Conceptual complexity and the bias/variance tradeoff E Briscoe, J Feldman Cognition 118 (1), 2-16, 2011 | 206 | 2011 |
Detecting insider threats in a real corporate database of computer usage activity TE Senator, HG Goldberg, A Memory, WT Young, B Rees, R Pierce, ... Proceedings of the 19th ACM SIGKDD international conference on Knowledge …, 2013 | 178 | 2013 |
Cues to deception in social media communications EJ Briscoe, DS Appling, H Hayes 2014 47th Hawaii international conference on system sciences, 1435-1443, 2014 | 63 | 2014 |
Credibility assessment in the news: do we need to read J Fairbanks, N Fitch, N Knauf, E Briscoe Proc. of the MIS2 Workshop held in conjuction with 11th Int’l Conf. on Web …, 2018 | 52 | 2018 |
An integrated Bayesian approach to shape representation and perceptual organization J Feldman, M Singh, E Briscoe, V Froyen, S Kim, J Wilder Shape perception in human and computer vision: An interdisciplinary …, 2013 | 45 | 2013 |
Towards automated personality identification using speech acts D Appling, E Briscoe, H Hayes, R Mappus Proceedings of the international AAAI conference on web and social media 7 …, 2013 | 31 | 2013 |
Discriminative models for predicting deception strategies DS Appling, EJ Briscoe, CJ Hutto Proceedings of the 24th international conference on world wide web, 947-952, 2015 | 30 | 2015 |
Hague Convention on Protection of Children and Co-Operation in Respect of Intercountry Adoption: Are its benefits overshadowed by its shortcomings E Briscoe J. Am. Acad. Matrimonial Law. 22, 437, 2009 | 20 | 2009 |
Determining credibility from social network structure EJ Briscoe, DS Appling, RL Mappus IV, H Hayes Proceedings of the 2013 IEEE/ACM International Conference on Advances in …, 2013 | 19 | 2013 |
The perception of social bots by human and machine DS Appling, EJ Briscoe The Thirtieth International Flairs Conference, 2017 | 17 | 2017 |
Closing the micro-macro divide in modeling technology adoption E Briscoe, E Trewhitt, C Hutto Proceedings of 2nd Annual Conference of the Computational Social Science …, 2011 | 17 | 2011 |
Artificial scientific intelligence and its impact on national security and foreign policy E Briscoe, J Fairbanks Orbis 64 (4), 544-554, 2020 | 15 | 2020 |
Shubhomoy Das, Andrew Emmott, Jed Irvine, Jay-Yoon Lee, Danai Koutra, Christos Faloutsos, Daniel Corkill, Lisa Friedland, Amanda Gentzel, and David Jensen. Detecting insider … TE Senator, HG Goldberg, A Memory, WT Young, B Rees, R Pierce, ... Proceedings of the 19th ACM SIGKDD International Conference on Knowledge …, 2013 | 14 | 2013 |
Evaluating counter-IED strategies L Weiss, E Whitaker, E Briscoe, E Trewhitt Defense & Security Analysis 27 (2), 135-147, 2011 | 14 | 2011 |
Real-time streaming intelligence: Integrating graph and nlp analytics D Ediger, S Appling, E Briscoe, R McColl, J Poovey 2014 IEEE High Performance Extreme Computing Conference (HPEC), 1-6, 2014 | 12 | 2014 |
Shape skeletons and shape similarity EJ Briscoe Rutgers The State University of New Jersey, School of Graduate Studies, 2008 | 12 | 2008 |
A Systems‐Level Understanding of Insurgent Involvement in Improvised Explosive Devices Activities E Briscoe, L Weiss, E Whitaker, E Trewhitt Systems Research and Behavioral Science 28 (4), 391-400, 2011 | 11 | 2011 |
Technology futures from passive crowdsourcing E Briscoe, S Appling, J Schlosser IEEE Transactions on Computational Social Systems 3 (1), 23-31, 2016 | 10 | 2016 |
Deriving disaster-related information from social media S Appling, E Briscoe, D Ediger, J Poovey, R McColl Proceedings of the 1st KDD Workshop on Learning about Emergencies from …, 2014 | 8 | 2014 |
Modeling behavioral activities related to deploying IEDs in Iraq L Weiss, E Whitaker, E Briscoe, E Trewhitt Georgia Tech Research Institute, 2009 | 8 | 2009 |