


default search action
ACM Transactions on Management Information Systems, Volume 13
Volume 13, Number 1, March 2022
- Jerry Chun-Wei Lin, Nachiketa Sahoo, Gautam Srivastava, Weiping Ding:
Introduction to the Special Issue on Pattern-Driven Mining, Analytics, and Prediction for Decision Making, Part 1. 1:1-1:3 - Shui-Hua Wang, Xin Zhang, Yu-Dong Zhang:
DSSAE: Deep Stacked Sparse Autoencoder Analytical Model for COVID-19 Diagnosis by Fractional Fourier Entropy. 2:1-2:20 - Fan Chen, Jiaoxiong Xia, Honghao Gao, Huahu Xu, Wei Wei:
TRG-DAtt: The Target Relational Graph and Double Attention Network Based Sentiment Analysis and Prediction for Supporting Decision Making. 3:1-3:25 - M. Saqib Nawaz
, Philippe Fournier-Viger
, Unil Yun, Youxi Wu
, Wei Song
:
Mining High Utility Itemsets with Hill Climbing and Simulated Annealing. 4:1-4:22 - Shuteng Niu, Yushan Jiang
, Bowen Chen, Jian Wang, Yongxin Liu, Houbing Song
:
Cross-Modality Transfer Learning for Image-Text Information Management. 5:1-5:14 - Mu-Yen Chen
, Min-Hsuan Fan, Li-Xiang Huang:
AI-Based Vehicular Network toward 6G and IoT: Deep Learning Approaches. 6:1-6:12 - Zhihan Lv
, Ranran Lou, Hailin Feng, Dongliang Chen, Haibin Lv:
Novel Machine Learning for Big Data Analytics in Intelligent Support Information Management Systems. 7:1-7:21 - Ankit Kumar, Abhishek Kumar, Ali Kashif Bashir
, Mamoon Rashid
, Visvam Devadoss Ambeth Kumar, Rupak Kharel:
Distance Based Pattern Driven Mining for Outlier Detection in High Dimensional Big Dataset. 8:1-8:17 - Mohammad Ehsan Shahmi Chowdhury, Chowdhury Farhan Ahmed, Carson K. Leung
:
A New Approach for Mining Correlated Frequent Subgraphs. 9:1-9:28
- Bo Wen, Paul Jen-Hwa Hu, Mohammadreza Ebrahimi, Hsinchun Chen:
Key Factors Affecting User Adoption of Open-Access Data Repositories in Intelligence and Security Informatics: An Affordance Perspective. 10:1-10:24 - Gamal Elkoumy, Stephan A. Fahrenkrog-Petersen
, Mohammadreza Fani Sani, Agnes Koschmider, Felix Mannhardt
, Saskia Nuñez von Voigt, Majid Rafiei, Leopold von Waldthausen:
Privacy and Confidentiality in Process Mining: Threats and Research Challenges. 11:1-11:17
Volume 13, Number 2, June 2022
- Bo Sun, Takeshi Takahashi, Tao Ban, Daisuke Inoue:
Detecting Android Malware and Classifying Its Families in Large-scale Datasets. 12:1-12:21 - Byron Marshall, Michael Curry, Robert E. Crossler, John Correia:
Machine Learning and Survey-based Predictors of InfoSec Non-Compliance. 13:1-13:20 - Jiaheng Xie, Bin Zhang, Jian Ma, Daniel Zeng, Jenny Lo-Ciganic:
Readmission Prediction for Patients with Heterogeneous Medical History: A Trajectory-Based Deep Learning Approach. 14:1-14:27 - Luo He, Hongyan Liu, Yinghui Yang, Bei Wang:
A Multi-attention Collaborative Deep Learning Approach for Blood Pressure Prediction. 15:1-15:20 - Yan Tang, Weilong Cui, Jianwen Su:
A Query Language for Workflow Logs. 16:1-16:28 - Shi-Ming Huang, David C. Yen, Ting Jyun Yan, Yi Ting Yang:
An Intelligent Mechanism to Automatically Discover Emerging Technology Trends: Exploring Regulatory Technology. 17:1-17:29 - Tomasz Miksa
, Simon Oblasser, Andreas Rauber
:
Automating Research Data Management Using Machine-Actionable Data Management Plans. 18:1-18:22 - Guangrui Li, Mike K. P. So
, Kar Yan Tam
:
Identifying the Big Shots - A Quantile-Matching Way in the Big Data Context. 19:1-19:30 - Xindong Wu
, Xingquan Zhu, Minghui Wu:
The Evolution of Search: Three Computing Paradigms. 20:1-20:20 - Ning Zhang, Mohammadreza Ebrahimi
, Weifeng Li
, Hsinchun Chen:
Counteracting Dark Web Text-Based CAPTCHA with Generative Adversarial Learning for Proactive Cyber Threat Intelligence. 21:1-21:21 - Karl Werder
, Balasubramaniam Ramesh
, Rongen (Sophia) Zhang
:
Establishing Data Provenance for Responsible Artificial Intelligence Systems. 22:1-22:23
Volume 13, Number 3, September 2022
- Jerry Chun-Wei Lin
, Nachiketa Sahoo, Gautam Srivastava, Weiping Ding:
Introduction to the Special Issue on Pattern-Driven Mining, Analytics, and Prediction for Decision Making, Part II. 23:1-23:3 - Maryam Ebrahimi
, Mohammad Hesam Tadayon, Mohammad Sayad Haghighi
, Alireza Jolfaei
:
A Quantitative Comparative Study of Data-oriented Trust Management Schemes in Internet of Things. 24:1-24:30 - Youxi Wu
, Xiaohui Wang, Yan Li, Lei Guo, Zhao Li, Ji Zhang, Xindong Wu
:
OWSP-Miner: Self-adaptive One-off Weak-gap Strong Pattern Mining. 25:1-25:23 - Yuan Gao, Laurence T. Yang
, Yaliang Zhao, Jing Yang:
Feature Extraction of High-dimensional Data Based on J-HOSVD for Cyber-Physical-Social Systems. 26:1-26:21 - Hsun-Ping Hsieh
, Fandel Lin, Nai-Yu Chen, Tzu-Hsin Yang:
A Decision Framework to Recommend Cruising Locations for Taxi Drivers under the Constraint of Booking Information. 27:1-27:30 - Anastasiia Pika, Chun Ouyang
, Arthur H. M. ter Hofstede:
Configurable Batch-Processing Discovery from Event Logs. 28:1-28:25 - A. N. M. Bazlur Rashid
, Mohiuddin Ahmed, Leslie F. Sikos, Paul S. Haskell-Dowland:
Anomaly Detection in Cybersecurity Datasets via Cooperative Co-evolution-based Feature Selection. 29:1-29:39 - Xin Liu
, Liang Zheng, Weishan Zhang
, Jiehan Zhou, Shuai Cao, Shaowen Yu:
An Evolutive Frequent Pattern Tree-based Incremental Knowledge Discovery Algorithm. 30:1-30:20
- Flavio Corradini, Alessandro Marcelletti
, Andrea Morichetta
, Andrea Polini, Barbara Re, Francesco Tiezzi:
Engineering Trustable and Auditable Choreography-based Systems Using Blockchain. 31:1-31:53 - M. Lisa Yeo
, Erik Rolland, Jacquelyn Rees Ulmer, Raymond A. Patterson
:
How Customer Demand Reactions Impact Technology Innovation and Security. 32:1-32:17 - Wanlun Ma, Xiangyu Hu, Chao Chen, Sheng Wen
, Kim-Kwang Raymond Choo
, Yang Xiang
:
Social Media Event Prediction using DNN with Feedback Mechanism. 33:1-33:24
- Gediminas Adomavicius
, Mochen Yang
:
Integrating Behavioral, Economic, and Technical Insights to Understand and Address Algorithmic Bias: A Human-Centric Perspective. 34:1-34:27
Volume 13, Number 4, December 2022
- Mu-Yen Chen
, Bhavani Thuraisingham
, Erol Egrioglu
, José de Jesús Rubio
:
Introduction to the Special Issue on Smart Systems for Industry 4.0 and IoT. 35:1-35:3 - Esteban Elias Romero, Carlos David Camacho, Carlos Enrique Montenegro-Marín, Oscar Esneider Acosta Agudelo, Rubén González Crespo
, Elvis Eduardo Gaona-García, Marcelo Herrera Martínez:
Integration of DevOps Practices on a Noise Monitor System with CircleCI and Terraform. 36:1-36:24 - Bin Ren, Yuquiang Chen, Fujie Wang:
Application Massive Data Processing Platform for Smart Manufacturing Based on Optimization of Data Storage. 37:1-37:20 - Genggeng Liu
, Yuhan Zhu, Saijuan Xu, Hao Tang, Yeh-Cheng Chen:
Performance-Driven X-Architecture Routing Algorithm for Artificial Intelligence Chip Design in Smart Manufacturing. 38:1-38:20 - Zhihan Lv
, Dongliang Chen, Hailin Feng, Amit Kumar Singh, Wei Wei, Haibin Lv:
Computational Intelligence in Security of Digital Twins Big Graphic Data in Cyber-physical Systems of Smart Cities. 39:1-39:17 - Rongli Chen
, Xiaozhong Chen
, Lei Wang
, Jianxin Li
:
The Core Industry Manufacturing Process of Electronics Assembly Based on Smart Manufacturing. 40:1-40:19 - Genggeng Liu
, Ruping Zhou
, Saijuan Xu
, Yuhan Zhu
, Wenzhong Guo
, Yeh-Cheng Chen
, Guolong Chen
:
Two-Stage Competitive Particle Swarm Optimization Based Timing-Driven X-Routing for IC Design Under Smart Manufacturing. 41:1-41:26 - Xin Du
, Songtao Tang
, Zhihui Lu
, Keke Gai
, Jie Wu
, Patrick C. K. Hung
:
Scientific Workflows in IoT Environments: A Data Placement Strategy Based on Heterogeneous Edge-Cloud Computing. 42:1-42:26 - Qi Lin
, Wensheng Gan
, Yongdong Wu
, Jiahui Chen
, Chien-Ming Chen
:
Smart System: Joint Utility and Frequency for Pattern Classification. 43:1-43:24 - Rohini Poolat Parameswarath
, Prosanta Gope
, Biplab Sikdar
:
User-empowered Privacy-preserving Authentication Protocol for Electric Vehicle Charging Based on Decentralized Identity and Verifiable Credential. 44:1-44:21 - Mengxin Nong, Lingfeng Huang, Mingtao Liu:
Allocation of Resources for Cloud Survivability in Smart Manufacturing. 45:1-45:11 - Usman Ahmed
, Jerry Chun-Wei Lin
, Gautam Srivastava
:
Heterogeneous Energy-aware Load Balancing for Industry 4.0 and IoT Environments. 46:1-46:23 - Yu-Chia Chen
, Sin-Ye Jhong
, Chih-Hsien Hsia
:
Roadside Unit-based Unknown Object Detection in Adverse Weather Conditions for Smart Internet of Vehicles. 47:1-47:21

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.