Publications of the University of Nevada, Las Vegas Department of Computer Science Faculty.

Follow


Submissions from 2018

Link

Continuous State Power-Down Systems for Renewable Energy Management, James Andro-Vasko, Surya Ravali Avasarala, and Wolfgang Bein

Link

Malice Domestic: The Cambridge Analytica Dystopia, Hal Berghel

Link

Trolling Pathologies, Hal Berghel

Link

Weaponizing Twitter Litter: Abuse-Forming Networks and Social Media, Hal Berghel

PDF

Using Empirical Recurrence Rates Ratio For Time Series Data Similarity, Moinak Bhaduri and Justin Zhan

Finding Top-k Dominance on Incomplete Big Data Using Map Reduce Framework, Payam Ezatpoor, Justin Zhan, Jimmy Ming-Tai Wu, and Carter Chiu

PDF

Dynamically Adjusting the Mining Capacity in Cryptocurrency with Binary Blockchain, Yoohwan Kim and Ju-Yeon Jo

Link

Constant Space Self-stabilizing Center Finding Algorithms in Chains and Trees, Yuichi Sudo, Ajoy Datta, and Lawrence Larmore

Link

Prediction of Online Social Networks Users' Behaviors with a Game Theoretic Approach, Felix Zhan, Gabriella Laines, Sarah Deniz, Sahan Paliskara, Irvin Ochoa, Idania Guerra, Shahab Tayeb, Carter Chiu, Martin Pirouz, Elliott Ploutz, Justin Zhan, Laxmi Gewali, and Paul Oh

Link

An Efficient Alternative to Personalized Page Rank for Friend Recommendations, Felix Zhan, Brandon Waters, Maria Mijangos, LeAnn Chung, Raghav Bhagat, Tanvi Bhagat, Matin Pirouz, Carter Chiu, Shahab Tayeb, Elliott Ploutz, Justin Zhan, and Laxmi Gewali

Submissions from 2017

Link

A Self-Stabilizing Minimal k-Grouping Algorithm, Ajoy K. Datta, Lawrence L. Larmore, Toshimitsu Masuzawa, and Yuichi Sudo

Link

Mining of Frequent Patterns with Multiple Minimum Supports, Wensheng Gan, Jerry Chun-Wei Lin, Philippe Fournier-Viger, Han Chieh Chao, and Zhijun Zhan

Link

Time-Based Estimation of Vulnerable Points in the Munich Subway Network, Sorin Nistor, Doina Bein, Wolfgang Bein, Martin Dehmer, and Stefan Pickl

Link

Low Bandwidth Transmission Algorithm for Reliable Wireless Communication, Evangelos A. Yfantis, Masanori Nakakuni, and Ernesto Zamora

Link

Quantitative Measures to evaluate Neural Network Weight Initialization Strategies, Ernesto Zamora, Masanori Nakakuni, and Evangelos A. Yfantis

Submissions from 2016

Link

Leader Election in Rings with Bounded Multiplicity (Short Paper), Karine Altisen, Ajoy K. Datta, Stephane Devismes, Anais Durand, and Lawrence L. Larmore

Link

Algorithmic approaches for a dependable smart grid, Wolfgang Bein, B B. Madan, D Bein, and D Nyknahad

Link

Chasing Elbridge's Ghost: The Digital Gerrymander, H Berghel

Link

Net Neutrality vs. Net Neutering, H Berghel

Link

Coda in the Key of F2654hD4, Hal Berghel

Link

Digital Politics 2016, Hal Berghel

Link

Douglas Jones on Today's Voting Machines, Hal Berghel

Link

Secretocracy, Hal Berghel

Link

The Bogus Science Theorem (and the Junk Science Wager), Hal Berghel

Link

The dictator's (False) dilemma, Hal Berghel

Link

The Pollyanna Delusion, Hal Berghel

Link

Self-stabilizing robots in highly dynamic environments, M Bournat, Ajoy Datta, and S Dubois

Link

Self-Stabilizing Prefix Tree Based Overlay Networks, E Caron, Ajoy Datta, F Petit, and C Tedeschi

Link

Towards A Framework for Community Detection in Large Networks using Game-Theoretic Modeling, Pravn Chopade and Zhijun Zhan

Link

Micro-Community detection and vulnerability identification for large critical networks, P Chopade, Justin Zhan, and M Bikdash

Link

The expressive power of snap-stabilization, A Cournier, Ajoy Datta, S Devismes, F Petit, and V Villain

Link

Understanding programming expertise: An empirical study of phasic brain wave changes, I Crk, T Kluthe, and Andreas Stefik

Link

Competitive self-stabilizing k-clustering, Ajoy K. Datta, Stephane Devismes, Karine Heurtefeux, Lawrence L. Larmore, and Yvan Rivierre

Link

Maximum matching for anonymous trees with constant space per process, Ajoy Datta, Lawrence Larmore, and T Masuzawa

Link

Implementation of detection and tracking mechanism for small UAS, Sai Ram Ganti and Yoohwan Kim

Link

Constrained triangulation of 2D shapes, Laxmi Gewali and R Gyawali

Link

Big Data Analysis with Hadoop on Personalized Incentive Model with Statistical Hotel Customer Data, Sungchul Lee, Eunmin Hwang, Ju-yeon Jo, and Yoohwan Kim

Link

Efficient mining of high-utility itemsets using multiple minimum utility thresholds, J C.W. Lin, W Gan, P Fournier-Viger, T P. Hong, and J Zhan

Link

An efficient algorithm to mine high average-utility itemsets, J C. W. Lin, T Li, P Fournier-Viger, T P. Hong, Justin Zhan, and M Voznak

Link

A sanitization approach for hiding sensitive itemsets based on particle swarm optimization, J C. W. Lin, Q Liu, P Fournier-Viger, T P. Hong, M Voznak, and Justin Zhan

Link

Fast algorithms for hiding sensitive high-utility itemsets in privacy-preserving utility mining, J C.W. Lin, T Y. Wu, P Fournier-Viger, G Lin, Justin Zhan, and M Voznak

Link

Mining high-utility itemsets based on particle swarm optimization, J C.W. Lin, L Yang, P Fournier-Viger, Jimmy Ming Thai Wu, T P. Hong, L SL Wang, and Justin Zhan

Link

Efficient Mining of Multiple Fuzzy Frequent Item sets, Jerry Chun-Wei Lin, Ting Li, Philippe Fournier-Viger, Tzung-Pei Hong, Jimmy Ming-Thai Wu, and Zhijun Zhan

Link

An Efficient Anonymous System for Transaction Data, Jerry Chun-Wei Lin, Qiankun Liu, Philippe Fournier-Viger, Tzung-Pei Hong, Justin Zhan, and Miroslav Voznak

Link

Usability of programming languages: Special interest group (SIG) meeting at CHI 2016, B A. Myers, Andrea Stefik, S Hanenberg, A J. Kaijanaho, M Burnett, F Turbak, and P Wadler

Link

Optimized relativity search: node reduction in personalized page rank estimation for large graphs, Matin Pirouz and J Zhan

Link

An optimized approach for community detection and ranking, Matin Pirouz, J Zhan, and S Tayeb

Link

Towards shortest path identification on large networks, Haysam Selim and J Zhan

PDF

sUTM System API at UNLV: Small UAS Traffic Management System API, Monetta Angelique Shaw, Ju-Yeon Jo, and Yoohwan Kim

Link

The Same Speed Timer in Population Protocols, Y Sudo, T Masuzawa, Ajoy Datta, and L L. Larmore

Link

Vulnerabilities and Mitigation Methods in the NextGen Air Traffic Control System, Sachiko Sueki and Yoohwan Kim

Link

Text Mining for Security Threat Detection Discovering Hidden Information in Unstructured Log Messages, Candace Suh-Lee, Ju-yeon Jo, and Yoohwan Kim

Link

Will an emerging standard take over the routing realm? An evaluative analysis of DUAL and SPF, Shahab Tayeb and S Latifi

Link

Load balancing in WSNs using a novel markov decision process based routing algorithm, Shahab Tayeb, M Mirnabibaboli, and Shahram Latifi

Link

Implementation and Comparison of M2M Protocols for Internet of Things, Priyanka Thota and Yoohwan Kim

Link

An empirical study on the impact of C++ lambdas and programmer experience, Phillip Merlin Uesbeck, A Stefik, S Hanenberg, J Pedersen, and P Daleiden

Link

Mining of High-Utility Itemsets by ACO Algorithms, Jimmy Ming-Tai Wu, Zhijun Zhan, and Jerry Chun-Wei Harbin Institute of Technology

Link

Robot Server Architecture for Optimizing the Solar Panel Power Output, Ernesto Zamora, Maria Ramos, Konstantinos Moutafis, and Evangelos A. Yfantis

A robot architecture for detecting dust and cleaning solar panels, E Zamora-Ramos, K Moutafis, M Ramos, and Evangelos Yfantis

Link

Vertebrae Detection Algorithm in CT Scout Images, Guodong Zhang, Ying Shao, Yoohwan Kim, and Wei Guo

Link

Identification of top-K influential communities in big networks, Justin Zhan, V Guidibande, and S P.K. Parsa

Submissions from 2011

Link

Multi-resource allocation with unknown participants, Ajoy K. Datta, Lawrence L. Larmore, Stephane Devismes, Francois Kawala, and Maria Potop-Butucaru

Submissions from 2009

Link

Impact of variable transmission range in all-wireless networks, Doina Bein, Ajoy K. Datta, P. Sajja, and S. Q. Zheng

Link

The Knuth-Yao quadrangle-inequality speedup is a consequence of total-monotonicity, Wolfgang Bein, Mordecai J. Golin, Lawrence L. Larmore, and Yan Zhang

Link

Self-stabilizing k-out-of-ℓ exclusion on tree networks, Ajoy K. Datta, Stephane Devismes, Florian Horn, and Lawrence L. Larmore

Link

A self-stabilizing O(n)-round k-clustering algorithm, Ajoy K. Datta, Stephane Devismes, and Lawrence L. Larmore

Link

HTSMA: A hybrid temporal-spatial multi-channel assignment scheme in heterogeneous wireless mesh networks, Yan Jin, Ju-yeon Jo, Mei Yang, Yoohwan Kim, Yingtao Jiang, and John Gowens

Submissions from 2008

Link

Self-stabilizing algorithms for sorting and heapification, Doina Bein, Ajoy K. Datta, and Lawrence L. Larmore

Link

Self-stabilizing synchronization algorithms on oriented chains, Doina Bein, Ajoy K. Datta, and Lawrence L. Larmore

Link

Self-stabilization in tree-structured peer-to-peer service discovery systems, Eddy Caront, Ajoy K. Datta, Franck Petit, and Cedric Tedeschit

Link

EECCP: An energy-efficient coverage- and connectivity preserving algorithm under border effects in wireless sensor networks, Yan Jin, Ju-yeon Jo, Yoohwan Kim, Yingtao Jiang, and Mei Yang

Submissions from 2006

Link

A self-stabilizing link-cluster algorithm in mobile ad hoc networks, Doina Bein, Ajoy K. Datta, Chakradhar R. Jagganagari, and Vincent Villain

Link

A better algorithm for uniform metrical task systems with few states, Wolfgang Bein, Lawrence L. Larmore, and John Noga

Submissions from 2005

Link

Snap-stabilizing optimal binary search tree, Doina Bein, Ajoy K. Datta, and Vincent Villain

Submissions from 2004

Link

Knowledge states for the caching problem in shared memory multiprocessor systems, Wolfgang Bein, Lawrence L. Larmore, and Rudiger Reischuk

Submissions from 2003

Link

A new self-stabilizing K-out-of-L exclusion algorithm on rings, Ajoy K. Datta, Rachid Hadid, and Vincent Villain