Author of the publication

A Tensor-Based Information Framework for Predicting the Stock Market.

, , , , and . ACM Trans. Inf. Syst., 34 (2): 11:1-11:30 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identifying top listers in Alphabay using Latent Dirichlet Allocation., , , , and . ISI, page 219. IEEE, (2016)SCADA honeypots: An in-depth analysis of Conpot., , and . ISI, page 196-198. IEEE, (2016)Anonymous port scanning: Performing network reconnaissance through Tor., , and . ISI, page 217. IEEE, (2016)An integrated approach to mapping worldwide bioterrorism research capabilities., , , , and . ISI, page 212-214. IEEE, (2008)Senior Scholars' Forum., , , , , and . ICIS, Association for Information Systems, (2011)Unraveling International Terrorist Groups' Exploitation of the Web: Technical Sophistication, Media Richness, and Web Interactivity., , , , and . WISI, volume 3917 of Lecture Notes in Computer Science, page 4-15. Springer, (2006)Evaluating an Infectious Disease Information Sharing and Analysis System., , , , , and . ISI, volume 3495 of Lecture Notes in Computer Science, page 412-417. Springer, (2005)User acceptance of Intelligence and Security Informatics technology: A study of COPLINK., , and . J. Assoc. Inf. Sci. Technol., 56 (3): 235-244 (2005)Introduction to the special topic issue: Intelligence and security informatics.. J. Assoc. Inf. Sci. Technol., 56 (3): 217-220 (2005)Document clustering for electronic meetings: an experimental comparison of two techniques., and . Decis. Support Syst., 27 (1-2): 67-79 (1999)