


default search action
ACM Transactions on Intelligent Systems and Technology, Volume 10
Volume 10, Number 1, January 2019
- Nan Cao, Steffen Koch, David Gotz, Yingcai Wu:

ACM TIST Special Issue on Visual Analytics. 1:1-1:4 - Wei Chen, Jing Xia, Xu-Meng Wang

, Yi Wang, Jun Chen, Liang Chang:
RelationLines: Visual Reasoning of Egocentric Relations from Heterogeneous Urban Data. 2:1-2:21 - Mingliang Xu, Hua Wang, Shili Chu, Yong Gan, Xiaoheng Jiang, Yafei Li, Bing Zhou:

Traffic Simulation and Visual Verification in Smog. 3:1-3:17 - Cong Xie

, Wen Zhong, Wei Xu, Klaus Mueller:
Visual Analytics of Heterogeneous Data Using Hypergraph Learning. 4:1-4:26 - Athanasios Vogogias

, Jessie Kennedy, Daniel Archambault
, Benjamin Bach, V. Anne Smith
, Hannah Currant
:
BayesPiles: Visualisation Support for Bayesian Network Structure Learning. 5:1-5:23 - Dongyu Liu

, Weiwei Cui, Kai Jin, Yuxiao Guo, Huamin Qu:
DeepTracker: Visualizing the Training Process of Convolutional Neural Networks. 6:1-6:25 - Hai Jin, Yuanfeng Lian, Jing Hua

:
Learning Facial Expressions with 3D Mesh Convolutional Neural Network. 7:1-7:22 - Chen Zhang, Hao Wang:

ResumeVis: A Visual Analytics System to Discover Semantic Information in Semi-structured Resume Data. 8:1-8:25 - Fan Du, Catherine Plaisant, Neil Spring, Ben Shneiderman:

Visual Interfaces for Recommendation Systems: Finding Similar and Dissimilar Peers. 9:1-9:23 - Haoran Liang, Ming Jiang

, Ronghua Liang, Qi Zhao:
CapVis: Toward Better Understanding of Visual-Verbal Saliency Consistency. 10:1-10:23 - Siming Chen

, Shuai Chen
, Zhenhuang Wang, Jie Liang, Yadong Wu, Xiaoru Yuan:
D-Map+: Interactive Visual Analysis and Exploration of Ego-centric and Event-centric Information Diffusion Patterns in Social Media. 11:1-11:26
Volume 10, Number 2, February 2019
- Qiang Yang, Yang Liu

, Tianjian Chen, Yongxin Tong
:
Federated Machine Learning: Concept and Applications. 12:1-12:19 - Wei Wang

, Vincent W. Zheng, Han Yu
, Chunyan Miao
:
A Survey of Zero-Shot Learning: Settings, Methods, and Applications. 13:1-13:37
- Reuth Mirsky, Kobi Gal

, Roni Stern
, Meir Kalech
:
Goal and Plan Recognition Design for Plan Libraries. 14:1-14:23 - Oskar Skibski

, Talal Rahwan, Tomasz P. Michalak
, Michael J. Wooldridge:
Enumerating Connected Subgraphs and Computing the Myerson and Shapley Values in Graph-Restricted Games. 15:1-15:25 - Jason Shuo Zhang

, Qin Lv:
Understanding Event Organization at Scale in Event-Based Social Networks. 16:1-16:23 - Hsun-Ping Hsieh

, Cheng-Te Li
:
Inferring Online Social Ties from Offline Geographical Activities. 17:1-17:21 - Zeng Yu, Tianrui Li

, Ning Yu, Yi Pan
, Hongmei Chen, Bing Liu:
Reconstruction of Hidden Representation for Robust Feature Extraction. 18:1-18:24 - Hongjian Wang

, Xianfeng Tang, Yu-Hsuan Kuo, Daniel Kifer
, Zhenhui Li:
A Simple Baseline for Travel Time Estimation using Large-scale Trip Data. 19:1-19:22 - Cheng Deng

, Zhao Li, Xinbo Gao
, Dacheng Tao
:
Deep Multi-scale Discriminative Networks for Double JPEG Compression Forensics. 20:1-20:20
Volume 10, Number 3, May 2019
- Karishma Sharma

, Feng Qian, He Jiang, Natali Ruchansky, Ming Zhang
, Yan Liu:
Combating Fake News: A Survey on Identification and Mitigation Techniques. 21:1-21:42
- Zun Li

, Congyan Lang, Jiashi Feng, Yidong Li, Tao Wang, Songhe Feng:
Co-saliency Detection with Graph Matching. 22:1-22:22
- Ankita Likhyani

, Srikanta Bedathur, P. Deepak
:
Location-Specific Influence Quantification in Location-Based Social Networks. 23:1-23:28 - Huaxiu Yao

, Defu Lian
, Yi Cao, Yifan Wu, Tao Zhou
:
Predicting Academic Performance for College Students: A Campus Behavior Perspective. 24:1-24:21 - Bailin Yang, Luhong Zhang, Frederick W. B. Li

, Xiaoheng Jiang
, Zhigang Deng
, Meng Wang, Mingliang Xu
:
Motion-Aware Compression and Transmission of Mesh Animation Sequences. 25:1-25:21 - Hanrui Wu

, Yuguang Yan
, Yuzhong Ye, Huaqing Min, Michael K. Ng
, Qingyao Wu
:
Online Heterogeneous Transfer Learning by Knowledge Transition. 26:1-26:19 - Neng Shi

, Yubo Tao:
CNNs Based Viewpoint Estimation for Volume Visualization. 27:1-27:22 - Joseph W. Mikhail

, John M. Fossaceca
, Ronald Iammartino:
A Semi-Boosted Nested Model With Sensitivity-Based Weighted Binarization for Multi-Domain Network Intrusion Detection. 28:1-28:27 - Jianping Gou

, Wenmo Qiu, Zhang Yi, Yong Xu, Qirong Mao, Yongzhao Zhan:
A Local Mean Representation-based K-Nearest Neighbor Classifier. 29:1-29:25 - Hankz Hankui Zhuo

:
Recognizing Multi-Agent Plans When Action Models and Team Plans Are Both Incomplete. 30:1-30:24 - Fatemeh Golpayegani

, Ivana Dusparic, Siobhán Clarke:
Using Social Dependence to Enable Neighbourly Behaviour in Open Multi-Agent Systems. 31:1-31:31 - Chunbiao Zhu, Wenhao Zhang, Thomas H. Li, Shan Liu, Ge Li:

Exploiting the Value of the Center-dark Channel Prior for Salient Object Detection. 32:1-32:20
Volume 10, Number 4, August 2019
- Jiang Bian

, Dayong Tian, Yuanyan Tang, Dacheng Tao
:
Trajectory Data Classification: A Review. 33:1-33:34 - Ilya Verenich

, Marlon Dumas
, Marcello La Rosa, Fabrizio Maria Maggi, Irene Teinemaa:
Survey and Cross-benchmark Comparison of Remaining Time Prediction Methods in Business Process Monitoring. 34:1-34:34
- Chen Gong

, Jian Yang, Dacheng Tao
:
Multi-Modal Curriculum Learning over Graphs. 35:1-35:25 - Xiang Ao

, Haoran Shi, Jin Wang, Luo Zuo, Hongwei Li, Qing He:
Large-Scale Frequent Episode Mining from Complex Event Sequences with Hierarchies. 36:1-36:26 - Thanh Cong Phan, Thanh Tam Nguyen

, Hongzhi Yin
, Bolong Zheng, Bela Stantic, Nguyen Quoc Viet Hung
:
Efficient User Guidance for Validating Participatory Sensing Data. 37:1-37:30 - Wanqiu Cui

, Junping Du
, Dawei Wang, Xunpu Yuan, Feifei Kou, Liyan Zhou, Nan Zhou:
Short Text Analysis Based on Dual Semantic Extension and Deep Hashing in Microblog. 38:1-38:24 - Suining He

, Kang G. Shin:
Spatio-temporal Adaptive Pricing for Balancing Mobility-on-Demand Networks. 39:1-39:28 - Ashwini Tonge

, Cornelia Caragea
:
Privacy-aware Tag Recommendation for Accurate Image Privacy Prediction. 40:1-40:28 - Guoshuai Zhao

, Hao Fu, Ruihua Song, Tetsuya Sakai, Zhongxia Chen, Xing Xie
, Xueming Qian:
Personalized Reason Generation for Explainable Song Recommendation. 41:1-41:21 - Deepak Thukral, Adesh Pandey, Rishabh Gupta, Vikram Goyal, Tanmoy Chakraborty

:
DiffQue: Estimating Relative Difficulty of Questions in Community Question Answering Services. 42:1-42:27 - Zhe Jiang

, Arpan Man Sainju
, Yan Li, Shashi Shekhar, Joseph F. Knight
:
Spatial Ensemble Learning for Heterogeneous Geographic Data with Class Ambiguity. 43:1-43:25 - Suvadeep Banerjee

, Abhijit Chatterjee:
ALERA: Accelerated Reinforcement Learning Driven Adaptation to Electro-Mechanical Degradation in Nonlinear Control Systems Using Encoded State Space Error Signatures. 44:1-44:25
Volume 10, Number 5, November 2019
- Jiuyong Li

, Kun Zhang, Emre Kiciman, Peng Cui:
Introduction to the Special Section on Advances in Causal Discovery and Inference. 45:1-45:3 - Eric V. Strobl

, Peter L. Spirtes, Shyam Visweswaran:
Estimating and Controlling the False Discovery Rate of the PC Algorithm Using Edge-specific P-Values. 46:1-46:37 - Benjamin Herd

, Simon Miles:
Detecting Causal Relationships in Simulation Models Using Intervention-based Counterfactual Analysis. 47:1-47:25 - Ridho Rahmadi

, Perry Groot, Tom Heskes
:
Stable Specification Search in Structural Equation Models with Latent Variables. 48:1-48:23 - Yue Liu, Zheng Cai, Chunchen Liu, Zhi Geng:

Local Learning Approaches for Finding Effects of a Specified Cause and Their Causal Paths. 49:1-49:15 - Hao Zhang, Shuigeng Zhou

, Jihong Guan, Jun Huan:
Measuring Conditional Independence by Independent Residuals for Causal Discovery. 50:1-50:19 - David Heckerman

:
Toward Accounting for Hidden Common Causes When Inferring Cause and Effect from Observational Data. 51:1-51:5 - Zhaolong Ling

, Kui Yu, Hao Wang, Lin Liu
, Wei Ding
, Xindong Wu:
BAMB: A Balanced Markov Blanket Discovery Approach to Feature Selection. 52:1-52:25
- Yongshan Zhang

, Jia Wu
, Chuan Zhou
, Zhihua Cai, Jian Yang
, Philip S. Yu:
Multi-View Fusion with Extreme Learning Machine for Clustering. 53:1-53:23 - Stephen Law

, Brooks Paige, Chris Russell
:
Take a Look Around: Using Street View and Satellite Images to Estimate House Prices. 54:1-54:19 - Ya-Lin Zhang

, Jun Zhou, Wenhao Zheng, Ji Feng, Longfei Li, Ziqi Liu, Ming Li, Zhiqiang Zhang, Chaochao Chen
, Xiaolong Li
, Yuan (Alan) Qi, Zhi-Hua Zhou:
Distributed Deep Forest and its Application to Automatic Detection of Cash-Out Fraud. 55:1-55:19 - Ali Braytee

, Wei Liu, Ali Anaissi
, Paul J. Kennedy
:
Correlated Multi-label Classification with Incomplete Label Space and Class Imbalance. 56:1-56:26 - Hamed Zamani, Markus Schedl

, Paul Lamere, Ching-Wei Chen:
An Analysis of Approaches Taken in the ACM RecSys Challenge 2018 for Automatic Music Playlist Continuation. 57:1-57:21 - Fulvio Corno

, Luigi De Russis
, Alberto Monge Roffarello
:
RecRules: Recommending IF-THEN Rules for End-User Development. 58:1-58:27 - Luca Pappalardo

, Paolo Cintia, Paolo Ferragina
, Emanuele Massucco, Dino Pedreschi
, Fosca Giannotti:
PlayeRank: Data-driven Performance Evaluation and Player Ranking in Soccer via a Machine Learning Approach. 59:1-59:27
Volume 10, Number 6, December 2019
- Weijia Jia, Geyong Min, Yang Xiang, Arun Kumar Sangaiah

:
Special Issue on Intelligent Edge Computing for Cyber Physical and Cloud Systems. - Zhaolong Ning

, Peiran Dong
, Xiaojie Wang
, Joel J. P. C. Rodrigues, Feng Xia
:
Deep Reinforcement Learning for Vehicular Edge Computing: An Intelligent Offloading System. 60:1-60:24 - Yuxin Liu, Xiao Liu, Anfeng Liu, Neal N. Xiong

, Fang Liu:
A Trust Computing-based Security Routing Scheme for Cyber Physical Systems. 61:1-61:27 - Tian Wang

, Hao Luo, Xi Zheng
, Mande Xie:
Crowdsourcing Mechanism for Trust Evaluation in CPCS Based on Intelligent Mobile Edge Computing. 62:1-62:19 - Fang Liu

, Yeting Guo
, Zhiping Cai, Nong Xiao, Ziming Zhao:
Edge-enabled Disaster Rescue: A Case Study of Searching for Missing People. 63:1-63:21 - Xiaoming Li

, Guangquan Xu, Xi Zheng
, Kaitai Liang
, Emmanouil Panaousis
, Tao Li, Wei Wang, Chao Shen:
Using Sparse Representation to Detect Anomalies in Complex WSNs. 64:1-64:18 - Po Yang

, Jing Liu, Jun Qi, Yun Yang
, Xulong Wang, Zhihan Lv
:
Comparison and Modelling of Country-level Microblog User and Activity in Cyber-physical-social Systems Using Weibo and Twitter Data. 65:1-65:24 - Umair Ullah Tariq

, Haider Ali
, Lu Liu
, John Panneerselvam
, Xiaojun Zhai:
Energy-efficient Static Task Scheduling on VFI-based NoC-HMPSoCs for Intelligent Edge Devices in Cyber-physical Systems. 66:1-66:22 - Junhao Zhou, Hong-Ning Dai

, Hao Wang
:
Lightweight Convolution Neural Networks for Mobile Edge Computing in Transportation Cyber Physical Systems. 67:1-67:20 - Wenjuan Tang

, Ju Ren
, Kuan Zhang
, Deyu Zhang, Yaoxue Zhang, Xuemin (Sherman) Shen
:
Efficient and Privacy-preserving Fog-assisted Health Data Sharing Scheme. 68:1-68:23 - Jin Li

, Tong Li, Zheli Liu, Xiaofeng Chen:
Secure Deduplication System with Active Key Update and Its Application in IoT. 69:1-69:21
- Ying Zhao

, Lei Wang, Shijie Li, Fangfang Zhou, Xiaoru Lin, Qiang Lu, Lei Ren:
A Visual Analysis Approach for Understanding Durability Test Data of Automotive Products. 70:1-70:23 - Milad Leyli-Abadi

, Allou Samé, Latifa Oukhellou
, Nicolas Cheifetz, Pierre Mandel, Cédric Féliers, Olivier Chesneau:
Mixture of Joint Nonhomogeneous Markov Chains to Cluster and Model Water Consumption Behavior Sequences. 71:1-71:21

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














