Displaying 5851 - 5860 of 8292
Singh, V. K., Gao, M., & Jain, R. (2012, October). Situation recognition: an evolving problem for heterogeneous dynamic big multimedia data. In Proceedings of the 20th ACM international conference on Multimedia (pp. 1209-1218). ACM.
Pongpaichet, S., Singh, V. K., Jain, R., & Pentland, A. P. (2013). Situation fencing: making geo-fencing personal and dynamic. In Workshop on Personal Data Meets Distributed Multimedia (pp. 3-10), ACM.
This course is will introduce students to a set of social science research methods that are used in the communication discipline and in workplace and organizational contexts.
Singh, V. K., Freeman, L., Lepri, B., & Pentland, A. S. (2013, September). Predicting spending behavior using socio-mobile features. In Social Computing (SocialCom), 2013 International Conference on (pp. 174-179). IEEE.
Huang, Q., Singh, V. K., & Atrey, P. K. (2014, November). Cyber Bullying Detection Using Social and Textual Analysis. In Proceedings of the 3rd International Workshop on Socially-Aware Multimedia (pp. 3-6). ACM.
Almaatouq, A., Alabdulkareem, A., Nouh, M., Shmueli, E., Alsaleh, M., Singh, V. K., Alarifi, A., Alfaris, A., & Pentland, A. S. (2014, June). Twitter: who gets caught? observed trends in social micro-blogging spam. In Proceedings of the 2014 ACM conference on Web science (pp. 33-41). ACM.
Dong, X., Suhara, Y., Bozkaya, B., Singh, V. K., & Pentland, A. Social Bridges in Community Purchase Behavior, Submitted to: IEEE Transactions on Big Data, 2015. Peer-Reviewed Conferences and Workshops: Proceedings Published
Huang, Q., Singh, V. K., & Atrey, P. K.. Cyber Bullying Detection Using Social Network Analysis, Submitted to: IEEE Transactions on Computational Social Systems, 2015.
Singh, V. K., Atrey, P. K., & Kankanhalli, M. S. (2008). Coopetitive multi-camera surveillance using model predictive control. Machine Vision and applications, 19(5-6), 375-393. Journals Articles and Book Chapters: Under Submission
Singh, V. K., & Kankanhalli, M. S. (2009). Adversary aware surveillance systems. Information Forensics and Security, IEEE Transactions on, 4(3), 552-563.