Social media have become an established feature of the dynamic information space that emerges during crisis events. Both emergency responders and the public use these platforms to...
—Secure data collection is an important problem in wireless sensor networks. Different approaches have been proposed. One of them is overhearing. We investigate the problem of co...
Wael Y. Alghamdi, Hui Wu, Wenguang Zheng, Salil S....
With computer security spending on the rise, organizations seem to have accepted the notion that buying more—and more expensive—defenses allows them to better protect their co...
—We propose a new system for facilitating the co-creation of conference tracks through data analytics and human knowledge. The system attempts to learn track representations base...
Pengfei Liu, Shoaib Jameel, King Keung Wu, Helen M...
Previous studies showed that combining learning based on experiences in the past with learning from an envisioned future scenario results in more innovative and radical ideas as w...
This paper shows how the two virtues of collective intelligence – cognitive diversity and large crowds – turn into perils in crowdsourced policymaking. That is because of a co...
Rankings and tournaments are often used to incentivize task completion and participation in online innovation and design contests and prediction markets. One of the main challenge...
Public institutions are increasingly reliant on data from social media sites to measure public attitude and provide timely public engagement. Such reliance includes the exploratio...
Hemant Purohit, Tanvi Banerjee, Andrew Hampton, Va...
Let n be a positive integer and B be a non-degenerate symmetric bilinear form over Fn q , where q is an odd prime power and Fq is the finite field with q elements. We determine th...
In contrast to the ‘universal’ multizeta shuffle relations, when the chosen infinite place of the function field over Fq is rational, we show that in the non-rational case, o...