添加

tist - Volume 9

  • 主办方 / 出版社 ACM
  • 关注的研究方向 智能系统
  • CCF等级 / JCR分区 暂无
tist - Volume 9 - Number 6 - November 2018
Congratulations to Richard Thaler for Winning the Nobel Prize in Economics.

K. Sudhir==

Mobile Money in Tanzania.

Nicholas Economides==Przemyslaw Jeziorski==

Does Online Word of Mouth Increase Demand? (And How?) Evidence from a Natural Experiment.

Stephan Seiler==Song Yao==Wenbo Wang==

Does Offline TV Advertising Affect Online Chatter? Quasi-Experimental Analysis Using Synthetic Control.

Seshadri Tirunillai==Gerard J. Tellis==

Banning Foreign Pharmacies from Sponsored Search: The Online Consumer Response.

Matthew Chesnes==Weijia (Daisy) Dai==Ginger Zhe Jin==

Match Your Own Price? Self-Matching as a Retailer's Multichannel Pricing Strategy.

Pavel Kireyev==Vineet Kumar==Elie Ofek==

Pharmaceutical Product Recalls: Category Effects and Competitor Response.

Ram Bala==Pradeep Bhardwaj==Pradeep K. Chintagunta==

Competitive Price Targeting with Smartphone Coupons.

Jean-Pierre Dubé==Zheng Fang==Nathan Fong==Xueming Luo==

Investigating the Spillover Effect of Keyword Market Entry in Sponsored Search Advertising.

Shijie Lu==Sha Yang==

Pricing with Prescheduled Sales.

Maxim Sinitsyn==

Stimulating dialog between information systems research and practice.

Dov Te'eni==Stefan Seidel==Jan vom Brocke==

Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda.

Paul Benjamin Lowry==Tamara Dinev==Robert Willison==

Which phish get caught? An exploratory study of individuals′ susceptibility to phishing.

Gregory D. Moody==Dennis F. Galletta==Brian Kimball Dunn==

Taking stock of organisations' protection of privacy: categorising and assessing threats to personally identifiable information in the USA.

Clay Posey==Uzma Raja==Robert E. Crossler==A. J. Burns==

Organizational information security policies: a review and research framework.

W. Alec Cram==Jeffrey Proudfoot==John D'Arcy==

Antecedents and outcomes of information privacy concerns in a peer context: An exploratory study.

Zafer D. Ozdemir==H. Jeff Smith==John H. Benamati==

An empirical study on the susceptibility to social engineering in social networking sites: the case of Facebook.

Abdullah Algarni==Yue Xu==Taizan Chan==

Adverse consequences of access to individuals' information: an analysis of perceptions and the scope of organisational influence.

Sabrina Karwatzki==Manuel Trenz==Virpi Kristiina Tuunainen==Daniel Veit==

Congratulations to Richard Thaler for Winning the Nobel Prize in Economics.

K. Sudhir==

Mobile Money in Tanzania.

Nicholas Economides==Przemyslaw Jeziorski==

Does Online Word of Mouth Increase Demand? (And How?) Evidence from a Natural Experiment.

Stephan Seiler==Song Yao==Wenbo Wang==

Does Offline TV Advertising Affect Online Chatter? Quasi-Experimental Analysis Using Synthetic Control.

Seshadri Tirunillai==Gerard J. Tellis==

Banning Foreign Pharmacies from Sponsored Search: The Online Consumer Response.

Matthew Chesnes==Weijia (Daisy) Dai==Ginger Zhe Jin==

Match Your Own Price? Self-Matching as a Retailer's Multichannel Pricing Strategy.

Pavel Kireyev==Vineet Kumar==Elie Ofek==

Pharmaceutical Product Recalls: Category Effects and Competitor Response.

Ram Bala==Pradeep Bhardwaj==Pradeep K. Chintagunta==

Competitive Price Targeting with Smartphone Coupons.

Jean-Pierre Dubé==Zheng Fang==Nathan Fong==Xueming Luo==

Investigating the Spillover Effect of Keyword Market Entry in Sponsored Search Advertising.

Shijie Lu==Sha Yang==

Pricing with Prescheduled Sales.

Maxim Sinitsyn==

Stimulating dialog between information systems research and practice.

Dov Te'eni==Stefan Seidel==Jan vom Brocke==

Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda.

Paul Benjamin Lowry==Tamara Dinev==Robert Willison==

Which phish get caught? An exploratory study of individuals′ susceptibility to phishing.

Gregory D. Moody==Dennis F. Galletta==Brian Kimball Dunn==

Taking stock of organisations' protection of privacy: categorising and assessing threats to personally identifiable information in the USA.

Clay Posey==Uzma Raja==Robert E. Crossler==A. J. Burns==

Organizational information security policies: a review and research framework.

W. Alec Cram==Jeffrey Proudfoot==John D'Arcy==

Antecedents and outcomes of information privacy concerns in a peer context: An exploratory study.

Zafer D. Ozdemir==H. Jeff Smith==John H. Benamati==

An empirical study on the susceptibility to social engineering in social networking sites: the case of Facebook.

Abdullah Algarni==Yue Xu==Taizan Chan==

Adverse consequences of access to individuals' information: an analysis of perceptions and the scope of organisational influence.

Sabrina Karwatzki==Manuel Trenz==Virpi Kristiina Tuunainen==Daniel Veit==

TPM: A Temporal Personalized Model for Spatial Item Recommendation.

Weiqing Wang==Hongzhi Yin==Xingzhong Du==Quoc Viet Hung Nguyen==Xiaofang Zhou==

X-CLEaVER: Learning Ranking Ensembles by Growing and Pruning Trees.

Claudio Lucchese==Franco Maria Nardini==Salvatore Orlando==Raffaele Perego==Fabrizio Silvestri==Salvatore Trani==

Learning Urban Community Structures: A Collective Embedding Perspective with Periodic Spatial-temporal Mobility Graphs.

Pengyang Wang==Yanjie Fu==Jiawei Zhang==Xiaolin Li==Dan Lin==

Adaptive Online One-Class Support Vector Machines with Applications in Structural Health Monitoring.

Ali Anaissi==Nguyen Lu Dang Khoa==Thierry Rakotoarivelo==Mehrisadat Makki Alamdari==Yang Wang==

Discriminative and Orthogonal Subspace Constraints-Based Nonnegative Matrix Factorization.

Xuelong Li==Guosheng Cui==Yongsheng Dong==

High-Precision Camera Localization in Scenes with Repetitive Patterns.

Xiaobai Liu==Qian Xu==Yadong Mu==Jiadi Yang==Liang Lin==Shuicheng Yan==

A Cross-Domain Recommendation Mechanism for Cold-Start Users Based on Partial Least Squares Regression.

Cheng-Te Li==Chia-Tai Hsu==Man-Kwan Shan==

Characterizing User Skills from Application Usage Traces with Hierarchical Attention Recurrent Networks.

Longqi Yang==Chen Fang==Hailin Jin==Matthew D. Hoffman==Deborah Estrin==

Random-Forest-Inspired Neural Networks.

Suhang Wang==Charu C. Aggarwal==Huan Liu==

SmartTransfer: Modeling the Spatiotemporal Dynamics of Passenger Transfers for Crowdedness-Aware Route Recommendations.

Bowen Du==Yifeng Cui==Yanjie Fu==Runxing Zhong==Hui Xiong==

Few-Shot Text and Image Classification via Analogical Transfer Learning.

Wenhe Liu==Xiaojun Chang==Yan Yan==Yi Yang==Alexander G. Hauptmann==

An Efficient Alternating Newton Method for Learning Factorization Machines.

Wei-Sheng Chin==Bo-Wen Yuan==Meng-Yuan Yang==Chih-Jen Lin==


tist - Volume 9 - Number 5 - July 2018
Deep Learning for Environmentally Robust Speech Recognition: An Overview of Recent Developments.

Zixing Zhang==Jürgen T. Geiger==Jouni Pohjalainen==Amr El-Desoky Mousa==Wenyu Jin==Björn W. Schuller==

Mining Significant Microblogs for Misinformation Identification: An Attention-Based Approach.

Qiang Liu==Feng Yu==Shu Wu==Liang Wang==

Dynamic Optimization of the Level of Operational Effectiveness of a CSOC Under Adverse Conditions.

Ankit Shah==Rajesh Ganesan==Sushil Jajodia==Hasan Cam==

Exploiting Multilabel Information for Noise-Resilient Feature Selection.

Ling Jian==Jundong Li==Huan Liu==

Multiview Discrete Hashing for Scalable Multimedia Search.

Xiaobo Shen==Fumin Shen==Li Liu==Yunhao Yuan==Weiwei Liu==Quan-Sen Sun==

Automatic Extraction of Behavioral Patterns for Elderly Mobility and Daily Routine Analysis.

Chen Li==William K. Cheung==Jiming Liu==Joseph Kee-Yin Ng==

On Incremental High Utility Sequential Pattern Mining.

Jun-Zhe Wang==Jiun-Long Huang==

Optimum Velocity Profile of Multiple Bernstein-Bézier Curves Subject to Constraints for Mobile Robots.

Andrej Zdesar==Igor Skrjanc==

Integrate and Conquer: Double-Sided Two-Dimensional k-Means Via Integrating of Projection and Manifold Construction.

Chong Peng==Zhao Kang==Shuting Cai==Qiang Cheng==

Combination Forecasting Reversion Strategy for Online Portfolio Selection.

Dingjiang Huang==Shunchang Yu==Bin Li==Steven C. H. Hoi==Shuigeng Zhou==

Interactive Visual Graph Mining and Learning.

Ryan A. Rossi==Nesreen K. Ahmed==Rong Zhou==Hoda Eldardiry==

The Effect of Pets on Happiness: A Large-Scale Multi-Factor Analysis Using Social Multimedia.

Xuefeng Peng==Li-Kai Chi==Jiebo Luo==


tist - Volume 9 - Number 4 - February 2018
A Review of Co-Saliency Detection Algorithms: Fundamentals, Applications, and Challenges.

Dingwen Zhang==Huazhu Fu==Junwei Han==Ali Borji==Xuelong Li==

Virtual Metering: An Efficient Water Disaggregation Algorithm via Nonintrusive Load Monitoring.

Bingsheng Wang==Zhiqian Chen==Arnold P. Boedihardjo==Chang-Tien Lu==

A Multi-Label Multi-View Learning Framework for In-App Service Usage Analysis.

Yanjie Fu==Junming Liu==Xiaolin Li==Hui Xiong==

Concept and Attention-Based CNN for Question Retrieval in Multi-View Learning.

Pengwei Wang==Lei Ji==Jun Yan==Dejing Dou==Nisansa de Silva==Yong Zhang==Lianwen Jin==

A Novel Image-Centric Approach Toward Direct Volume Rendering.

Naimul Mefraz Khan==Riadh Ksantini==Ling Guan==

Quick Bootstrapping of a Personalized Gaze Model from Real-Use Interactions.

Michael Xuelin Huang==Jiajia Li==Grace Ngai==Hong Va Leong==

A Bayesian Approach to Intervention-Based Clustering.

Igor Kulev==Pearl Pu==Boi Faltings==

Sparse Passive-Aggressive Learning for Bounded Online Kernel Methods.

Jing Lu==Doyen Sahoo==Peilin Zhao==Steven C. H. Hoi==

Evolutionary Strategy to Perform Batch-Mode Active Learning on Multi-Label Data.

Oscar Gabriel Reyes Pupo==Sebastián Ventura==

Modeling Queries with Contextual Snippets for Information Retrieval.

Qin Chen==Qinmin Hu==Jimmy Xiangji Huang==Liang He==

Fuzzy Cognitive Diagnosis for Modelling Examinee Performance.

Qi Liu==Run-ze Wu==Enhong Chen==Guandong Xu==Yu Su==Zhigang Chen==Guoping Hu==


tist - Volume 9 - Number 3 - February 2018
Real-Time Human Mobility Modeling with Multi-View Learning.

Desheng Zhang==Tian He==Fan Zhang==

ACM TIST Special Issue on Urban Intelligence.

Bo An==Nicholas R. Jennings==Zhenhui Jessie Li==

Risk-Sensitive Stochastic Orienteering Problems for Trip Optimization in Urban Environments.

Pradeep Varakantham==Akshat Kumar==Hoong Chuin Lau==William Yeoh==

A Multiagent-Based Approach for Vehicle Routing by Considering Both Arriving on Time and Total Travel Time.

Zhiguang Cao==Hongliang Guo==Jie Zhang==

Scalable Urban Mobile Crowdsourcing: Handling Uncertainty in Worker Movement.

Shih-Fen Cheng==Cen Chen==Thivya Kandappu==Hoong Chuin Lau==Archan Misra==Nikita Jaiman==Randy Tandriansyah==Desmond Koh==

Simulating Urban Pedestrian Crowds of Different Cultures.

Gal A. Kaminka==Natalie Fridman==

A Comfort-Based Approach to Smart Heating and Air Conditioning.

Frederik Auffenberg==Stephen Snow==Sebastian Stein==Alex Rogers==

Spotting Trip Purposes from Taxi Trajectories: A General Probabilistic Model.

Pengfei Wang==Guannan Liu==Yanjie Fu==Yuanchun Zhou==Jianhui Li==

Personalized Air Travel Prediction: A Multi-factor Perspective.

Jie Liu==Bin Liu==Yanchi Liu==Huipeng Chen==Lina Feng==Hui Xiong==Yalou Huang==

A Data Mining Approach to Assess Privacy Risk in Human Mobility Data.

Roberto Pellungrini==Luca Pappalardo==Francesca Pratesi==Anna Monreale==

Using Online Geotagged and Crowdsourced Data to Understand Human Offline Behavior in the City: An Economic Perspective.

Yingjie Zhang==Beibei Li==Jason Hong==

Social Bridges in Urban Purchase Behavior.

Xiaowen Dong==Yoshihiko Suhara==Burçin Bozkaya==Vivek K. Singh==Bruno Lepri==Alex Sandy Pentland==

GeoBurst+: Effective and Real-Time Local Event Detection in Geo-Tagged Tweet Streams.

Chao Zhang==Dongming Lei==Quan Yuan==Honglei Zhuang==Lance M. Kaplan==Shaowen Wang==Jiawei Han==

illiad: InteLLigent Invariant and Anomaly Detection in Cyber-Physical Systems.

Nikhil Muralidhar==Chen Wang==Nathan Self==Marjan Momtazpour==Kiyoshi Nakayama==Ratnesh Sharma==Naren Ramakrishnan==

Energy Usage Behavior Modeling in Energy Disaggregation via Hawkes Processes.

Liangda Li==Hongyuan Zha==

A Real-Time Framework for Task Assignment in Hyperlocal Spatial Crowdsourcing.

Luan Tran==Hien To==Liyue Fan==Cyrus Shahabi==


tist - Volume 9 - Number 2 - January 2018
Knowledge Representations and Inference Techniques for Medical Question Answering.

Travis R. Goodwin==Sanda M. Harabagiu==

SocialWave: Visual Analysis of Spatio-temporal Diffusion of Information on Social Media.

Guodao Sun==Tan Tang==Tai-Quan Peng==Ronghua Liang==Yingcai Wu==

Supervised Representation Learning with Double Encoding-Layer Autoencoder for Transfer Learning.

Fuzhen Zhuang==Xiaohu Cheng==Ping Luo==Sinno Jialin Pan==Qing He==

Understanding and Identifying Rhetorical Questions in Social Media.

Suhas Ranganath==Xia Hu==Jiliang Tang==Suhang Wang==Huan Liu==

Iteratively Divide-and-Conquer Learning for Nonlinear Classification and Ranking.

Ou Wu==Xue Mao==Weiming Hu==

Stopping Criterion for Active Learning with Model Stability.

Yexun Zhang==Wenbin Cai==Wenquan Wang==Ya Zhang==

SPACE-TA: Cost-Effective Task Allocation Exploiting Intradata and Interdata Correlations in Sparse Crowdsensing.

Leye Wang==Daqing Zhang==Dingqi Yang==Animesh Pathak==Chao Chen==Xiao Han==Haoyi Xiong==Yasha Wang==

Vertical Ensemble Co-Training for Text Classification.

Gilad Katz==Cornelia Caragea==Asaf Shabtai==


tist - Volume 9 - Number 1 - October 2017
Refined-Graph Regularization-Based Nonnegative Matrix Factorization.

Xuelong Li==Guosheng Cui==Yongsheng Dong==

Multifeature Anisotropic Orthogonal Gaussian Process for Automatic Age Estimation.

Zhifeng Li==Dihong Gong==Kai Zhu==Dacheng Tao==Xuelong Li==

Finding Semantically Valid and Relevant Topics by Association-Based Topic Selection Model.

Yang Gao==Yuefeng Li==Raymond Y. K. Lau==Yue Xu==Md. Abul Bashar==

ACM TIST Special Issue on Data-Driven Intelligence for Wireless Networking.

Wenwu Zhu==Jean C. Walrand==Yike Guo==Zhi Wang==

i2tag: RFID Mobility and Activity Identification Through Intelligent Profiling.

Xiaoyi Fan==Wei Gong==Jiangchuan Liu==

Energy-Efficient Mobile Video Streaming: A Location-Aware Approach.

Wei Zhang==Rui Fan==Yonggang Wen==Fang Liu==

UMCR: User Interaction-Driven Mobile Content Retrieval.

Hao Yin==Wei Wang==Xu Zhang==Yongqiang Lyu==Geyong Min==Dongchao Guo==

TensorBeat: Tensor Decomposition for Monitoring Multiperson Breathing Beats with Commodity WiFi.

Xuyu Wang==Chao Yang==Shiwen Mao==

Exploring Indoor White Spaces in Metropolises.

Xuhang Ying==Jincheng Zhang==Lichao Yan==Yu Chen==Guanglin Zhang==Minghua Chen==Ranveer Chandra==

Secure IoT-Based, Incentive-Aware Emergency Personnel Dispatching Scheme with Weighted Fine-Grained Access Control.

Lo-Yao Yeh==Woei-Jiunn Tsaur==Hsin-Han Huang==

DMAD: Data-Driven Measuring of Wi-Fi Access Point Deployment in Urban Spaces.

Jiaxing Shen==Jiannong Cao==Xuefeng Liu==Chisheng Zhang==

Taking the Pulse of US College Campuses with Location-Based Anonymous Mobile Apps.

Yanqiu Wu==Tehila Minkus==Keith W. Ross==

From Electromyogram to Password: Exploring the Privacy Impact of Wearables in Augmented Reality.

Ruide Zhang==Ning Zhang==Changlai Du==Wenjing Lou==Y. Thomas Hou==Yuichi Kawamoto==


回到顶部