default search action
Charles K. Nicholas
Person information
- affiliation: University of Maryland, USA
Other persons with a similar name
- Nicholas Charles
- Nicholas Charles Gallomarino
- Nicholas C. Landolfi (aka: Nicholas Charles Landolfi, Nick Landolfi)
- Nicholas Charles Patterson
- Nicholas Charles Victor Pilkington
- Mark Nicholas Charles Rhodes
- Charles Thomas 0002 (aka: Charles Nicholas Alexander Thomas) — Agere Systems, North Ryde, Australia
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c59]Ran Liu, Cynthia Matuszek, Charles Nicholas:
An Efficient PDF Malware Detection Method Using Highly Compact Features. DocEng 2024: 14:1-14:4 - [c58]Ryan Barron, Maksim Ekin Eren, Manish Bhattarai, Selma Wanna, Nick Solovyev, Kim Ø. Rasmussen, Boian S. Alexandrov, Charles Nicholas, Cynthia Matuszek:
Cyber-Security Knowledge Graph Generation by Hierarchical Nonnegative Matrix Factorization. ISDFS 2024: 1-6 - [c57]Maksim Ekin Eren, Ryan Barron, Manish Bhattarai, Selma Wanna, Nicholas Solovyev, Kim Ø. Rasmussen, Boian S. Alcxandrov, Charles Nicholas:
Catch'em all: Classification of Rare, Prominent, and Novel Malware Families. ISDFS 2024: 1-6 - [i36]Nicholas R. Allgood, Ajinkya Borle, Charles K. Nicholas:
Adaptive Quantum Optimized Centroid Initialization. CoRR abs/2401.11258 (2024) - [i35]Maksim Ekin Eren, Ryan Barron, Manish Bhattarai, Selma Wanna, Nicholas Solovyev, Kim Ø. Rasmussen, Boian S. Alexandrov, Charles Nicholas:
Catch'em all: Classification of Rare, Prominent, and Novel Malware Families. CoRR abs/2403.02546 (2024) - [i34]Ryan Barron, Maksim Ekin Eren, Manish Bhattarai, Selma Wanna, Nicholas Solovyev, Kim Ø. Rasmussen, Boian S. Alexandrov, Charles Nicholas, Cynthia Matuszek:
Cyber-Security Knowledge Graph Generation by Hierarchical Nonnegative Matrix Factorization. CoRR abs/2403.16222 (2024) - [i33]Ryan Barron, Ves Grantcharov, Selma Wanna, Maksim Ekin Eren, Manish Bhattarai, Nick Solovyev, George Tompkins, Charles Nicholas, Kim Ø. Rasmussen, Cynthia Matuszek, Boian S. Alexandrov:
Domain-Specific Retrieval-Augmented Generation Using Vector Stores, Knowledge Graphs, and Tensor Factorization. CoRR abs/2410.02721 (2024) - [i32]John Hurwitz, Charles Nicholas, Edward Raff:
Neural Normalized Compression Distance and the Disconnect Between Compression and Classification. CoRR abs/2410.15280 (2024) - [i31]Siddhant Gupta, Fred Lu, Andrew Barlow, Edward Raff, Francis Ferraro, Cynthia Matuszek, Charles Nicholas, James Holt:
Living off the Analyst: Harvesting Features from Yara Rules for Malware Detection. CoRR abs/2411.18516 (2024) - 2023
- [j22]Robert J. Joyce, Dev Amlani, Charles Nicholas, Edward Raff:
MOTIF: A Malware Reference Dataset with Ground Truth Family Labels. Comput. Secur. 124: 102921 (2023) - [j21]Maksim Ekin Eren, Manish Bhattarai, Robert J. Joyce, Edward Raff, Charles Nicholas, Boian S. Alexandrov:
Semi-Supervised Classification of Malware Families Under Extreme Class Imbalance via Hierarchical Non-Negative Matrix Factorization with Automatic Model Selection. ACM Trans. Priv. Secur. 26(4): 48:1-48:27 (2023) - [c56]Ran Liu, Robert J. Joyce, Cynthia Matuszek, Charles Nicholas:
Evaluating Representativeness in PDF Malware Datasets: A Comparative Study and a New Dataset. IEEE Big Data 2023: 3017-3024 - [c55]Robert J. Joyce, Edward Raff, Charles Nicholas, James Holt:
MalDICT: Benchmark Datasets on Malware Behaviors, Platforms, Exploitation, and Packers. CAMLIS 2023: 105-121 - [c54]Tirth Patel, Fred Lu, Edward Raff, Charles Nicholas, Cynthia Matuszek, James Holt:
Small Effect Sizes in Malware Detection? Make Harder Train/Test Splits! CAMLIS 2023: 181-192 - [c53]Robert J. Joyce, Tirth Patel, Charles Nicholas, Edward Raff:
AVScan2Vec: Feature Learning on Antivirus Scan Data for Production-Scale Malware Corpora. AISec@CCS 2023: 185-196 - [c52]Ran Liu, Cynthia Matuszek, Charles Nicholas:
A PDF Malware Detection Method Using Extremely Small Training Sample Size. DocEng 2023: 27:1-27:4 - [c51]Nicholas R. Allgood, Ajinkya Borle, Charles K. Nicholas:
Quantum Optimized Centroid Initialization. FTC (2) 2023: 71-85 - [c50]Maksim Ekin Eren, Manish Bhattarai, Kim Ø. Rasmussen, Boian S. Alexandrov, Charles Nicholas:
MalwareDNA: Simultaneous Classification of Malware, Malware Families, and Novel Malware. ISI 2023: 1-3 - [i30]Ran Liu, Charles Nicholas:
IMCDCF: An Incremental Malware Detection Approach Using Hidden Markov Models. CoRR abs/2304.07989 (2023) - [i29]Ran Liu, Maksim Ekin Eren, Charles Nicholas:
Can Feature Engineering Help Quantum Machine Learning for Malware Detection? CoRR abs/2305.02396 (2023) - [i28]Nicholas R. Allgood, Ajinkya Borle, Charles K. Nicholas:
Quantum Optimized Centroid Initialization. CoRR abs/2305.08626 (2023) - [i27]Robert J. Joyce, Tirth Patel, Charles Nicholas, Edward Raff:
AVScan2Vec: Feature Learning on Antivirus Scan Data for Production-Scale Malware Corpora. CoRR abs/2306.06228 (2023) - [i26]Ran Liu, Charles Nicholas:
A Feature Set of Small Size for the PDF Malware Detection. CoRR abs/2308.04704 (2023) - [i25]Maksim Ekin Eren, Manish Bhattarai, Kim Ø. Rasmussen, Boian S. Alexandrov, Charles Nicholas:
MalwareDNA: Simultaneous Classification of Malware, Malware Families, and Novel Malware. CoRR abs/2309.01350 (2023) - [i24]Maksim Ekin Eren, Manish Bhattarai, Robert J. Joyce, Edward Raff, Charles Nicholas, Boian S. Alexandrov:
Semi-supervised Classification of Malware Families Under Extreme Class Imbalance via Hierarchical Non-Negative Matrix Factorization with Automatic Model Selection. CoRR abs/2309.06643 (2023) - [i23]Robert J. Joyce, Edward Raff, Charles Nicholas, James Holt:
MalDICT: Benchmark Datasets on Malware Behaviors, Platforms, Exploitation, and Packers. CoRR abs/2310.11706 (2023) - [i22]Tirth Patel, Fred Lu, Edward Raff, Charles Nicholas, Cynthia Matuszek, James Holt:
Small Effect Sizes in Malware Detection? Make Harder Train/Test Splits! CoRR abs/2312.15813 (2023) - 2022
- [c49]André T. Nguyen, Fred Lu, Gary Lopez Munoz, Edward Raff, Charles Nicholas, James Holt:
Out of Distribution Data Detection Using Dropout Bayesian Neural Networks. AAAI 2022: 7877-7885 - [c48]André T. Nguyen, Richard Zak, Luke E. Richards, Maya Fuchs, Fred Lu, Robert Brandon, Gary Lopez Munoz, Edward Raff, Charles Nicholas, James Holt:
Minimizing Compute Costs: When Should We Run More Expensive Malware Analysis? CAMLIS 2022: 81-99 - [c47]Maksim Ekin Eren, Nick Solovyev, Manish Bhattarai, Kim Ø. Rasmussen, Charles Nicholas, Boian S. Alexandrov:
SeNMFk-SPLIT: large corpora topic modeling by semantic non-negative matrix factorization with automatic model selection. DocEng 2022: 10:1-10:4 - [c46]Nicholas R. Allgood, Charles K. Nicholas:
A Quantum Algorithm to Locate Unknown Hashgrams. FTC (3) 2022: 273-285 - [c45]Maksim Ekin Eren, Manish Bhattarai, Nicholas Solovyev, Luke E. Richards, Roberto Yus, Charles Nicholas, Boian S. Alexandrov:
One-Shot Federated Group Collaborative Filtering. ICMLA 2022: 647-652 - [i21]Robert J. Joyce, Edward Raff, Charles Nicholas:
Rank-1 Similarity Matrix Decomposition For Modeling Changes in Antivirus Consensus Through Time. CoRR abs/2201.00757 (2022) - [i20]André T. Nguyen, Fred Lu, Gary Lopez Munoz, Edward Raff, Charles Nicholas, James Holt:
Out of Distribution Data Detection Using Dropout Bayesian Neural Networks. CoRR abs/2202.08985 (2022) - [i19]Maksim Ekin Eren, Luke E. Richards, Manish Bhattarai, Roberto Yus, Charles Nicholas, Boian S. Alexandrov:
FedSPLIT: One-Shot Federated Recommendation System Based on Non-negative Joint Matrix Factorization and Knowledge Distillation. CoRR abs/2205.02359 (2022) - [i18]Maksim Ekin Eren, Nick Solovyev, Manish Bhattarai, Kim Ø. Rasmussen, Charles Nicholas, Boian S. Alexandrov:
SeNMFk-SPLIT: Large Corpora Topic Modeling by Semantic Non-negative Matrix Factorization with Automatic Model Selection. CoRR abs/2208.09942 (2022) - 2021
- [c44]Prajna Bhandary, Edward Zieglar, Charles Nicholas:
Searching for Selfie in TLS 1.3 with the Cryptographic Protocol Shapes Analyzer. Protocols, Strands, and Logic 2021: 50-76 - [c43]Robert J. Joyce, Edward Raff, Charles Nicholas:
A Framework for Cluster and Classifier Evaluation in the Absence of Reference Labels. AISec@CCS 2021: 73-84 - [c42]Charles Nicholas, Robert J. Joyce, Steve Simske:
Document engineering issues in malware analysis. DocEng 2021: 2:1 - [c41]Maksim Ekin Eren, Nick Solovyev, Chris Hamer, Renee McDonald, Boian S. Alexandrov, Charles Nicholas:
COVID-19 multidimensional kaggle literature organization. DocEng 2021: 33:1-33:4 - [i17]John Boutsikas, Maksim Ekin Eren, Charles K. Varga, Edward Raff, Cynthia Matuszek, Charles Nicholas:
Evading Malware Classifiers via Monte Carlo Mutant Feature Discovery. CoRR abs/2106.07860 (2021) - [i16]Maksim Ekin Eren, Nick Solovyev, Chris Hamer, Renee McDonald, Boian S. Alexandrov, Charles Nicholas:
COVID-19 Multidimensional Kaggle Literature Organization. CoRR abs/2107.08190 (2021) - [i15]André T. Nguyen, Edward Raff, Charles Nicholas, James Holt:
Leveraging Uncertainty for Improved Static Malware Detection Under Extreme False Positive Constraints. CoRR abs/2108.04081 (2021) - [i14]Robert J. Joyce, Edward Raff, Charles Nicholas:
A Framework for Cluster and Classifier Evaluation in the Absence of Reference Labels. CoRR abs/2109.11126 (2021) - [i13]Robert J. Joyce, Dev Amlani, Charles Nicholas, Edward Raff:
MOTIF: A Large Malware Reference Dataset with Ground Truth Family Labels. CoRR abs/2111.15031 (2021) - 2020
- [c40]Edward Raff, Charles Nicholas, Mark McLean:
A New Burrows Wheeler Transform Markov Distance. AAAI 2020: 5444-5453 - [c39]Edward Raff, Richard Zak, Gary Lopez Munoz, William Fleming, Hyrum S. Anderson, Bobby Filar, Charles Nicholas, James Holt:
Automatic Yara Rule Generation Using Biclustering. AISec@CCS 2020: 71-82 - [c38]Maksim Ekin Eren, Nick Solovyev, Edward Raff, Charles Nicholas, Ben Johnson:
COVID-19 Kaggle Literature Organization. DocEng 2020: 15:1-15:4 - [c37]Ketan Rajshekhar Shahapure, Charles Nicholas:
Cluster Quality Analysis Using Silhouette Score. DSAA 2020: 747-748 - [i12]Nicholas R. Allgood, Charles K. Nicholas:
A Quantum Algorithm To Locate Unknown Hashes For Known N-Grams Within A Large Malware Corpus. CoRR abs/2005.02911 (2020) - [i11]Edward Raff, Charles Nicholas:
A Survey of Machine Learning Methods and Challenges for Windows Malware Classification. CoRR abs/2006.09271 (2020) - [i10]Maksim Ekin Eren, Nick Solovyev, Edward Raff, Charles Nicholas, Ben Johnson:
COVID-19 Kaggle Literature Organization. CoRR abs/2008.13542 (2020) - [i9]Edward Raff, Richard Zak, Gary Lopez Munoz, William Fleming, Hyrum S. Anderson, Bobby Filar, Charles Nicholas, James Holt:
Automatic Yara Rule Generation Using Biclustering. CoRR abs/2009.03779 (2020)
2010 – 2019
- 2019
- [c36]Edward Raff, Joe Aurelio, Charles Nicholas:
PyLZJD: An Easy to Use Tool for Machine Learning. SciPy 2019: 101-106 - [i8]Edward Raff, William Fleming, Richard Zak, Hyrum S. Anderson, Bill Finlayson, Charles Nicholas, Mark McLean:
KiloGrams: Very Large N-Grams for Malware Classification. CoRR abs/1908.00200 (2019) - [i7]Edward Raff, Charles Nicholas, Mark McLean:
A New Burrows Wheeler Transform Markov Distance. CoRR abs/1912.13046 (2019) - 2018
- [j20]Edward Raff, Charles Nicholas:
Lempel-Ziv Jaccard Distance, an effective alternative to ssdeep and sdhash. Digit. Investig. 24: 34-49 (2018) - [j19]Edward Raff, Richard Zak, Russell Cox, Jared Sylvester, Paul Yacci, Rebecca Ward, Anna Tracy, Mark McLean, Charles Nicholas:
An investigation of byte n-gram features for malware classification. J. Comput. Virol. Hacking Tech. 14(1): 1-20 (2018) - [c35]Edward Raff, Jon Barker, Jared Sylvester, Robert Brandon, Bryan Catanzaro, Charles K. Nicholas:
Malware Detection by Eating a Whole EXE. AAAI Workshops 2018: 268-276 - [c34]William Fleshman, Edward Raff, Richard Zak, Mark McLean, Charles Nicholas:
Static Malware Detection & Subterfuge: Quantifying the Robustness of Machine Learning and Current Anti-Virus. AAAI Fall Symposium: ALEC 2018: 3-10 - [c33]Edward Raff, Jared Sylvester, Charles Nicholas:
Engineering a Simplified 0-Bit Consistent Weighted Sampling. CIKM 2018: 1203-1212 - [c32]Edward Raff, Charles Nicholas:
Hash-Grams: Faster N-Gram Features for Classification and Malware Detection. DocEng 2018: 22:1-22:4 - [c31]William Fleshman, Edward Raff, Richard Zak, Mark McLean, Charles Nicholas:
Static Malware Detection & Subterfuge: Quantifying the Robustness of Machine Learning and Current Anti-Virus. MALWARE 2018: 3-12 - [i6]Edward Raff, Charles Nicholas:
Toward Metric Indexes for Incremental Insertion and Querying. CoRR abs/1801.05055 (2018) - [i5]Edward Raff, Jared Sylvester, Charles Nicholas:
Engineering a Simplified 0-Bit Consistent Weighted Sampling. CoRR abs/1804.00069 (2018) - [i4]William Fleshman, Edward Raff, Richard Zak, Mark McLean, Charles Nicholas:
Static Malware Detection & Subterfuge: Quantifying the Robustness of Machine Learning and Current Anti-Virus. CoRR abs/1806.04773 (2018) - 2017
- [c30]Edward Raff, Charles Nicholas:
Malware Classification and Class Imbalance via Stochastic Hashed LZJD. AISec@CCS 2017: 111-120 - [c29]Edward Raff, Jared Sylvester, Charles Nicholas:
Learning the PE Header, Malware Detection with Minimal Domain Knowledge. AISec@CCS 2017: 121-132 - [c28]Charles K. Nicholas:
Document Engineering Issues in Malware Analysis. DocEng 2017: 3 - [c27]Edward Raff, Charles K. Nicholas:
An Alternative to NCD for Large Sequences, Lempel-Ziv Jaccard Distance. KDD 2017: 1007-1015 - [c26]Richard Zak, Edward Raff, Charles Nicholas:
What can N-grams learn for malware detection? MALWARE 2017: 109-118 - [i3]Edward Raff, Charles K. Nicholas:
Lempel-Ziv Jaccard Distance, an Effective Alternative to Ssdeep and Sdhash. CoRR abs/1708.03346 (2017) - [i2]Edward Raff, Jared Sylvester, Charles K. Nicholas:
Learning the PE Header, Malware Detection with Minimal Domain Knowledge. CoRR abs/1709.01471 (2017) - [i1]Edward Raff, Jon Barker, Jared Sylvester, Robert Brandon, Bryan Catanzaro, Charles K. Nicholas:
Malware Detection by Eating a Whole EXE. CoRR abs/1710.09435 (2017) - 2016
- [c25]Charles K. Nicholas, Robert Brandon:
Document Engineering Issues in Malware Analysis. DocEng 2016: 3 - 2015
- [c24]Charles K. Nicholas, Robert Brandon:
Document Engineering Issues in Document Analysis. DocEng 2015: 229-230 - 2013
- [j18]Charles K. Nicholas, Ethan V. Munson:
Document engineering education: workshop report. SIGWEB Newsl. 2013(Winter): 1:1-1:5 (2013) - [c23]Timothy R. Leschke, Charles K. Nicholas:
Change-link 2.0: a digital forensic tool for visualizing changes to shadow volume data. VizSEC 2013: 17-24
2000 – 2009
- 2009
- [c22]Paul McNamee, James Mayfield, Charles K. Nicholas:
Translation Corpus Source and Size in Bilingual Retrieval. HLT-NAACL (Short Papers) 2009: 25-28 - [c21]Paul McNamee, Charles K. Nicholas, James Mayfield:
Addressing morphological variation in alphabetic languages. SIGIR 2009: 75-82 - 2008
- [c20]Marcella Wilson, Charles K. Nicholas:
Topological analysis of an online social network for older adults. SSM 2008: 51-58 - [c19]Paul McNamee, Charles K. Nicholas, James Mayfield:
Don't have a stemmer?: be un+concern+ed. SIGIR 2008: 813-814 - 2007
- [j17]Vladimir Volkovich, Jacob Kogan, Charles K. Nicholas:
Building initial partitions through sampling techniques. Eur. J. Oper. Res. 183(3): 1097-1105 (2007) - 2006
- [p1]Zeev Volkovich, Jacob Kogan, Charles K. Nicholas:
Sampling Methods for Building Initial Partitions. Grouping Multidimensional Data 2006: 161-185 - [e7]Jacob Kogan, Charles K. Nicholas, Marc Teboulle:
Grouping Multidimensional Data - Recent Advances in Clustering. Springer 2006, ISBN 978-3-540-28348-5 [contents] - 2005
- [j16]Jacob Kogan, Marc Teboulle, Charles K. Nicholas:
Data Driven Similarity Measures for k-Means Like Clustering Algorithms. Inf. Retr. 8(2): 331-349 (2005) - 2004
- [j15]Vinay Bhat, Tim Oates, Vishal Shanbhag, Charles K. Nicholas:
Finding aliases on the web using latent semantic analysis. Data Knowl. Eng. 49(2): 129-143 (2004) - 2003
- [j14]Jacob Kogan, Charles K. Nicholas, Vladimir Volkovich:
Text mining with information-theoretic clustering. Comput. Sci. Eng. 5(6): 52-59 (2003) - [c18]Srikanth Kallurkar, Yongmei Shi, R. Scott Cost, Charles K. Nicholas, Akshay Java, Christopher James, Sowjanya Rajavaram, Vishal Shanbhag, Sachin Bhatkar, Drew Ogle:
UMBC at TREC 12. TREC 2003: 699-706 - 2002
- [j13]R. Scott Cost, Timothy W. Finin, Anupam Joshi, Yun Peng, Charles K. Nicholas, Ian Soboroff, Harry Chen, Lalana Kagal, Filip Perich, Youyong Zou, Sovrin Tolia:
ITtalks: A Case Study in the Semantic Web and DAML+OIL. IEEE Intell. Syst. 17(1): 40-47 (2002) - [j12]Ian Soboroff, Charles K. Nicholas:
Related, but not Relevant: Content-Based Collaborative Filtering in TREC-8. Inf. Retr. 5(2-3): 189-208 (2002) - [c17]R. Scott Cost, Srikanth Kallurkar, Hemali Majithia, Charles K. Nicholas, Yongmei Shi:
Integrating Distributed Information Sources with CARROT II. CIA 2002: 194-201 - [c16]R. Scott Cost, Srikanth Kallurkar, Hemali Majithia, Charles K. Nicholas, Yongmei Shi:
CARROTT 11 and the TREC 11 Web Track. TREC 2002 - [c15]Lalana Kagal, Filip Perich, Harry Chen, Sovrin Tolia, Youyong Zou, Timothy W. Finin, Anupam Joshi, Yun Peng, R. Scott Cost, Charles K. Nicholas:
Agents Making Sense of the Semantic Web. WRAC 2002: 417-433 - 2001
- [c14]Filip Perich, Lalana Kagal, Harry Chen, Sovrin Tolia, Youyong Zou, Timothy W. Finin, Anupam Joshi, Yun Peng, R. Scott Cost, Charles K. Nicholas:
ITTALKS: An Application of Agents in the Semantic Web. ESAW 2001: 175-194 - [c13]R. Scott Cost, Timothy W. Finin, Anupam Joshi, Yun Peng, Charles K. Nicholas, Harry Chen, Lalana Kagal, Filip Perich, Youyong Zou, Sovrin Tolia:
ITTALKS: A Case Study in the Semantic Web and DAML. SWWS 2001: 477-494 - [c12]Ian Soboroff, Charles K. Nicholas, Patrick Cahan:
Ranking Retrieval Systems without Relevance Judgments. SIGIR 2001: 66-73 - [c11]Travis Atkison, Kathleen Pensy, Charles K. Nicholas, David S. Ebert, Rebekah Atkison, Chris Morris:
Case Study: Visualization and Information Retrieval Techniques for Network Intrusion Detection. VisSym 2001: 283-290 - 2000
- [j11]Ethan Millar, Dan Shen, Junli Liu, Charles K. Nicholas:
Performance and Scalability of a Large-Scale N-gram Based Information Retrieval System. J. Digit. Inf. 1(5) (2000) - [c10]Ian Soboroff, Charles K. Nicholas:
Collaborative filtering and the generalized vector space model. SIGIR 2000: 351-353
1990 – 1999
- 1999
- [j10]Christopher D. Shaw, James M. Kukla, Ian Soboroff, David S. Ebert, Charles K. Nicholas, Amen Zwa, Ethan L. Miller, D. Aaron Roberts:
Interactive Volumetric Information Visualization for Document Corpus Management. Int. J. Digit. Libr. 2(2-3): 144-156 (1999) - [j9]Ian Soboroff, Charles K. Nicholas, Michael J. Pazzani:
Workshop on Recommender Systems: Algorithms and Evaluation. SIGIR Forum 33(1): 36-43 (1999) - [c9]Ethan L. Miller, Dan Shen, Junli Liu, Charles K. Nicholas, Ting Chen:
Techniques for Gigabyte-Scale N-gram Based Information Retrieval on Personal Computers. PDPTA 1999: 1410-1416 - 1998
- [c8]Charles K. Nicholas, Randall Dahlberg:
Spotting Topics with the Singular Value Decomposition. PODDP 1998: 82-91 - [e6]Ethan V. Munson, Charles K. Nicholas, Derick Wood:
Principles of Digital Document Processing, 4th International Workshop, PODDP'98, Saint Malo, France, March 29-30, 1998, Proceedings. Lecture Notes in Computer Science 1481, Springer 1998, ISBN 3-540-65086-5 [contents] - [e5]David S. Ebert, Charles K. Nicholas, Chris D. Shaw:
Proceedings of the CIKM 1998 Workshop on New Paradigms in Information Visualization and Manipulation, NPIV 1998, Bethesda, MD, USA, November 3-7, 1998. ACM 1998, ISBN 978-1-58113-179-6 [contents] - 1997
- [c7]R. Scott Cost, Ian Soboroff, Jeegar Lakhani, Timothy W. Finin, Ethan L. Miller, Charles K. Nicholas:
TKQML: A Scripting Tool for Building Agents. ATAL 1997: 339-343 - [c6]Ian Soboroff, Charles K. Nicholas, James M. Kukla, David S. Ebert:
Visualizing Document Authorship Using n-grams and Latent Semantic Indexing. Workshop on New Paradigms in Information Visualization and Manipulation 1997: 43-48 - [c5]R. Scott Cost, Ian Soboroff, Jeegar Lakhani, Tim Finin, Ethan L. Miller, Charles K. Nicholas:
Agent Development Support for Tcl. Tcl/Tk Workshop 1997 - [e4]Charles K. Nicholas, James Mayfield:
Intelligent Hypertext: Advanced Techniques for the World Wide Web. Lecture Notes in Computer Science 1326, Springer 1997, ISBN 3-540-63637-4 [contents] - [e3]David S. Ebert, Charles K. Nicholas:
Proceedings of the Workshop on New Paradigms in Information Visualization and Manipulation, NIPV 1997, in conjuction with CIKM 1997, November 10-14, 1997, Las Vegas, NV, USA. ACM 1997, ISBN 978-1-58113-051-5 [contents] - [e2]Charles K. Nicholas, Derick Wood:
Principles of Document Processing, Third International Workshop, PODP'96, Palo Alto, California, USA, September 23, 1996, Proceedings. Lecture Notes in Computer Science 1293, Springer 1997, ISBN 3-540-63620-X [contents] - 1996
- [j8]Claudia Pearce, Charles K. Nicholas:
TELLTALE: Experiments in a Dynamic Hypertext Environment for Degraded and Multilingual Data. J. Am. Soc. Inf. Sci. 47(4): 263-275 (1996) - [c4]Grace Crowder, Charles Nicholas:
Using Statistical Properties of Text to Create Metadata. MD 1996 - 1995
- [j7]Kenneth E. Rowe, Charles K. Nicholas:
Reliability of WWW Name Servers. Comput. Networks ISDN Syst. 27(6): 773-780 (1995) - [c3]Grace Crowder, Charles Nicholas:
An Approach to Large Scale Distributed Information Systems Using Statistical Properties of Text to Guide Agent Search. CIKM Information Agents Workshop 1995: 2:1-2:7 - 1993
- [j6]Charles K. Nicholas, Linda H. Rosenberg:
Canto: a Hypertext Data Model. Electron. Publ. 6(2): 93-113 (1993) - [j5]Charles K. Nicholas, Yelena Yesha:
Information and Knowledge Management: Guest Editors' Introduction. Int. J. Cooperative Inf. Syst. 2(2): 105-106 (1993) - [j4]James Mayfield, Charles K. Nicholas:
Snitch: Augmenting Hypertext Documents with a Semantic Net. Int. J. Cooperative Inf. Syst. 2(3): 335-354 (1993) - [c2]Claudia Pearce, Charles K. Nicholas:
Generating a Dynamic Hypertext Environment with n-gram Analysis. CIKM 1993: 148-153 - [e1]Timothy W. Finin, Charles K. Nicholas, Yelena Yesha:
Information and Knowledge Management, Expanding the Definition of "Database", First International Conference, CIKM'92, Baltimore, Maryland, USA, November 8-11, 1992, Selected Papers. Lecture Notes in Computer Science 752, Springer 1993, ISBN 3-540-57419-0 [contents] - 1992
- [j3]Charles K. Nicholas, Lawrence A. Welsch:
On the Interchangeability of SGML and ODA. Electron. Publ. 5(3): 105-130 (1992)
1980 – 1989
- 1989
- [j2]Sandra A. Mamrak, Michael J. Kaelbling, Charles K. Nicholas, Michael Share:
Chameleon: A System for Solving the Data-Translation Problem. IEEE Trans. Software Eng. 15(9): 1090-1108 (1989) - 1987
- [j1]Sandra A. Mamrak, Michael J. Kaelbling, Charles K. Nicholas, Michael Share:
A Software Architecture for Supporting the Exchange of Electronic Manuscripts. Commun. ACM 30(5): 408-414 (1987) - 1982
- [c1]Sandra A. Mamrak, P. Maurath, J. Gomez, S. Janardan, Charles Nicholas:
Guest Layer in Distributed Processing Support on Local Operating Systems. ICDCS 1982: 854-859
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-02 18:19 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint