Prasant Mohapatra
Applied Filters
- Prasant Mohapatra
- AuthorRemove filter
People
Colleagues
- Prasant Mohapatra (222)
- Parth H Pathak (28)
- Amit Pande (20)
- Chen Nee Chuah (16)
- Krishna Kant (13)
- Pengfei Hu (13)
- Yunze Zeng (12)
- Aveek K. Das (11)
- Daniel Wu (11)
- Kai Zeng (10)
- A. Seneviratne (9)
- Lihua Yuan (9)
- Zhicheng Yang (9)
- Huamin Chen (8)
- Chao Gui (7)
- Chita Ranjan Das (7)
- Dhruv Gupta (7)
- Zhi Li (7)
- Srikanth V Krishnamurthy (6)
- Vara Varavithya (5)
Publication
Journal/Magazine Names
- Computer Communications (10)
- Computer Networks: The International Journal of Computer and Telecommunications Networking (10)
- IEEE Transactions on Mobile Computing (9)
- IEEE/ACM Transactions on Networking (8)
- Journal of Parallel and Distributed Computing (6)
- IEEE Transactions on Computers (5)
- GetMobile: Mobile Computing and Communications (4)
- Pervasive and Mobile Computing (4)
- Wireless Networks (4)
- Ad Hoc Networks (3)
- IEEE Transactions on Parallel and Distributed Systems (3)
- ACM Computing Surveys (2)
- ACM SIGCOMM Computer Communication Review (2)
- ACM SIGMETRICS Performance Evaluation Review (2)
- Computer (2)
- IEEE Wireless Communications (2)
Proceedings/Book Names
- INFOCOM'10: Proceedings of the 29th conference on Information communications (4)
- MASS '15: Proceedings of the 2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems (MASS) (3)
- 2015 12th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON) (2)
- 2016 13th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON) (2)
- ICDCSW '03: Proceedings of the 23rd International Conference on Distributed Computing Systems (2)
- ICPP '93: Proceedings of the 1993 International Conference on Parallel Processing - Volume 01 (2)
- ICPP '97: Proceedings of the international Conference on Parallel Processing (2)
- IoTDI '19: Proceedings of the International Conference on Internet of Things Design and Implementation (2)
- IPSN '16: Proceedings of the 15th International Conference on Information Processing in Sensor Networks (2)
- MASS '12: Proceedings of the 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS) (2)
- MobiSys '14: Proceedings of the 12th annual international conference on Mobile systems, applications, and services (2)
- MobiSys '15: Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services (2)
- NETWORKING'05: Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems (2)
- SPDP '96: Proceedings of the 8th IEEE Symposium on Parallel and Distributed Processing (SPDP '96) (2)
- WICON '08: Proceedings of the 4th Annual International Conference on Wireless Internet (2)
- WiNTECH '06: Proceedings of the 1st international workshop on Wireless network testbeds, experimental evaluation & characterization (2)
- WiNTECH '13: Proceedings of the 8th ACM international workshop on Wireless network testbeds, experimental evaluation & characterization (2)
- IWCMC '06: Proceedings of the 2006 international conference on Wireless communications and mobile computing (1)
- MobiCom '04: Proceedings of the 10th annual international conference on Mobile computing and networking (1)
- VANET '05: Proceedings of the 2nd ACM international workshop on Vehicular ad hoc networks (1)
Publisher
- Association for Computing Machinery (66)
- IEEE Computer Society (46)
- IEEE Press (37)
- Elsevier Science Publishers B. V. (17)
- Elsevier North-Holland, Inc. (10)
- Springer-Verlag (10)
- IEEE Educational Activities Department (9)
- Academic Press, Inc. (6)
- IEEE Computer Society Press (4)
- ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering) (3)
- Kluwer Academic Publishers (3)
- Curran Associates Inc. (2)
- AAAI Press (1)
- Academic Press Ltd. (1)
- Inderscience Publishers (1)
- International World Wide Web Conferences Steering Committee (1)
- IOS Press (1)
- JMLR.org (1)
- John Wiley and Sons Ltd. (1)
- Pennsylvania State University (1)
- Springer Publishing Company, Incorporated (1)
Publication Date
Export Citations
Publications
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- introductionfreePublished By ACMPublished By ACM
Introduction to the Special Section on Contact-free Smart Sensing in AIoT
- Pengfei Hu
School of Computer Science and Technology, Shandong University, Ji'nan, China
, - Zhe Chen
AIWiSe, Guangzhou, China
, - Chris Xiaoxuan Lu
School of Informatics, University of Edinburgh, Edinburgh, UK
, - Xuyu Wang
Department of Computer Science, California State University Sacramento, Miami, USA
, - Jun Luo
School of Computer Science and Engineering, Nanyang Technological University, Singapore, Singapore
, - Prasant Mohapatra
Department of Computer Science, UC Davis, Davis, USA
ACM Transactions on Sensor Networks, Volume 20, Issue 4•July 2024, Article No.: 76, pp 1-4 • https://doi.org/10.1145/3639406- 0Citation
- 498
- Downloads
MetricsTotal Citations0Total Downloads498Last 12 Months498Last 6 weeks32
- Pengfei Hu
- research-article
On the robustness of deep clustering models: adversarial attacks and defenses
- Anshuman Chhabra
Department of Computer Science, University of California Davis, CA
, - Ashwin Sekhari
Department of Computer Science, University of California Davis, CA
, - Prasant Mohapatra
Department of Computer Science, University of California Davis, CA
NIPS '22: Proceedings of the 36th International Conference on Neural Information Processing Systems•November 2022, Article No.: 1495, pp 20566-20579Clustering models constitute a class of unsupervised machine learning methods which are used in a number of application pipelines, and play a vital role in modern data science. With recent advancements in deep learning-deep clustering models have emerged ...
- 0Citation
MetricsTotal Citations0
- Anshuman Chhabra
- short-paperOpen AccessPublished By ACMPublished By ACM
Stability of Explainable Recommendation
- Sairamvinay Vijayaraghavan
Department of Computer Science, University of California, Davis, USA
, - Prasant Mohapatra
Department of Computer Science, University of California, Davis, USA
RecSys '23: Proceedings of the 17th ACM Conference on Recommender Systems•September 2023, pp 947-954• https://doi.org/10.1145/3604915.3608853Explainable Recommendation has been gaining attention over the last few years in industry and academia. Explanations provided along with recommendations in a recommender system framework have many uses: particularly reasoning why a suggestion is ...
- 0Citation
- 499
- Downloads
MetricsTotal Citations0Total Downloads499Last 12 Months322Last 6 weeks42
- Sairamvinay Vijayaraghavan
- research-article
Enabling Fast and Privacy-Preserving Broadcast Authentication With Efficient Revocation for Inter-Vehicle Connections
- Chen Lyu
Department of Computer Science and Technology, Shanghai University of Finance and Economics, Shanghai, China
, - Amit Pande
Department of Computer Science, University of California, Davis, CA, USA
, - Yuanyuan Zhang
Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China
, - Dawu Gu
Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China
, - Prasant Mohapatra
Department of Computer Science and Engineering, University of South Florida, Tampa, FL, USA
IEEE Transactions on Mobile Computing, Volume 23, Issue 4•April 2024, pp 3309-3327 • https://doi.org/10.1109/TMC.2023.3275218Many vehicular applications, especially safety-related ones, rely on spatial-temporal messages periodically broadcast by vehicles. In the absence of a secure authentication scheme, invalid spatial-temporal messages may be sent out by malicious vehicles. ...
- 0Citation
MetricsTotal Citations0
- Chen Lyu
- research-article
Towards System-Level Security Analysis of IoT Using Attack Graphs
- Zheng Fang
Meta Platforms, Inc., Menlo Park, CA, USA
, - Hao Fu
Meta Platforms, Inc., Menlo Park, CA, USA
, - Tianbo Gu
Department of Computer Science, University of California, Davis, Davis, CA, USA
, - Pengfei Hu
School of Computer Science and Technology, Shandong University, Qingdao, China
, - Jinyue Song
Department of Computer Science, University of California, Davis, Davis, CA, USA
, - Trent Jaeger
Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA
, - Prasant Mohapatra
Department of Computer Science, University of California, Davis, Davis, CA, USA
IEEE Transactions on Mobile Computing, Volume 23, Issue 2•Feb. 2024, pp 1142-1155 • https://doi.org/10.1109/TMC.2022.3231567Most IoT systems involve IoT devices, communication protocols, remote cloud, IoT applications, mobile apps, and the physical environment. However, existing IoT security analyses only focus on a subset of all the essential components, such as device ...
- 1Citation
MetricsTotal Citations1
- Zheng Fang
- research-article
Towards Unconstrained Vocabulary Eavesdropping With mmWave Radar Using GAN
- Pengfei Hu
School of Computer Science and Technology, Shandong University, Jinan, China
, - Wenhao Li
School of Computer Science and Technology, Shandong University, Jinan, China
, - Yifan Ma
School of Computer Science and Technology, Shandong University, Jinan, China
, - Panneer Selvam Santhalingam
Computer Science Department, George Mason University, Fairfax, VA, USA
, - Parth Pathak
Computer Science Department, George Mason University, Fairfax, VA, USA
, - Hong Li
Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
, - Huanle Zhang
School of Computer Science and Technology, Shandong University, Jinan, China
, - Guoming Zhang
School of Computer Science and Technology, Shandong University, Jinan, China
, - Xiuzhen Cheng
School of Computer Science and Technology, Shandong University, Jinan, China
, - Prasant Mohapatra
Department of Computer Science, UC Davis, Davis, CA, USA
IEEE Transactions on Mobile Computing, Volume 23, Issue 1•Jan. 2024, pp 941-954 • https://doi.org/10.1109/TMC.2022.3226690As acoustic communication systems become increasingly common in our daily life, eavesdropping brings severe security and privacy risks. Current methods of acoustic eavesdropping either provide low resolution due to the use of sub-6 GHz frequencies, work ...
- 0Citation
MetricsTotal Citations0
- Pengfei Hu
- research-articleOpen AccessPublished By ACMPublished By ACM
MAIDE: Augmented Reality (AR)-facilitated Mobile System for Onboarding of Internet of Things (IoT) Devices at Ease
- Huanle Zhang
University of California, Davis, California
, - Mostafa Uddin
Peraton Labs, Basking Ridge, New Jersey
, - Fang Hao
Nokia Bell Labs, Holmdel, New Jersey
, - Sarit Mukherjee
Nokia Bell Labs, Holmdel, New Jersey
, - Prasant Mohapatra
University of California, Davis, California
ACM Transactions on Internet of Things, Volume 3, Issue 2•May 2022, Article No.: 16, pp 1-21 • https://doi.org/10.1145/3506667Having an efficient onboarding process is a pivotal step to utilize and provision the IoT devices for accessing the network infrastructure. However, the current process to onboard IoT devices is time-consuming and labor-intensive, which makes the process ...
- 6Citation
- 1,729
- Downloads
MetricsTotal Citations6Total Downloads1,729Last 12 Months457Last 6 weeks61
- Huanle Zhang
- research-articlefree
Stochastic zeroth-order optimization under nonstationarity and nonconvexity
- Abhishek Roy
Department of Statistics, University of California, Davis, CA
, - Krishnakumar Balasubramanian
Department of Statistics, University of California, Davis, CA
, - Saeed Ghadimi
Department of Management Sciences, University of Waterloo, Waterloo, ON, Canada
, - Prasant Mohapatra
Department of Computer Science, University of California, Davis, CA
Stochastic zeroth-order optimization algorithms have been predominantly analyzed under the assumption that the objective function being optimized is time-invariant. Motivated by dynamic matrix sensing and completion problems, and online reinforcement ...
- 0Citation
- 98
- Downloads
MetricsTotal Citations0Total Downloads98Last 12 Months61Last 6 weeks7
- Abhishek Roy
- keynotePublished By ACMPublished By ACM
Moving Target Defense against Adversarial Machine Learning
- Anshuman Chhabra
University of California, Davis, Davis, CA, USA
, - Prasant Mohapatra
University of California, Davis, Davis, CA, USA
MTD '21: Proceedings of the 8th ACM Workshop on Moving Target Defense•November 2021, pp 29-30• https://doi.org/10.1145/3474370.3485662As Machine Learning (ML) models are increasingly employed in a number of applications across a multitude of fields, the threat of adversarial attacks against ML models is also increasing. Adversarial samples crafted via specialized attack algorithms ...
- 2Citation
- 236
- Downloads
MetricsTotal Citations2Total Downloads236Last 12 Months56Last 6 weeks8- 1
Supplementary MaterialMTD21-mtd02.mp4
- Anshuman Chhabra
- research-article
Towards Automatic Detection of Nonfunctional Sensitive Transmissions in Mobile Applications
- Hao Fu
Department of Computer Science, University of California Davis, Davis, CA, USA
, - Pengfei Hu
School of Computer Science and Technology, Shandong University, Jinan, China
, - Zizhan Zheng
Department of Computer Science, Tulane University, New Orleans, LA, USA
, - Aveek K. Das
Forescout Technologies, San Jose, CA, USA
, - Parth H. Pathak
Computer Science Department, George Mason University, Fairfax, VA, USA
, - Tianbo Gu
Department of Computer Science, University of California Davis, Davis, CA, USA
, - Sencun Zhu
Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA
, - Prasant Mohapatra
Department of Computer Science, University of California Davis, Davis, CA, USA
IEEE Transactions on Mobile Computing, Volume 20, Issue 10•Oct. 2021, pp 3066-3080 • https://doi.org/10.1109/TMC.2020.2992253While mobile apps often need to transmit sensitive information out to support various functionalities, they may also abuse the privilege by leaking the data to unauthorized third parties. This makes us question: <italic>Is the given transmission required ...
- 0Citation
MetricsTotal Citations0
- Hao Fu
- research-article
Blockchain based secure smart city architecture using low resource IoTs
- Rourab Paul
Siksha O Anusandhan, Bhubaneswar, India
, - Nimisha Ghosh
Siksha O Anusandhan, Bhubaneswar, India
, - Suman Sau
Siksha O Anusandhan, Bhubaneswar, India
, - Amlan Chakrabarti
University of Calcutta, India
, - Prasant Mohapatra
University of California, Davis, United States of America
Computer Networks: The International Journal of Computer and Telecommunications Networking, Volume 196, Issue C•Sep 2021 • https://doi.org/10.1016/j.comnet.2021.108234AbstractInternet of Things (IoT) is growing exponentially in research and industry. Although, many standard and conventional security solutions have been provided for IoT, it suffers from many privacy and security concerns. Standard security ...
- 2Citation
MetricsTotal Citations2
- Rourab Paul
- research-articlefree
Escaping saddle-point faster under interpolation-like conditions
- Abhiskek Roy
Department of Statistics, University of California, Davis
, - Krishnakumar Balasubramanian
Department of Statistics, University of California, Davis
, - Saeed Ghadimi
Department of Management Sciences, University of Waterloo
, - Prasant Mohapatra
Department of Computer Science, University of California, Davis
NIPS '20: Proceedings of the 34th International Conference on Neural Information Processing Systems•December 2020, Article No.: 1041, pp 12414-12425In this paper, we show that under over-parametrization several standard stochastic optimization algorithms escape saddle-points and converge to local-minimizers much faster. One of the fundamental aspects of over-parametrized models is that they are ...
- 0Citation
- 26
- Downloads
MetricsTotal Citations0Total Downloads26Last 12 Months23Last 6 weeks4- 1
Supplementary Material3495724.3496765_supp.pdf
- Abhiskek Roy
- research-article
IoTGaze: IoT Security Enforcement via Wireless Context Analysis
- Tianbo Gu
University of California,Department of Computer Science,Davis,CA,USA
, - Zheng Fang
University of California,Department of Computer Science,Davis,CA,USA
, - Allaukik Abhishek
ARM Research,Austin,TX,USA
, - Hao Fu
University of California,Department of Computer Science,Davis,CA,USA
, - Pengfei Hu
University of California,Department of Computer Science,Davis,CA,USA
, - Prasant Mohapatra
University of California,Department of Computer Science,Davis,CA,USA
IEEE INFOCOM 2020 - IEEE Conference on Computer Communications•July 2020, pp 884-893• https://doi.org/10.1109/INFOCOM41043.2020.9155459Internet of Things (IoT) has become the most promising technology for service automation, monitoring, and interconnection, etc. However, the security and privacy issues caused by IoT arouse concerns. Recent research focuses on addressing security issues ...
- 6Citation
MetricsTotal Citations6
- Tianbo Gu
- research-articleOpen AccessPublished By ACMPublished By ACM
A moving target defense against adversarial machine learning
- Abhishek Roy
University of California, Davis
, - Anshuman Chhabra
University of California, Davis
, - Charles A. Kamhoua
Network Security Branch, U.S. Army Research Laboratory (ARL)
, - Prasant Mohapatra
University of California, Davis
SEC '19: Proceedings of the 4th ACM/IEEE Symposium on Edge Computing•November 2019, pp 383-388• https://doi.org/10.1145/3318216.3363338Adversarial Machine Learning has become the latest threat with the ubiquitous presence of machine learning. In this paper we propose a Moving Target Defense approach to defend against adversarial machine learning, i.e., instead of manipulating the ...
- 13Citation
- 1,158
- Downloads
MetricsTotal Citations13Total Downloads1,158Last 12 Months178Last 6 weeks17
- Abhishek Roy
- research-articleOpen AccessPublished By ACMPublished By ACM
mmSense: Multi-Person Detection and Identification via mmWave Sensing
- Tianbo Gu
University of California, Davis, Davis, CA, USA
, - Zheng Fang
University of California, Davis, Davis, CA, USA
, - Zhicheng Yang
University of California, Davis, Davis, CA, USA
, - Pengfei Hu
University of California, Davis, Davis, CA, USA
, - Prasant Mohapatra
University of California, Davis, Davis, CA, USA
mmNets '19: Proceedings of the 3rd ACM Workshop on Millimeter-wave Networks and Sensing Systems•October 2019, pp 45-50• https://doi.org/10.1145/3349624.3356765In recent years, millimeter-wave (mmWave) is becoming a significant component of the next-generation wireless communication due to its up to 7 Gbps transmission rate. In addition to the communication benefits, the unique sensing feature of mmWave ...
- 39Citation
- 2,303
- Downloads
MetricsTotal Citations39Total Downloads2,303Last 12 Months631Last 6 weeks68
- Tianbo Gu
- research-article
DATALET: An approach to manage big volume of data in cyber foraged environment
- Chhabi Rani Panigrahi
Rama Devi Women’s University, Bhubaneswar, India
, - Joy Lal Sarkar
Central University of Rajasthan, Rajasthan, India
, - Mayank Tiwary
SAP Labs, Bangalore, India
, - Bibudhendu Pati
Rama Devi Women’s University, Bhubaneswar, India
, - Prasant Mohapatra
University of California, Davis, United States
Journal of Parallel and Distributed Computing, Volume 131, Issue C•Sep 2019, pp 14-28 • https://doi.org/10.1016/j.jpdc.2019.04.005AbstractIn the new era of cloud computing, the users get various services from the cloud. In recent years, the increasing volume of data specially from pervasive devices has become a great matter of concern. In mobile computing, cloudlets act ...
Highlights- Deals with distribution of data by utilizing the processing and storage resources of big intermittent networks.
- 1Citation
MetricsTotal Citations1
- Chhabi Rani Panigrahi
- research-articleOpen AccessPublished By ACMPublished By ACM
Quantifying and Visualizing the Demand and Supply Gap from E-commerce Search Data using Topic Models
- Anjan Goswami
UC David
, - Prasant Mohapatra
UC David
, - Chengxiang Zhai
UIUC
WWW '19: Companion Proceedings of The 2019 World Wide Web Conference•May 2019, pp 348-353• https://doi.org/10.1145/3308560.3316605The demand generation and assortment planning are two critical components of running a retail business. Traditionally, retail companies use the historical sales data for modeling and optimization of assortment selection, and they use a marketing ...
- 3Citation
- 986
- Downloads
MetricsTotal Citations3Total Downloads986Last 12 Months200Last 6 weeks10
- Anjan Goswami
- research-article
RangingNet: A convolutional deep neural network based ranging model for wireless sensor networks (WSN)
- Huafeng Wu
Merchant Marine College, Shanghai Maritime University, Shanghai 201306, China
, - Weijun Wang
Merchant Marine College, Shanghai Maritime University, Shanghai 201306, China
, - Jun Wang
University of Central Florida, Orlando, FL 32836, USA
, - Prasant Mohapatra
University of California, Davis, CA 95616, USA
Computer Communications, Volume 140, Issue C•May 2019, pp 61-68 • https://doi.org/10.1016/j.comcom.2019.04.006AbstractDistance measurement based on signal strength indication (RSSI) remains a challenge in wireless sensor network. Traditional theoretical models cannot accurately describe the signal propagation in actual ground environment. Existing ...
- 0Citation
MetricsTotal Citations0
- Huafeng Wu
- posterPublished By ACMPublished By ACM
Wireless access to ultimate virtual reality 360-degree video: poster abstract
- Huanle Zhang
UC Davis
, - Zhicheng Yang
UC Davis
, - Prasant Mohapatra
UC Davis
IoTDI '19: Proceedings of the International Conference on Internet of Things Design and Implementation•April 2019, pp 271-272• https://doi.org/10.1145/3302505.3312590Virtual reality 360-degree videos will become the first prosperous online VR application. In this paper, we focus on the ultimate VR 360 that satisfies human eye fidelity. The ultimate VR 360 requires downlink 1.5 Gbps for viewing and uplink 6.6 Gbps ...
- 10Citation
- 234
- Downloads
MetricsTotal Citations10Total Downloads234Last 12 Months18
- Huanle Zhang
- research-articleOpen AccessPublished By ACMPublished By ACM
On the feasibility of estimating soluble sugar content using millimeter-wave
- Zhicheng Yang
UC Davis
, - Parth H. Pathak
George Mason University
, - Mo Sha
SUNY Binghamton
, - Tingting Zhu
UC Davis
, - Junai Gan
UC Davis
, - Pengfei Hu
UC Davis
, - Prasant Mohapatra
UC Davis
IoTDI '19: Proceedings of the International Conference on Internet of Things Design and Implementation•April 2019, pp 13-24• https://doi.org/10.1145/3302505.3310065With the development of novel sensing techniques, continuous monitoring, data-driven inferences, precision irrigation control, and intelligent Internet-of-Things (IoT) systems, agriculture sector is witnessing a revolution. Specialized devices based on ...
- 13Citation
- 1,029
- Downloads
MetricsTotal Citations13Total Downloads1,029Last 12 Months337Last 6 weeks19
- Zhicheng Yang
Author Profile Pages
- Description: The Author Profile Page initially collects all the professional information known about authors from the publications record as known by the ACM bibliographic database, the Guide. Coverage of ACM publications is comprehensive from the 1950's. Coverage of other publishers generally starts in the mid 1980's. The Author Profile Page supplies a quick snapshot of an author's contribution to the field and some rudimentary measures of influence upon it. Over time, the contents of the Author Profile page may expand at the direction of the community.
Please see the following 2007 Turing Award winners' profiles as examples: - History: Disambiguation of author names is of course required for precise identification of all the works, and only those works, by a unique individual. Of equal importance to ACM, author name normalization is also one critical prerequisite to building accurate citation and download statistics. For the past several years, ACM has worked to normalize author names, expand reference capture, and gather detailed usage statistics, all intended to provide the community with a robust set of publication metrics. The Author Profile Pages reveal the first result of these efforts.
- Normalization: ACM uses normalization algorithms to weigh several types of evidence for merging and splitting names.
These include:- co-authors: if we have two names and cannot disambiguate them based on name alone, then we see if they have a co-author in common. If so, this weighs towards the two names being the same person.
- affiliations: names in common with same affiliation weighs toward the two names being the same person.
- publication title: names in common whose works are published in same journal weighs toward the two names being the same person.
- keywords: names in common whose works address the same subject matter as determined from title and keywords, weigh toward being the same person.
The more conservative the merging algorithms, the more bits of evidence are required before a merge is made, resulting in greater precision but lower recall of works for a given Author Profile. Many bibliographic records have only author initials. Many names lack affiliations. With very common family names, typical in Asia, more liberal algorithms result in mistaken merges.
Automatic normalization of author names is not exact. Hence it is clear that manual intervention based on human knowledge is required to perfect algorithmic results. ACM is meeting this challenge, continuing to work to improve the automated merges by tweaking the weighting of the evidence in light of experience.
- Bibliometrics: In 1926, Alfred Lotka formulated his power law (known as Lotka's Law) describing the frequency of publication by authors in a given field. According to this bibliometric law of scientific productivity, only a very small percentage (~6%) of authors in a field will produce more than 10 articles while the majority (perhaps 60%) will have but a single article published. With ACM's first cut at author name normalization in place, the distribution of our authors with 1, 2, 3..n publications does not match Lotka's Law precisely, but neither is the distribution curve far off. For a definition of ACM's first set of publication statistics, see Bibliometrics
- Future Direction:
The initial release of the Author Edit Screen is open to anyone in the community with an ACM account, but it is limited to personal information. An author's photograph, a Home Page URL, and an email may be added, deleted or edited. Changes are reviewed before they are made available on the live site.
ACM will expand this edit facility to accommodate more types of data and facilitate ease of community participation with appropriate safeguards. In particular, authors or members of the community will be able to indicate works in their profile that do not belong there and merge others that do belong but are currently missing.
A direct search interface for Author Profiles will be built.
An institutional view of works emerging from their faculty and researchers will be provided along with a relevant set of metrics.
It is possible, too, that the Author Profile page may evolve to allow interested authors to upload unpublished professional materials to an area available for search and free educational use, but distinct from the ACM Digital Library proper. It is hard to predict what shape such an area for user-generated content may take, but it carries interesting potential for input from the community.
Bibliometrics
The ACM DL is a comprehensive repository of publications from the entire field of computing.
It is ACM's intention to make the derivation of any publication statistics it generates clear to the user.
- Average citations per article = The total Citation Count divided by the total Publication Count.
- Citation Count = cumulative total number of times all authored works by this author were cited by other works within ACM's bibliographic database. Almost all reference lists in articles published by ACM have been captured. References lists from other publishers are less well-represented in the database. Unresolved references are not included in the Citation Count. The Citation Count is citations TO any type of work, but the references counted are only FROM journal and proceedings articles. Reference lists from books, dissertations, and technical reports have not generally been captured in the database. (Citation Counts for individual works are displayed with the individual record listed on the Author Page.)
- Publication Count = all works of any genre within the universe of ACM's bibliographic database of computing literature of which this person was an author. Works where the person has role as editor, advisor, chair, etc. are listed on the page but are not part of the Publication Count.
- Publication Years = the span from the earliest year of publication on a work by this author to the most recent year of publication of a work by this author captured within the ACM bibliographic database of computing literature (The ACM Guide to Computing Literature, also known as "the Guide".
- Available for download = the total number of works by this author whose full texts may be downloaded from an ACM full-text article server. Downloads from external full-text sources linked to from within the ACM bibliographic space are not counted as 'available for download'.
- Average downloads per article = The total number of cumulative downloads divided by the number of articles (including multimedia objects) available for download from ACM's servers.
- Downloads (cumulative) = The cumulative number of times all works by this author have been downloaded from an ACM full-text article server since the downloads were first counted in May 2003. The counts displayed are updated monthly and are therefore 0-31 days behind the current date. Robotic activity is scrubbed from the download statistics.
- Downloads (12 months) = The cumulative number of times all works by this author have been downloaded from an ACM full-text article server over the last 12-month period for which statistics are available. The counts displayed are usually 1-2 weeks behind the current date. (12-month download counts for individual works are displayed with the individual record.)
- Downloads (6 weeks) = The cumulative number of times all works by this author have been downloaded from an ACM full-text article server over the last 6-week period for which statistics are available. The counts displayed are usually 1-2 weeks behind the current date. (6-week download counts for individual works are displayed with the individual record.)
ACM Author-Izer Service
Summary Description
ACM Author-Izer is a unique service that enables ACM authors to generate and post links on both their homepage and institutional repository for visitors to download the definitive version of their articles from the ACM Digital Library at no charge.
Downloads from these sites are captured in official ACM statistics, improving the accuracy of usage and impact measurements. Consistently linking to definitive version of ACM articles should reduce user confusion over article versioning.
ACM Author-Izer also extends ACM’s reputation as an innovative “Green Path” publisher, making ACM one of the first publishers of scholarly works to offer this model to its authors.
To access ACM Author-Izer, authors need to establish a free ACM web account. Should authors change institutions or sites, they can utilize the new ACM service to disable old links and re-authorize new links for free downloads from a different site.
How ACM Author-Izer Works
Authors may post ACM Author-Izer links in their own bibliographies maintained on their website and their own institution’s repository. The links take visitors to your page directly to the definitive version of individual articles inside the ACM Digital Library to download these articles for free.
The Service can be applied to all the articles you have ever published with ACM.
Depending on your previous activities within the ACM DL, you may need to take up to three steps to use ACM Author-Izer.
For authors who do not have a free ACM Web Account:
- Go to the ACM DL http://dl.acm.org/ and click SIGN UP. Once your account is established, proceed to next step.
For authors who have an ACM web account, but have not edited their ACM Author Profile page:
- Sign in to your ACM web account and go to your Author Profile page. Click "Add personal information" and add photograph, homepage address, etc. Click ADD AUTHOR INFORMATION to submit change. Once you receive email notification that your changes were accepted, you may utilize ACM Author-izer.
For authors who have an account and have already edited their Profile Page:
- Sign in to your ACM web account, go to your Author Profile page in the Digital Library, look for the ACM Author-izer link below each ACM published article, and begin the authorization process. If you have published many ACM articles, you may find a batch Authorization process useful. It is labeled: "Export as: ACM Author-Izer Service"
ACM Author-Izer also provides code snippets for authors to display download and citation statistics for each “authorized” article on their personal pages. Downloads from these pages are captured in official ACM statistics, improving the accuracy of usage and impact measurements. Consistently linking to the definitive version of ACM articles should reduce user confusion over article versioning.
Note: You still retain the right to post your author-prepared preprint versions on your home pages and in your institutional repositories with DOI pointers to the definitive version permanently maintained in the ACM Digital Library. But any download of your preprint versions will not be counted in ACM usage statistics. If you use these AUTHOR-IZER links instead, usage by visitors to your page will be recorded in the ACM Digital Library and displayed on your page.
FAQ
- Q. What is ACM Author-Izer?
A. ACM Author-Izer is a unique, link-based, self-archiving service that enables ACM authors to generate and post links on either their home page or institutional repository for visitors to download the definitive version of their articles for free.
- Q. What articles are eligible for ACM Author-Izer?
- A. ACM Author-Izer can be applied to all the articles authors have ever published with ACM. It is also available to authors who will have articles published in ACM publications in the future.
- Q. Are there any restrictions on authors to use this service?
- A. No. An author does not need to subscribe to the ACM Digital Library nor even be a member of ACM.
- Q. What are the requirements to use this service?
- A. To access ACM Author-Izer, authors need to have a free ACM web account, must have an ACM Author Profile page in the Digital Library, and must take ownership of their Author Profile page.
- Q. What is an ACM Author Profile Page?
- A. The Author Profile Page initially collects all the professional information known about authors from the publications record as known by the ACM Digital Library. The Author Profile Page supplies a quick snapshot of an author's contribution to the field and some rudimentary measures of influence upon it. Over time, the contents of the Author Profile page may expand at the direction of the community. Please visit the ACM Author Profile documentation page for more background information on these pages.
- Q. How do I find my Author Profile page and take ownership?
- A. You will need to take the following steps:
- Create a free ACM Web Account
- Sign-In to the ACM Digital Library
- Find your Author Profile Page by searching the ACM Digital Library for your name
- Find the result you authored (where your author name is a clickable link)
- Click on your name to go to the Author Profile Page
- Click the "Add Personal Information" link on the Author Profile Page
- Wait for ACM review and approval; generally less than 24 hours
- Q. Why does my photo not appear?
- A. Make sure that the image you submit is in .jpg or .gif format and that the file name does not contain special characters
- Q. What if I cannot find the Add Personal Information function on my author page?
- A. The ACM account linked to your profile page is different than the one you are logged into. Please logout and login to the account associated with your Author Profile Page.
- Q. What happens if an author changes the location of his bibliography or moves to a new institution?
- A. Should authors change institutions or sites, they can utilize ACM Author-Izer to disable old links and re-authorize new links for free downloads from a new location.
- Q. What happens if an author provides a URL that redirects to the author’s personal bibliography page?
- A. The service will not provide a free download from the ACM Digital Library. Instead the person who uses that link will simply go to the Citation Page for that article in the ACM Digital Library where the article may be accessed under the usual subscription rules.
However, if the author provides the target page URL, any link that redirects to that target page will enable a free download from the Service.
- Q. What happens if the author’s bibliography lives on a page with several aliases?
- A. Only one alias will work, whichever one is registered as the page containing the author’s bibliography. ACM has no technical solution to this problem at this time.
- Q. Why should authors use ACM Author-Izer?
- A. ACM Author-Izer lets visitors to authors’ personal home pages download articles for no charge from the ACM Digital Library. It allows authors to dynamically display real-time download and citation statistics for each “authorized” article on their personal site.
- Q. Does ACM Author-Izer provide benefits for authors?
- A. Downloads of definitive articles via Author-Izer links on the authors’ personal web page are captured in official ACM statistics to more accurately reflect usage and impact measurements.
Authors who do not use ACM Author-Izer links will not have downloads from their local, personal bibliographies counted. They do, however, retain the existing right to post author-prepared preprint versions on their home pages or institutional repositories with DOI pointers to the definitive version permanently maintained in the ACM Digital Library.
- Q. How does ACM Author-Izer benefit the computing community?
- A. ACM Author-Izer expands the visibility and dissemination of the definitive version of ACM articles. It is based on ACM’s strong belief that the computing community should have the widest possible access to the definitive versions of scholarly literature. By linking authors’ personal bibliography with the ACM Digital Library, user confusion over article versioning should be reduced over time.
In making ACM Author-Izer a free service to both authors and visitors to their websites, ACM is emphasizing its continuing commitment to the interests of its authors and to the computing community in ways that are consistent with its existing subscription-based access model.
- Q. Why can’t I find my most recent publication in my ACM Author Profile Page?
- A. There is a time delay between publication and the process which associates that publication with an Author Profile Page. Right now, that process usually takes 4-8 weeks.
- Q. How does ACM Author-Izer expand ACM’s “Green Path” Access Policies?
- A. ACM Author-Izer extends the rights and permissions that authors retain even after copyright transfer to ACM, which has been among the “greenest” publishers. ACM enables its author community to retain a wide range of rights related to copyright and reuse of materials. They include:
- Posting rights that ensure free access to their work outside the ACM Digital Library and print publications
- Rights to reuse any portion of their work in new works that they may create
- Copyright to artistic images in ACM’s graphics-oriented publications that authors may want to exploit in commercial contexts
- All patent rights, which remain with the original owner