leveraging Question Answer technology to address terrorism inquiry (2007) (26)
- BioPortal (2009) (26)
- Intelligent spider for Internet searching (1997) (26)
- Nano Mapper: an Internet knowledge mapping system for nanotechnology development (2008) (26)
- Infectious Diseaxe Informatics and Outbreak detection (2005) (26)
- Theory-Informed Design and Evaluation of an Advanced Search and Knowledge Mapping System in Nanotechnology (2012) (26)
- An integrated framework for analyzing multilingual content in Web 2.0 social media (2014) (26)
- Sports knowledge management and data mining (2010) (25)
- ESSENCE (2009) (25)
- A Collection of Visual Thesauri for Browsing Large Collections of Geographic Images (1999) (25)
- XOA: Web-Enabled Cross-Ontological Analytics (2007) (25)
- West Nile Virus and Botulism Portal: A Case Study in Infectious Disease Informatics (2004) (25)
- Multilingual chief complaint classification for syndromic surveillance: An experiment with Chinese chief complaints (2008) (25)
- Grammatical relations, thematic roles and verb semantics (1991) (25)
- COPLINK: Visualization for Crime Analysis (2003) (25)
- A sequence-to-sequence model-based deep learning approach for recognizing activity of daily living for senior care (2018) (24)
- Moving digital libraries into the student learning space: The GetSmart experience (2006) (24)
- Identifying SCADA Systems and Their Vulnerabilities on the Internet of Things: A Text-Mining Approach (2018) (24)
- Analyzing market performance via social media: a case study of a banking industry crisis (2013) (24)
- Identification of extremist videos in online video sharing sites (2009) (24)
- Discovering Identity Problems: A Case Study (2005) (23)
- Editorial: Design science, grand challenges, and societal impacts (2011) (23)
- Spatial-Temporal Cross-Correlation Analysis: A New Measure and a Case Study in Infectious Disease Informatics (2006) (23)
- Human Identification for Activities of Daily Living: A Deep Transfer Learning Approach (2020) (23)
- Burst Detection From Multiple Data Streams: A Network-Based Approach (2010) (23)
- A Machine Learning Approach to Inductive Query by Examples : An Experiment Using Relevance Feedback , ID 3 , Genetic Algorithms , and Simulated Annealing (1998) (23)
- COPLINK - Arming Law Enforcement with New Knowledge Management Technologies (2002) (23)
- Knowledge-based document retrieval: framework and design (1992) (23)
- Multilingual Web Retrieval: An Experiment on a Multilingual Business Intelligence Portal (2005) (23)
- Content Analysis of Jihadi Extremist Groups' Videos (2006) (23)
- Internet browsing: visualizing category map by fisheye and fractal views (2002) (23)
- A web-based system for near real-time surveillance and space-time cluster analysis of foot-and-mouth disease and other animal diseases. (2009) (23)
- A Review of Public Health Syndromic Surveillance Systems (2006) (23)
- Botnets, and the cybercriminal underground (2008) (22)
- Digital Libraries: International Collaboration and Cross-Fertilization (2008) (22)
- Semi-Supervised Cyber Threat Identification in Dark Net Markets: A Transductive and Deep Learning Approach (2020) (22)
- Combining Hierarchical and Associative Gene Ontology Relations With Textual Evidence in Estimating Gene and Gene Product Similarity (2007) (22)
- Dynamic Social Network Analysis of a Dark Network: Identifying Significant Facilitators (2007) (22)
- Customizable and Ontology-Enhanced Medical Information Retrieval Interfaces (1999) (22)
- Reducing Indeterminism in Consultation: A Cognitive Model of User/Librarian Interactions (1987) (22)
- The Dark Web Portal Project: Collecting and Analyzing the Presence of Terrorist Groups on the Web (2005) (22)
- CrimeLink Explorer: Using Domain Knowledge to Facilitate Automated Crime Association Analysis (2003) (22)
- Using social network analysis to identify key hackers for keylogging tools in hacker forums (2016) (22)
- Enhancing border security: Mutual information analysis to identify suspect vehicles (2007) (21)
- Artificial Intelligence for Homeland Security (2005) (21)
- Using Genetic Algorithm in Building Domain-Specific Collections: An Experiment in the Nanotechnology Domain (2005) (21)
- Exploring the Dark Side of the Web: Collection and Analysis of U.S. Extremist Online Forums (2006) (21)
- DiabeticLink: A Health Big Data System for Patient Empowerment and Personalized Healthcare (2013) (21)
- Syndromic Surveillance Systems: Public Health and Biodefence (2008) (21)
- Determining inventor status and its effect on knowledge diffusion: A study on nanotechnology literature from China, Russia, and India (2011) (20)
- Machine learning for attack vector identification in malicious source code (2013) (20)
- A Deep Learning Approach for Recognizing Activity of Daily Living (ADL) for Senior Care: Exploiting Interaction Dependency and Temporal Patterns (2021) (20)
- Genescene: biomedical text and data mining (2003) (20)
- A Spatio Temporal Visualizer for Law Enforcement (2003) (20)
- Detecting Cyber Threats in Non-English Dark Net Markets: A Cross-Lingual Transfer Learning Approach (2018) (19)
- Exploring key hackers and cybersecurity threats in Chinese hacker communities (2016) (19)
- Incremental Hacker Forum Exploit Collection and Classification for Proactive Cyber Threat Intelligence: An Exploratory Study (2018) (19)
- SpidersRUs: Creating specialized search engines in multiple languages (2008) (19)
- Semantic Research for Digital Libraries (1999) (19)
- Global mapping of gene/protein interactions in PubMed abstracts: A framework and an experiment with P53 interactions (2007) (19)
- Modeling the dynamics of medical information through web forums in medical industry (2015) (19)
- Visualization tools for self-organizing maps (1999) (19)
- An end user evaluation of query formulation and results review tools in three medical meta-search engines (2007) (19)
- Benchmarking vulnerability scanners: An experiment on SCADA devices and scientific instruments (2017) (19)
- An Adaptive Visual Analytics Platform for Mobile Devices (2005) (18)
- Special Issue on Social Media Analytics: Understanding the Pulse of the Society (2011) (18)
- Interaction Analysis of the ALICE Chatterbot: A Two-Study Investigation of Dialog and Domain Questioning (2010) (18)
- Intelligence and Security Informatics: Biosurveillance, Second NSF Workshop, BioSurveillance 2007, New Brunswick, NJ, USA, May 22, 2007, Proceedings (2007) (18)
- Investigating the impacts of avatar gender, avatar age, and region theme on avatar physical activity in the virtual world (2017) (18)
- AI for Global Disease Surveillance (2009) (18)
- Content Analysis for Proactive Intelligence: Marshaling Frame Evidence (2007) (18)
- Combining probability models and web mining models: a framework for proper name transliteration (2008) (18)
- Credit Rating Change Modeling Using News and Financial Ratios (2012) (18)
- Genescene: An ontology-enhanced integration of linguistic and co-occurrence based relations in biomedical texts: Research Articles (2005) (18)
- Using 3D interfaces to facilitate the spatial knowledge retrieval: a geo-referenced knowledge repository system (2005) (18)
- Introduction to the special issue on decision support in medicine (2007) (17)
- Developing understanding of hacker language through the use of lexical semantics (2015) (17)
- Mapping Medical Informatics Research (2005) (17)
- Modeling knowledge diffusion in scientific innovation networks: an institutional comparison between China and US with illustration for nanotechnology (2015) (17)
- Intelligence and Security Informatics (2006) (17)
- SpidersRUs: automated development of vertical search engines in different domains and languages (2005) (17)
- Transforming Open-Source Documents to Terror Networks: The Arizona TerrorNet (2005) (17)
- Agency satisfaction with electronic record management systems: A large-scale survey (2010) (17)
- Automating ontological annotation with WordNet (2006) (16)
- Internet browsing and searching (poster): user evaluations of category map and concept space techniques (1997) (16)
- Technology implementation management in law enforcement: COPLINK system usability and user acceptance evaluations (2003) (16)
- Smart health and wellbeing [Trends & Controversies] (2011) (16)
- Walking the Path: A New Journey to Explore and Discover Through Visual Analytics (2006) (16)
- Argus (2009) (16)
- Binary Black-box Evasion Attacks Against Deep Learning-based Static Malware Detectors with Adversarial Byte-Level Language Model (2020) (16)
- Detecting Dependencies between Semantic Verb Subclasses and Subcategorization Frames in Text Corpora (1996) (16)
- Bridging the virtual and real: The relationship between web content, linkage, and geographical proximity of social movements (2014) (16)
- Exploring the online underground marketplaces through topic-based social network and clustering (2016) (16)
- Towards A National Infectious Disease Information Infrastructure: A Case Study in West Nile Virus and Botulism (2004) (16)
- Analysis of Affect Intensities in Extremist Group Forums (2008) (16)
- Supporting non-English Web searching: An experiment on the Spanish business and the Arabic medical intelligence portals (2006) (16)
- COPLINK Knowledge Management for Law Enforcement: Text Analysis, Visualization and Collaboration (2001) (16)
- A hierarchical Naïve Bayes model for approximate identity matching (2011) (16)
- Stakeholder Analyses of Firm-Related Web Forums: Applications in Stock Return Prediction (2015) (16)
- Analyzing and Visualizing Gray Web Forum Structure (2007) (16)
- Collection of U.S. Extremist Online Forums: A Web Mining Approach (2007) (16)
- International perspective on nanotechnology papers, patents, and NSF awards (2000–2016) (2017) (16)
- Analyzing sentiments in Web 2.0 social media data in Chinese: experiments on business and marketing related Chinese Web forums (2013) (16)
- IEDs in the dark web: Lexicon expansion and genre classification (2009) (16)
- Trailblazing the Artificial Intelligence for Cybersecurity Discipline (2020) (16)
- AI and Security Informatics (2010) (15)
- The Dark Web Forum Portal: From multi-lingual to video (2011) (15)
- HealthQA: A Chinese QA Summary System for Smart Health (2014) (15)
- The MindMine comment analysis tool for collaborative attitude solicitation, analysis, sense-making and visualization (2000) (15)
- Ontological Annotation with WordNet (2006) (15)
- Nanotechnology Public Funding and Impact Analysis: A Tale of Two Decades (1991-2010) (2013) (15)
- Time-to-Event Modeling for Predicting Hacker IRC Community Participant Trajectory (2014) (15)
- Smart and Connected Health [Guest editors' introduction] (2014) (15)
- Modeling the Impact of Innovation Diffusion on Solar PV Adoption in City Neighborhoods (2018) (15)
- Chinese underground market jargon analysis based on unsupervised learning (2016) (15)
- Predictive Modeling for Sports and Gaming (2010) (15)
- Target vehicle identification for border safety using mutual information (2005) (15)
- Multilingual Web retrieval: An experiment in English–Chinese business intelligence (2006) (15)
- A knowledge-based approach to the design of document-based retrieval systems (1990) (15)
- Collaborative Friendship Networks in Online Healthcare Communities: An Exponential Random Graph Model Analysis (2014) (15)
- Artificial immune system for illicit content identification in social media (2012) (15)
- Introduction to special issue on terrorism informatics (2011) (15)
- Testing a Cancer Meta Spider (2003) (15)
- Inductive query by examples (IQBE): a machine learning approach (1994) (15)
- Communication-Garden System: Visualizing a computer-mediated communication process (2008) (15)
- Automated criminal link analysis based on domain knowledge: Research Articles (2007) (14)
- Evaluating an Infectious Disease Information Sharing and Analysis System (2005) (14)
- Mapping the Contemporary Terrorism Research Domain: Researchers, Publications, and Institutions Analysis (2005) (14)
- Automated Identification of Web Communities for Business Intelligence Analysis (2005) (14)
- An Integrated Framework for Avatar Data Collection from the Virtual World (2010) (14)
- Thematic and Aspectual Information in Verb Semantics (1991) (14)
- Technosocial predictive analytics in support of naturalistic decision making (2009) (14)
- Using importance flooding to identify interesting networks of criminal activity (2006) (14)
- Ontology-Based Automatic Chief Complaints Classification for Syndromic Surveillance (2006) (14)
- A Framework for Exploring Gray Web Forums: Analysis of Forum-Based Communities in Taiwan (2006) (14)
- Semantic indexing and searching using a Hopfield net (1998) (14)
- SilverLink: Smart Home Health Monitoring for Senior Care (2015) (14)
- Evaluating the efficacy of a terrorism question/answer system (2007) (14)
- Text mining self‐disclosing health information for public health service (2014) (14)
- Examining patterns of scientific knowledge diffusion based on knowledge cyber infrastructure: a multi-dimensional network approach (2019) (14)
- Vulnerability Assessment, Remediation, and Automated Reporting: Case Studies of Higher Education Institutions (2018) (14)
- Comparing nanotechnology landscapes in the US and China: a patent analysis perspective (2019) (14)
- Supporting Multilingual Information Retrieval in Web Applications: An English-Chinese Web Portal Experiment (2003) (13)
- Time-to-Event Predictive Modeling for Chronic Conditions Using Electronic Health Records (2014) (13)
- Social Network Data Mining: Research Questions, Techniques, and Applications (2010) (13)
- Dark-Net Ecosystem Cyber-Threat Intelligence (CTI) Tool (2019) (13)
- Intelligent Software Agents for Electronic Commerce (2000) (13)
- Defining the Players in Higher-Order Networks: Predictive Modeling for Reverse Engineering Functional Influence Networks (2011) (13)
- Security Informatics (2009) (13)
- Concept-based searching and browsing: a geoscience experiment (2001) (13)
- Word Knowledge Acquisition, Lexicon Construction and Dictionary Compilation (1994) (13)
- Scalable sentiment classification across multiple Dark Web Forums (2012) (13)
- Conducting large-scale analyses of underground hacker communities (2016) (13)
- Automating Frame Analysis (2008) (13)
- Dark Web: Exploring and Mining the Dark Side of the Web (2012) (13)
- Giving context to accounting numbers: The role of news coverage (2011) (12)
- Analysis of cyberactivism: A case study of online free Tibet activities (2008) (12)
- Trends and Controversies (2011) (12)
- IEDs in the Dark Web: Genre classification of improvised explosive device web pages (2008) (12)
- Cross-Ontological Analytics: Combining Associative and Hierarchical Relations in the Gene Ontologies to Assess Gene Product Similarity (2006) (12)
- Intelligence and Security Informatics, Techniques and Applications (2008) (12)
- An artificial intelligence approach to the design of online information retrieval systems (1990) (12)
- Identifying Supervisory Control and Data Acquisition (SCADA) Devices and their Vulnerabilities on the Internet of Things (IoT): A Text Mining Approach (2018) (12)
- MANAGING LAW ENFORCEMENT DATA AND KNOWLEDGE (2003) (12)
- BioPortal: a case study in infectious disease informatics (2005) (12)
- Smart and Connected Health (2014) (12)
- Digital Libraries: Social issues and technological advances (1999) (12)
- Trailblazing the Artificial Intelligence for Cybersecurity Discipline: A Multi-Disciplinary Research Roadmap (2020) (12)
- Enterprise risk and security management: Data, text and Web mining (2011) (11)
- Effects of Heart Rate Variability Biofeedback Therapy on Patients with Poststroke Depression: A Case Study (2015) (11)
- Graph Kernel-Based Learning for Gene Function Prediction from Gene Interaction Network (2007) (11)
- Creating a Large-Scale Digital Library for Georeferenced Information (1999) (11)
- Proceedings of the 14th ACM/IEEE-CS Joint Conference on Digital Libraries (2004) (11)
- An event-driven SIR model for topic diffusion in web forums (2012) (11)
- Benchmarking Vulnerability Assessment Tools for Enhanced Cyber-Physical System (CPS) Resiliency (2018) (11)
- Aggregating automatically extracted regulatory pathway relations (2006) (11)
- Evaluating text visualization for authorship analysis (2014) (11)
- Nanotechnology knowledge diffusion: measuring the impact of the research networking and a strategy for improvement (2014) (11)
- Evaluating the use of search engine development tools in IT education (2010) (11)
- Translation equivalence and lexicalization in the ACQUILEX LKB (1992) (11)
- Building a Human Information Discourse Interface to Uncover Scenario Content (2005) (11)
- Evaluating text visualization: An experiment in authorship analysis (2013) (11)
- Modeling multi-criteria decision analysis in residential PV adoption (2022) (11)
- Semantic Retrieval for the NCSA Mosaic (1994) (11)
- HealthMap (2009) (11)
- Building Knowledge Management System for Researching Terrorist Groups on the Web (2005) (11)
- A Multi-layer Naïve Bayes Model for Approximate Identity Matching (2006) (11)
- Topological analysis of criminal activity networks in multiple jurisdictions (2005) (11)
- Arizona Literature Mapper: An integrated approach to monitor and analyze global bioterrorism research literature (2009) (10)
- SPARKLE Work Package 1: Specification of Phrasal Parsing. Final Report (1997) (10)
- COPLINK: Visualization and Collaboration for Law Enforcement (2002) (10)
- Effects of Individuals' Motivations on Communications in Online Health Forums (2016) (10)
- Using the gene ontology to enrich biological pathways (2009) (10)
- Predicting individual affect of health interventions to reduce HPV prevalence. (2011) (10)
- Digital library research in the US: an overview with a knowledge management perspective (2004) (10)
- COPLINK Agent: An Architecture for Information Monitoring and Sharing in Law Enforcement (2003) (10)
- Organizing domain-specific information on the Web: An experiment on the Spanish business Web directory (2008) (10)
- Introduction to the special topic issue: Intelligence and security informatics (2005) (10)
- An Integrated Framework for Avatar Data Collection from the Virtual World: A Case Study in Second Life (2011) (10)
- The Vocabulary Problem in Collaboration (2002) (10)
- An Explorative Study on the Virtual World: Investigating the Avatar Gender and Avatar Age Differences in their Social Interactions for Help-Seeking (2020) (10)
- Lexical Polymorphism and Word Disambiguation (1995) (10)
- Linking Exploits from the Dark Web to Known Vulnerabilities for Proactive Cyber Threat Intelligence: An Attention-Based Deep Structured Semantic Model (2022) (10)
- Unraveling International Terrorist Groups' Exploitation of the Web: Technical Sophistication, Media Richness, and Web Interactivity (2006) (9)
- Using Shortest Path Algorithms to Identify Criminal Associations (2002) (9)
- Effect of Inventor Status on Intra-Organizational Innovation Evolution (2009) (9)
- COPLINK center: social network analysis and identity deception detection for law enforcement and homeland security intelligence and security informatics: a crime data mining approach to developing border safe research (2006) (9)
- Studying Global Extremist Organizations' Internet Presence Using the DarkWeb Attribute System (2008) (9)
- Suspect Vehicle Identification for Border Safety with Modified Mutual Information (2006) (9)
- Virtual Polysemy (1994) (9)
- User acceptance of Intelligence and Security Informatics technology: A study of COPLINK: Research Articles (2005) (9)
- Data Visualization, Information Dissemination, and Alerting (2009) (9)
- Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics (2005) (9)
- Predicting the Impact of Climate Change on U.S. Power Grids and Its Wider Implications on National Security (2009) (9)
- To Post or Not to Post: Using Online Trends to Predict Popularity of Offline Content (2018) (9)
- Gender difference analysis of political web forums: An experiment on an international islamic women's forum (2009) (9)
- Homeland security data mining using social network analysis (2008) (9)
- Special issue: "Web retrieval and mining" (2003) (9)
- BioPortal Infectious Disease Informatics research: disease surveillance and situational awareness (2008) (9)
- Social Network Analysis for Contact Tracing (2010) (9)
- Intelligence and Security Informatics - 12th Pacific Asia Workshop, PAISI 2017, Jeju Island, South Korea, May 23, 2017, Proceedings (2017) (9)
- Shodan visualized (2016) (9)
- Submission to the National Conference on Digital Government, 2001 Submission Type: PAPER (SHORT PAPER preferred) Building an Infrastructure for Law Enforcement Information Sharing and Collaboration: Design Issues and Challenges (2001) (9)
- MedTextus: An Ontology-enhanced Medical Portal (2002) (8)
- Create a large-scale digital library for geo-referenced information (1999) (8)
- Financial text mining: Supporting decision making using web 2.0 content (2010) (8)
- Chinese Chief Complaint Classification for Syndromic Surveillance (2007) (8)
- Adoption of Social Media Search Systems: An IS Success Model Perspective (2018) (8)
- Violent frames in action (2011) (8)
- COPLINK: information and knowledge management for law enforcement (2001) (8)
- The Illinois Digital Library Initiative Project: Federating Repositories and Semantic Research (2001) (8)
- A Layered Dempster-Shafer Approach to Scenario Construction and Analysis (2007) (8)
- The impact of individual attributes on knowledge diffusion in web forums (2015) (8)
- New York City Syndromic Surveillance Systems (2009) (8)
- A novel spatio-temporal data analysis approach based on prospective support vector clustering (2005) (8)
- SilverLink: Developing an International Smart and Connected Home Monitoring System for Senior Care (2016) (8)
- Domain Mapping of Contemporary Terrorism Research (2008) (8)
- Information foraging through clustering and summarization: a self-organizing approach (1999) (8)
- Designing a Collaborative Visual Analytics Tool for Social and Technological Change Prediction (2009) (8)
- Exploiting Emotions in Social Interactions to Detect Online Social Communities (2010) (8)
- Dark Web Forum Portal (2012) (8)
- Modeling one-mode projection of bipartite networks by tagging vertex information (2016) (8)
- Support concept-based multimedia information retrieval: a knowledge management approach (1999) (8)
- Deep Learning Based Topic Identification and Categorization: Mining Diabetes-Related Topics on Chinese Health Websites (2016) (8)
- Discovery of improvised explosive device content in the Dark Web (2008) (7)
- FEDERATED SEARCH OF SCIENTIFIC LITERATURE A RETROSPECTIVE ON THE ILLINOIS DIGITAL LIBRARY PROJECT (2000) (7)
- Partially supervised learning for radical opinion identification in hate group web forums (2012) (7)
- MedTextus: an intelligent web-based medical meta-search system (2002) (7)
- Biosurveillance and Biosecurity, International Workshop, BioSecure 2008, Raleigh, NC, USA, December 2, 2008. Proceedings (2008) (7)
- Motion Sensor-Based Assessment on Fall Risk and Parkinson's Disease Severity: A Deep Multi-Source Multi-Task Learning (DMML) Approach (2018) (7)
- Analyzing information systems researchers' productivity and impacts: A perspective on the H index (2011) (7)
- Identifying language groups within multilingual cybercriminal forums (2016) (7)
- Dark Web Research Overview (2012) (7)
- Introduction to the JASIST Special Topic issue on web retrieval and mining: A machine learning perspective (2003) (7)
- Predicting criminal relationships using multivariate survival analysis (2007) (7)
- RODS (2009) (7)
- Collaborative Workflow Management for Interagency Crime Analysis (2003) (7)
- CMedPort: a cross-regional Chinese medical portal (2003) (7)
- Introduction to the special topic issue: part 2 (2000) (7)
- NanoPort: a web portal for nanoscale science and technology (2002) (7)
- Intelligence and Security Informatics (2016) (7)
- Statistical Modeling of Nanotechnology Knowledge Diffusion Networks (2013) (7)
- Exploring the World Wide Web with Self-Organizing Map (2002) (7)
- Visualizing Internet search results with adaptive self-organizing maps (demonstration abstract) (1999) (7)
- Redips: Backlink search and analysis on the Web for business intelligence analysis: Research Articles (2007) (6)
- Using Content-Based and Link-Based Analysis in Building Vertical Search Engines (2004) (6)
- Identifying High Quality Carding Services in Underground Economy using Nonparametric Supervised Topic Model (2016) (6)
- Efficient scheduling of periodic information monitoring requests (2006) (6)
- DiabeticLink: An Integrated and Intelligent Cyber-Enabled Health Social Platform for Diabetic Patients (2014) (6)
- BioSense (2009) (6)
- Research in Sports Statistics (2010) (6)
- BorderSafe: Cross-Jurisdictional Information Sharing, Analysis, and Visualization (2005) (6)
- Chapter 10 Social Network Analysis for Terrorism Research (2007) (6)
- PRM-based identity matching using social context (2008) (6)
- Ranking Text Units According to Textual Saliency, Connectivity and Topic Aptness (1998) (6)
- Computer Modeling of Violent Intent: A Content Analysis Approach (2014) (6)
- Counteracting Dark Web Text-Based CAPTCHA with Generative Adversarial Learning for Proactive Cyber Threat Intelligence (2022) (6)
- Introduction to the special topic issue: Part 1 (2000) (6)
- AI and Global Science and Technology Assessment (2009) (6)
- Trends & Controversies (2011) (6)
- Sports Data Mining: The Field (2010) (6)
- Semantic search and semantic categorization (abstracts) (1997) (6)
- The Landscape of International Computing (1992) (6)
- Linking Ontological Resources Using Aggregatable Substance Identifiers to Organize Extracted Relations (2004) (6)
- Interactive Internet search through automatic clustering (poster abstract): an empirical study (1999) (6)
- Interaction Coherence Analysis for Dark Web Forums (2007) (6)
- Emoticon Analysis for Chinese Social Media and E-commerce (2019) (6)
- Global disease surveillance using social media: HIV/AIDS content intervention in web forums (2010) (5)
- A probabilistic model for approximate identity matching (2006) (5)
- The Finance Web: Internet Information and Markets (2010) (5)
- Experiments on Chinese-English Cross-language Retrieval at NTCIR-4 (2004) (5)
- Word Domain Disambiguation via Word Sense Disambiguation (2006) (5)
- Cross-Lingual Cybersecurity Analytics in the International Dark Web with Adversarial Deep Representation Learning (2022) (5)
- Building Large-scale Digital (1996) (5)
- The Java Search Agent Workshop (2000) (5)
- Visualizing the archive of a computer mediated communication process (2002) (5)
- Identifying the socio-spatial dynamics of terrorist attacks in the Middle East (2016) (5)
- Antibacterial activity of aminosidine and of beta-lactamic antibiotics. (1974) (5)
- Identifying, Collecting, and Monitoring Personally Identifiable Information: From the Dark Web to the Surface Web (2020) (5)
- Sentiment Analysis on Chinese Health Forums: A Preliminary Study of Different Language Models (2015) (5)
- Tracing Topic Discussions with the Event-Driven Sir Model for Online Forums (2016) (5)
- From Terrorism Informatics to Dark Web Research (2011) (5)
- Deep Learning for Information Systems Research (2020) (5)
- Artificial Intelligence Techniques for Emerging Information Systems Applications: Trailblazing Path to Semantic Interoperability (1998) (5)
- Dynamic user-level affect analysis in social media: Modeling violence in the Dark Web (2011) (5)
- Development of Hybrid AC/DC Laboratory-scale Smart Microgrid Testbed with Control & Monitoring System Implementation in LabVIEW (2019) (5)
- Identifying High-Status Nodes in Knowledge Networks (2010) (5)
- An automatic text mining framework for knowledge discovery on the web (2004) (5)
- NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks (2016) (5)
- Identifying Vulnerable GitHub Repositories and Users in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach (2020) (5)
- A High Accuracy Method for Semi-Supervised Information Extraction (2007) (5)
- Examining User Acceptance of COPLINK Technologies by Law Enforcement Officers: A Survey Study (2002) (5)
- BioPortal: an integrated infectious disease information sharing and analysis environment (2005) (5)
- Proceedings of the 2012 International Workshop on Smart Health and Wellbeing, SHB 2012, October 29, 2012, Maui, HI, USA (2012) (5)
- Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach (2020) (5)
- Validating a geographical image retrieval system (2000) (5)
- Global Foot-and-Mouth Disease Surveillance Using BioPortal (2007) (5)
- Studying the presence of terrorism on the web: an knowledge portal approach (2005) (5)
- Knowledge sharing and diffusion patterns (2009) (4)
- Case Study of Jihad on the Web (2008) (4)
- Modeling Dynamic Regulatory Processes in Stroke (2012) (4)
- A Generative Adversarial Learning Framework for Breaking Text-Based CAPTCHA in the Dark Web (2020) (4)
- Sharing and Visualizing Infectious Disease Datasets Using the WNV-BOT Portal System (2004) (4)
- Linking Personally Identifiable Information from the Dark Web to the Surface Web: A Deep Entity Resolution Approach (2020) (4)
- Multilingual input system for the Web-an open multimedia approach of keyboard and handwriting recognition for Chinese and Japanese (1998) (4)
- Introduction to the JASIST Special Topic Section on Web Retrieval and Mining : A Machine Learning Perspective (2003) (4)
- A concept space approach to semantic exchange (2000) (4)
- EARS (1895) (4)
- Linking Common Vulnerabilities and Exposures to the MITRE ATT&CK Framework: A Self-Distillation Approach (2021) (4)
- Intelligence and Security Informatics (2012) (4)
- Public Safety Information Sharing: An Ontological Perspective (2008) (4)
- Enhancing PV hosting Capacity of a Qatar Remote Farm Network using Inverters Ability to Regulate Reactive Power-a Case Study (2019) (4)
- Bioterrorism event detection based on the Markov switching model: A simulated anthrax outbreak study (2008) (4)
- Business-Technology Alignments in e-Government: A Large-Scale Taiwan Government Electronic Record Management Systems Study (2008) (4)
- Binary Black-Box Attacks Against Static Malware Detectors with Reinforcement Learning in Discrete Action Spaces (2021) (4)
- EconPort: a digital library for Microeconomics education (2003) (4)
- Greyhound Racing Using Support Vector Machines: A Case Study (2010) (4)
- A Knowledge-Based Design for Hypertext-Based Document Retrieval Systems (1990) (4)
- Design and evaluation of a multi-agent collaborativeWeb mining system (2003) (4)
- Extremist YouTube Videos (2012) (4)
- NATERGM: A model for examining the role of Nodal Attributes in dynamic social media networks (2016) (4)
- Adverse drug reaction early warning using user search data (2017) (4)
- Knowledge Mapping for Bioterrorism-Related Literature (2011) (4)
- Identifying top listers in Alphabay using Latent Dirichlet Allocation (2016) (4)
- What are the grand challenges in information systems research? a debate and discussion (2011) (4)
- Examining the Business-Technology Alignment in Government Agencies: A Study of Electronic Record Management Systems in Taiwan (2006) (4)
- Targeting key data breach services in underground supply chain (2016) (4)
- Detecting Fake Escrow Websites using Rich Fraud Cues and Kernel Based Methods (2013) (4)
- Scientific Discovery Within Data Streams (2004) (4)
- Modeling innovation diffusion for renewable energy technologies in city neighborhoods (2018) (4)
- A Web-Based System for Infectious Disease Data Integration and Sharing: Evaluating Outcome, Task Performance Efficiency, User Information Satisfaction, and Usability (2007) (4)
- Automated Annotation-Based Bio-Ontology Alignment with Structural Validation (2009) (4)
- Using Social Contextual Information to Match Criminal Identities (2006) (4)
- Social Media Analytics and Intelligence INTRODUCTION (2010) (4)
- Using Semantic Similarity to Acquire Cooccurrence Restrictions from Corpora (2002) (4)
- Handbooks in Information Systems, National Security (2007) (4)
- BioPortal: Sharing and Analyzing Infectious Disease Information (2005) (4)
- Technosocial predictive analytics for security informatics (2012) (4)
- Enriching regulatory networks by bootstrap learning using optimised GO-based gene similarity and gene links mined from PubMed abstracts (2011) (4)
- Improvised Explosive Devices (IED) on Dark Web (2012) (4)
- Automatic selection and ranking of translation candidates (1997) (4)
- The Arizona IDMatcher: developing an identity matching tool for law enforcement (2007) (4)
- Browsing the underdeveloped Web: An experiment on the Arabic Medical Web Directory (2009) (4)
- Detecting Cyber Threats in Non-English Hacker Forums: An Adversarial Cross-Lingual Knowledge Transfer Approach (2020) (4)
- A Multi-theoretical Framework for Hypotheses Testing of Temporal Network Patterns (2014) (4)
- A Statistical Learning Based System for Fake Website Detection (2013) (4)
- Single-Shot Black-Box Adversarial Attacks Against Malware Detectors: A Causal Language Model Approach (2021) (4)
- The Strategic Co-Alignment for Implementing Information Systems in E-Government (2009) (3)
- The Geopolitical Web: Assessing societal risk in an uncertain world (2011) (3)
- Smart Vulnerability Assessment for Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach (2020) (3)
- Potential impacts of solar energy integration on fuel mix strategies in Qatar (2018) (3)
- Anonymous port scanning: Performing network reconnaissance through Tor (2016) (3)
- Cross-Jurisdictional Activity Networks to Support Criminal Investigations (2004) (3)
- VIM: A Platform for Violent Intent Modeling (2009) (3)
- Special IssueDigital Government: technologies and practices (2002) (3)
- Enhancing Automatic Biological Pathway Generation with GO-Based Gene Similarity (2009) (3)
- Examining Technology Acceptance by Individual Law Enforcement Officers: An Exploratory Study (2003) (3)
- Visualizing the expertise space (2004) (3)
- Gene Pathway Text Mining and Visualization (2005) (3)
- Geo-Science self-organizing map and concept space (1997) (3)
- Proactive Intelligence for Nuclear Nonproliferation (2008) (3)
- User-Centered Evaluation of Arizona BioPathway: An Information Extraction, Integration, and Visualization System (2007) (3)
- Beyond Adoption: Does Meaningful Use of EHR Improve Quality of Care? (2014) (3)
- Language on trial (1999) (3)
- Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005, ... (Lecture Notes in Computer Science) (2005) (3)
- Validating a Geographical Image Retrieval System. (2000) (3)
- Predicting Stock Price Movement from Financial News Articles (2012) (3)
- Exploring Gray Web Forums: Analysis and Investigation of Forum-Based Communities in Taiwan (2008) (3)
- CMedPort: Intelligent Searching for Chinese Medical Information (2003) (3)
- NanoPort: an example for building knowledge portals for scientific domains (2003) (3)
- Target vehicle identification for border safety with modified mutual information (2006) (3)
- Identifying devices across the IPv4 address space (2016) (3)
- From Digital Library to Digital Government: A Case Study in Crime Data Mapping and Mining (2002) (3)
- Sports Data Mining Methodology (2010) (3)
- From Dark Web to GeoPolitical Web: Exploring the Value of Social Media Informatics (2012) (3)
- Designing, Implementing, and Evaluating Information Systems for Law Enforcement - A Long-Term Design-Science Research Project (2011) (3)
- Mapping Dark Web Geolocation (2008) (3)
- Comprar Infectious Disease Informatics And Biosurveillance (Integrated Series In Information Systems, Vol. 27) | Mark Thurmond | 9781441968913 | Springer (2010) (3)
- Fall Detection with Orientation Calibration Using a Single Motion Sensor (2016) (3)
- Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings (2007) (3)
- Open Source Data Mining Tools for Sports (2010) (3)
- Visualizing aggregated biological pathway relations (2005) (3)
- Bridging the Gap between Human Judgment and Automated Reasoning in Predictive Analytics (2010) (3)
- A Computational Approach to Detecting and Assessing Sustainability-related Communities in Social Media (2013) (3)
- DiabeticLink: An Internationally Collaborative Cyber-Enabled Patient Empowerment Platform (2015) (2)
- Using burst detection techniques to identify suspicious vehicular traffic at border crossings (2012) (2)
- Emoticon Analysis for Chinese Health and Fitness Topics (2014) (2)
- From Fingerprint to Writeprint: Feature Selection for Authorship Identification (2006) (2)
- Intelligence and Security Informatics (2003) (2)
- Innovation diffusion for renewable energy technologies (2018) (2)
- Editorial: Welcome to the first issue of ACM TMIS (2010) (2)
- Impacts of PV Adoption in Qatar on Natural Gas Exports to Northeast Asia and Ensuing Environmental Benefits (2016) (2)
- Does climate help modeling COVID-19 risk and to what extent? (2020) (2)
- Information visualization : Technology and systems (2005) (2)
- Lexicons for constraint-based grammars (1997) (2)
- A Framework for Stylometric Similarity Detection in Online Settings (2007) (2)
- Psychosocial and Cultural Modeling in Human Computation Systems: A Gamification Approach (2013) (2)
- Solar Nowcasting (2019) (2)
- Editors' introduction special issue on multilingual knowledge management (2008) (2)
- Diabetes-Related Topic Detection in Chinese Health Websites Using Deep Learning (2014) (2)
- Approach on the Vocabulary Problem in Collaboration (1993) (2)
- Survey and History of Digital Library Development in the Asia Pacific (2005) (2)
- Al for Global Disease Sur veillance (2009) (2)
- Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010. Proceedings (2010) (2)
- Betting and Gaming (2010) (2)
- PyNDA: Deep Learning for Psychometric Natural Language Processing (2019) (2)
- Chronic Disease Related Entity Extraction in Online Chinese Question and Answer Services (2015) (2)
- Grammatical relations in unification categorial grammar (1993) (2)
- Healthcare Analytics and Clinical Intelligence: A Risk Prediction Framework for Chronic Care (2014) (2)
- Genescene: biomedical text and data mining (2003) (2)
- Heterogeneous Domain Adaptation With Adversarial Neural Representation Learning: Experiments on E-Commerce and Cybersecurity (2022) (2)
- Stakeholder and sentiment analysis in web forums (2012) (2)
- Impacts of PV Adoption in Qatar on Natural Gas Exports and Carbon Dioxide Emission Reduction (2016) (2)
- Exploring adoption scenarios for residential photovoltaic systems in Qatar (2018) (2)
- Proceedings of the 5th International Conference on Asian Digital Libraries: Digital Libraries: People, Knowledge, and Technology (2002) (2)
- Proceedings of the 6th Pacific Asia conference on Intelligence and security informatics (2007) (2)
- The Arizona IDMatcher: A Probabilistic Identity Matching System (2007) (2)
- DGPort: A Web Portal for Digital Government (2003) (2)
- Extremist social movement groups and their online digital libraries (2006) (2)
- Disease surveillance based on spatial contact networks: A case study of Beijing 2003 SARS epidemic (2009) (2)
- "Violent Intent Modeling: Incorporating Cultural Knowledge into the Analytical Process (2007) (2)
- Senior Scholars' Forum (2011) (2)
- Data Analysis and Outbreak Detection (2009) (2)
- Content Analysis for Proactive Protective Intelligence (2010) (2)
- GeoScience self-organizing map and concept space (poster) (1997) (2)
- A Multi-Disciplinary Perspective for Conducting Artificial Intelligence-enabled Privacy Analytics (2021) (2)
- Examining Agencies' Satisfaction with Electronic Record Management Systems in e-Government: A Large-Scale Survey Study (2008) (2)
- Public Health Syndromic Surveillance Systems (2009) (2)
- Introduction: from information retrieval to knowledge management: enabling technologies and best practices (1999) (2)
- Digital Library Development in the Asia Pacific (2005) (2)
- Explainable Artificial Intelligence for Cyber Threat Intelligence (XAI-CTI) (2022) (2)
- Syndromic Surveillance Data Sources and Collection Strategies (2009) (2)
- Topological Analysis of Patent Citation Networks: Nanotechnology at USPTO, 1976-2004 (2009) (1)
- Modeling a Blockchain-enabled Transactive Energy System for Community Microgrids (2022) (1)
- Exogenous Parameters in Solar Forecasting (2020) (1)
- AI for Energy: A Blockchain-based Trading Market (2022) (1)
- Current Trends in the Detection of Sociocultural Signatures: Data-Driven Models (2014) (1)
- AI, Virtual Worlds, and Massively Multiplayer Online Games (2011) (1)
- WNV-BOT portal project summary (2004) (1)
- Identification of Marker Genes from High-Dimensional Microarray Data for Cancer Classification (2007) (1)
- Evaluating an integrated forum portal for terrorist surveillance and analysis (2012) (1)
- MARKOV SWITCHING MODELS FOR OUTBREAK DETECTION (2011) (1)
- Software agents for issues identification : an experiment on financial documents (1996) (1)
- Facilitating knowledge discovery by integrating bottom-up and top-down knowledge sources: a text mining approach (2003) (1)
- Introduction to the special topic issue: Intelligence and security informatics: Introduction (2005) (1)
- Suspect Vehicle Identification for Border Safety (2008) (1)
- High-performance Digital Library Classification Systems : From Information Retrieval to Knowledge Management (1999) (1)
- JCDL 2004 : proceedings of the fourth ACM/IEEE Joint Conference on Digital Libraries : global reach and diverse impact : Tucson, Arizona, June 7-11, 2004 (2004) (1)
- Medical information access for the new millennium: UMLS-enhanced semantic parsing and personalized medical agent (1999) (1)
- Building a Directory for the Underdeveloped Web: An Experiment on the Arabic Medical Web Directory (2007) (1)
- Predicting Market Movements: From Breaking News to Emerging Social Media (2011) (1)
- Acceptance Evaluations Technology Implementation Management in Law Enforcement : COPLINK System Usability and User (2003) (1)
- Terror tracker system: a web portal for terrorism research (2005) (1)
- Government Research Investment and Nanotechnology Innovations: NSF Funding and USPTO Patent Analysis, 2001-2004. (2009) (1)
- Introduction to the Special Topic Issue: Artificial Intelligence Techniques for Emerging Information Systems Applications (1998) (1)
- The BioPortal project: a national center of excellence for infectious disease informatics (2006) (1)
- DEVELOPING AN INTELLIGENT MULTI-REGIONAL CHINESE MEDICAL PORTAL (2004) (1)
- ACM SIGKDD Workshop on Intelligence and Security Informatics (2010) (1)
- Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009. Proceedings (2009) (1)
- Data Sources for Sports (2010) (1)
- Tools and Systems for Sports Data Analysis (2010) (1)
- Concept Classification and Search on Internet Using Machine Learning and Parallel Computing Techniques (1995) (1)
- Proceedings of the 2006 international conference on Intelligence and Security Informatics (2006) (1)
- Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings (2006) (1)
- ACM/IEEE Joint Conference on Digital Libraries, JCDL 2004, Tucson, AZ, USA, June 7-11, 2004, Proceedings (2004) (1)
- Web Sports Data Extraction and Visualization (2010) (1)
- Intelligence and security informatics : second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004 : proceedings (2004) (1)
- ACM KDD AI4Cyber: The 1st Workshop on Artificial Intelligence-enabled Cybersecurity Analytics (2021) (1)
- Biomedical Informatics and Security Informatics Research in Digital Library (2004) (1)
- Fostering Cybersecurity Big Data Research : A Case Study of the AZSecure Data System (2017) (1)
- Multilingual Web retrieval: An experiment in English-Chinese business intelligence (2006) (1)
- Optimal Search Based Gene Selection for Cancer Prognosis (2005) (1)
- Mapping Nanotechnology Knowledge Via Literature Database: A Longitudinal Study, 1976-2004 (2009) (1)
- Women’s Forums on the Dark Web (2012) (1)
- Identifying Adverse Drug Events from Health Social Media Using Distant Supervision (2015) (1)
- Digital libraries supporting digital government (2001) (1)
- EconPort: a digital library for microeconomics education (2003) (1)
- Quantifying Qualitative Data for Electronic Commerce Attitude Assessment and Visualization (2000) (1)
- Comparing the virtual linkage intensity and real world proximity of social movements (2010) (1)
- Visual SOM (abstract) (1997) (1)
- Digital Libraries: International Collaboration and Cross-Fertilization: 7th International Conference on Asian Digital Libraries, ICADL 2004, Shanghai, ... (Lecture Notes in Computer Science) (2005) (1)
- A Parallel Computing Approach to Creating Engineering Concept Spaces for Retrieval: The Illinios Digital Library Initiative Project (1996) (1)
- Does Meaningful Use of Electronic Health Records Improve Quality of Care? (2015) (1)
- Intelligence and Security Informatics, IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008. Proceedings (2008) (1)
- Intelligence and Security Informatics: International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings (Lecture Notes in Computer Science) (2006) (1)
- Proceedings of the 1st NSF/NIJ conference on Intelligence and security informatics (2003) (1)
- Identity Matching Based on Probabilistic Relational Models (2006) (1)
- Semantic Issues for Digital Libraries (2000) (1)
- Understanding Avatar Sentiments Using Verbal and Non-Verbal Cues (2012) (1)
- Smart Health (2018) (1)
- Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2011, Beijing, China, July 9, 2011. Proceedings (2011) (1)
- Medical Ontology-Enhanced Text Processing for Infectious Disease Informatics (2007) (1)
- Categorization, analysis, and visualization of computer-mediated communication and electronic markets (2008) (1)
- COPLINK: visualization for crime analysis DEMO (2003) (1)
- Social intelligence and cultural awareness (2011) (1)
- Sentiment Analysis on Chinese Web Forums using Elastic Nets: Features, Classification and Interpretation: Working Paper Series--11-11 (2011) (1)
- Identifying High-Impact Opioid Products and Key Sellers in Dark Net Marketplaces: An Interpretable Text Analytics Approach (2019) (1)
- US Domestic Extremist Groups (2012) (1)
- Supporting Information Seeking in Multinational Organizations: A Knowledge Portal Approach (2005) (1)
- Understanding the Nexus of Terrorist Web Sites (2008) (1)
- Building a Social Media Digital Library: Collection, Management, and Analytics (2011) (1)
- Building Web Directories in Different Languages for Decision Support: A Semi-Automatic Approach (2005) (1)
- Intelligence and Security Informatics (2015) (1)
- Bioterrorism Knowledge Mapping (2012) (1)
- Nuclear Threat Detection Via the Nuclear Web and Dark Web: Framework and Preliminary Study (2008) (1)
- AZPharm MetaAlert: A Meta-learning Framework for Pharmacovigilance (2016) (1)
- Intelligence and security informatics : first NSF/NIJ symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003 : proceedings (2003) (1)
- Thematic accessibility in discontinuous dependencies (1996) (1)
- Technosocial Predictive Analytics for Illicit Nuclear Trafficking (2011) (1)
- An integrated approach to predictive genomic analytics (2010) (1)
- Aligning Ontologies and Integrating Textual Evidence for Pathway Analysis of Microarray Data (2006) (1)
- Modeling Emergence in Neuroprotective Regulatory Networks (2012) (1)
- Integrating Ontological Knowledge and Textual Evidence in Estimating Gene and Gene Product Similarity (2006) (1)
- Word Disambiguation by Lexical Underspecification (1999) (1)
- Gene network and pathway generation and analysis. (2011) (1)
- Identifying and Categorizing Malicious Content on Paste Sites: A Neural Topic Modeling Approach (2021) (0)
- Key Factors Affecting User Adoption of Open-Access Data Repositories in Intelligence and Security Informatics: An Affordance Perspective (2021) (0)
- Evaluating Two Approaches to Extracting Gene Regulatory Networks : Bayesian Networks and Association Rule Mining (2003) (0)
- Examining the impacts of mental workload and task-technology fit on user acceptance of the social media search system (2018) (0)
- Comprar Infectious Disease Informatics | Chen, Hsinchun | 9781441912770 | Springer (2011) (0)
- A C OMPARATIVE STUDY OF SOCIAL NETWORKING APPROACHES IN IDENTIFYING THE COVERT (2011) (0)
- Language- and domain-independent knowledge maps: a statistical phrase indexing approach (2004) (0)
- Do International Students Displace US Students in the Pursuit of Higher Degrees in Science and Engineering? A Forecasting Analysis (2016) (0)
- Question Answer TARA: A Terrorism Activity Resource Application (2005) (0)
- International Falun Gong Movement on the Web (2012) (0)
- Health-Related Spammer Detection on Chinese Social Media (2015) (0)
- Botnets and Cyber Criminals (2012) (0)
- International Patent and Patent Family Analysis for Nanotechnology (2009) (0)
- Interactional Coherence Analysis (2012) (0)
- AMCIS2006 Submission to Data and Text Mining for Decision Support Identity Matching Based on Probabilistic Relational Models (2006) (0)
- Proceedings of the 11th Pacific Asia Workshop on Intelligence and Security Informatics - Volume 9650 (2016) (0)
- Weapons of Mass Destruction (WMD) on Dark Web (2012) (0)
- BioPortal: Sharing, Analyzing & Visualizing Infectious Disease Datasets (2004) (0)
- ISI 2007 Preface (2007) (0)
- A Mdtilingaal-supporting Dialog System Acroas Multi- Intelligence and Security Informatics Isi: Challenges and Research Framework (0)
- Preface from the pacific Asia workshop on intelligence and security informatics (PAISI 2008) chairs (2008) (0)
- Proceedings of the 7th international Conference on Digital Libraries: international collaboration and cross-fertilization (2004) (0)
- Analysis on Chinese Web Forums using Elastic Nets : Features , Classification and Interpretation Working Paper Series — 11-11 | October 2011 (2011) (0)
- Welcome message from conference co-chairs (2017) (0)
- System Evaluation and User Technology Adoption (2011) (0)
- The Design and Evaluation of Multilingual Social Media Portal Working Paper Series — 1109 | October 2011 (2011) (0)
- "Intelligence and Security Informatics: Overview and the COPLINK Experience" (2010) (0)
- Specification of Lexicon Structure (1997) (0)
- Ambiguous Challenge to the Computer Industry (2004) (0)
- Exploring the Evolution of Exploit-Sharing Hackers: An Unsupervised Graph Embedding Approach (2021) (0)
- Digital Government Portal: A Tool for Digital Government Research (2004) (0)
- Ai and Opinion Mining, Part 2 Sentiment Quantifi Cation (2010) (0)
- A national center of excellence for infectious disease informatics: project summary (2005) (0)
- High-Performance Computing Needs of Digital Library Community: A Knowledge Management Perspective (1998) (0)
- Knowledge Sharing and Diffusion (2009) (0)
- An integrated approach to mapping worldwide bioterrorism research capabilities (2008) (0)
- Intelligence and Security Informatics: Techniques and Applications (Studies in Computational Intelligence) (2008) (0)
- The NanoMapper System: Accessing and Visualizing Nanotechnology Patents and Grants (2009) (0)
- Infectious Disease Informatics and Syndromic Surveillance (2008) (0)
- Joint Learning Using Multiple Types of Data and Knowledge (2005) (0)
- Proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics (2009) (0)
- West Nile Virus and Botulism Portal : A Case Study in Infectious Disease Informatics 1 (2004) (0)
- Impact of PV Power Loss/Gain on PV Power Cost and PV Adoption (2018) (0)
- A Control Study on the Effects of HRV Biofeedback Therapy in Patients with Post-Stroke Depression (2014) (0)
- The impact of individual attributes on knowledge diffusion in web forums (2015) (0)
- Dark Network Analysis (2012) (0)
- Medical information retrieval (1997) (0)
- Exploring Key Hackers and Cyber Threats in Chinese Hacker Communities (2016) (0)
- Evaluating the Usefulness of Sentiment Information for Focused Crawlers (2013) (0)
- S'boric Learning, and (1994) (0)
- National Conference on Digital Government (2002) (0)
- Analyzing sentiments in Web 2.0 social media data in Chinese: experiments on business and marketing related Chinese Web forums (2013) (0)
- Articles/Chapters (2016) (0)
- 1-1-2002 MedTextus : An Intelligent Web-Based Medical MetaSearch System (2013) (0)
- Lecture Notes in Computer Science: Preface (2005) (0)
- Introduction to the Special Topic Issue, In This Issue. (2000) (0)
- List of Tables Inductive Query by Examples ( IQBE ) : A Machine Learning Approach (2002) (0)
- Knowledge Mapping: Analysis Framework (2009) (0)
- Intelligence and Security Informatics (ISI): Research Framework (2012) (0)
- Developing ideological networks using social network analysis and writeprints: A case study of the international Falun Gong movement (2008) (0)
- Tech N O I O G Y and Systems Information Visualization (2006) (0)
- Knowledge discovery in social media: physical world, online world, and virtual world (2011) (0)
- IEEE International Conference on Intelligence and Security Informatics, ISI 2010, Vancouver, BC, Canada, May 23-26, 2010, Proceedings (2010) (0)
- Proceedings of the 2013 international conference on Smart Health (2013) (0)
- Advanced Informatics for Business Intelligence 2.0 (2010) (0)
- Knowledge integration for medical informatics: an experiment on a cancer information system (1998) (0)
- Guest Editors' Introduction: Special Section on Intelligence and Security Informatics (2008) (0)
- Distilling Contextual Embeddings Into A Static Word Embedding For Improving Hacker Forum Analytics (2021) (0)
- Proceedings of the 2008 International Workshop on Biosurveillance and Biosecurity (2008) (0)
- Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics (2008) (0)
- SHB 2012: international workshop on smart health and wellbeing (2012) (0)
- Introduction to the special topic issue: Digital Libraries - Part 2 (2000) (0)
- The itsy bitsy spider (poster) (1997) (0)
- Discrete Optimization Efficient scheduling of periodic information monitoring requests (2006) (0)
- Medical information retrieval (poster) (1997) (0)
- Revised Selected Papers of the International Conference on Smart Health - Volume 9545 (2015) (0)
- IEEE ISI 2008 Keynote Talk (III) Homeland Security Data Mining using Social Network Analysis (2008) (0)
- AI for Energy: A Blockchain-based Trading Market (2022) (0)
- Analyzing market performance via social media: a case study of a banking industry crisis (2013) (0)
- BioPortal: A scalable information sharing and analysis environment for disease informatics (2005) (0)
- Multimedia and Video Analysis for Sports (2010) (0)
- 2012 IEEE International Conference on Intelligence and Security Informatics, ISI 2012, Washington, DC, USA, June 11-14, 2012 (2012) (0)
- Data Prediction for a Blockchain-based Energy Market (2022) (0)
- Design for a wine barrel stand (1936) (0)
- Solar PV Energy Trading Market Blockchain-based: Agent-Models Community (2022) (0)
- Calculation of the optimal dosage regime for bactericidal antibiotics. (1973) (0)
- The action of Lucensomycin on some microorganisms (1970) (0)
- Panel 2 Research Opportunities in Knowledge Networking (1999) (0)
- [Pharmacokinetic aspects of aminosidine in normal and nephropathic humans]. (1972) (0)
- Automated detection of anomalous shipping manifests to identify illicit trade (2013) (0)
- SHB chairs' welcome (2012) (0)
- Studying the Structure of Terrorist Networks: A Web Structural Mining Approach (2005) (0)
- IEEE International Conference on Intelligence and Security Informatics (ISI 2010) May 23-26, 2010, The Fairmont Waterfront Hotel, Vancouver, B.C., Canada Theme: Public Safety and Security (2010) (0)
- A Path to Concept-based Information Access: From National Collaboratories to Digital Libraries (2000) (0)
- Technosocial predictive analysis : papers from the AAAI Spring Symposium (2009) (0)
- An Advanced Analytical Environment for Scientific Discovery within Continuous , Time-Varying Data-Streams (2004) (0)
- Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, Paris, France, June 28, 2009 (2009) (0)
- 1 DOMAIN MAPPING OF CONTEMPORARY TERRORISM RESEARCH (0)
- Proceedings - 12th IEEE International Conference on Computational Science and Engineering, CSE 2009: Message from the SIAG 2009 workshop chairs (2009) (0)
- Title Segmentation of lecture videos based on text : A methodcombining multiple linguistic features (2001) (0)
- Link and Content Analysis (2012) (0)
- Analysis in Cybercrime Investigation (0)
- Corrections to "NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks" (2020) (0)
- Intelligence and Security Informatics (2014) (0)
- A COMPUTATIONAL APPROACH TO DETECTING AND ASSESSING SUSTAINABILITYRELATED COMMUNITIES IN SOCIAL MEDIA Research-in-Progress (2013) (0)
- Position Paper: Integrating Ontologies for Semantic Web Applications (2003) (0)
- Trends & Controversies: Sociocultural Predictive Analytics and Terrorism Deterrence (2011) (0)
- ISI-KDD: SIGKDD workshop on intelligence and security informatics 2010 (2011) (0)
- Predication Within a Neo-Davidsonian Approach to Verb Semantics (1992) (0)
- SIAG 2009 Organizing and Program Committees (2009) (0)
- Meaningful Clusters (2004) (0)
- Electronic Commerce and Digital Libraries (2000) (0)
- 2015 IEEE International Conference on Intelligence and Security Informatics, ISI 2015, Baltimore, MD, USA, May 27-29, 2015 (2015) (0)
- The Acquis i t ion of Lexical K n o w l e d g e from C o m b i n e d Machine-Readable Dic t ionary Sources (0)
- Time-to-EventModeling for Chronic Conditions Using Electronic Health Records (2014) (0)
- AAAI Spring Symposium - Technical Report: Preface (2009) (0)
- 2013 IEEE International Conference on Intelligence and Security Informatics, Seattle, WA, USA, June 4-7, 2013 (2013) (0)
- AUTOMATICALLYDETECTING DECEPTIVE CRIMINAL IDENTITIES THE CRIMINAL MIND IS NO MATCH FOR SOME OF THE LATEST TECHNOLOGY DESIGNED TO DETERMINE FACT FROM (2004) (0)
- IEEE International Conference on Intelligence and Security Informatics, ISI 2010, Vancouver, BC, Canada, May 23-26, 2010, Proceedings (2010) (0)
- Workshop on current issues in predictive approaches to intelligence and security analytics (2010) (0)
- Trends & Controversies (2011) (0)
- Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics (CSI-KDD): Preface (2009) (0)
- Ai and Global Science and Technology Assessment in This Issue (1984) (0)
- THE POLICING CYBERSPACE INTERNATIONAL CONFERENCE 2008 (POLCYB CONFERENCE) "International Research and Collaboration in Global Security." September 29 to 30, 2008, Fairmont Waterfront Hotel, Vancouver, B.C., Canada. PRELIMINARY CONFERENCE PROGRAMME (CLOSED SESSIONS) (2008) (0)
- Reports of the AAAI 2009 Spring Symposia: Technosocial Predictive Analytics. (2009) (0)
- Welcome message from conference co-chairs (2013) (0)
- Itsy bitsy spider (1997) (0)
- Peer-to-Peer Pv Energy Trading for Residential Households in the GCC (2022) (0)
- Jihadi Video Analysis (2012) (0)
- Modeling knowledge diffusion in scientific innovation networks: an institutional comparison between China and US with illustration for nanotechnology (2015) (0)
- Forecasting the Diffusion of innovation for Solar PV Adoption for Community Housing (2022) (0)
- Identifying Novel Adverse Drug Events from Health Social Media Using Distant Supervision (2015) (0)
- 2010 3rd International Conference on Human-Centric Computing, HumanCom 2010: Message from the Program Chairs (2010) (0)
- Hypothesis Analysis Methods, Hypothesis Analysis Devices, and Articles of Manufacture: (550442012-001) (2013) (0)
- AAAI Spring Symposium - Technical Report (2009) (0)
- The design and evaluation of multilingual social media portal: Working paper series--11-09 (2011) (0)
- Data Forecasting with Application to Blockchain-based Local Energy Markets (2022) (0)
- Modular Semantic Tagging of Medline Abstracts and Its Use in Inferring Regulatory Networks (2011) (0)
- Dark Web Attribute System (2012) (0)
- From Information Retrieval to Knowledge Management Enabling Technologies and Best Practices (1999) (0)
- Reports of the AAAI 2009 Spring Symposia (2009) (0)
- Ontolex 2006 Programme Ontology-based Reasoning over Lexical Resources by Means of Ontolex 2006 Organisers Ontolex 2006 Programme Committee Table of Contents Reasoning over Lexical Resources by Means of Ontologies 1 Author Index Ontology-based Reasoning about Lexical Resources (0)
- Modeling Residential Adoption of Solar PV in Qatar (2016) (0)
- Intellectual Capital and Knowledge Management: A Perpetual Self-Organizing (PSO) Approach (1998) (0)
- Model and Analytic Processes for Export License Assessments (2011) (0)
- Classifying Scientific Performance on a Metric-by-Metric Basis (2012) (0)
- A New Perspective on Recommender Systems A Random Graph Theory Approach (2005) (0)
- Learning biological networks via bootstrapping with optimized go-based gene similarity (2010) (0)
- Knowledge Mapping: Foundation (2009) (0)
- Chapter 7 Spatio-Temporal Data Analysis in Security Informatics (2007) (0)
- Human language technologies for the information society: roles, plans and visions of funding agencies (1999) (0)
- WMD Intent Identification and Interaction Analysis Using the Dark Web (2016) (0)
- Introduction to the Journal on Digital Libraries special issue on Asian digital libraries (2004) (0)
- Do International Students Displace US Students in the Pursuit of Higher Degrees in Science and Engineering? A Forecasting Analysis (2016) (0)
- Infectious Disease Informatics: An Introduction and An Analysis Framework (2009) (0)
- Title Incorporating web analysis into neural networks : An example inhopfield net searching (2007) (0)
- Federal Funding and Nanotechnology Innovations: NSF Funding and USPTO Patent Analysis, 1991-2002. (2009) (0)
- A Syntactic Parser with Semantic Filtering for Biomedical Text (2004) (0)
- Chapter 18 GENE PATHWAY TEXT MINING AND VISUALIZATION (2007) (0)
- Gene network and pathway generation and analysis: Editorial (2011) (0)
- Ranking Text Units According to Textual Saliency, Connectivity and Topic Aptness (0)
- Towards Self-Supervised Learning for Automatic Electrical Appliance Classification (2022) (0)
- Comparison on the Impact of 0.4 MW PV with Central Inverter vs String Inverter on Distribution Network Operation (2018) (0)
- PNNL: A Supervised Maximum Entropy Approach to Word Sense Disambiguation (2007) (0)
- Method for Flagging Shaded Solar Data Using a Semi-Graphical Representation (2021) (0)
- PMU Analytics for Power Fault Awareness and Prediction (2019) (0)
- Transactive Green Energy Exchange Market Blockchain-based (2022) (0)
- Academic Literature Citation in Patents: A Longitudinal Study of USPTO Patents, 1976-2004. (2009) (0)
- Multilingual Chief Complaint Classifier (2007) (0)
- A Knowledge-Based Approach to the Design of cdTS (2004) (0)
- Validating a Geographic Image Retrieval System (2000) (0)
- Automated PII Extraction from Social Media for Raising Privacy Awareness: A Deep Transfer Learning Approach (2021) (0)
- Evaluating Sentiment in Financial News Articles: Working Paper Series--11-10 (2011) (0)
- Nanotechnology: An Emerging Field (2009) (0)
- System Assessment and Evaluation (2009) (0)
- An Issues Identifier for Online Financial Databases (1995) (0)
- Greyhound Racing Using Neural Networks: A Case Study (2010) (0)
- Intelligence and Security Informatics: Biosurveillance and Biosecurity (2009) (0)
- Mapping Nanotechnology Innovations Via USPTO Database: A Longitudinal Study, 1976-2002. (2009) (0)
- Introduction to the special topic issue: Digital Libraries - Part 1 (2000) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Antonio Sanfilippo?
Antonio Sanfilippo is affiliated with the following schools: