callback( { "result":{ "query":":facetid:stream:\"streams/conf/ieeeiccc\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"72.67" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"62", "@dc":"62", "@oc":"62", "@id":"43347987", "text":":facetid:stream:streams/conf/ieeeiccc" } }, "hits":{ "@total":"62", "@computed":"62", "@sent":"62", "@first":"0", "hit":[{ "@score":"1", "@id":"2213076", "info":{"authors":{"author":[{"@pid":"181/3219","text":"Ruba AlOmari"},{"@pid":"v/MiguelVargasMartin","text":"Miguel Vargas Martin"},{"@pid":"196/2302","text":"Shane MacDonald"},{"@pid":"181/3038","text":"Christopher Bellman"}]},"title":"Using EEG to Predict and Analyze Password Memorability.","venue":"ICCC","pages":"42-49","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/AlOmariMMB19","doi":"10.1109/ICCC.2019.00019","ee":"https://doi.org/10.1109/ICCC.2019.00019","url":"https://dblp.org/rec/conf/ieeeiccc/AlOmariMMB19"}, "url":"URL#2213076" }, { "@score":"1", "@id":"2213077", "info":{"authors":{"author":[{"@pid":"31/3451","text":"Bruno Apolloni"},{"@pid":"161/1458","text":"Aamna Al Shehhi"},{"@pid":"d/EDamiani","text":"Ernesto Damiani"}]},"title":"Bargaining Compatible Explanations.","venue":"ICCC","pages":"98-105","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/ApolloniSD19","doi":"10.1109/ICCC.2019.00028","ee":"https://doi.org/10.1109/ICCC.2019.00028","url":"https://dblp.org/rec/conf/ieeeiccc/ApolloniSD19"}, "url":"URL#2213077" }, { "@score":"1", "@id":"2213078", "info":{"authors":{"author":[{"@pid":"173/8571","text":"Cristina Barros"},{"@pid":"173/8569","text":"Marta Esther Vicente"},{"@pid":"82/1545","text":"Elena Lloret"}]},"title":"Tackling the Challenge of Computational Identification of Characters in Fictional Narratives.","venue":"ICCC","pages":"122-129","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/BarrosVL19","doi":"10.1109/ICCC.2019.00031","ee":"https://doi.org/10.1109/ICCC.2019.00031","url":"https://dblp.org/rec/conf/ieeeiccc/BarrosVL19"}, "url":"URL#2213078" }, { "@score":"1", "@id":"2213079", "info":{"authors":{"author":[{"@pid":"93/6458","text":"Seraphin B. Calo"},{"@pid":"45/4989","text":"Dinesh C. Verma"},{"@pid":"60/5927","text":"Maroun Touma"},{"@pid":"38/2945","text":"Franck Le"},{"@pid":"84/915","text":"Douglas Freimuth"},{"@pid":"06/2055","text":"Erich M. Nahum"}]},"title":"An AI Enabled System for Distributed System Characterization.","venue":"ICCC","pages":"10-18","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/CaloVTLFN19","doi":"10.1109/ICCC.2019.00015","ee":"https://doi.org/10.1109/ICCC.2019.00015","url":"https://dblp.org/rec/conf/ieeeiccc/CaloVTLFN19"}, "url":"URL#2213079" }, { "@score":"1", "@id":"2213080", "info":{"authors":{"author":[{"@pid":"237/9529","text":"Linsong Chu"},{"@pid":"88/5233","text":"Ramya Raghavendra"},{"@pid":"16/6744","text":"Mudhakar Srivatsa"},{"@pid":"p/AlunDPreece","text":"Alun D. Preece"},{"@pid":"222/2902","text":"Daniel Harborne"}]},"title":"Feature Importance Identification through Bottleneck Reconstruction.","venue":"ICCC","pages":"64-66","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/ChuRSPH19","doi":"10.1109/ICCC.2019.00022","ee":"https://doi.org/10.1109/ICCC.2019.00022","url":"https://dblp.org/rec/conf/ieeeiccc/ChuRSPH19"}, "url":"URL#2213080" }, { "@score":"1", "@id":"2213081", "info":{"authors":{"author":[{"@pid":"233/4171","text":"Mireille Fares"},{"@pid":"233/3797","text":"Angela Moufarrej"},{"@pid":"233/3950","text":"Eliane Jreij"},{"@pid":"82/4336","text":"Joe Tekli"},{"@pid":"g/WilliamIGrosky","text":"William I. Grosky"}]},"title":"Difficulties and Improvements to Graph-Based Lexical Sentiment Analysis Using LISA.","venue":"ICCC","pages":"28-35","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/FaresMJTG19","doi":"10.1109/ICCC.2019.00008","ee":"https://doi.org/10.1109/ICCC.2019.00008","url":"https://dblp.org/rec/conf/ieeeiccc/FaresMJTG19"}, "url":"URL#2213081" }, { "@score":"1", "@id":"2213082", "info":{"authors":{"author":[{"@pid":"204/3629","text":"Mathieu Garchery"},{"@pid":"32/1270","text":"Michael Granitzer"}]},"title":"Identifying and Clustering Users for Unsupervised Intrusion Detection in Corporate Audit Sessions.","venue":"ICCC","pages":"19-27","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/GarcheryG19","doi":"10.1109/ICCC.2019.00016","ee":"https://doi.org/10.1109/ICCC.2019.00016","url":"https://dblp.org/rec/conf/ieeeiccc/GarcheryG19"}, "url":"URL#2213082" }, { "@score":"1", "@id":"2213083", "info":{"authors":{"author":[{"@pid":"11/1248","text":"Keith Grueneberg"},{"@pid":"08/358","text":"Bongjun Ko"},{"@pid":"99/5635","text":"David Wood"},{"@pid":"68/4430","text":"Xiping Wang"},{"@pid":"248/2568","text":"Dean Steuer"},{"@pid":"248/2898","text":"Yeonsup Lim"}]},"title":"IoT Data Management System for Rapid Development of Machine Learning Models.","venue":"ICCC","pages":"59-63","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/GruenebergKWWSL19","doi":"10.1109/ICCC.2019.00021","ee":"https://doi.org/10.1109/ICCC.2019.00021","url":"https://dblp.org/rec/conf/ieeeiccc/GruenebergKWWSL19"}, "url":"URL#2213083" }, { "@score":"1", "@id":"2213084", "info":{"authors":{"author":[{"@pid":"138/4316","text":"Yuede Ji"},{"@pid":"248/2643","text":"Benjamin Bowman"},{"@pid":"39/560","text":"H. Howie Huang"}]},"title":"Securing Malware Cognitive Systems against Adversarial Attacks.","venue":"ICCC","pages":"1-9","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/JiBH19","doi":"10.1109/ICCC.2019.00014","ee":"https://doi.org/10.1109/ICCC.2019.00014","url":"https://dblp.org/rec/conf/ieeeiccc/JiBH19"}, "url":"URL#2213084" }, { "@score":"1", "@id":"2213085", "info":{"authors":{"author":[{"@pid":"166/3074","text":"Rupesh Raj Karn"},{"@pid":"64/571","text":"Prabhakar Kudva"},{"@pid":"29/2561","text":"Ibrahim M. Elfadel"}]},"title":"Criteria for Learning without Forgetting in Artificial Neural Networks.","venue":"ICCC","pages":"90-97","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/KarnKE19","doi":"10.1109/ICCC.2019.00027","ee":"https://doi.org/10.1109/ICCC.2019.00027","url":"https://dblp.org/rec/conf/ieeeiccc/KarnKE19"}, "url":"URL#2213085" }, { "@score":"1", "@id":"2213086", "info":{"authors":{"author":[{"@pid":"248/2199","text":"Rhodri Morris"},{"@pid":"167/5289","text":"Liam D. Turner"},{"@pid":"41/3683","text":"Roger M. Whitaker"},{"@pid":"126/7898","text":"Cheryl Giammanco"}]},"title":"The Impact of Peer Pressure: Extending Axelrod's Model on Cultural Polarisation.","venue":"ICCC","pages":"114-121","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/MorrisTWG19","doi":"10.1109/ICCC.2019.00030","ee":"https://doi.org/10.1109/ICCC.2019.00030","url":"https://dblp.org/rec/conf/ieeeiccc/MorrisTWG19"}, "url":"URL#2213086" }, { "@score":"1", "@id":"2213087", "info":{"authors":{"author":[{"@pid":"13/928","text":"Stavros Ntalampiras"},{"@pid":"44/5254","text":"Federico Avanzini"},{"@pid":"50/3290","text":"Luca Andrea Ludovico"}]},"title":"Fusing Acoustic and Electroencephalographic Modalities for User-Independent Emotion Prediction.","venue":"ICCC","pages":"36-41","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/NtalampirasAL19","doi":"10.1109/ICCC.2019.00018","ee":"https://doi.org/10.1109/ICCC.2019.00018","url":"https://dblp.org/rec/conf/ieeeiccc/NtalampirasAL19"}, "url":"URL#2213087" }, { "@score":"1", "@id":"2213088", "info":{"authors":{"author":[{"@pid":"248/2991","text":"Atsushi Oba"},{"@pid":"61/371","text":"Incheon Paik"}]},"title":"Extraction of Taxonomic Relation of Complex Terms by Recurrent Neural Network.","venue":"ICCC","pages":"70-72","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/ObaP19","doi":"10.1109/ICCC.2019.00024","ee":"https://doi.org/10.1109/ICCC.2019.00024","url":"https://dblp.org/rec/conf/ieeeiccc/ObaP19"}, "url":"URL#2213088" }, { "@score":"1", "@id":"2213089", "info":{"authors":{"author":[{"@pid":"210/1009","text":"Deboleena Roy"},{"@pid":"54/7402","text":"Indranil Chakraborty"},{"@pid":"r/KaushikRoy","text":"Kaushik Roy 0001"}]},"title":"Scaling Deep Spiking Neural Networks with Binary Stochastic Activations.","venue":"ICCC","pages":"50-58","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/RoyC019","doi":"10.1109/ICCC.2019.00020","ee":"https://doi.org/10.1109/ICCC.2019.00020","url":"https://dblp.org/rec/conf/ieeeiccc/RoyC019"}, "url":"URL#2213089" }, { "@score":"1", "@id":"2213090", "info":{"authors":{"author":[{"@pid":"160/1725","text":"Jörg Schlötterer"},{"@pid":"248/2045","text":"Martin Wehking"},{"@pid":"143/7095","text":"Fatemeh Salehi Rizi"},{"@pid":"32/1270","text":"Michael Granitzer"}]},"title":"Investigating Extensions to Random Walk Based Graph Embedding.","venue":"ICCC","pages":"81-89","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/SchlottererWRG19","doi":"10.1109/ICCC.2019.00026","ee":"https://doi.org/10.1109/ICCC.2019.00026","url":"https://dblp.org/rec/conf/ieeeiccc/SchlottererWRG19"}, "url":"URL#2213090" }, { "@score":"1", "@id":"2213091", "info":{"authors":{"author":[{"@pid":"248/2291","text":"Simone Scicluna"},{"@pid":"51/2237","text":"Carlo Strapparava"}]},"title":"The Visual Representation of Abstract Verbs: Merging Verb Classification with Iconicity in Sign Language.","venue":"ICCC","pages":"73-80","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/SciclunaS19","doi":"10.1109/ICCC.2019.00025","ee":"https://doi.org/10.1109/ICCC.2019.00025","url":"https://dblp.org/rec/conf/ieeeiccc/SciclunaS19"}, "url":"URL#2213091" }, { "@score":"1", "@id":"2213092", "info":{"authors":{"author":[{"@pid":"226/4659","text":"Joseph Sirrianni"},{"@pid":"02/1986","text":"Xiaoqing Liu"},{"@pid":"205/9961","text":"Md Mahfuzer Rahman"},{"@pid":"120/6918-3","text":"Douglas Adams 0003"}]},"title":"An Opinion Diversity Enhanced Social Connection Recommendation Re-Ranking Method Based on Opinion Distance in Cyber Argumentation with Social Networking.","venue":"ICCC","pages":"106-113","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/SirrianniLRA19","doi":"10.1109/ICCC.2019.00029","ee":"https://doi.org/10.1109/ICCC.2019.00029","url":"https://dblp.org/rec/conf/ieeeiccc/SirrianniLRA19"}, "url":"URL#2213092" }, { "@score":"1", "@id":"2213093", "info":{"authors":{"author":[{"@pid":"248/2835","text":"Ganyu Wang"},{"@pid":"v/MiguelVargasMartin","text":"Miguel Vargas Martin"},{"@pid":"h/PCKHung","text":"Patrick Hung"},{"@pid":"196/2302","text":"Shane MacDonald"}]},"title":"Towards Classifying Motor Imagery Using a Consumer-Grade Brain-Computer Interface.","venue":"ICCC","pages":"67-69","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/WangMHM19","doi":"10.1109/ICCC.2019.00023","ee":"https://doi.org/10.1109/ICCC.2019.00023","url":"https://dblp.org/rec/conf/ieeeiccc/WangMHM19"}, "url":"URL#2213093" }, { "@score":"1", "@id":"2296067", "info":{"authors":{"author":[{"@pid":"b/ElisaBertino","text":"Elisa Bertino"},{"@pid":"c/CarlKChang","text":"Carl K. Chang"},{"@pid":"76/6411","text":"Peter Chen"},{"@pid":"d/EDamiani","text":"Ernesto Damiani"},{"@pid":"13/669","text":"Michael Goul"},{"@pid":"01/6813","text":"Katsunori Oyama"}]},"title":"2019 IEEE International Conference on Cognitive Computing, ICCC 2019, Milan, Italy, July 8-13, 2019","venue":"ICCC","publisher":"IEEE","year":"2019","type":"Editorship","key":"conf/ieeeiccc/2019","ee":"https://ieeexplore.ieee.org/xpl/conhome/8804914/proceeding","url":"https://dblp.org/rec/conf/ieeeiccc/2019"}, "url":"URL#2296067" }, { "@score":"1", "@id":"2603640", "info":{"authors":{"author":[{"@pid":"226/4657","text":"Ralph Abboud"},{"@pid":"82/4336","text":"Joe Tekli"}]},"title":"MUSE Prototype for Music Sentiment Expression.","venue":"ICCC","pages":"106-109","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/AbboudT18","doi":"10.1109/ICCC.2018.00023","ee":"https://doi.org/10.1109/ICCC.2018.00023","url":"https://dblp.org/rec/conf/ieeeiccc/AbboudT18"}, "url":"URL#2603640" }, { "@score":"1", "@id":"2603641", "info":{"authors":{"author":{"@pid":"153/0137","text":"Ahmed Abdelmoamen"}},"title":"A Modular Approach to Programming Multi-Modal Sensing Applications.","venue":"ICCC","pages":"91-98","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/Abdelmoamen18","doi":"10.1109/ICCC.2018.00021","ee":"https://doi.org/10.1109/ICCC.2018.00021","url":"https://dblp.org/rec/conf/ieeeiccc/Abdelmoamen18"}, "url":"URL#2603641" }, { "@score":"1", "@id":"2603642", "info":{"authors":{"author":[{"@pid":"181/3038","text":"Christopher Bellman"},{"@pid":"v/MiguelVargasMartin","text":"Miguel Vargas Martin"},{"@pid":"196/2302","text":"Shane MacDonald"}]},"title":"(WKSP) On the Potential of Data Extraction by Detecting Unaware Facial Recognition with Brain-Computer Interfaces.","venue":"ICCC","pages":"99-105","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/BellmanMM18","doi":"10.1109/ICCC.2018.00022","ee":"https://doi.org/10.1109/ICCC.2018.00022","url":"https://dblp.org/rec/conf/ieeeiccc/BellmanMM18"}, "url":"URL#2603642" }, { "@score":"1", "@id":"2603643", "info":{"authors":{"author":[{"@pid":"226/4656","text":"Federico Buffoni"},{"@pid":"62/2977","text":"Gabriele Gianini"},{"@pid":"d/EDamiani","text":"Ernesto Damiani"},{"@pid":"32/1270","text":"Michael Granitzer"}]},"title":"All-Implicants Neural Networks for Efficient Boolean Function Representation.","venue":"ICCC","pages":"82-86","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/BuffoniGDG18","doi":"10.1109/ICCC.2018.00019","ee":"https://doi.org/10.1109/ICCC.2018.00019","url":"https://dblp.org/rec/conf/ieeeiccc/BuffoniGDG18"}, "url":"URL#2603643" }, { "@score":"1", "@id":"2603644", "info":{"authors":{"author":[{"@pid":"226/4658","text":"Harshitha Bura"},{"@pid":"223/2785","text":"Nathan Lin"},{"@pid":"78/2996","text":"Naveen Kumar"},{"@pid":"226/4649","text":"Sangram Malekar"},{"@pid":"222/6050","text":"Sushma Nagaraj"},{"@pid":"82/10612","text":"Kaikai Liu"}]},"title":"An Edge Based Smart Parking Solution Using Camera Networks and Deep Learning.","venue":"ICCC","pages":"17-24","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/BuraLKMNL18","doi":"10.1109/ICCC.2018.00010","ee":"https://doi.org/10.1109/ICCC.2018.00010","url":"https://dblp.org/rec/conf/ieeeiccc/BuraLKMNL18"}, "url":"URL#2603644" }, { "@score":"1", "@id":"2603645", "info":{"authors":{"author":[{"@pid":"226/4653","text":"Deyu Deng"},{"@pid":"29/654","text":"Carson K. Leung"},{"@pid":"226/4645","text":"Bryan H. Wodi"},{"@pid":"16/2674","text":"Jialiang Yu"},{"@pid":"55/2270-27","text":"Hao Zhang 0027"},{"@pid":"c/AlfredoCuzzocrea","text":"Alfredo Cuzzocrea"}]},"title":"An Innovative Framework for Supporting Cognitive-Based Big Data Analytics for Frequent Pattern Mining.","venue":"ICCC","pages":"49-56","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/DengLWY0C18","doi":"10.1109/ICCC.2018.00014","ee":"https://doi.org/10.1109/ICCC.2018.00014","url":"https://dblp.org/rec/conf/ieeeiccc/DengLWY0C18"}, "url":"URL#2603645" }, { "@score":"1", "@id":"2603646", "info":{"authors":{"author":[{"@pid":"80/11110","text":"Ahmed Al Dhanhani"},{"@pid":"d/EDamiani","text":"Ernesto Damiani"},{"@pid":"87/3132","text":"Rabeb Mizouni"},{"@pid":"18/5410-1","text":"Di Wang 0001"}]},"title":"Analysis of Shapelet Transform Usage in Traffic Event Detection.","venue":"ICCC","pages":"41-48","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/DhanhaniDMW18","doi":"10.1109/ICCC.2018.00013","ee":"https://doi.org/10.1109/ICCC.2018.00013","url":"https://dblp.org/rec/conf/ieeeiccc/DhanhaniDMW18"}, "url":"URL#2603646" }, { "@score":"1", "@id":"2603647", "info":{"authors":{"author":[{"@pid":"94/10763","text":"Xiaoyi Duan"},{"@pid":"80/2266-1","text":"Jia Zhang 0001"},{"@pid":"91/5457","text":"Rahul Ramachandran"},{"@pid":"203/3052","text":"Patrick Gatlin"},{"@pid":"08/3449","text":"Manil Maskey"},{"@pid":"203/2946","text":"Jeffrey J. Miller"},{"@pid":"171/0035","text":"Kaylin M. Bugbee"},{"@pid":"139/2378","text":"Tsengdar J. Lee"}]},"title":"A Neural Network-Powered Cognitive Method of Identifying Semantic Entities in Earth Science Papers.","venue":"ICCC","pages":"9-16","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/DuanZRGMMBL18","doi":"10.1109/ICCC.2018.00009","ee":"https://doi.org/10.1109/ICCC.2018.00009","url":"https://dblp.org/rec/conf/ieeeiccc/DuanZRGMMBL18"}, "url":"URL#2603647" }, { "@score":"1", "@id":"2603648", "info":{"authors":{"author":[{"@pid":"185/1115","text":"Divam Gupta"},{"@pid":"219/5568","text":"Indira Sen"},{"@pid":"119/0385","text":"Niharika Sachdeva"},{"@pid":"97/5147","text":"Ponnurangam Kumaraguru"},{"@pid":"128/4273","text":"Arun Balaji Buduru"}]},"title":"Empowering First Responders through Automated Multimodal Content Moderation.","venue":"ICCC","pages":"1-8","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/GuptaSSKB18","doi":"10.1109/ICCC.2018.00008","ee":"https://doi.org/10.1109/ICCC.2018.00008","url":"https://dblp.org/rec/conf/ieeeiccc/GuptaSSKB18"}, "url":"URL#2603648" }, { "@score":"1", "@id":"2603649", "info":{"authors":{"author":[{"@pid":"207/7148","text":"Kimberley Hemmings-Jarrett"},{"@pid":"153/0146","text":"Julian Jarrett"},{"@pid":"b/MBrianBlake","text":"M. Brian Blake"}]},"title":"(WKSP) Sentiment Analysis of Twitter Samples That Differentiates Impact of User Participation Levels.","venue":"ICCC","pages":"65-72","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/Hemmings-Jarrett18","doi":"10.1109/ICCC.2018.00016","ee":"https://doi.org/10.1109/ICCC.2018.00016","url":"https://dblp.org/rec/conf/ieeeiccc/Hemmings-Jarrett18"}, "url":"URL#2603649" }, { "@score":"1", "@id":"2603650", "info":{"authors":{"author":[{"@pid":"214/9427","text":"Hana Lee"},{"@pid":"27/3928","text":"Young Yoon"}]},"title":"Interest Recognition from Online Instant Messaging Sessions Using Text Segmentation and Document Embedding Techniques.","venue":"ICCC","pages":"126-129","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/LeeY18","doi":"10.1109/ICCC.2018.00028","ee":"https://doi.org/10.1109/ICCC.2018.00028","url":"https://dblp.org/rec/conf/ieeeiccc/LeeY18"}, "url":"URL#2603650" }, { "@score":"1", "@id":"2603651", "info":{"authors":{"author":[{"@pid":"11/6105","text":"Pei-Chun Lin"},{"@pid":"61/5499","text":"Nureize Arbaiy"}]},"title":"A Novel Classifier for a Kansei Recommender System.","venue":"ICCC","pages":"114-117","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/LinA18","doi":"10.1109/ICCC.2018.00025","ee":"https://doi.org/10.1109/ICCC.2018.00025","url":"https://dblp.org/rec/conf/ieeeiccc/LinA18"}, "url":"URL#2603651" }, { "@score":"1", "@id":"2603652", "info":{"authors":{"author":[{"@pid":"131/7985","text":"Ganapathy Mani"},{"@pid":"b/BKBhargava","text":"Bharat K. Bhargava"},{"@pid":"268/6914","text":"Basavesh Shivakumar"}]},"title":"Incremental Learning through Graceful Degradations in Autonomous Systems.","venue":"ICCC","pages":"25-32","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/ManiBS18","doi":"10.1109/ICCC.2018.00011","ee":"https://doi.org/10.1109/ICCC.2018.00011","url":"https://dblp.org/rec/conf/ieeeiccc/ManiBS18"}, "url":"URL#2603652" }, { "@score":"1", "@id":"2603653", "info":{"authors":{"author":[{"@pid":"224/3899","text":"Rajath Swaroop Mulky"},{"@pid":"226/4647","text":"Supradeep Koganti"},{"@pid":"226/4646","text":"Sneha Shahi"},{"@pid":"82/10612","text":"Kaikai Liu"}]},"title":"Autonomous Scooter Navigation for People with Mobility Challenges.","venue":"ICCC","pages":"87-90","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/MulkyKSL18","doi":"10.1109/ICCC.2018.00020","ee":"https://doi.org/10.1109/ICCC.2018.00020","url":"https://dblp.org/rec/conf/ieeeiccc/MulkyKSL18"}, "url":"URL#2603653" }, { "@score":"1", "@id":"2603654", "info":{"authors":{"author":{"@pid":"226/4648","text":"Patrick Neary"}},"title":"Automatic Hyperparameter Tuning in Deep Convolutional Neural Networks Using Asynchronous Reinforcement Learning.","venue":"ICCC","pages":"73-77","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/Neary18","doi":"10.1109/ICCC.2018.00017","ee":"https://doi.org/10.1109/ICCC.2018.00017","url":"https://dblp.org/rec/conf/ieeeiccc/Neary18"}, "url":"URL#2603654" }, { "@score":"1", "@id":"2603655", "info":{"authors":{"author":[{"@pid":"226/4654","text":"Kazuki Omine"},{"@pid":"61/371","text":"Incheon Paik"}]},"title":"Classification of Taxonomical Relationship by Word Embedding.","venue":"ICCC","pages":"122-125","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/OmineP18","doi":"10.1109/ICCC.2018.00027","ee":"https://doi.org/10.1109/ICCC.2018.00027","url":"https://dblp.org/rec/conf/ieeeiccc/OmineP18"}, "url":"URL#2603655" }, { "@score":"1", "@id":"2603656", "info":{"authors":{"author":[{"@pid":"168/6315","text":"Labiblais Rahman"},{"@pid":"01/6813","text":"Katsunori Oyama"}]},"title":"Long-Term Monitoring of NIRS and EEG Signals for Assessment of Daily Changes in Emotional Valence.","venue":"ICCC","pages":"118-121","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/RahmanO18","doi":"10.1109/ICCC.2018.00026","ee":"https://doi.org/10.1109/ICCC.2018.00026","url":"https://dblp.org/rec/conf/ieeeiccc/RahmanO18"}, "url":"URL#2603656" }, { "@score":"1", "@id":"2603657", "info":{"authors":{"author":[{"@pid":"226/4650","text":"George Salloum"},{"@pid":"226/4655","text":"Elie Semaan"},{"@pid":"82/4336","text":"Joe Tekli"}]},"title":"PIN Prototype for Intelligent Nutrition Assessment and Meal Planning.","venue":"ICCC","pages":"110-113","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/SalloumST18","doi":"10.1109/ICCC.2018.00024","ee":"https://doi.org/10.1109/ICCC.2018.00024","url":"https://dblp.org/rec/conf/ieeeiccc/SalloumST18"}, "url":"URL#2603657" }, { "@score":"1", "@id":"2603658", "info":{"authors":{"author":[{"@pid":"226/4659","text":"Joseph Sirrianni"},{"@pid":"02/1986","text":"Xiaoqing Liu"},{"@pid":"120/6918-3","text":"Douglas Adams 0003"}]},"title":"Quantitative Modeling of Polarization in Online Intelligent Argumentation and Deliberation for Capturing Collective Intelligence.","venue":"ICCC","pages":"57-64","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/SirrianniLA18","doi":"10.1109/ICCC.2018.00015","ee":"https://doi.org/10.1109/ICCC.2018.00015","url":"https://dblp.org/rec/conf/ieeeiccc/SirrianniLA18"}, "url":"URL#2603658" }, { "@score":"1", "@id":"2603659", "info":{"authors":{"author":[{"@pid":"82/4336","text":"Joe Tekli"},{"@pid":"c/RichardChbeir","text":"Richard Chbeir"},{"@pid":"t/AgmaJMTraina","text":"Agma J. M. Traina"},{"@pid":"t/CaetanoTrainaJr","text":"Caetano Traina"},{"@pid":"27/3959","text":"Kokou Yétongnon"},{"@pid":"150/7836","text":"Carlos Raymundo Ibañez"},{"@pid":"226/4651","text":"Christian Kallas"}]},"title":"Upgraded SemIndex Prototype Supporting Intelligent Database Keyword Queries through Disambiguation, Query as You Type, and Parallel Search Algorithms.","venue":"ICCC","pages":"33-40","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/TekliCTTYIK18","doi":"10.1109/ICCC.2018.00012","ee":"https://doi.org/10.1109/ICCC.2018.00012","url":"https://dblp.org/rec/conf/ieeeiccc/TekliCTTYIK18"}, "url":"URL#2603659" }, { "@score":"1", "@id":"2683556", "info":{"title":"2018 IEEE International Conference on Cognitive Computing, ICCC 2018, San Francisco, CA, USA, July 2-7, 2018","venue":"ICCC","publisher":"IEEE Computer Society","year":"2018","type":"Editorship","key":"conf/ieeeiccc/2018","ee":"https://ieeexplore.ieee.org/xpl/conhome/8457594/proceeding","url":"https://dblp.org/rec/conf/ieeeiccc/2018"}, "url":"URL#2683556" }, { "@score":"1", "@id":"2960216", "info":{"authors":{"author":[{"@pid":"167/0953","text":"Amany Alnahdi"},{"@pid":"193/5926","text":"Rania Aboalela"},{"@pid":"156/6635","text":"Amal Babour"}]},"title":"Building Bilingual Algorithm English-Arabic Ontology for Cognitive Applications.","venue":"ICCC","pages":"124-127","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/AlnahdiAB17","doi":"10.1109/IEEE.ICCC.2017.22","ee":"https://doi.org/10.1109/IEEE.ICCC.2017.22","url":"https://dblp.org/rec/conf/ieeeiccc/AlnahdiAB17"}, "url":"URL#2960216" }, { "@score":"1", "@id":"2960217", "info":{"authors":{"author":[{"@pid":"126/0590","text":"Julian Brinkley"},{"@pid":"44/4620","text":"David Hoffman"},{"@pid":"66/8818","text":"Nasseh Tabrizi"}]},"title":"A Social Networking Site Portable Profile System for Blind and Visually Impaired Users Based on Cloud and Semantic Web Technologies.","venue":"ICCC","pages":"104-111","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/BrinkleyHT17","doi":"10.1109/IEEE.ICCC.2017.21","ee":"https://doi.org/10.1109/IEEE.ICCC.2017.21","url":"https://dblp.org/rec/conf/ieeeiccc/BrinkleyHT17"}, "url":"URL#2960217" }, { "@score":"1", "@id":"2960218", "info":{"authors":{"author":[{"@pid":"144/2222","text":"Monika Davidekova"},{"@pid":"140/7868","text":"Michal Gregus"}]},"title":"Social Network Types: An Emergency Social Network Approach - A Concept of Possible Inclusion of Emergency Posts in Social Networks through an API.","venue":"ICCC","pages":"40-47","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/DavidekovaG17","doi":"10.1109/IEEE.ICCC.2017.13","ee":"https://doi.org/10.1109/IEEE.ICCC.2017.13","url":"https://dblp.org/rec/conf/ieeeiccc/DavidekovaG17"}, "url":"URL#2960218" }, { "@score":"1", "@id":"2960219", "info":{"authors":{"author":{"@pid":"72/10118","text":"Kenneth K. Fletcher"}},"title":"A Method for Dealing with Data Sparsity and Cold-Start Limitations in Service Recommendation Using Personalized Preferences.","venue":"ICCC","pages":"72-79","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/Fletcher17","doi":"10.1109/IEEE.ICCC.2017.17","ee":"https://doi.org/10.1109/IEEE.ICCC.2017.17","url":"https://dblp.org/rec/conf/ieeeiccc/Fletcher17"}, "url":"URL#2960219" }, { "@score":"1", "@id":"2960220", "info":{"authors":{"author":[{"@pid":"72/10118","text":"Kenneth K. Fletcher"},{"@pid":"175/7575","text":"Todd Sparks"},{"@pid":"207/7156","text":"Aaron Flood"},{"@pid":"175/7540","text":"Frank Liou"}]},"title":"A SOA Approach to Improve Performance of Metal Additive Manufacturing Simulation.","venue":"ICCC","pages":"140-143","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/FletcherSFL17","doi":"10.1109/IEEE.ICCC.2017.26","ee":"https://doi.org/10.1109/IEEE.ICCC.2017.26","url":"https://dblp.org/rec/conf/ieeeiccc/FletcherSFL17"}, "url":"URL#2960220" }, { "@score":"1", "@id":"2960221", "info":{"authors":{"author":[{"@pid":"207/7148","text":"Kimberley Hemmings-Jarrett"},{"@pid":"153/0146","text":"Julian Jarrett"},{"@pid":"b/MBrianBlake","text":"M. Brian Blake"}]},"title":"Evaluation of User Engagement on Social Media to Leverage Active and Passive Communication.","venue":"ICCC","pages":"132-135","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/Hemmings-Jarrett17","doi":"10.1109/IEEE.ICCC.2017.24","ee":"https://doi.org/10.1109/IEEE.ICCC.2017.24","url":"https://dblp.org/rec/conf/ieeeiccc/Hemmings-Jarrett17"}, "url":"URL#2960221" }, { "@score":"1", "@id":"2960222", "info":{"authors":{"author":[{"@pid":"207/7252","text":"Pavel Tariqul Islam"},{"@pid":"33/9971","text":"Dakshnamoorthy Manivannan"}]},"title":"Predicting Application Failure in Cloud: A Machine Learning Approach.","venue":"ICCC","pages":"24-31","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/IslamM17","doi":"10.1109/IEEE.ICCC.2017.11","ee":"https://doi.org/10.1109/IEEE.ICCC.2017.11","url":"https://dblp.org/rec/conf/ieeeiccc/IslamM17"}, "url":"URL#2960222" }, { "@score":"1", "@id":"2960223", "info":{"authors":{"author":[{"@pid":"80/4567","text":"Fei Jiang"},{"@pid":"z/LiangJieZhang","text":"Liang-Jie Zhang"},{"@pid":"132/8300-7","text":"Huan Chen 0007"}]},"title":"Automated Image Quality Assessment for Certificates and Bills.","venue":"ICCC","pages":"1-8","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/JiangZC17","doi":"10.1109/IEEE.ICCC.2017.8","ee":"https://doi.org/10.1109/IEEE.ICCC.2017.8","url":"https://dblp.org/rec/conf/ieeeiccc/JiangZC17"}, "url":"URL#2960223" }, { "@score":"1", "@id":"2960224", "info":{"authors":{"author":[{"@pid":"186/7986","text":"Diana Jlailaty"},{"@pid":"g/DanielaGrigori","text":"Daniela Grigori"},{"@pid":"39/3585","text":"Khalid Belhajjame"}]},"title":"Mining Business Process Activities from Email Logs.","venue":"ICCC","pages":"112-119","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/JlailatyGB17","doi":"10.1109/IEEE.ICCC.2017.28","ee":"https://doi.org/10.1109/IEEE.ICCC.2017.28","url":"https://dblp.org/rec/conf/ieeeiccc/JlailatyGB17"}, "url":"URL#2960224" }, { "@score":"1", "@id":"2960225", "info":{"authors":{"author":[{"@pid":"193/7816","text":"Hourieh Khalajzadeh"},{"@pid":"15/2771","text":"Dong Yuan"},{"@pid":"g/JohnCGrundy","text":"John Grundy 0001"},{"@pid":"90/3406-1","text":"Yun Yang 0001"}]},"title":"Cost-Effective Social Network Data Placement and Replication Using Graph-Partitioning.","venue":"ICCC","pages":"64-71","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/KhalajzadehYGY17","doi":"10.1109/IEEE.ICCC.2017.16","ee":"https://doi.org/10.1109/IEEE.ICCC.2017.16","url":"https://dblp.org/rec/conf/ieeeiccc/KhalajzadehYGY17"}, "url":"URL#2960225" }, { "@score":"1", "@id":"2960226", "info":{"authors":{"author":[{"@pid":"96/6590","text":"Harald Kornmayer"},{"@pid":"141/9090","text":"Abdallah Salama"}]},"title":"AQUASI - An Automated Quality Assurance Application Platform for SMEs in Handcraft Industries.","venue":"ICCC","pages":"80-87","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/KornmayerS17","doi":"10.1109/IEEE.ICCC.2017.18","ee":"https://doi.org/10.1109/IEEE.ICCC.2017.18","url":"https://dblp.org/rec/conf/ieeeiccc/KornmayerS17"}, "url":"URL#2960226" }, { "@score":"1", "@id":"2960227", "info":{"authors":{"author":[{"@pid":"284/8639-7","text":"Yu Lei 0007"},{"@pid":"65/287","text":"Shiping Chen 0001"},{"@pid":"y/PhilipSYu","text":"Philip S. Yu"}]},"title":"Heterogeneous Service Information Mining Based on Parallel Computing.","venue":"ICCC","pages":"120-123","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/LeiCY17","doi":"10.1109/IEEE.ICCC.2017.27","ee":"https://doi.org/10.1109/IEEE.ICCC.2017.27","url":"https://dblp.org/rec/conf/ieeeiccc/LeiCY17"}, "url":"URL#2960227" }, { "@score":"1", "@id":"2960228", "info":{"authors":{"author":[{"@pid":"22/1805","text":"Ying Li"},{"@pid":"207/7195","text":"Muthu Muthiah"},{"@pid":"207/7168","text":"Arindam Routh"},{"@pid":"73/2262","text":"Chitra Dorai"}]},"title":"Cognitive Computing in Action to Enhance Invoice Processing with Customized Language Translation.","venue":"ICCC","pages":"136-139","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/LiMRD17","doi":"10.1109/IEEE.ICCC.2017.25","ee":"https://doi.org/10.1109/IEEE.ICCC.2017.25","url":"https://dblp.org/rec/conf/ieeeiccc/LiMRD17"}, "url":"URL#2960228" }, { "@score":"1", "@id":"2960229", "info":{"authors":{"author":[{"@pid":"136/7364","text":"Zhiling Luo"},{"@pid":"22/1805-1","text":"Ying Li 0001"},{"@pid":"74/3786","text":"Jianwei Yin"},{"@pid":"85/9062","text":"Honghao Gao"},{"@pid":"15/4530","text":"Yuyu Yin"}]},"title":"Service Pattern Evaluation: Studying Profitability from Perspective of Resource.","venue":"ICCC","pages":"88-95","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/LuoLYGY17","doi":"10.1109/IEEE.ICCC.2017.19","ee":"https://doi.org/10.1109/IEEE.ICCC.2017.19","url":"https://dblp.org/rec/conf/ieeeiccc/LuoLYGY17"}, "url":"URL#2960229" }, { "@score":"1", "@id":"2960230", "info":{"authors":{"author":[{"@pid":"83/1192-2","text":"Fei Luo 0002"},{"@pid":"s/IsaacDScherson","text":"Isaac D. Scherson"},{"@pid":"162/7164","text":"Joel Fuentes"}]},"title":"A Novel Genetic Algorithm for Bin Packing Problem in jMetal.","venue":"ICCC","pages":"17-23","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/LuoSF17","doi":"10.1109/IEEE.ICCC.2017.10","ee":"https://doi.org/10.1109/IEEE.ICCC.2017.10","url":"https://dblp.org/rec/conf/ieeeiccc/LuoSF17"}, "url":"URL#2960230" }, { "@score":"1", "@id":"2960231", "info":{"authors":{"author":[{"@pid":"65/572","text":"Lijun Mei"},{"@pid":"71/28","text":"Qicheng Li"},{"@pid":"129/5062","text":"Yipeng Yu"},{"@pid":"62/5110","text":"Jie Ma"}]},"title":"Knowledge Learning for Cognitive Business Conversations.","venue":"ICCC","pages":"128-131","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/MeiLYM17","doi":"10.1109/IEEE.ICCC.2017.23","ee":"https://doi.org/10.1109/IEEE.ICCC.2017.23","url":"https://dblp.org/rec/conf/ieeeiccc/MeiLYM17"}, "url":"URL#2960231" }, { "@score":"1", "@id":"2960232", "info":{"authors":{"author":[{"@pid":"00/6266","text":"Hiroki Nakashima"},{"@pid":"30/2082","text":"Mikio Aoyama"}]},"title":"An Automation Method of SLA Contract of Web APIs and Its Platform Based on Blockchain Concept.","venue":"ICCC","pages":"32-39","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/NakashimaA17","doi":"10.1109/IEEE.ICCC.2017.12","ee":"https://doi.org/10.1109/IEEE.ICCC.2017.12","url":"https://dblp.org/rec/conf/ieeeiccc/NakashimaA17"}, "url":"URL#2960232" }, { "@score":"1", "@id":"2960233", "info":{"authors":{"author":[{"@pid":"02/8693","text":"Zhaotai Pan"},{"@pid":"79/5417","text":"Yi Ge"},{"@pid":"97/6755","text":"Yu Chen Zhou"},{"@pid":"207/7181","text":"Jing Chang Huang"},{"@pid":"185/1482","text":"Yu Ling Zheng"},{"@pid":"181/2597","text":"Ning Zhang"},{"@pid":"03/8326","text":"Xiao Xing Liang"},{"@pid":"29/5999","text":"Peng Gao"},{"@pid":"207/7173","text":"Guan Qun Zhang"},{"@pid":"03/3368","text":"Qingyan Wang"},{"@pid":"207/7146","text":"Shaw-Ben Shi"}]},"title":"Cognitive Acoustic Analytics Service for Internet of Things.","venue":"ICCC","pages":"96-103","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/PanGZHZZLGZWS17","doi":"10.1109/IEEE.ICCC.2017.20","ee":"https://doi.org/10.1109/IEEE.ICCC.2017.20","url":"https://dblp.org/rec/conf/ieeeiccc/PanGZHZZLGZWS17"}, "url":"URL#2960233" }, { "@score":"1", "@id":"2960234", "info":{"authors":{"author":[{"@pid":"193/9949","text":"Mayra Samaniego"},{"@pid":"52/4351","text":"Ralph Deters"}]},"title":"Internet of Smart Things - IoST: Using Blockchain and CLIPS to Make Things Autonomous.","venue":"ICCC","pages":"9-16","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/SamaniegoD17","doi":"10.1109/IEEE.ICCC.2017.9","ee":"https://doi.org/10.1109/IEEE.ICCC.2017.9","url":"https://dblp.org/rec/conf/ieeeiccc/SamaniegoD17"}, "url":"URL#2960234" }, { "@score":"1", "@id":"2960235", "info":{"authors":{"author":[{"@pid":"04/8331","text":"Jinhui Yao"},{"@pid":"92/2047","text":"Wencheng Wu"},{"@pid":"207/7187","text":"Jagadeeh Prabhakara"},{"@pid":"207/7191","text":"Jennifer Watts-Englert"},{"@pid":"160/2055","text":"Isaiah Simmons"},{"@pid":"207/7160","text":"Michael Mongeon"},{"@pid":"159/1018","text":"Marina Tharayil"}]},"title":"Crowdsourcing Workflow Optimization to Internal Worker Crowds.","venue":"ICCC","pages":"56-63","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/YaoWPWSMT17","doi":"10.1109/IEEE.ICCC.2017.15","ee":"https://doi.org/10.1109/IEEE.ICCC.2017.15","url":"https://dblp.org/rec/conf/ieeeiccc/YaoWPWSMT17"}, "url":"URL#2960235" }, { "@score":"1", "@id":"2960236", "info":{"authors":{"author":[{"@pid":"80/2877","text":"Xinfeng Ye"},{"@pid":"88/898","text":"Fan Wang"}]},"title":"A Privacy Guard Service.","venue":"ICCC","pages":"48-55","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/ieeeiccc/YeW17","doi":"10.1109/IEEE.ICCC.2017.14","ee":"https://doi.org/10.1109/IEEE.ICCC.2017.14","url":"https://dblp.org/rec/conf/ieeeiccc/YeW17"}, "url":"URL#2960236" }, { "@score":"1", "@id":"3035369", "info":{"title":"IEEE International Conference on Cognitive Computing, ICCC 2017, Honolulu, HI, USA, June 25-30, 2017","venue":"ICCC","publisher":"IEEE Computer Society","year":"2017","type":"Editorship","key":"conf/ieeeiccc/2017","ee":"https://ieeexplore.ieee.org/xpl/conhome/8027144/proceeding","url":"https://dblp.org/rec/conf/ieeeiccc/2017"}, "url":"URL#3035369" } ] } } } )