


default search action
ACM Transactions on Management Information Systems, Volume 13
Volume 13, Number 1, March 2022
- Jerry Chun-Wei Lin, Nachiketa Sahoo, Gautam Srivastava, Weiping Ding

:
Introduction to the Special Issue on Pattern-Driven Mining, Analytics, and Prediction for Decision Making, Part 1. 1:1-1:3 - Shui-Hua Wang, Xin Zhang, Yu-Dong Zhang:

DSSAE: Deep Stacked Sparse Autoencoder Analytical Model for COVID-19 Diagnosis by Fractional Fourier Entropy. 2:1-2:20 - Fan Chen, Jiaoxiong Xia, Honghao Gao, Huahu Xu, Wei Wei:

TRG-DAtt: The Target Relational Graph and Double Attention Network Based Sentiment Analysis and Prediction for Supporting Decision Making. 3:1-3:25 - M. Saqib Nawaz

, Philippe Fournier-Viger
, Unil Yun, Youxi Wu
, Wei Song
:
Mining High Utility Itemsets with Hill Climbing and Simulated Annealing. 4:1-4:22 - Shuteng Niu, Yushan Jiang

, Bowen Chen, Jian Wang, Yongxin Liu, Houbing Song
:
Cross-Modality Transfer Learning for Image-Text Information Management. 5:1-5:14 - Mu-Yen Chen

, Min-Hsuan Fan, Li-Xiang Huang:
AI-Based Vehicular Network toward 6G and IoT: Deep Learning Approaches. 6:1-6:12 - Zhihan Lv

, Ranran Lou, Hailin Feng, Dongliang Chen, Haibin Lv:
Novel Machine Learning for Big Data Analytics in Intelligent Support Information Management Systems. 7:1-7:21 - Ankit Kumar, Abhishek Kumar

, Ali Kashif Bashir
, Mamoon Rashid
, Visvam Devadoss Ambeth Kumar, Rupak Kharel:
Distance Based Pattern Driven Mining for Outlier Detection in High Dimensional Big Dataset. 8:1-8:17 - Mohammad Ehsan Shahmi Chowdhury, Chowdhury Farhan Ahmed, Carson K. Leung

:
A New Approach for Mining Correlated Frequent Subgraphs. 9:1-9:28
- Bo Wen, Paul Jen-Hwa Hu, Mohammadreza Ebrahimi, Hsinchun Chen:

Key Factors Affecting User Adoption of Open-Access Data Repositories in Intelligence and Security Informatics: An Affordance Perspective. 10:1-10:24 - Gamal Elkoumy, Stephan A. Fahrenkrog-Petersen

, Mohammadreza Fani Sani, Agnes Koschmider, Felix Mannhardt
, Saskia Nuñez von Voigt, Majid Rafiei, Leopold von Waldthausen:
Privacy and Confidentiality in Process Mining: Threats and Research Challenges. 11:1-11:17
Volume 13, Number 2, June 2022
- Bo Sun, Takeshi Takahashi, Tao Ban, Daisuke Inoue:

Detecting Android Malware and Classifying Its Families in Large-scale Datasets. 12:1-12:21 - Byron Marshall, Michael Curry, Robert E. Crossler, John Correia:

Machine Learning and Survey-based Predictors of InfoSec Non-Compliance. 13:1-13:20 - Jiaheng Xie, Bin Zhang, Jian Ma, Daniel Zeng, Jenny Lo-Ciganic:

Readmission Prediction for Patients with Heterogeneous Medical History: A Trajectory-Based Deep Learning Approach. 14:1-14:27 - Luo He, Hongyan Liu, Yinghui Yang, Bei Wang:

A Multi-attention Collaborative Deep Learning Approach for Blood Pressure Prediction. 15:1-15:20 - Yan Tang, Weilong Cui, Jianwen Su:

A Query Language for Workflow Logs. 16:1-16:28 - Shi-Ming Huang, David C. Yen, Ting Jyun Yan, Yi Ting Yang:

An Intelligent Mechanism to Automatically Discover Emerging Technology Trends: Exploring Regulatory Technology. 17:1-17:29 - Tomasz Miksa

, Simon Oblasser, Andreas Rauber
:
Automating Research Data Management Using Machine-Actionable Data Management Plans. 18:1-18:22 - Guangrui Li

, Mike K. P. So
, Kar Yan Tam
:
Identifying the Big Shots - A Quantile-Matching Way in the Big Data Context. 19:1-19:30 - Xindong Wu

, Xingquan Zhu, Minghui Wu:
The Evolution of Search: Three Computing Paradigms. 20:1-20:20 - Ning Zhang, Mohammadreza Ebrahimi

, Weifeng Li
, Hsinchun Chen:
Counteracting Dark Web Text-Based CAPTCHA with Generative Adversarial Learning for Proactive Cyber Threat Intelligence. 21:1-21:21 - Karl Werder

, Balasubramaniam Ramesh
, Rongen (Sophia) Zhang
:
Establishing Data Provenance for Responsible Artificial Intelligence Systems. 22:1-22:23
Volume 13, Number 3, September 2022
- Jerry Chun-Wei Lin

, Nachiketa Sahoo, Gautam Srivastava, Weiping Ding
:
Introduction to the Special Issue on Pattern-Driven Mining, Analytics, and Prediction for Decision Making, Part II. 23:1-23:3 - Maryam Ebrahimi

, Mohammad Hesam Tadayon, Mohammad Sayad Haghighi
, Alireza Jolfaei
:
A Quantitative Comparative Study of Data-oriented Trust Management Schemes in Internet of Things. 24:1-24:30 - Youxi Wu

, Xiaohui Wang, Yan Li, Lei Guo, Zhao Li, Ji Zhang, Xindong Wu
:
OWSP-Miner: Self-adaptive One-off Weak-gap Strong Pattern Mining. 25:1-25:23 - Yuan Gao, Laurence T. Yang

, Yaliang Zhao, Jing Yang:
Feature Extraction of High-dimensional Data Based on J-HOSVD for Cyber-Physical-Social Systems. 26:1-26:21 - Hsun-Ping Hsieh

, Fandel Lin, Nai-Yu Chen, Tzu-Hsin Yang:
A Decision Framework to Recommend Cruising Locations for Taxi Drivers under the Constraint of Booking Information. 27:1-27:30 - Anastasiia Pika, Chun Ouyang

, Arthur H. M. ter Hofstede:
Configurable Batch-Processing Discovery from Event Logs. 28:1-28:25 - A. N. M. Bazlur Rashid

, Mohiuddin Ahmed, Leslie F. Sikos, Paul S. Haskell-Dowland:
Anomaly Detection in Cybersecurity Datasets via Cooperative Co-evolution-based Feature Selection. 29:1-29:39 - Xin Liu

, Liang Zheng, Weishan Zhang
, Jiehan Zhou, Shuai Cao, Shaowen Yu:
An Evolutive Frequent Pattern Tree-based Incremental Knowledge Discovery Algorithm. 30:1-30:20
- Flavio Corradini, Alessandro Marcelletti

, Andrea Morichetta
, Andrea Polini, Barbara Re, Francesco Tiezzi:
Engineering Trustable and Auditable Choreography-based Systems Using Blockchain. 31:1-31:53 - M. Lisa Yeo

, Erik Rolland, Jacquelyn Rees Ulmer, Raymond A. Patterson
:
How Customer Demand Reactions Impact Technology Innovation and Security. 32:1-32:17 - Wanlun Ma, Xiangyu Hu, Chao Chen, Sheng Wen

, Kim-Kwang Raymond Choo
, Yang Xiang
:
Social Media Event Prediction using DNN with Feedback Mechanism. 33:1-33:24
- Gediminas Adomavicius

, Mochen Yang
:
Integrating Behavioral, Economic, and Technical Insights to Understand and Address Algorithmic Bias: A Human-Centric Perspective. 34:1-34:27
Volume 13, Number 4, December 2022
- Mu-Yen Chen

, Bhavani Thuraisingham
, Erol Egrioglu
, José de Jesús Rubio
:
Introduction to the Special Issue on Smart Systems for Industry 4.0 and IoT. 35:1-35:3 - Esteban Elias Romero, Carlos David Camacho, Carlos Enrique Montenegro-Marín, Oscar Esneider Acosta Agudelo, Rubén González Crespo

, Elvis Eduardo Gaona-García, Marcelo Herrera Martínez:
Integration of DevOps Practices on a Noise Monitor System with CircleCI and Terraform. 36:1-36:24 - Bin Ren, Yuquiang Chen, Fujie Wang:

Application Massive Data Processing Platform for Smart Manufacturing Based on Optimization of Data Storage. 37:1-37:20 - Genggeng Liu

, Yuhan Zhu, Saijuan Xu, Hao Tang, Yeh-Cheng Chen:
Performance-Driven X-Architecture Routing Algorithm for Artificial Intelligence Chip Design in Smart Manufacturing. 38:1-38:20 - Zhihan Lv

, Dongliang Chen, Hailin Feng, Amit Kumar Singh, Wei Wei, Haibin Lv:
Computational Intelligence in Security of Digital Twins Big Graphic Data in Cyber-physical Systems of Smart Cities. 39:1-39:17 - Rongli Chen

, Xiaozhong Chen
, Lei Wang
, Jianxin Li
:
The Core Industry Manufacturing Process of Electronics Assembly Based on Smart Manufacturing. 40:1-40:19 - Genggeng Liu

, Ruping Zhou
, Saijuan Xu
, Yuhan Zhu
, Wenzhong Guo
, Yeh-Cheng Chen
, Guolong Chen
:
Two-Stage Competitive Particle Swarm Optimization Based Timing-Driven X-Routing for IC Design Under Smart Manufacturing. 41:1-41:26 - Xin Du

, Songtao Tang
, Zhihui Lu
, Keke Gai
, Jie Wu
, Patrick C. K. Hung
:
Scientific Workflows in IoT Environments: A Data Placement Strategy Based on Heterogeneous Edge-Cloud Computing. 42:1-42:26 - Qi Lin

, Wensheng Gan
, Yongdong Wu
, Jiahui Chen
, Chien-Ming Chen
:
Smart System: Joint Utility and Frequency for Pattern Classification. 43:1-43:24 - Rohini Poolat Parameswarath

, Prosanta Gope
, Biplab Sikdar
:
User-empowered Privacy-preserving Authentication Protocol for Electric Vehicle Charging Based on Decentralized Identity and Verifiable Credential. 44:1-44:21 - Mengxin Nong, Lingfeng Huang, Mingtao Liu:

Allocation of Resources for Cloud Survivability in Smart Manufacturing. 45:1-45:11 - Usman Ahmed

, Jerry Chun-Wei Lin
, Gautam Srivastava
:
Heterogeneous Energy-aware Load Balancing for Industry 4.0 and IoT Environments. 46:1-46:23 - Yu-Chia Chen

, Sin-Ye Jhong
, Chih-Hsien Hsia
:
Roadside Unit-based Unknown Object Detection in Adverse Weather Conditions for Smart Internet of Vehicles. 47:1-47:21

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














