Book Publishing
Books: 5
- Ye and T. Wu, Developing Windows-based and Web-Enabled Information Systems, Boca Raton, Florida: CRC Press – A Taylor & Francis Company, 2014, ISBN 978-1-4398-6059-5 (578 pages).
- Ye, Data Mining: Theories, Algorithms, and Examples, Boca Raton, Florida: CRC Press – A Taylor & Francis Company, 2013, ISBN: 978-1-4398-0838-2. (329 pages) (with the Arabic translation published in 2016 by Institute of Public Administration)
- Ye, Secure Computer and Network Systems: Modeling, Analysis and Design, London, UK: John Wiley & Sons, 2008, ISBN 978-0-470-02324-2 (336 pages).
- Ye (ed.), The Handbook of Data Mining. Mahwah, New Jersey: Lawrence Erlbaum Associates, 2003, ISBN 0-8058-4081-8. (689 pages)
- K. Bhargava, and N. Ye (eds.), Computational Modeling and Problem Solving in the Networked World. Norwell, MA: Kluwar Academic Publishers, 2003, ISBN 1-4020-7295-3. (325 pages)
Refereed Archival Journal Papers
Published and Accepted Work: 87 papers
- Ye, T. Y. Fok, and O. Chong, “Learning and Building an Energy Consumption System Model Using the Partial-Value Association Discovery Algorithm,” Advanced Information Sciences and Service Sciences, in review.
- Ye, “Analytical techniques for anomaly detection through features, signal-noise separation and partial-value associations,” Proceedings of Machine Learning Research, Vol. 77, pp. 20-32, 2017. http://proceedings.mlr.press/v71/ye18a/ye18a.pdf.
- Ye, “The partial-value association discovery algorithm to learn multi-layer structural system models from system data.” IEEE Transactions on Systems, Man, and Cybernetics: Systems, Vol. 47, No. 12, pp. 3377-3385, 2017
- Ye, “A reverse engineering algorithm for mining a causal system model from system data.” International Journal of Production Research, Vol. 55, No. 3, pp. 828-844, 2017. Published online in July 27, 2016. Eprint link: http://dx.doi.org/10.1080/00207543.2016.1213913.
- Ye, “Reverse engineering: Mining structural system models from system data,” Information, Knowledge, Systems Management, 2015, Vol, 12, pp. 205-208.
- Ye, B. M. Aranda, and P. Hurley, “System impact characteristics of cyber services, security mechanisms, and attacks and implications in cyber system survivability,” Information, Knowledge, Systems Management, Vol. 12, No. 1, 2013, pp. 75-95.
- Ye, S. S. Yang, B. M. Aranda, “The analysis of service provider-user coordination for resource allocation in cloud computing,” Information, Knowledge, Systems Management. Vol. 12, No.1, 2013, pp. 1-24.
- Ye, B. M. Aranda, S. Yau, D. Huang, “Analysis and modeling of service impacts on system activities, resource workloads and service performance on computer and network systems,” Information, Knowledge, Systems Management. Vol. 11, No. 3, 2012, pp. 255-274.
- Ye, S. S. Yau, D. Huang, M. Baydogan, B. M. Aranda, A. Roontiva, and P. Hurey, “Models of dynamic relations among service activities, system state and service quality on computer and network systems,” Information, Knowledge, Systems Management, Vol. 9, 2010, pp. 99-116.
- S. Yau, N. Ye, H. Sarjoughian, D. Huang, A. Roontiva, M. G. Baydogan, and M. Quqsith, “Towards development of adaptive service-based software systems,” IEEE Transactions on Services Computing, Vol. 2, No. 3, 2009, pp. 247-260.
- Ye, X. Xu, and P. Hurley, “QoS protocols for end-to-end delay guarantee of instantaneous jobs on computer networks,” Information, Knowledge, Systems Management, Vol. 7, No. 4, 2008, pp. 429-451.
- Xu, and N. Ye, “Minimization of job waiting time variance on identical parallel machines.” IEEE Transactions on Systems, Man, and Cybernetics, Part C, Vol. 37, No. 5, 2007, pp. 917-927.
- Ye, and Q. Chen, “Attack-norm separation for detecting attack-induced quality problems on computers and networks.” Quality and Reliability Engineering International, Vol. 23, No. 5, 2007, pp. 545-553.
- Ye, X. Li, T. Farley, and X. Xu, “Job scheduling methods for reducing waiting time variance.” Computers & Operations Research, Vol. 34, No. 10, 2007, pp. 3069-3083.
- Li, N. Ye, X. Xu, and R. Sawhey, “Influencing factors of job waiting time variance on a single machine.” European Journal of Industrial Engineering, Vol. 1, No.1, 2007, pp. 56-73.
- Li, N. Ye, Tieming Liu, and Yang Sun, “Job scheduling to minimize the weighted waiting time variance of jobs.” Computers & Industrial Engineering, Vol. 52, No. 1, 2007, pp. 41-56.
- Ye, T. Farley, X. Li, and B. Harish, “Batch scheduled admission control for computer and network systems.” Information, Knowledge, Systems Management, Vol. 5, No. 4, 2005/2006, pp. 211-226.
- Ye, C. Newman, and T. Farley, “A system-fault-risk framework for cyber attack classification.” Information, Knowledge, Systems Management, Vol. 5, No. 2, 2005/2006, pp. 135-151.
- Ye, T. Farley, and D. K. Lakshminarasimhan, “An attack-norm separation approach for detecting cyber attacks,” Information Systems Frontiers, Vol. 8, No. 3, 2006, pp. 163-177.
- Ye, and T. Farley, “Information sharing and control in homogeneous and heterogeneous supply networks.” International Journal of Modeling and Simulation, Vol. 26, No. 2, 2006, pp. 160-168.
- Yang, N. Ye, and Y.-C. Lai, “QoS model of a router with feedback control.” Quality and Reliability Engineering International, Vol. 22, No. 4., 2006, pp. 429-444.
- Ye, D. Parmar, and C. M. Borror, “A hybrid SPC method with the Chi-square distance monitoring procedure for large-scale, complex process data.” Quality and Reliability Engineering International, Vol. 22, No. 4, 2006, pp. 393-402.
- Li, and N. Ye, “A supervised clustering and classification algorithm for mining data with mixed variables.” IEEE Transactions on Systems, Man, and Cybernetics, Part A, Vol. 36, No. 2, 2006, pp. 396-406.
- Ye, B. Harish, and T. Farley, “Attack profiles to derive data observables, features, and characteristics of cyber attacks.” Information, Knowledge, Systems Management, Vol. 5, No. 1, 2005/2006, pp. 23-47.
- Ye and T. Farley, “A scientific approach to cyberattack detection.” IEEE Computer, Vol. 38, No. 11, 2005, pp. 55-61.
- Ye, Z. Yang, Y.-C. Lai, and Toni Farley, “Enhancing router QoS through job scheduling with weighted shortest processing time—adjusted.” Computers & Operations Research, Vol. 32, No. 9, 2005, pp. 2255-2269.
- Ye, E. Gel, X. Li, T. Farley, and Y.-C. Lai, “Web-server QoS models: Applying scheduling rules from production planning.” Computers & Operations Research, Vol. 32, No. 5, 2005, pp. 1147-1164.
- Wu, N. Ye, and D. Zhang,“Comparison of distributed methods for resource allocation.” International Journal of Production Research, Vol. 43, No. 3, 2005, pp. 515-536.
- Li, and N. Ye, “A supervised clustering algorithm for mining normal and intrusive activity patterns in computer intrusion detection.” Knowledge and Information Systems, Vol. 8, No. 4, 2005, pp. 498-509.
- Zhao, K. Park, Y.-C. Lai, and N. Ye, “Tolerance of scale-free networks against attack-induced cascades.” Physical Review E, Vol. 72, No. 2, 2005, pp. 025104-1 to 025104-4.
- Park, Y.-C. Lai, and N. Ye, “Self-organized scale-free networks.” Physical Review E, Vol. 72, No. 2, 2005, pp. 026131-1 to 026131-5.
- Park, Y.-C. Lai, L. Zhao, and N. Ye, “Jamming in complex gradient networks.” Physical Review E, Vol. 71, No. 6, 2005, pp. 065105-1 to 065105-4.
- Zhao, Y.-C. Lai, K. Park, and N. Ye, “Onset of traffic congestion in complex networks.” Physical Review E, Vol. 71, No. 2, 2005, pp. 026125-1 to 026125-8.
- Ye, Q. Chen, and C. Borror, “EWMA forecast of normal system activity for computer intrusion detection.” IEEE Transactions on Reliability, Vol. 53, No. 4, 2004, pp. 557-566.
- Ye, Y. Zhang, and C. M. Borror, “Robustness of the Markov-chain model for cyber-attack detection.” IEEE Transactions on Reliability, Vol. 53, No. 1, 2004, pp. 116-123.
- Ye and O. S. Saydjari, “Introduction to special section on: quality/reliability engineering of information systems,” IEEE Transactions on Reliability, Vol. 53, No. 1, 2004, pp. 102.
- Ye, T. Farley, D. Aswath, “Data measures and collection points to detect traffic changes on large-scale computer networks.” Information, Knowledge, Systems Management, Vol. 4, No. 4, 2004, pp. 215-224.
- Park, Y.-C. Lai, and N. Ye, “Characterization of weighted complex networks.” Physical Review E, Vol. 70, No. 2, 2004, pp. 026109-1 to026109-4.
- Chen, T. Farley, and N. Ye, “QoS requirements of network applications on the Internet.” Information, Knowledge, Systems Management, Vol. 4, No.1, 2004, pp. 55-76.
- Ye, and Q. Chen, “Computer intrusion detection through EWMA for auto-correlated and uncorrelated data.” IEEE Transactions on Reliability, Vol. 52, No. 1, 2003, pp. 73-82.
- Ye, C. Borror, and D. Parmar, “Scalable chi square distance versus conventional statistical distance for process monitoring with uncorrelated data variables.” Quality and Reliability Engineering International, Vol. 19, No. 6, 2003, pp. 505-515.
- Ye, Y.-C. Lai, and T. Farley, “Dependable information infrastructures as complex adaptive systems.” Systems Engineering, Vol. 6, No. 4, 2003, pp.225-237.
- Ye, “An information processing model for human-computer integrated assembly planning systems.” JCIIE, Vol. 20, No. 3, 2003, pp. 220-229.
- -C. Lai, Z. Liu, and N. Ye, “Infection dynamics on growing networks.” International Journal of Modern Physics B, Vol. 17, 2003, pp. 4045-4061.
- -C. Lai, and N. Ye, “Recent developments in chaotic time series analysis.” International Journal of Bifurcation and Chaos, Vol. 13, No. 6, 2003, pp. 1383-1422.
- Liu, Y.-C. Lai, and N. Ye, “Propagation and immunization of infection on general networks with both homogeneous and heterogeneous components.” Physical Review E, Vol. 67, 031911, 2003, pp. 031911-1 to 031911-5.
- Ye, X. Li, and T. Farley, “A data mining technique for discovering distinct patterns of hand signs: Implications in User Training and Computer Interface Design.” Ergonomics, Vol. 46, No. 1-3, 2002, pp. 188-196.
- Ye, C. Borror, and Y. Zhang, “EWMA techniques for computer intrusion detection through anomalous changes in event intensity.” Quality and Reliability Engineering International, Vol. 18, No. 6, 2002, pp. 443-451.
- Ye, S. M. Emran, Q. Chen, and S. Vilbert, “Multivariate statistical analysis of audit trails for host-based intrusion detection.” IEEE Transactions on Computers, Vol. 51. No. 7, 2002, pp. 810-820.
- Ye, and X. Li, “A scalable, incremental learning algorithm for classification problems.” Computers & Industrial Engineering Journal, Vol. 43, No. 4, 2002, pp. 677-692.
- Ye, T. Ehiabor, and Y. Zhang, “First-order versus high-order stochastic models for computer intrusion detection.” Quality and Reliability Engineering International, Vol. 18, No. 3, 2002, pp. 243-250.
- Ye, “Information infrastructure of engineering collaboration in a distributed virtual enterprise.” International Journal of Computer Integrated Manufacturing, Vol. 15, No. 3, 2002, pp. 265-273.
- Ye, “QoS-centric stateful resource management in information systems.” Information Systems Frontiers, Vol. 4, No. 2, 2002, pp. 149-160.
- M. Emran, and N. Ye, “Robustness of chi-square and Canberra techniques in detecting intrusions into information systems.” Quality and Reliability Engineering International, Vol. 18, No. 1, 2002, pp. 19-28.
- Li, and N. Ye, “Grid- and dummy-cluster-based learning of normal and intrusive clusters for computer intrusion detection.” Quality and Reliability Engineering International, Vol. 18, No. 3, 2002, pp. 231-242.
- Liu, Y.-C. Lai, N. Ye, and P. Dasgupta, “Connectivity distribution and attack tolerance of general networks with both preferential and random attachments.” Physics Letters A, Vol. 303, 2002, pp. 337-344.
- Liu, Y.-C. Lai, and N. Ye, “Statistical properties and attack tolerance of growing networks with algebraic preferential attachment.” Physical Review E, Vol. 66, 2002, pp. 036112-1 to 036112-7.
- Ye, X. Li, Q. Chen, S. M. Emran, and M. Xu, “Probabilistic techniques for intrusion detection based on computer audit data.” IEEE Transactions on Systems, Man, and Cybernetics, Vol. 31, No. 4, 2001, pp. 266-274.
- Ye, V. Nguyen, and G. Runger, “Assessment of operation plan performance under uncertainty.” IEEE Transactions on Systems, Man, and Cybernetics, Vol. 31, No. 2, 2001, pp. 256-260.
- Ye, J. Giordano, and J. Feldman, “A process control approach to cyber attack detection.” Communications of the ACM, Vol. 44, No. 8, 2001, pp. 76-82.
- Ye, and Q. Chen, “An anomaly detection technique based on a chi-square statistic for detecting intrusions into information systems.” Quality and Reliability Engineering International, Vol. 17, No. 2, 2001, pp. 105 – 112.
- Ye, “Robust intrusion tolerance for information systems.” Information Management and Computer Security, Vol. 9, No. 1, 2001, pp. 38-43.
- Ye, “A hierarchical, distributed architecture of command and control.” Information, Knowledge, Systems Management, Vol. 2, No. 3, 2001, pp. 261-269.
- Li, and N. Ye, “Decision tree classifiers for computer intrusion detection.” Journal of Parallel and Distributed Computing Practices, Vol. 4, No. 2, 2001, pp. 179-190.
- M. Emran, and N. Ye, “A system architecture for computer intrusion detection.” Information, Knowledge, Systems Management, Vol. 2, No. 3, 2001, pp. 271-290.
- Ye, Q. Zhong, and G. Rahn, “Confidence assessment of quality prediction from process measurement in sequential manufacturing processes.” IEEE Transactions on Electronic Packaging Manufacturing, Vol. 23, No. 3, 2000, pp. 177-184.
- Ye, P. Banerjee, A. Banerjee, and F. Dech, “A comparative study of assembly planning in traditional and virtual environments.” IEEE Transactions on Systems, Man, and Cybernetics, Vol. 29, No. 4, 1999, pp. 546-555.
- Banerjee, P. Banerjee, N. Ye, and F. Dech, “Assembly planning effectiveness using virtual reality.” Presence: Teleoperators and Virtual Environments, Vol. 8, No. 2, 1999, pp. 204-217.
- Ye, “The MDS-ANAVA technique for assessing knowledge representation differences between skill groups.” IEEE Transactions on Systems, Man and Cybernetics, Vol. 28, No. 5, 1998, pp. 586-600.
- Ye, “Neural networks approach to user modeling and intelligent interface: A review and reappraisal.” International Journal of Human-Computer Interaction, Vol. 9, No. 1, 1997, pp. 3-24.
- Ye, “Objective and consistent analysis of group differences in knowledge representation.” International Journal of Cognitive Ergonomics, Vol. 1, No. 2, 1997, pp. 169-187.
- Ye, and B. Zhao, “Automatic setting of article format through neural networks.” International Journal of Human-Computer Interaction, Vol. 9, No. 1, 1997, pp. 81-100.
- Ye, “The presentation of knowledge and state information for system fault diagnosis.” IEEE Transactions on Reliability, Vol. 45, No. 4, 1996, pp. 638-645.
- Ye, “A hierarchy of system-oriented knowledge for diagnosis of manufacturing system faults.” Information and System Engineering, Vol. 2, No. 2, 1996, pp. 79-103.
- Ye, “Self-adapting decision support for interactive fault diagnosis of manufacturing systems.” International Journal of Computer Integrated Manufacturing, Vol. 9, No. 5, 1996, pp. 392-401.
- Ye, and D. A. Urzi, “Heuristic rules and strategies of assembly planning: Experiment and Implications in the design of assembly decision support system.” International Journal of Production Research, Vol. 34, No. 8, 1996, pp. 2211-2228.
- Ye, and G. Salvendy, “Expert-novice knowledge of computer programming at different levels of abstraction.” Ergonomics, Vol. 39, No. 3, 1996, pp. 461-481.
- Ye, and G. Salvendy, “An objective approach to exploring skill differences in strategies of computer program comprehension.” Behaviour & Information Technology, Vol. 15, No. 3, 1996, pp. 139-148.
- B. Swider, and N. Ye, “Effect of information at different stages of users’ training.” Perceptual and Motor Skills, Vol. 83, 1996, pp. 747-754.
- K. Hennings, and N. Ye, “Interaction of screen distances, screen letter heights and source document distances.” Interacting with computers, Vol. 8, No. 4, 1996, pp. 311-322.
- Ye, and B. Zhao, “A hybrid intelligent system for fault diagnosis of advanced manufacturing system.” International Journal of Production Research, Vol. 34, No. 2, 1996, pp. 555-576.
- D. Caldwell, N. Ye, and D. A. Urzi, “Re-engineering the product development cycle and future enhancements of the computer integrated manufacturing environment.” International Journal of Computer Integrated Manufacturing, Vol. 8, No. 6, 1995, pp. 441-447.
- Ye, and G. Salvendy, “Quantitative and qualitative differences between experts and novices in chunking computer software knowledge.” International Journal of Human-Computer Interaction, Vol. 6, No. 1, 1994, pp. 105-118.
- Ye, B. Zhao, and G. Salvendy, “Neural-networks-aided fault diagnosis in supervisory control of advanced manufacturing systems.” International Journal of Advanced Manufacturing Technology, Vol. 8, 1993, pp. 200-209.
- Ye, and G. Salvendy, “Cognitive engineering based knowledge representation in neural networks.” Behaviour & Information Technology, Vol. 10, No. 5, 1991, pp. 403-418.
- Zhong, and N. Ye “JSD methodology in software engineering.” Journal of Computer Science, No. 6, 1988, pp. 33-38.
- Zhong, and N. Ye, “The conceptual framework of software engineering.” Journal of Computer Science, No. 1, 1988, pp. 50-56.
Conference Papers
62 papers
- Ye, T. Y. Fok, X. Wang, J. Collofello, N. Dickson, “Learning partial-value variable relations for system modeling”, In Proceedings of the 2018 IEEE ICCAR Conference, Auckland, New Zealand, April 20-23, 2018.
- Ye, T. Y. Fok, X. Wang, J. Collofello, N. Dickson, “The PVAD algorithm to learn partial-value variable associations with applications to modeling for engineering retention,” In Proceedings of the Vienna International Conference on Mathematical Modeling, Vienna, Austria, February 21-23, 2018.
- Ye, 2017, “The partial-value association discovery algorithm to identify engineering retention and success characteristics,” In Proceedings of The 9th International Conference on Education and New Learning Technologies (EDULEARN17), pp. 5033-5041. Barcelona, Spain, July 3-5, 2017.
- Naganathan, H., Chong, W., and Ye, N., 2015, “Learning energy consumption and demand models through data mining for reverse engineering,” The Proceedings of the International Conference on Sustainable Design, Engineering and Construction 2015 (May 10-13, 2015, Chicago).
- Ye, S. S. Yau, D. Huang, M. Baydogan, B. Aranda, A. Roontiva, and P. Hurley, “Cause-effect dynamics of computer and network systems for QoS,” The Proceedings of the 2010 Industrial Engineering Research Conference, 2010.
- Ye, and B. M. Aranda, “Tradeoffs of service, security and attack for cyber system survivability,” The Proceedings of the 2010 Survivability Workshop, 2010.
- Ye, A. Roontiva and J. He, “A cluster analysis of neuronal activity in the dorsal premotor cortical area for neuroprosthetic control,” The Proceedings of the 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2008, pp. 2638-2641.
- Zhang, N. Ye, J. He, A. Roontiva and J. Aguayo, “Two-way ANOVA to identify impacts of multiple interactive behavioral factors on the neuronal population dependency during the reaching motion,” The Proceedings of the 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2008, pp. 1335-1338.
- S. Yau, N. Ye, H. Sarjoughian, and D. Huang, “Developing Service-based Software Systems with QoS Monitoring and Adaptation,”The Proceedings of the 12th IEEE Workshop on Future Trends of Distributed Computing Systems (FTDCS’08), 2008, pp. 74-80.
- Li, and N. Ye, “Mining normal and intrusive activity patterns for computer intrusion detection.” In Proceedings of 2004 ISI (Lecture Notes in Computer Science), Vol. 3037, edited by H. Chen et al., June 2004, pp. 226-238.
- Ye, Y. Chen, and T. Farley, “QoS requirements of multimedia data on computer networks.” In Proceedings of the Second International Conference on Active Media Technology, Chongqing, P. R. China, May 2004, pp. 183-189.
- Ye, E. S. Gel, X. Li, T. Farley, Y.-C. Lai, “Job scheduling rules for web server QoS.” In Proceedings of the 2004 International Conference on Computers and Industrial Engineering, Jeju, Korea, March 25-27, 2004, Paper No. CIE424.
- Ye, Y. Chen, and T. Farley, “QoS requirements of multimedia data on computer networks.” In Proceedings of the International Computer Science Conference 2003 Active Media Technology (ICAMT2003), 2003.
- Ye, T. Ehiabor, and Y. Zang, “First-order versus high-order stochastic model applications to computer intrusion detection.” In Proceedings of the Third IEEE SMC Information Assurance Workshop, 2002, pp. 279-283.
- Ye, Q. Chen, and J.-I. Mou, “Univariate and multivariate noise cancellation for computer intrusion detection.” In Proceedings of the Third IEEE SMC Information Assurance Workshop, 2002, pp. 284-291.
- Ye, and X. Li, “A machine learning algorithm based on supervised clustering and classification.” In Proceedings of the Sixth International Computer Science Conference on Active Media Technology (ATM-01), 2001, pp. 327-334.
- Ye, and Y.-C. Lai, “A self-organization approach to dependable information infrastructure.” In Proceedings of the International Conference on Pattern Formation and Self-Organization in Nonlinear Complex Systems, 2001, pp. 100-102.
- Ye, S. M. Emran, X. Li, and Q. Chen, “Statistical process control techniques for an intrusion detection system.” In Proceedings of the Second DARPA Information Survivability Conference and Exposition (DISCEX II), 2001, pp. 3-14.
- Ye, and X. Li, “A scalable clustering technique for intrusion signature recognition.” In Proceedings of the Second IEEE SMC Information Assurance Workshop, 2001, pp. 1-4.
- M. Emran, and Ye, N. “Robustness of Canberra metric in computer intrusion detection.” In Proceedings of the Second IEEE SMC Information Assurance Workshop, 2001, pp. 80-84.
- Ye, and Q. Chen, “Profile-based information fusion for intrusion detection.” In Proceedings of the Second IEEE SMC Information Assurance Workshop, 2001, pp. 227-230.
- M. Emran, and N. Ye, “The ISA-IDS architecture.” In Proceedings of the Southern Conference on Computing, 2000, CD-ROM.
- Ye, Q. Chen, and S. M. Emran, “Computer intrusion detection based on statistical distributions of distance metrics.” In Proceedings of the Southern Conference on Computing, 2000, CD-ROM.
- Ye, “A Markov chain model of temporal behavior for anomaly detection.” In Proceedings of the First IEEE SMC Information Assurance and Security Workshop, 2000, pp. 166-169. (37 citations)
- Ye, Q. Zhong, and M. Xu, “Probabilistic networks with undirected links for anomaly detection.” In Proceedings of the First IEEE SMC Information Assurance and Security Workshop, 2000, pp. 170-174.
- Ye, Q. Chen, and S. M. Emran, “Hotelling’s T2 multivariate profiling for anomaly detection.” In Proceedings of the First IEEE SMC Information Assurance and Security Workshop, 2000, pp. 175-181.
- Ye, Q. Chen, and S. M. Emran, “Chi-square statistical profiling for anomaly detection.” In Proceedings of the First IEEE SMC Information Assurance and Security Workshop, 2000, pp. 182-188.
- Ye, X. Li, and S. M. Emran, “Decision trees for signature recognition and state classification.” In Proceedings of the First IEEE SMC Information Assurance and Security Workshop, 2000, pp. 189-194.
- Ye, M. Xu, Q. Chen, and X. Li, “Information fusion for intrusion detection.” In Proceedings of the Third International Conference on Information Fusion (FUSION 2000), 2000, pp. ThB3-17 – ThB3-20.
- Ye, and X. Li, “Application of decision tree to intrusion detection.” In Proceedings of the Second International Conference on Data Mining, 2000, CD-ROM.
- Ye, and M. Xu, “A process model based integration of intrusion detection techniques.” In Proceedings of the 9th Industrial Engineering Research Conference, 2000, CD-ROM.
- Ye, V. Nguyen, and G. Runger, “Plan performance assessment under uncertainty for command and control.” In Proceedings of the 15th International Conference on Computers and Their Applications, 2000, pp. 354-357.
- Choi, K. Dooley, and N. Ye, “Control versus emergence in scaleable enterprise systems.” In Proceedings of the NSF DMII Grantees Conference, 2000.
- Ye, T. Choi, K. J. Dooley, and J. K. Cochran, “Modeling and simulation of supply network enterprise.” Program of the INFORMS Annual Meeting San Antonio Fall 2000, 2000, pp. 91.
- Ye, and X. Li, “Scalable clustering technique for quality assurance of information systems.” In Program of the INFORMS Annual Meeting San Antonio Fall 2000, 2000, pp 69.
- Bhattacharya, and N. Ye, “Design of robust, survivable intrusion detection agent.” In Proceedings of the 1st Asia-Pacific Conference on Intelligent Agent Technology, 1999, pp. 274-278.
- Ye, “Enabling information technology for distributed virtual enterprises.” In Proceedings of the 8th Industrial Engineering Research Conference, 1999, CD-ROM.
- Ye, Q. Zhong, G. Rahn, “Confidence assessment of product quality from process measurement.” In Proceedings of the 8th Industrial Engineering Research Conference, 1999, CD-ROM.
- Nguyen, and N. Ye, “A functional model for production systems engineering.” In Proceedings of the 8th Industrial Engineering Research Conference, 1999, CD-ROM.
- Ye, P. Banerjee, A. Banerjee, and F. Dech, “Assembly planning in traditional and virtual environments.” In Proceedings of the 25th International Conference on Computers and Industrial Engineering, 1999.
- Ye, “Computer-supported assembly production planning.” In Proceedings of the International Conference on Advanced Manufacturing Technology (ICAMT ’99), 1999.
- Ye, C. Hosmer, J. Giordano, and J. Feldman, “Critical information infrastructure protection through process modeling and model-based information fusion.” In Proceedings of the Information Survivability Workshop, 1998, pp. 197-201.
- Ye, J. Giordano, J. Feldman, and Q. Zhong, “Information fusion techniques for network intrusion detection.” In Proceedings of the 1998 Information Technology Conference, 1998, pp. 117-120.
- Ye, “Confidence assessment of product quality from process measurement – II.” In Proceedings of the Spring ’98 Symposium of the Center for Machine Tool Systems Research, 1998.
- Ye, “Confidence assessment of product quality from process measurement – I.” In Proceedings of the Fall ’97 Symposium of the Center for Machine Tool Systems Research, 1997.
- Ye, “A knowledge hierarchy for diagnosis of manufacturing system faults.” In Proceedings of 1996 NSF Design, Manufacture and Industrial Innovations Grantees Conference, 1996, pp. 595-596.
- Ye, and D. A. Urzi, “A protocol analysis of assembly planning rules and strategies.” In Proceedings of 1995 IEEE International Conference on Systems, Man and Cybernetics, 1995, pp. 1759 – 1762.
- B. Swider, and N. Ye, “The effects of knowledge training on user performance in a database query task.” In Proceedings of 1995 Annual International Industrial Ergonomics and Safety Conference, 1995, pp. 587 – 591.
- K. Hennings, and N. Ye, “VDT-induced visual fatigue and its relationship to viewing distances and letter heights.” In Proceedings of 1995 Annual International Industrial Ergonomics and Safety Conference, 1995, pp. 607 – 612.
- Ye, “Human knowledge and strategy for machine fault diagnosis.” In Proceedings of 1995 NSF Design, Manufacture and Industrial Innovations Grantees Conference, 1995, pp. 299-300.
- Ye, “Fault diagnosis of advanced manufacturing systems: Operator strategies and performance support with neural networks.” In Proceedings of the Fourth International Conference on Human Aspects of Advanced Manufacturing & Hybrid Automation, 1994, pp. 445-448.
- Ye, “A survey of on-line diagnostics on computer-controlled manufacturing equipment.” In Proceedings of 1994 Symposium on Human Interaction with Complex Systems, 1994, pp. 307-314.
- Ye, “Computer simulation of manufacturing systems for exploration of human information needs and strategies in system fault diagnosis.” In Proceedings of 1994 IEEE International Conference on Systems, Man and Cybernetics, 1994, pp. 2190-2194.
- Ye, and G. Salvendy, “Quantitative and qualitative measures on knowledge chunking of computer programmers.” In Proceedings of the 12th Triennial Congress of International Ergonomics Association, 1994, pp. 423-425.
- Ye, and G. Salvendy, “Abstraction from the physical appearance of computer programs: A barrier to knowledge development of computer programmers.” In Proceedings of the 12th Triennial Congress of International Ergonomics Association, 1994, pp. 426-428.
- Ye, and D. J. Brinkman, “Test and evaluation of knowledge transfer between task domains.” In Proceedings of Human Factors and Ergonomics Society 1994 Annual Meeting, 1994, pp. 1123-1127.
- L. Schneider, and N. Ye, “Ergonomic evaluation and improvement of sewing operations in automobile assembly production.” In Proceedings of ’94 Industrial Ergonomics and safety Conference, 1994, pp. 377 – 382.
- Ye, “Fault diagnosis of advanced manufacturing equipment.” In Proceedings of 1994 NSF Design and Manufacturing Grantees Conference, 1994, pp. 395-396.
- C. Hale, and N. Ye, “A fuzzy set model of vehicular guidance”. In Proceedings of Human Factors and Ergonomics Society 1994 Annual Meeting, 1994, pp. 968.
- Ye, “Implementation of hypothesis-test strategy for fault diagnosis.” In Proceedings of the 2nd Industrial Engineering Research Conference, 1993, pp. 619-623.
- Ye, and G. Salvendy, “Introducing problem solving Strategies of users into the interface design.” In Proceedings of the 5th International Conference on Human-Computer Interaction, 1993, pp. 873-878.
- Ye, and G. Salvendy, “An adaptive interface design using neural networks.” In Proceedings of 4th International Conference on Human-Computer Interaction, 1991, pp. 435-439.
Patents
- Ye, and X. Li, “Method for Classifying Data Using Clustering and Classification Algorithm Supervised,” United State Patent No. 6907436 (US6,907,436, issued June 14, 2005), ASU Case No. M1-015.
- Ye, X. Li, T. Farley, and B. Harish, “Job Scheduling Techniques to Reduce the Variance of Waiting Time,” United State Patent Application No. 20040237087 (Patent exposure filed November 25, 2004; Patent filed May 10, 2006.), ASU Case No. M3-069 and ASU Case No. M3-080. Available at http://appft1.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PG01&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.html&r=1&f=G&l=50&s1=%2220040237087%22.PGNR.&OS=DN/20040237087&RS=DN/20040237087 or http://www.freshpatents.com/Job-scheduling-techniques-to-reduce-the-variance-of-waiting-time-dt20041125ptan20040237087.php.
(N. Ye, X. Li, and T. Farley, “The Yelf Spiral: A Task Scheduling Technique to Reduce the Variance of Waiting Time for Performance Stability and Predictability,” ASU Case No. M3-069.)
(N. Ye, B. Harish, and T. Farley, “Batch Scheduled Admission Control,” ASU Case No. M3-080.)