Shaokun Fan, Daning Hu, J Leon Zhao, Integrating workflow and forum via event management, In: IEEE Symposium on Advanced Management of Information for Globalized Enterprises, IEEE, Tianjin, China, 2008-09-28. (Conference or Workshop Paper published in Proceedings)
Workflows have been widely used for coordinating structured processes, whereas group support systems are used to facilitate ad hoc and unstructured collaboration activities. In many business settings, it is beneficial to use both workflows and group support systems. However, how to integrate workflow systems and group support systems have not been well studied in the literature. In this paper, we propose a scalable middleware framework, namely event management system, which can support high-degree decoupling between workflow and groupware. The event management architecture and its main functionalities as well as the implementation techniques are presented. We delineate the applicability of event-based integration by comparing with other integration paradigms. |
|
Daning Hu, Leon Zhao, A Comparison of Evaluation Networks and Collaboration Networks in Open Source Software Communities, In: the Proceedings of the 14th Americas Conference on Information Systems (AMCIS ‘08), 2008. (Conference or Workshop Paper published in Proceedings)
|
|
J Leon Zhao, Daning Hu, Shaokun Fan, SOFTFLOW: A Prototype System for Software Change Workflow, In: the 17th Workshop on Information Technologies & Systems, Montréal, Québec, Canada, 2007-12-13. (Conference or Workshop Paper published in Proceedings)
|
|
Daning Hu, Surendra Samikar, Leon Zhao, Towards a Process-Driven Intelligent Forum System (PIFS) for Efficient Organizational Knowledge Transfer, In: International Conference on Information Systems (ICIS ‘07). 2007. (Conference Presentation)
|
|
Siddharth Kaza, Daning Hu, Hsinchun Chen, Dynamic social network analysis of a dark network: Identifying significant facilitators, In: the 5th IEEE Conference on Intelligence and Security Informatics, IEEE, New Brunswick, New Jersey, 2007-05-23. (Conference or Workshop Paper published in Proceedings)
"Dark Networks" refer to various illegal and covert social networks like criminal and terrorist networks. These networks evolve over time with the formation and dissolution of links to survive control efforts by authorities. Previous studies have shown that the link formation process in such networks is influenced by a set of facilitators. However, there have been few empirical evaluations to determine the significant facilitators. In this study, we used dynamic social network analysis methods to examine several plausible link formation facilitators in a large-scale real-world narcotics network. Multivariate Cox regression showed that mutual acquaintance and vehicle affiliations were significant facilitators in the network under study. These findings provide insights into the link formation processes and the resilience of dark networks. They also can be used to help authorities predict co-offending in future crimes. |
|
Siddharth Kaza, Daning Hu, Homa Atabakhsh, Hsinchun Chen, Predicting criminal relationships using multivariate survival analysis, In: International conference on Digital government research, ACM, Proceedings of the 8th annual international conference on Digital government research, 2007-05-20. (Conference or Workshop Paper published in Proceedings)
Criminal networks evolve over time with the formation and dissolution of links to survive control efforts by government authorities. Previous studies have shown that the link formation process in such networks is influenced by a set of facilitators. However, there have been few empirical evaluations to determine the significant facilitators. In this study, we used dynamic social network analysis methods to examine several plausible link formation facilitators in a large-scale real-world narcotics network. Multivariate Cox regression showed that mutual
acquaintance and vehicle affiliations were significant facilitators in the network under study. The findings shown in this poster can help government authorities automatically predict co-offending relationships in future crimes. |
|
Daning Hu, Hsinchun Chen, Zan Huang, Mihail C Roco, Longitudinal study on patent citations to academic research articles in nanotechnology (1976–2004), Journal of Nanoparticle Research, Vol. 9 (4), 2007. (Journal Article)
Academic nanoscale science and engineering (NSE) research provides a foundation for nanotechnology innovation reflected in patents. About 60% or about 50,000 of the NSE-related patents identified by “full-text” keyword searching between 1976 and 2004 at the United States Patent and Trademark Office (USPTO) have an average of approximately 18 academic citations. The most cited academic journals, individual researchers, and research articles have been evaluated as sources of technology innovation in the NSE area over the 28-year period. Each of the most influential articles was cited about 90 times on the average, while the most influential author was cited more than 700 times by the NSE-related patents. Thirteen mainstream journals accounted for about 20% of all citations. Science, Nature and Proceedings of the National Academy of Sciences (PNAS) have consistently been the top three most cited journals, with each article being cited three times on average. There is another kind of influential journals, represented by Biosystems and Origin of Life , which have very few articles cited but with exceptionally high frequencies. The number of academic citations per year from ten most cited journals has increased by over 17 times in the interval (1990–1999) as compared to (1976–1989), and again over 3 times in the interval (2000–2004) as compared to (1990–1999). This is an indication of increased used of academic knowledge creation in the NSE-related patents. |
|
Jialun Qin, Jennifer J Xu, Daning Hu, Marc Sageman, Hsinchun Chen, Analyzing terrorist networks: A case study of the global salafi jihad network, In: the 3rd IEEE Conference on Intelligence and Security Informatics, Springer, Atlanta, Georgia, USA, 2005-05-18. (Conference or Workshop Paper published in Proceedings)
It is very important for us to understand the functions and structures of terrorist networks to win the battle against terror. However, previous studies of terrorist network structure have generated little actionable results. This is mainly due to the difficulty in collecting and accessing reliable data and the lack of advanced network analysis methodologies in the field. To address these problems, we employed several advance network analysis techniques ranging from social network analysis to Web structural mining on a Global Salafi Jihad network dataset collected through a large scale empirical study. Our study demonstrated the effectiveness and usefulness of advanced network techniques in terrorist network analysis domain. We also introduced the Web structural mining technique into the terrorist network analysis field which, to the best our knowledge, has never been used in this domain. More importantly, the results from our analysis provide not only insights for terrorism research community but also empirical implications that may help law-reinforcement, intelligence, and security communities to make our nation safer. |
|