Keeping a beat on the heart KJ Liszka, MA Mackin, MJ Lichter, DW York, D Pillai, DS Rosenbaum IEEE Pervasive Computing 3 (4), 42-49, 2004 | 125 | 2004 |
Prediction of movies box office performance using social media KR Apala, M Jose, S Motnam, CC Chan, KJ Liszka, F de Gregorio Proceedings of the 2013 IEEE/ACM International Conference on Advances in …, 2013 | 95 | 2013 |
Text mining for sentiment analysis of Twitter data S Wakade, C Shekar, KJ Liszka, CC Chan Proceedings of the International Conference on Information and Knowledge …, 2012 | 55 | 2012 |
Problems with comparing interconnection networks: Is an alligator better than an armadillo? KJ Liszka, JK Antonio, HJ Siegel IEEE Concurrency (out of print) 5 (04), 18-28, 1997 | 34 | 1997 |
A generalized bitonic sorting network KJ Liszka, KE Batcher 1993 International Conference on Parallel Processing-ICPP'93 1, 105-108, 1993 | 30 | 1993 |
Mining pharmaceutical spam from twitter C Shekar, S Wakade, KJ Liszka, CC Chan 2010 10th International Conference on Intelligent Systems Design and …, 2010 | 27 | 2010 |
Malware analysis using reverse engineering and data mining tools S Burji, KJ Liszka, CC Chan 2010 International Conference on System Science and Engineering, 619-624, 2010 | 21 | 2010 |
RedTweet: recommendation engine for reddit H Nguyen, R Richards, CC Chan, KJ Liszka Proceedings of the 2015 IEEE/ACM International Conference on Advances in …, 2015 | 14 | 2015 |
A Modulo merge sorting network KJ Liszka, KE Batcher The Fourth Symposium on the Frontiers of Massively Parallel Computation, 164 …, 1992 | 13 | 1992 |
Learning attack features from static and dynamic analysis of malware RR Ravula, KJ Liszka, CC Chan Knowledge Discovery, Knowledge Engineering and Knowledge Management: Third …, 2013 | 11 | 2013 |
Spam image identification using an artificial neural network JR Bowling, P Hope, KJ Liszka International Conference on Artificial Neural Networks (ICANN), 2009 | 11 | 2009 |
Real-time scheduling in command and control WC Meilander, J Potter, K Liszka, JW Baker MWPP workshop, Aug, 1999 | 9 | 1999 |
Application of learning algorithms to image spam evolution S Wakade, KJ Liszka, CC Chan Emerging paradigms in machine learning, 471-495, 2013 | 8 | 2013 |
Examining the performance of java static analyzers K Daimi, S Banitaan, K Liszka Proceedings of the International Conference on Software Engineering Research …, 2013 | 7 | 2013 |
Artificial Neural Networks as a Tool for Identifying Image Spam. P Hope, J Bowling, K Liszka Security and Management, 447-451, 2009 | 7 | 2009 |
Using droiddream android malware behavior for identification of other android malware families YK Kim, KJ Liszka, CC Chan Proceedings of the International Conference on Security and Management (SAM …, 2016 | 6 | 2016 |
Application of rough set theory to sentiment analysis of microblog data CC Chan, KJ Liszka Rough Sets and Intelligent Systems-Professor Zdzisław Pawlak in Memoriam …, 2013 | 6 | 2013 |
A sensor network architecture for cardiac health monitoring KJ Liszka 2007 4th IEEE Consumer Communications and Networking Conference, 737-740, 2007 | 6 | 2007 |
Generalizing bitonic and odd-even merging networks KJ Liszka Kent State University, 1992 | 5 | 1992 |
Metrics for Metrics: Why It Is Difficult to Compare Interconnection Networks OR How Would You Compare an Alligator to an Armadillo? HJ Siegel, JK Antonio, KJ Liszka A Workshop on Future Directions of Massively Parallel Processing, The New …, 1992 | 5 | 1992 |