SlideShare a Scribd company logo
April 10, 2010

                                            Hsinchun Chen

  Management Information Systems Department                Office: (520) 621-2748
  Eller College of Management                              FAX: (520) 621-2433
  The University of Arizona                                hchen@eller.arizona.edu
  McClelland Hall 430Z                                     http://ai.arizona.edu
  Tucson, Arizona 85721
Education
 Ph.D.      Information Systems                         New York University                     1989
 M.S.       Information Systems                         New York University                     1987
 MBA        Management Information Systems              State University of New York at         1985
            Management Science                          Buffalo
            Finance
 B.S.       Management Science                          National   Chiao-Tung     University,   1981
                                                        Taiwan
Ph.D. Dissertation
“An Artificial Intelligence Approach to the Design of Online Information Retrieval Systems,” October
1989 (Advisor: Vasant Dhar).

Personal Background

Born in Taiwan; US Citizen; Security Clearance (FBI: Secret, effective 2007, expired 3/31/2010; CIA:
Top Secret, TS/SI/TK/G/HCS effective 4/23/2009); Married with two children.

Academic/Professional Experience and Employment

Honorary/Distinguished Chair Professor, National Taiwan University, Taiwan Central Police University,
Taiwan National Dong-Hua University, Shanghai Jiao-Tong University

Director, NSF BioPortal Center for infectious disease and bioagent information sharing, analysis, and
visualization research, 2004-2009 ($2.5M funding).

Director, NSF COPLINK Center for public safety and homeland security IT research, 2003-2008 ($3M
funding).

Founding Director, Mark and Susan Hoffman E-Commerce Lab, University of Arizona, 2000-2005 ($2M
in infrastructure funding and $10M in software donation from SAP, Oracle, Microsoft, IBM, etc., 7,000
square-foot).

Founder, Knowledge Computing Corporation, a University of Arizona spin-off company in
knowledge management, February, 2000 ($4.6M in VC funding). The company was acquired by
Silverlake and I2 for $40M in July 2009.

Founder, International Biocomputing Corporation, a University of Arizona spin-off company in infectious
disease informatics, January, 2006 ($100K NSF SBIR funding).

McClelland Endowed Professor of Management Information Systems, 1999.

Andersen Consulting Professor of the Year, 1999.

Director, Artificial Intelligence Laboratory, Management Information Systems Department,
University of Arizona, 1990-present (35 research scientists, graduate assistants, and programmers,
$30M in federal funding, see http://ai.bpa.arizona.edu).




                                                   1
Visiting Senior Research Scientist, University of Illinois at Urbana-Champaign, National Center for
Supercomputing Applications (NCSA), 1996-present.

Member, Arizona Cancer Center, University of Arizona, 1997.

Full Professor (with tenure), University of Arizona, Department of MIS, 1998-present.

Associate Professor (with tenure), University of Arizona, Department of MIS, 1995-1998.

Assistant Professor, University of Arizona, Department of MIS, 1989-1995.

Major Project Activities

Dark Web: Open-Source Terrorism Content Collection and Analysis (NSF, DOD, ITIC, $3M): PI of
a major terrorism research project funded by NSF and ITIC. In partnership with selected terrorism study
centers and intelligent community agencies, the project aims to develop a systematic, computational
approach to collecting and analyzing international extremist-generated Internet contents (web site, forums,
chat rooms, etc.). Current research efforts include: intelligent spidering/archiving, link (social network)
analysis, content analysis, web metrics analysis, multimedia analysis, sentiment analysis, and authorship
analysis of online extremism. (Collaborators: E. Reid, C. Ellis, M. Sageman)

BioPortal: National Infectious Disease Infrastructure (NSF, ITIC, $2.5M): PI of a major
bioinformatics demonstration project funded by NSF and ITIC. In partnership with the NY, CA, and AZ
public health departments, the project aims to develop a scalable information sharing and data mining
infrastructure for infectious diseases across jurisdictions and disease types. A prototype system has been
developed with West Nile Virus and Boutulism information across CA and NY. Significant research efforts
are under way in HL7/XML data sharing, agent-based alerting, spatial-temporal visualization, and hotspot
analysis. (Collaborators: M. Ascher, M. Thurmond, C. Lynch, J. Kvach)

National Security Research in BorderSafe (NSF/ITR. ITIC/KDD, DHS/CNRI, $1.5M)): PI of several
major national security related projects. BorderSafe aims to develop an information sharing and data
mining framework for the law enforcement and intelligence community. By partnering with several law
enforcement and federal agencies in Southern California and Arizona, the project has developed significant
criminal network analysis and (identify) deception detection components that have been adopted for
national security and border protection activities. (Collaborators: J. Pitt, R. Friends, T. Petersen)

GeneScene: Gene Pathway Analysis (NLM/NIH, 2002-, $1.4M): PI of a major NIH/NLM funded
project. It is widely believed that elucidation of the genes and proteins that compose biochemical pathways
will define the molecular targets for future drug therapies. GeneScene is designed to utilize information
derived from various medical literature sources (e.g., Medline, CancerLit, UMLS) to help suggest possible
interactions between genetic and biochemical pathways. It will assist in reviewing existing literature,
identifying gaps in existing knowledge, comparing and integrating knowledge and data from different
fields, and as such help lead the way to new and interesting hypotheses and field research. Significant
research in the areas of data mining and text mining has been performed to develop GeneScene into a
public resource for biomedical research and advancement. (Collaborators: J. Martinez, G. Leroy, Z. Huang,
D. McDonald)

NSDL Projects: GetSmart and EconPort (NSF, 2002-, $1.2M): PI of several major NSF funded NSDL
projects. As part of the NSF National Science Digital Library (NSDL) program that aims to create
sustainable, innovative digital library based e-learning and education collection, services, and research for
various academic communities, our projects encompass various knowledge portals, concept mapping, and
active digital library objects research activities. The GetSmart project, in collaboration with the Virginia
Tech, develops concept mapping and digital library knowledge creation tools for the computer engineering
domain. The EconPort project, in collaboration with the Economics Science Lab at the University of
Arizona, creates a sustainable web portal environment for researching experimental economics and agent
related issues on the Internet. (Collaborators: E. Fox, J. Cox, D. Zeng, B. Marshall, Y. Zhang, A. Lally, C.
Larson)



                                                     2
Mark and Susan Hoffman E-Commerce Lab (Hoffman/HP/IBM, 2000-, $4M): Founding Director of
the University of Arizona Hoffman eCommerce Lab, a state-of-the-art eCommerce education, research, and
outreach environment for BPA students of all levels. Located at the McClelland Hall 218 area (a 7,000
square-foot space of high-speed, wired and wireless facility), the lab has received over $2M in
infrastructure funding from Hoffman, HP, and IBM and more than $10M in software donation from major
eCommerce companies including Commerce One, Oracle, SAP, Microsoft, and IBM. The lab consists of a
high-end lab space, a technology lounge, and an executive training classroom. The lab is also a major part
of the UA/Eller Prop 301 Internet Technology and Commerce Initiative (ITCI), which received $5.5M state
funding for education, research, and outreach development, 2001-2006. The lab currently consists of a staff
of 2 full-time lab and software managers and 5 GTAs. (Collaborators: M. Hoffman of Commerce One,
Garry Gray of HP, D. Zeng, M. Fenstermarcher, D. Meader, B. Newman, O. Sheng)

COPLINK Center: Knowledge Management for Law Enforcement (NSF, 2000-2003, $2.5M):
Principal investigator (PI) of a major NSF Digital Government project, which aims to develop information
sharing and knowledge management technologies for law enforcement community and to understand the
associated social and organizational impacts. The project is one of the major awards of the NSF Digital
Government program, which aims to examine and develop technologies that could more efficiently and
effectively deliver government services to the public in the Internet era. The COPLINK system has
successfully linked the record management systems between Tucson Police Department and Phoenix Police
Department and is in use by more than 500 police officers in the state of Arizona. (Collaborators: J.
Schroeder of Tucson Police Department and J. Hindman of Phoenix Police Department, S. Weisband, D.
Zeng, A. Lally, M. Chau)

OOHAY, From Digital Library to Knowledge Management (NSF, 1998-2003, $1M): Principal
investigator (PI) of several NSF-funded projects. Project OOHAY (Object Oriented Hierarchical Automatic
Yellowpage, the reverse of YAHOO) is a multi-disciplinary, long-term project that aims to create system-
aided technologies and methodologies for automatically analyzing and visualizing large collections of
unstructured documents in a useful organizational context. In a new Digital Library Initiative (DLI) Phase 2
project, the OOHAY approach will be compared with human knowledge structures in several large-scale
knowledge domains (e.g., National Library of Medicine's UMLS and the Yahoo! subject directory). In a
separate NSF/CISE funded project, we are beginning to study agent-based analysis and visualization
techniques which are grounded on emerging human-computer interaction principles and new visualization
metaphors (e.g., 3D and virtual reality). (Collaborators: D. Meader, D. Zeng, R. Sewell, M. Ramsey, K.
Tolle, B. Zhu)

COPLINK, Database and Intranet Integration (DOJ/NIJ, 1997-2002, $1.5M): Principal investigator
(PI) of an NIJ-funded project on “COPLINK: Database Integration and Access for a Law Enforcement
Intranet.” The project, funded by the National Institute of Justice, is intended to be a catalyst to solve law
enforcement information technology problems through a partnership between the AI Lab and the Tucson
Police Department. Innovative and functional technologies will expand the uses of COPLINK from
database integration, secured Intranet access, and mobile computing, to criminal intelligence and case
analysis, mug-shot face recognition, and intelligent agents. (Collaborators: D. Smith, B. Fund, B. Cochrane,
J. Wills at Tucson Police Department, K. Lynch, C. Lin, H. Gupta, A. Clements, K. Rasmusen, C.
Boarman)

Interspace Semantic Middleware (DARPA, 1997-2000, $1.1M): Principal investigator (PI) of an
DARPA-funded project on “The Interspace Prototype: An Analysis Environment based on Scalable
Semantics.” The foundation of our proposed analysis environment will be a “semantic middleware” for
scalable distributed services, which consist of a hierarchy of statistical and pattern analysis algorithms that
are valid across the range of object types (e.g., texts and images) and subject domains. This middleware
will be used to construct a prototype Interspace with large collections across text (abstracts in engineering)
and image (aerial photos in geography), and then across subjects (medical thesaurus relationships) and
classifications (personal Web documents). We plan to use NCSA-unique computing, network, and
visualization resources as a “time-machine” to simulate a generation-after-next hardware and software
environment. (Collaborators: B. Schatz, B. Pottenger, D. Lawrie at UIUC, M. Ramsey, T. Ng, K. Tolle, B.
Zhu, D. Roussinov)



                                                      3
Medical Informatics (NCI/NLM, 1996-present, $300K): Principal investigator (PI) of several NIH-
funded projects on “Information Analysis and Visualization for Medical Informatics.” These projects aim
to create concept spaces and self-organizing categories for cancer and toxicology literature (Cancerlit and
Toxline databases of National Library of Medicine). Automatic indexing, linguistic parsing, cluster
analysis, neural networks, and information visualization techniques have been adopted. The resulting
system-generated knowledge structures will be integrated with existing fine-grained medical knowledge
sources (e.g., NLM's Unified Medical Language System) and will be used to enhance medical information
retrieval and knowledge sharing. (Collaborators: B. Schatz at NCSA, T. Doszkocs at National Library of
Medicine, S. Hubbard at National Cancer of Institute, A. Houston, R. Sewell, D. Ng, K. Tolle, G. Leroy)

Geographic Information Systems (NSF, 1996-1998, $100K): Principal investigator (PI) of an NSF/CISE-
funded project on “Supplement to Alexandria DLI Project: A Semantic Interoperability Experiment for
Spatially-Oriented Multimedia Data.” This research aims to examine semantic interoperability issues
related to spatially-oriented, multimedia geographic information access. Based on the concept space
approach developed by the Illinois Digital Library Initiative (DLI) project and the Alexandria (University
of California at Santa Barbara) geo-referenced collections, this research proposes to develop knowledge
representations and structures to capture concepts of relevance to spatial and multimedia information
(natural language phrases and geo-related textures). Selected machine learning techniques and general
Artificial Intelligence (AI) graph traversal algorithms will also be adopted to assist in semantic, concept-
based spreading activation in integrated knowledge networks. (Collaborators: T. Smith, B. Schatz, L.
Carver, M. Larsgaard, L. Hill, B. Manjunath at University of California at Santa Barbara and T. Huang at
University of Illinois, M. Ramsey, B. Zhu, D. Ng)

Parallel Computing for Knowledge Discovery (NSF/NCSA, 1995-2001): Principal investigator (PI) of
an National Center for Supercomputing Applications (NCSA) High-performance Computing Resources
Grant (“Information Analysis and Knowledge Discovery for Digital Libraries”). The project aims to
generate concept spaces for all engineering domains. The resulting concept spaces will be used to support
concept-based retrieval and cross-domain vocabulary switching in scientific information retrieval. Thinking
Machine's CM-5 (512 nodes), SGI's Power Challenge Array (48 nodes), Cray's CS6400 (8 nodes), and
Convex's Exemplar (64 nodes) have been provided by NCSA. (Collaborators: B. Schatz, L. Smarr at
NCSA)

Internet Categorization (NSF, 1995-1998, $200K): Principal investigator (PI) of an NSF/CISE-funded
“Internet Categorization and Search” project. The proposed approach, which is grounded on automatic
textual analysis of Internet documents (homepages), attempts to address the Internet search problem by first
categorizing the content of Internet documents and subsequently providing semantic search capabilities
based on a concept space and a genetic algorithm spider (agent). (Collaborators: C. Lin, E. Jan, B. Wilcox,
Y. Chung)

Digital Library Initiative-1 (NSF/ARPA/NASA, 1994-1998, $500K): Co-Principal investigator (Co-PI)
of an NSF/ARPA/NASA-funded “Digital Library Initiative” project. The project goal is to develop a large-
scale testbed for building the next-generation digital libraries for the National Information Infrastructure
(NII). The testbed collections are mainly in the engineering domains, to be contributed by major
engineering societies and publishers e.g., IEEE, John Weily & Sons, etc. Project researchers mainly are
information science and computer science faculty from the University of Illinois at Urbana-Champaign and
research scientists from Illinois's National Center for Supercomputing Applications (the NCSA Mosaic
development team). The initial platform will be based on the NCSA Mosaic, a popular multi-media,
hypertext-based tool for internet resource discovery. As a Co-PI from Arizona, I am responsible for
developing semantic (concept-based) retrieval, customized IR, and content-based information routing
capabilities for the extended Mosaic. (Collaborators: B. Schatz, J. Harden, A. Bishop, W. Mischo, L. Star at
University of Illinois)

Intelligent Groupware (Army/AT&T, 1991-present, $100K): Principal designer for an Army and AT&T
funded electronic meeting system project. Artificial intelligence and information science techniques for
assisting concept classification and content-based information retrieval that have been tested include:
neural network classification, genetic algorithms, inductive learning algorithms, vector space modeling, and



                                                     4
parallel search and clustering algorithms. We have successfully developed an AI tool (agent) to
automatically extract and classify topics (concepts) from the electronic brainstorming comments generated
by meeting participants (using GroupSystems). We are in the process of using similar techniques to
develop software which could automatically classify email and assist in email routing and filtering. We are
also designing an “intelligent” (concept-based) meeting memory system. (Collaborators: J. Nunamaker, D.
Vogel, R. Orwig, P. Hsu, L. Hoopes, J. Kim, L. She, G. Shankar, A. Iyer)

Worm Community System (NSF, 1992-1995, $65K): Principal investigator (PI) of an NSF-funded
“National Collaboratory” project. The project goal is to design a concept-based information retrieval and
information sharing software for molecular biologists whose work is related to the Human Genome
Initiative. A (nematode) worm concept space and a fly (Drosophila) concept space which can assist in
cross-domain concept exploration and term suggestion during IR have been created and are in use by worm
biologists. (Collaborators: B. Schatz, S. Ward, T. Yim, D. Fye, J. Martinez, K. Powell, E. Grossman, T.
Friedman, J. Calley)

Intelligence Analysis (1989-1994): Principal designer of an intelligence analysis and retrieval system,
which supports intelligence analysts who study information technology policy, manufacturing, and
proliferation in the (former) USSR countries. Extensive user requirements studies were conducted. A
content-based intelligence analysis and retrieval system was developed in ANSI C and runs on VAX/VMS
and DECStation (UNIX based). It includes a system-generated Russian computing “concept space” and a
system-assisted relevance feedback and query refinement process. The system is currently in use by the
intelligence analysts. (Collaborators: S. Goodman, W. McHenry, P. Wolcott, K. Lynch, A. Himler, R.
Orwig, T. Ng, K. Basu)

Neural Networks for Pharmaceutical Applications (1992-98): Principal investigator (PI) for an NIH-
funded project investigating a neural network approach to pharmaceutical applications. Sample applications
include drug solubility prediction and non-linear pharmacokinetics functions approximation. 1992-1993.
(Collaborators: S. Yakowski, P. Myral, H. Chow, T. Ng)

Multi-lingual Information Retrieval (1991-present): Principal investigator (PI) for a University of
Arizona funded project designing “intelligent” multilingual information retrieval databases. An AI-based
retrieval interface to foreign language databases in Chinese and in Spanish has been designed and tested.
(Collaborators: H. Saldana, C. Lin, K. Leung, P. Rodriguez)

Knowledge-based Information Retrieval (1986-1989): Principal designer and programmer for an NYU-
supported project designing knowledge-based online cataloging systems. The system was designed in Lisp
and runs on SUN workstations. 1986-1989. (Collaborator: V. Dhar)

DBMS-ES Coupling (1986): Programmer for a major IBM-NYU software engineering project which
evaluated and designed coupling mechanisms between the Expert System development language PROLOG
and Relational Database Systems (using SQL). This was part of a joint project between IBM and NYU,
January-September 1986. (Collaborators: M. Yarke, Y. Vassiliou, J. Clifford)

Teaching Experience
Instructor, “Advanced Topics in Artificial Intelligence” (Ph.D. course), MIS 680, 1989-1996.
    •   Fall/1989: 5.25 on a 6-point scale.

    •   Spring/1990: 5.13 on a 6-point scale. College of Business and Public Administration (BPA)
        Teaching Distinction List.

    •   Fall/1990: 5.00 on a 6-point scale.

    •   Spring/1991: 5.78 on a 6-point scale. BPA Teaching Distinction List.

    •   Fall/1991: 5.33 on a 6-point scale. BPA Teaching Distinction List.




                                                    5
•   Spring/1992: 5.75 on a 6-point scale. BPA Teaching Distinction List.

    •   Spring/1996: 4.90 on a new UA 5-point scale (top 10%).

Instructor, “Data Structures and Algorithms” (undergraduate course), using PASCAL/C, MIS 301,
1989-1998. Student instructor-evaluations:

    •   Fall/1989: 5.22 on a 6-point scale. BPA Teaching Distinction List.

    •   Spring/1990: 4.93 on a 6-point scale.

    •   Fall/1990: 5.04 on a 6-point scale.

    •   Fall/1991, 2 Sections: 5.08 and 5.15 on a 6-point scale.

    •   Fall/1992, 2 Sections: 5.43 and 5.38 on a 6-point scale. Both on BPA Teaching Distinction List.

    •   Fall/1993, 2 Sections: 4.52 and 4.80, on a new UA 5-point scale (top 10%).

    •   Spring/1995, 2 Sections: 4.66 and 4.82, on a UA 5-point scale (top 10%).

    •   Spring/1996: 4.69, on a UA 5-point scale (top 10%).

    •   Spring/1998, 2 sections: 4.7 and 4.2, on a UA 5-point scale (top 10%).

Instructor, “Data Structures and Algorithms” (MS/MBA course), using C/JAVA/C++, MIS 531A, 1989-
present. Student instructor-evaluations:

    •   Fall/1990: 3.86 on a 6-point scale.

    •   Fall/1994: 4.43 on a new UA 5-point scale (top 10%).

    •   Fall/1995: 4.52 on a new UA 5-point scale (top 10%).

    •   Fall/1997: 4.60 on a new UA 5-point scale (top 10%).

    •   Fall/1998, 2 sections: 4.60 and 4.7 on a new UA 5-point scale

    •   Fall/1999, 2 sections: 4.60 and 4.4 on a UA 5-point scale

    •   Fall/2000, 2 sections: 4.78 and 4.61 on a UA 5-point scale

    •   Fall/2001, 2 sections, 4.81and 4.5 on a UA 5-point scale

    •   Fall/2002, 2 sections, 4.63 and 4.39 on a UA 5-point scale

    •   Fall/2005, 4.6 on a UA 5-point scale

Instructor, “Introduction to Artificial Intelligence and Expert Systems” (MBA/MS/BS course), MIS
480/580, 1989-1997. Student instructor-evaluations:

    •   Fall/1990: 4.79 on a 6-point scale.

    •   Fall/1994: 4.75 on a new UA 5-point scale (top 10%).

    •   Fall/1995: 4.70 on a UA 5-point scale (top 10%).

    •   Fall/1997: 4.50 on a UA 5-point scale (top 10%).


                                                     6
Instructor, “Knowledge Management: Technologies and Practices” (MBA/MS/BS course), MIS 480/580,
1998-present. Student instructor-evaluations:

    •   Fall/1998: 4.30 on a UA 5-point scale (top 10%).

    •   Fall/1999: 4.20 on a UA 5-point scale (top 10%).

    •   Fall/2004: 3.90 on a UA 5-point scale

    •   Fall/2005: 4.8 on a UA 5-point scale

    •   Spring/2007: 4.5 on a UA 5-point scale

    •   Spring/2008: 4.0 on a UA 5-point scale

    •   Spring/2009: 4.0 on a UA 5-point scale

Instructor, “Web Computing and Mining,” (MS course), MIS 510, new course in 2004. Student instructor-
evaluations:

    •   Fall/2004: 4.10 on a UA 5-point scale

    •   Spring/2007: 4.5 on a UA 5-point scale

    •   Spring/2008: 3.8 on a UA 5-point scale

    •   Spring/2009: 4.2 on a UA 5-point scale

Instructor, “Biomedical and Security Informatics,” (MS course), MIS 596A, new course in 2007. Student
instructor-evaluations:

    •   Spring/2007: 4.10 on a UA 5-point scale

Instructor, “Information Systems for Management” (MBA course), New York University, June-August,
1988.

Teaching Assistant, “AI: Concepts and Applications” (MBA course), New York University, using LISP,
OPS5, FLAVORS, and PROLOG, December 1986-August 1988.

Teaching Assistant, “Software Engineering Practice” (MBA course), New York University, using COBOL,
January-December, 1986.

Ph.D. Dissertations Supervised
1. Randy J. Johnson, “A Cognitive Approach to the Representation of Managerial Competitive
    Intelligence Knowledge,” 1994

2. Richard E. Orwig, “A Graphical Self-Organizing Approach to Classifying Electronic Meeting Output,”
    1995 (Susquehanna University)

3. Andrea L. Houston, “Information Classification: Usability Studies of Two Automatic Approaches,”
    1998 (Louisiana State University)
4. Dmitri Roussinov, “Information Foraging Through Automatic Clustering and Summarization: A Self-
    organizing Approach,” 1999 (Syracuse University, Arizona State University, University of Strathclyde,
    Scottland). CHI 1999 Consortium Student




                                                   7
5. Dorbin T. Ng, “A Concept Space Approach to Semantic Exchange,” 2000 (Carnegie Mellon
    University)

6. Bin Zhu, “Information Visualization for Knowledge Repositories: Applications and Impacts,” 2002
    (Boston University). CHI 2001 Consortium Student

7. Gondy Leroy, “Facilitating Knowledge Discovery by Integrating Bottom-up and Top-Down
    Knowledge Sources: A Text Mining Approach,” 2003 (Claremont Graduate University)

8. Michael Chau, “Searching and Mining the Web for Personalized and Specialized Information,” 2003
    (Hong Kong University)

9. Wingyan Chung, “An Automatic Text Mining Framework for Knowledge Discovery on the Web,”
    2004 (University of Texas at El Paso; Santa Clara University)

10. Thian-Huat Ong, “Language and Domain-Independent Knowledge Maps: A Statistical Phrase
    Indexing Approach,” 2004 (Cal State University at Sacramento)

11. Chienting Lin, “Examining Technology Usability and Acceptance in Digital Government: A Case
    Study in Law Enforcement,” 2004 (Pace University)

12. Zan Huang, “Graph-based Analysis for E-Commerce Recommendation,” 2005 (Penn State
    University). International Conference on Information Systems (ICIS) 2005 Best Dissertation Award,
    December 2005

13. Jennifer Xu, “Mining Static and Dynamic Structural Patterns in Networks for Knowledge
    Management: A Computational Framework and Case Studies,” 2005 (Bentley College, Boston)

14. Byron Marshall, “Concept Mapping in Informal Node-Link Knowledge Representations,” 2005
    (Oregon State University)

15. Alan Gang Wang, “Entity Matching for Intelligent Information Integration,” 2006 (Virginia Tech)

16. Yilu Zhou, “Supporting Multilingual Internet Searching and Browsing,” 2006 (George Washington
    University).

17. Jialun Qin, “Facilitating Knowledge Discovery by Mining the Content and Link Structure of the Web,”
    2006 (University of Massachusetts)

18. Dan M. McDonald, “Combining Text Structure and Meaning to Support Text Mining,” 2006
    (University of Utah)

19. Jason Jiexin Li, “Feature Construction, Selection, and Consolidation for Knowledge Discovery,” 2007
    (Drexel University)

20. Rob Schumaker, “Knowledge Acquisition, Delivery and Prediction through Text Mining,” 2007 (Iona
    College)

21. Sidd Kaza, “Instance, Evolution, and Predictive Modeling of Social Networks,” 2008 (Towson
    University)

22. Ahmed Abbasi, “Categorization, Analysis, and Visualization of Computer-Mediated Communication
    and Electronic Markets,” 2008 (University of Wisconsin at Milwaukee)


                                                    8
23. Xin Li, “Graph Mining for Information Systems,” 2009 (City University of Hong Kong)

Ongoing dissertations: Hsin-min Lu (surveillance systems), Yan Dang (knowledge mapping), Yulei Zhang
(text mining), David Zimbra (web mining)

Master's theses supervised: A. Himler, S. Cooper, P. Collins, S. Crawford, S. Nizyborski, T. Ng, T. Yim, C.
Lin, V. Rajaraaman, L. She, Y. Chung, Y. Zhang, K. Ng, O. Titkova, K. Tolle, M. Ramsey, C. Chang, K.
Rasmusen, H. Dwiyono, A. Clements, W. Wyzga, P. Li, D. Chen, D. Hendriwan, C. Boarman, H. Gupta, F.
Ye, H. Gupta, S. Chen, L. Guo, H. Fang, M. Huang, F. Guo, J. Schroeder, Y. Lin.

Professional Associations

The Institute of Electrical and Electronics Engineers (IEEE), Fellow.

American Association for the Advancement of Science (AAAS), Fellow.

The Association of Computing Machinery (ACM).

The American Association for Artificial Intelligence (AAAI).
American Medical Informatics Association (AMIA)
The American Society for Information Science (ASIS).

Institute for Operations Research and the Management Science (INFORMS).

Research Interests

Digital library, intelligent information retrieval, automatic categorization and classification, concept space
generation, automatic thesaurus browsing and traversal, inductive query by examples, machine learning for
IR, large-scale information analysis and visualization.

Internet resource discovery, digital libraries, IR for large-scale scientific and business databases,
customized IR, multilingual IR.

Groupware, computer-supported collaborative work (CSCW), intelligent CSCW agent, collaborative
systems, meeting memory, email routing/filtering, organizational memory, intelligence systems,
international computing.

Knowledge-based systems design, knowledge discovery in databases, hypertext systems, machine learning,
neural networks computing, genetic algorithms, simulated annealing.

Cognitive modeling, human-computer interactions, IR behaviors, human problem-solving process.

Large-scale knowledge discovery, parallel computing, commercial applications on supercomputers.

Intramural Services

Chair, Eller College Faculty Status Committee, 2006-2007.

Member, MIS Graduate Committee, 2002-present.

Member, MIS Head Search Committee, Graduate Committee, Prop 301 Committee, 2001-2004.

Founding Director, Mark and Susan Hoffman E-Commerce Lab, College of BPA, University of Arizona,
2000 (obtained $2M in infrastructure funding , $10M in software donations, and $2M in Prop 301 funding).

Chair, MIS Graduate Committee, 1999-2000.



                                                      9
Member, BPA Undergraduate Curriculum Task Force, 1998-1999.

Chair, MIS Department Faculty Search Committee, 1997-1999.

Member, BPA Faculty Status Committee, 1998-1999.

Member, College of Business Undergraduate Curriculum Task Force, Fall 1998.

Member, University of Arizona Faculty Senate Committee on Intellectual Property and Scholarly
Communication, Spring 1998-Fall 1999 (18-month ad hoc committee).

Member, MIS Department Faculty Status Committee, Fall 1997.

Chair, Sunset Review Committee for the Center for the Management of Information (with Smith and
Zajac), College of Business and Public Administration, University of Arizona, Spring 1997.

Chair, MIS Department Head Search Committee (with Puto, Issac, Holmes, Vogel, LaSalle, and Ram)
College of Business and Public Administration, University of Arizona, Fall 1996-Spring 1997.

Chair and member, Undergraduate Curriculum Committee (with LaSalle, Vogel, and Slaten), MIS
Department, University of Arizona, Fall 1992-present.

Ph.D. dissertation committees, Departments of MIS, ECE (Electronic and Computer Engineering), SIE
(System and Industrial Engineering) and Computer Science, 1989-present.

Member, Undergraduate Program Director Recruiting Committee, College of Business and Public
Administration, University of Arizona, Fall 1993.

Local Community Services and Activities

COPLINK system, funded by NIJ and NSF, has been adopted by Tucson Police Department and the
Phoenix Police Department as a statewide information sharing and intelligence analysis tool. It is currently
in use by more than 5,000 police officers in the state of Arizona.

Principal Investigator, COPLINK (database and Intranet) project for local (Tucson) law enforcement,
jointly with Chief Doug Smith of Tucson Police Department (TPD), funded by National Institute of Justice
(NIJ), $1.2M, 1997-1999.

Founder/Presenter, Knowledge Computing Corporation (KCC), Arizona Venture Capitalist Conference
(AVCC), Phoenix, AZ, November 13-14, 1997. Reported as cover stories at Arizona Daily Star, November
9, 1997 and December 20, 1997.

Journal Editorial Board

Editor in Chief, ACM Transactions on Management Information Systems, 2009-present.

Associate Editor in Chief, IEEE Intelligent Systems, 2008-present.

Member, Editorial Board, IEEE Computing Now, 2009-present.

Member, Senior Editorial Board, Journal of Information Technology and Politics, 2006-present.

Member, Editorial Board, International Journal of Digital Libraries, 2005-present.

Member, Editorial Advisory Board, Encyclopedia of Library and Information Sciences, 2005-present.

Vice Chair, Editorial Board, Library Journal, Shanghai Library and Shanghai Society for Library Science,
2004-present.



                                                    10
Associate Editor, IEEE Transactions on Intelligent Transportation Systems, 2004-2007.

Associate Editor, IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2003-present.

Associate Editor, ACM Transactions on Information Systems, 2002-present.

Member, Editorial Board, International Journal of Electronic Business, 2002-present.

Area Editor (Digital and Web Computing), Decision Support Systems, 2001-present.

Member, Editorial Board, Journal of the American Society for Information Science and Technology, 1997-
present.

Scientific Board

Information Technology Counselor, Central Police University, Taiwan, 2006-2008.

Member, Advisory Committee, Digital Library of China Project, National Library of China, China,
2004-2007.

Member, Advisory Committee, Institute of Information Science, Academia Sinica, Taiwan,
2004-2008.

Scientific Counselor, Board of Scientific Counselors, Lister Hill Center, National Library of
Medicine, National Institutes of Health, 2002-2006.

Professional Society

Member, Board of Governors (BOG), IEEE Intelligent Transportation Systems Society (ITSS), 2004-2005.

Chair, Technical Community (TC) on Intelligence and Security Informatics for Transportation Systems,
IEEE Intelligent Transportation Systems Council (ITSC), 2004-present.

Chair, Technical Committee on Homeland Security (TCHS), IEEE Systems, Man, and Cybernetics (SMC)
Society, 2004-present.

Member and Asian Digital Library liaison, Technical Committee on Digital Library (TCDL), IEEE
Computer Society, 2004-present.

ExCom (Executive Committee) member, IEEE Intelligent Transportation Systems Council (ITSC),
representing IEEE Computer Society, 2004-present.

Book Editing

Editor (with E. Reid, J. Sinai, A. Silke, and B. Ganor), “Terrorism Informatics,” Springer, 2007,
forthcoming.

Editor (with L. Brandt, V. Gregg, R. Traunmuller, S. Dawes, E. Hovy, A. McIntosh, and C. Larson),
“Digital Government: E-Government Research, Case Studies and Implementation,” Springer, 2007.

Editor (with T. S. Raghu, R. Ramesh, A. Vinze, and D. Zeng), “Handbooks in Information Systems --
National Security,” Elsevier Scientific, 2007.

Editor (with S. Fuller, C. Friedman, and W. Hersh), “Medical Informatics: Knowledge Management and
Data Mining in Biomedicine,” Springer, 2005.

Journal Guest Editing (Special Issue)




                                                   11
Guest editor (with C. Yang and C. Wei), Decision Support Systems, special issue on “Multilingual
Knowledge Management,” 2006.

Gust editor (with F. Wang), IEEE Intelligent Systems, special issue on “Artificial Intelligence for
Homeland Security,” 2005.

Guest editor (with G. Leroy), Decision Support Systems, special issue on “Decision Support in Medicine,”
2005.

Guest editor (with T. S. Raghu), Decision Support Systems, special issue on “Advances in Information
Sharing, Data Mining, and Collaboration Systems,” 2005.

Guest editor (with D. Zeng), ACM Transactions on Internet Technology, special issue on “Intelligence and
Security Informatics,” 2004.

Guest editor (with E. Lim, E. Neuhold, S. Sugimoto, and J. Li), International Journal of Digital Libraries,
special issue on “Asian Digital Libraries,” 2004.

Guest editor, Decision Support Systems, special issue on “Intelligence and Security Informatics: An
Information Systems Perspective,” 2004.

Guest editor, Journal of the American Society for Information Science and Technology special issue on
“Intelligence and Security Informatics,” 2004.

Guest editor, Journal of the American Society for Information Science special issue on “Web Retrieval and
Mining,” 2003.

Guest editor, Decision Support Systems, special issues on “Web Retrieval and Mining” and “Digital
Government: Technologies and Practices,” 2002.

Guest editor, International Journal of Decision Support Systems special issue on “From Information
Retrieval to Knowledge Management: Enabling Technologies and Best Practices,” 1999.

Guest editor, Journal of the American Society for Information Science special issue on “Digital Libraries,”
1999.

Guest editor, IEEE Computer special issue on “Digital Libraries: Technological Advances and Social
Impacts,” February 1999.

Guest editor, Journal of the American Society for Information Science special issue on “Artificial
Intelligence Techniques for Emerging Information Systems Applications,” 1998.

Guest editor, IEEE Computer May 1996 special issue on “Building Large-scale Digital Libraries” (with B.
R. Schatz).

Conference/Workshop Chair and Keynote Speaker

Conference Co-Chair, IEEE International Conference on Intelligence and Security Informatics, IEEE
ISI-2009, Dallas, Texas, June 8-11, 2009.
Honorary Chair and Keynote Speaker, First European Conference on Intelligence and Security Informatics,
EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008.

Conference Co-Chair, IEEE International Conference on Intelligence and Security Informatics, IEEE
ISI-2008, Taipei, Taiwan, June 17-20, 2008.

Workshop Co-Chair, Second NSF Workshop on Intelligence and Security Informatics: Biosurveillance,
BioSurveillance 2007, New Brunswick, NJ, May 22, 2007.



                                                    12
Conference Co-Chair, IEEE International Conference on Intelligence and Security Informatics, IEEE
ISI-2007, New Brunswick, NJ, May 23-24, 2007.
Keynote speaker, “Exploring Extremism and Terrorism on the Web: The Dark Web Project,” Pacific-Asia
Intelligence and Security Informatics Workshop, PAISI 2007, Chengdu, China, April 2007.

Steering Committee Chair, IEEE International Conference on Intelligence and Security Informatics
(IEEE ISI), 2002-present.

Steering Committee Chair, International Conference on Asian Digital Libraries (ICADL), 1998-2006.

Conference Co-Chair, IEEE International Conference on Intelligence and Security Informatics, IEEE
ISI-2006, San Diego, CA, May 19-20, 2006.

Keynote speaker, “Digital Library Development in the Asia-Pacific,” The 8th International Conference on
Asian Digital Libraries (ICADL 2005), Bangkok, Thailand, December 12-14, 2005.

Steering Committee Co-Chair, The 8th International Conference on Asian Digital Libraries (ICADL 2005),
Bangkok, Thailand, December 12-14, 2005.

Conference Co-Chair, IEEE International Conference on Intelligence and Security Informatics, IEEE
ISI-2005, Atlanta, Georgia, May 19-20, 2005.

Program Co-Chair, The 7th International Conference on Asian Digital Libraries (ICADL 2004), Shanghai,
China, December 8-12, 2004.

Technical Committee Co-Chair, The 2nd China Conference on Digital Libraries, Beijing, China, September
6-8, 2004.

Conference Chair, ACM/IEEE Joint Conference on Digital Libraries, JCDL 2004, Tucson, Arizona, June
7-11, 2004.

Symposium Chair, “NSF/DHS/ITIC/NIJ Symposium on Intelligence and Security Informatics,” Tucson,
Arizona, June 10-11, 2004.

Inaugural Speaker, “Knowledge Management Systems: Applications and Development,” International
Conference on Digital Libraries (ICDL), New Delhi, India, February 24-27, 2004.

Keynote Speaker, “Crime Data Mining and Visualization for Intelligence and Security Informatics,” IEEE
Carnahan 2003, Taipei, Taiwan, October 14, 2003.

Keynote Speaker, “Achieving Information Resources Empowerment: A Digital Library and Knowledge
Management Perspective,” CONSAL (Congress of South East Asian Librarian) XII, Brunei Darussalam,
October 20, 2003.

Program Co-Chair, The 6th International Conference on Asian Digital Libraries (ICADL 2003), Kuala
Lumpur, Malaysia, December 8-12, 2003.

Symposium Co-Chair, “NSF/NIJ Symposium on Intelligence and Security Informatics,” Tucson, Arizona,
June 2-3, 2003.

Conference Co-Chair, The 5th International Conference on Asian Digital Libraries (ICADL 2002),
Singapore, December 17-20, 2002.

Keynote Speaker, “E-library, E-government, and E-commerce: Common Threads and New Opportunities,”
The First China Digital Library Conference, Beijing, China, July 11, 2002.

Chair, International Technical Committee, The First China Digital Library Conference, Beijing, China, July
9-11, 2002.


                                                   13
Keynote Speaker, “DLI1, DLI2, NSDL, JCDL, ECDL, and ICADL,” The 4th International Conference of
Asian Digital Libraries, Bangalore, India, December 10-12, 2001.

Chair, COPLINK User Workshop, sponsored by NSF, January 18, 2002, Tucson, Arizona.

Keynote Speaker, H. Chen, “UMLS and Linguistics Enhanced Medical Information Retrieval” and
“Medical Information Retrieval in the WWW Era: Challenges and Opportunities,” NHRI (National Health
Research Institute) Research Resources 2000, Taipei, Taiwan, April 27-28, 2000.

General Chair/Keynote Speaker, “Information Visualization for Digital Libraries,” The Second Asian
Digital Library Conference, Taipei, Taiwan, November 8-9, 1999.

Conference General Chair, The 4th International Conference on Asian Digital Libraries (ICADL 2001),
Bangalore, India, December 10-12, 2001.

Conference General Chair, The Third Asia Digital Library Workshop '2000 (ICADL 2000), Seoul, Korea,
December 6-9, 2000.

Technical Track Chair, ICIS’2000, Brisbane, Australia, December 10-14, 2000.

Conference General Chair, The Second Asia Digital Library Workshop '99 (ICADL 1999), Taipei, Taiwan,
November 8-9, 1999.

Conference General Chair, The First Asia Digital Library Workshop '98 (ICADL 1998), Hong Kong,
August 6-7, 1998.

Awards (University, Industry, and National)

Hisnchun Chen, recipient of the INFORMS Design Science Award (for the COPLINK Project), Paris,
France, December 2008.

Hsinchun Chen, recipient of the IEEE Computer Society 2006 Technical Achievement Award (for his
innovative contributions to digital libraries, medical informatics, and intelligence and security informatics).

Hsinchun Chen, AAAS (American Association for the Advancement of Science) Fellow, Elected 2006
(for contributions to scholarship and development in information systems, digital library, biomedical
informatics, and intelligence and security informatics).

Hsinchun Chen, IEEE (Institute of Electrical and Electronic Engineers) Fellow, Elected 2006 (for
contributions to the development of medical, intelligence, and security informatics).
Hsinchun Chen, Outstanding Overseas Scholar of Chinese Academy of Sciences, China, July, 2005.

Hsinchun Chen, Certificate of Honor, Outstanding University Achievements, University of Arizona,
2004-2005.




                                                     14
Hsinchun Chen, National Chiao-Tung University Distinguished Alumnus Award, April, 2005.

Best Paper Award in WITS 2004, “A Unified Recommendation Framework Based on Probabilistic
Models,” Z. Huang, D. Zeng, and H. Chen, Fourteen Workshop on Information Technologies & Systems,
Washington, DC, December 11-12, 2004..

Knowledge Computing Corporation (a UA spin-off company from the AI Lab), Finalist, Arizona
Governors Technology Innovator of the Year Award, November, 2004.

Hsinchun Chen, Certificate of Honor, Recognition of accomplishments on behalf of the University of
Arizona, awarded by the Student Unions Advisory Council, October 2004.

Hsinchun Chen, The First University of Arizona Technology Innovation Award, Outstanding Faculty
Entrepreneur, September, 2004 (with a cash award of $10,000).

Best Paper Award in SIGDSS (Special Interest Group in Decision Support Systems), “A Link Analysis
Approach to Recommendation under Sparse Data,” Z. Huang, D. Zeng, and H. Chen, Tenth Annual
Americas Conference on Information Systems, August 5-8, 2004, NY, NY.

Recognition of Service Award, presented to Hsinchun Chen, In Appreciation for Contributions to ACM,
General Chair, JCDL’04: ACM/IEEE Joint Conference on Digital Libraries, June 7-11, 2004, Association
for Computing Machinery.

TPD COPLINK program won the Best of Breed award based on the responses from the Digital Cities
Survey 2002, Center for Digital Government, 2003.

Tucson Police Department (TPD) COPLINK project receives the PTI Technology Solutions Award in the
mid-size, public-safety category, January 27, 2003. The PTI Technology Solutions Awards is a national
program recognizing local governments that use technology to increase revenues, improve service to their
community, save tax dollars, or improve management.

Tucson Police Department Award “presented to Dr. Hsinchun Chen, Head of the UA/MIS Artificial
Intelligence Lab, in recognition of his outstanding service to the Public and the Law Enforcement
Community. His dedicated efforts to promote Law Enforcement Technology Development through the
CopLink Project are greatly appreciated.” Tucson Police Department (Chief Miranda), Phoenix Police
Department (Chief Hardt), March 28, 2002.

University of Arizona, Kault Award for Best Placement of Graduates, College of BPA, 2000.
McClelland Named Professor of Management Information Systems, University of Arizona, 1999.

Andersen Consulting Professor of the Year, 1999.

SAP University Alliance Grant Awards in Research/Applications, 1998-1999.

1998 Honored Entrepreneurial Fellow, Karl Eller Center for the Study of Private Market Economy,
University of Arizona.

AT&T Foundation Award in Science and Engineering, 1994-1995.

AT&T Foundation Award in Science and Engineering, 1995-1996.

Best Paper Award, “A Machine Learning Approach to Document Retrieval: An Overview and an
Experiment,” in the 27th Annual Hawaii International Conference on System Sciences (HICSS-27), Maui,
Hawaii, January 4-7, 1994.




                                                   15
NSF Research Initiation Award, Division of Information, Robotics, and Intelligent Systems, Directorate for
Computer and Information Sciences and Engineering, 1992-1994.

University of Arizona, College of Business and Public Administration Teaching Distinction List,
1989-1992.

SIM (Society of Information Management) Doctoral Fellow, 1988.

Recipient of the Taggart Fellowship, New York University, 1988-1989.

Recipient of the Stern School of Business research assistantship, New York University, 1985-1988.

Recipient of the Haakon Samuelson Memorial Award in the area of Management Science, State University
of New York at Buffalo, 1985.
Beta Gamma Sigma membership, elected 1985.

Recognition (Press and Media)

“National Dragnet Is a Click Away,” COPLINK system featured in cover page as the largest
information sharing system for the US public safety agencies. The Washington Post, March 6, 2008.

“New tool automates analysis of Jihad sites,” (Associated Press) Philadelphia Inquirer, November 18, 2007.

“Dark Web project designed to find Internet’s most dangerous,” (Associated Press) AZ Central, November
12, 2007.

“Arizona team’s tool could help law enforcement link online postings and track down terrorists,”
(Associated Press) International Herald Tribune, November 12, 2007.

“Dark Web tool seeks online terrorists,” (Associated Press) Business Week, November 11, 2007.

“Project seeks to track terror web posts,” (Associated Press) Forbes, November 11, 2007.

“Project seeks to track terror web posts,” (Associated Press) Chicago Tribune, November 11, 2007.

“Project seeks to track terror web posts,” (Associated Press) Miami Herald, November 11, 2007.

“Project seeks to track terror web posts,” (Associated Press) Newsweek, November 11, 2007.

“Project seeks to track terror web posts,” (Associated Press) ABC News, November 11, 2007.

“Project seeks to track terror web posts,” (Associated Press) Washington Post, November 11, 2007.

“Researchers say tool could help trace online posts to terrorists,” (Associated Press) USA Today,
November 11, 2007.

“Project seeks to track terror web posts,” Associated Press, November 11, 2007.

“University of Arizona tool could help fight terrorism,” ACC:15.com, November 5, 2007.

“Germany in the crosshairs of terrorism – tracking down extremists,” Second German Television (ZDF),
October 23, 2007.




                                                    16
“Dark Web project takes on cyber-terrorism,” Fox News, October 12, 2007.

“UA effort sifting web for terror-threat data,” Arizona Daily Star, September 24, 2007.

“Mathematicians work to help targeting terrorists over the web,” National Public Radio, September 14,
2007.

“UA Scientists Probe 'Dark Web' to Uncover Potential Terrorist Threats,” AI Lab Dark Web project
featured in KVOA News 4 Tucson, September 12, 2006.

“Trolling for terrorists,” AI Lab Dark Web project featured in Toronto Star, September 8, 2006.

“UA’s Dark Web: Team Combing Internet to Track Terrorism,” AI Lab Dark Web project featured in
Arizona Republic front page article, July 28, 2006.

“The Future of Terrorism,” AI Lab Dark Web project featured in Discover Magazine cover article, June
2006.

Zan Huang, ICIS 2005 Best Dissertation Award, “Graph-based Analysis for E-Commerce
Recommendation,” co-supervised by Hsinchun Chen and Daniel Zeng, December 12-15, 2005, Las Vegas,
USA.

Hsinchun Chen, Honor Professor, National Dong Hwa University, Taiwan, December 2005.

Hsinchun Chen was ranked #1 in publication productivity in Digital Library in an Information Processing
and Management study (Liu, Bollen, Nelson, Van de Somel, “Co-authorship networks in the digital library
research community,” Information Processing and Management, 41(6), December, 2005, Pages
1462-1480).

Hsinchun Chen was ranked #8 in publication productivity in Information Systems in a Communications of
the Association for Information Systems study (Huang and Hsu, “An Evaluation of Publication
Productivity in Information Systems: 1999-2003, Communications of the AIS, 15, 2005, Pages 555-564).

“LAPD hopes to Add High-Tech Partner to Force,” The COPLINK computer program can mesh data in
minutes, a task that can take a detective weeks. Los Angeles Times, January 2, 2004.

“Cops Could Hit the Links Soon: New Search Engine Would Catalog, Interpret Data for Investigations,”
Los Angeles Daily News, December 6, 2003.

“Software Joins Cops on the Beat: COPLINK program links databases, speeds police investigations,”
COPLINK deployed at the state of Alaska. Anchorage Daily News, November 23, 2003.

COLINK project recognized as a finalist (among a field 144 nominations) by the prestigious International
Association of Chiefs of Police (IACP)/Motorola 2003 Weaver Seavey Award for Quality in Law
Enforcement, IACP Conference, Philadelphia, PA, October 23, 2003.

“Software Helps Police Draw Crime Links,” A front page story about COPLINK deployment at the Boston
Police Department, Boston Globe, July 17, 2003

“Google For Cops: Software Helps Police Search for Cyber Clues to Bust Criminals,” ABC News, April
15, 2003. Also appeared on TechTV.




                                                    17
“A Google for Cops,” COPLINK was considered as the Google search engine for cops, featured in
NEWSWEEK, March 3, 2003.

“Sniper probe to get help from Tucson,” Arizona Daily Star, October 23, 2002.

“Tucson cops, local software to help in D.C. sniper probe,” Tucson Citizen, October 23, 2002.

“An Electronic Cop that Plays Hunches,” COPLINK system was used to assist in DC sniper
investigation and the project was featured in New York Times, November 2, 2002.

“Making a Digital Government,” COPLINK project was featured in LA Times, May 20, 2002 as an
exemplar digital government project that supports law enforcement information sharing and analysis.

“Super Detective: When University of Arizona professor Hsinchun Chen combined police databases for a
consortium of city police agencies, a super-detective was born.” Featured in DG (Digital Government)
Online Special Issue on Homeland Security, December 2001.

 “Key professor: E-commerce expert Hsinchun Chen is a pioneer in the knowledge management and IT
areas.” Featured in The 20 Tech-Savviest Business Schools, Business 2.0, November 2001.

“Coplink Sifts and Shares Information – Fast,” Featured in POLICE The Law Enforcement Magazine, July
2001.

“Software for Data Searchers,” Featured in Law Enforcement Technology, April 2001.

Article related to self-organizing maps (SOM) and spider (in Spanish), Featured in Revista Digital de
InfoVis.net, April 2001.

“Information Sharing Systems: Coplink,” Featured in The POLICE CHIEF, March, 2001.

“AI Lab’s Chinese semantic retrieval system is the engine behind UDN’s (United Daily News) acclaimed
intelligent news search service,” Featured in United Daily News (Taiwan), February 2, 2001.

“Technology developed in Tucson is helping police catch criminals faster. COPLINK product let police
agencies rapidly share crime information across jurisdictional lines,” Featured in Arizona Daily Star,
January 7, 2001.

“Changing the Rules of the Game. How Coplink is helping police departments match evidence across
boundaries of time and space,” Featured in FCW.com, April 3, 2000.

“Map of the Month is based on the ET-Map created by a team lead by Dr. Hsinchun Chen,” Featured in
Mapa Mundi Magazine, February, 2000.

“A Cybermap Atlas: Envisioning the Internet,” Featured in TeleGeography, 2000.

“Cartes interactives ou dynamiques (Dynamic and Interactive Maps),” article in French, Featured in
Science & Vie, 2000.

“A Smart Itsy Bitsy Spider for the Web,” Featured in BotSpot, 2000.

“Beyond Geography: Mapping Unknowns of Cyberspace,” Featured in September 30, 1999 issue of New
York Times (Technology – Circuits Section cover article).

“Coplink: Database Detective,” Summer, 1999, TECH Beat (cover article).




                                                   18
“Information Retrieval in Digital Libraries: Bring Search to the Net,” Featured in Volume 275 of Science,
January 17, 1997 (cover article).

“NCSA and the Digital Library Initiative: Finding Critical Information Quickly and Easily,” Featured in
Hewlett Packard Technical Report (5965-3214E), September 1996.

“The Ultimate Indexing Job,” Featured in Business Week, Developments to Watch Column, August 12,
1996.

“DLI Breaks the Semantic Barrier,” Featured in Volume 10, No. 2 of Access, High-performance
Computing Magazine (Page 17), National Center for Supercomputing Applications, Summer 1996.

“Digital Libraries Computation Cracks Semantic Barriers between Databases,” Featured in Volume 272 of
Science, June 7, 1996.

“Digital Library Concept Space Research,” Featured in Volume 9, No. 2 of Access, High-performance
Computing Magazine (Page 17), National Center for Supercomputing Applications, Summer 1995, Volume
269 of Science (Page 1361, “Off-the-Shelf Chips Conquer The Heights of Computing,” September 8, 1995.

“Digital Library Initiative Tackles Grand Challenge of Information Science,” Featured in Volume 5,
Number 15 of HPCWire, April 12, 1996 and Volume 2, Number 17 of WEBster, April 30, 1996

Research Grants ($30M since 1989)
Current/Funded: ($5M+)

1. Principal investigator (PI), DOD Counter Terrorism Fellowship Program (CTFP), “Dark Web
     Research Program: Collection, Portal, Research, and Training,” $300,000, in partnership with Naval
     Postgraduate School (NPS), #N00104-10-C-Q381, March 2010-March 2011.
2. Principal investigator (PI), DOD Defense Threat Reduction Agency (DTRA), Basic and Applied
     Research Directorate, “WMD Intent Identification and Interaction Analysis Using the Dark Web,”
     $1,047,000, HDTRA-09-0058, July 2009-July 2012.
3.   Principal investigator (PI), NSF, REU (Research Experience for Undergraduate) “Dark Web Research”
     $31,000, August 2009-July 2010.
4.   Principal investigator (PI), NSF, “Unveiling Trends in Global Nanotechnology Research and
     Development, $250,000, EAGER, CMMI-0926270, May 2009-April 2011.
5.   Principal investigator (PI), DHS, The National Center for Border Security and Immigration, “Project
     3.2: Fusion of Spatial-Temporal Sensor Data,” $300,000 ($60,000 per year), August 2008-July, 2012.
6. Principal investigator (PI), Air Force Research Lab (AFRL), “Dark Web WMD-Terrorism Study,”
     $89,500, August 2008-May 2009.
7. Principal investigator (PI), (with Dr. Shu-Hsing Li of National Taiwan University), Taiwan National
     Science Council, “Text Mining for Business Intelligence Applications,” $70,000, January 2008-
     December, 2011.
8. Principal investigator (PI), NSF, “CRI: Developing a Dark Web Collection and Infrastructure for
     Computational and Social Sciences,” $500,000 (CNS-0709338), October 2007-Septembert 2010.
9. Principal investigator (PI), NSF, “EXP-LA: Explosives and IEDs in the Dark Web: Discovery,
     Categorization, and Analysis,” $800,000 (CBET-0730908), December 2007-November 2010.
10. Principal investigator (PI), NSF, REU (Research Experience for Undergraduate) “BioPortal Research”
    $12,000, August 2008-July 2009.
11. Principal Investigator (PI, Co-PI: D. Zeng), NSF, Information Technology Research (ITR) Program,
     “A National Center of Excellence for Infectious Disease Informatics,” $1,200,000 (IIS-0428241),


                                                   19
August 2004-July 2009. (subcontracts: University of Utah, California Department of Health, and NY
     Department of Public Health) (UA matching: $75,000)

Past/Funded: ($25M)

1.   Principal Investigator (PI), NSF, Digital Government Program, “COPLINK Center: Social Network
     Analysis and Identity Deception Detection for Law Enforcement and Homeland Security,” $600,000
     (IIS-0429364), September 2003-August 2009. (UA matching: $75,000)
2.   Principal Investigator (PI, Co-PI: D. Zeng), NSF, Information Technology Research (ITR) Program,
     “COPLINK Center for Intelligence and Security Informatics – A Crime Data Mining Approach to
     Developing Border Safe Research,” $700,000 (EIA-0326348), September 2003-August 2009. (UA
     matching: $175,000)
3.   Principal investigator (PI), Library of Congress, “Capture of Multimedia, Multilingual Open Source
     Web-based Terrorist Content – Phase 2,” $60,000, May 2007-April 2008.
4.   Principal investigator (PI), New Mexico Tech, “Border Crossing Network Analysis,” $125,000, June
     2007-September 2007.
5.   Principal investigator (PI), NSF, “Inter-Repository Patent Analysis to Understand Worldwide
     Nanotechnology Research and Development, $100,000, SGER, December 2007-December 2008.
6.   Principal investigator (PI), NSF, “Worldwide Nanotechnology Development: A Comparative Study of
     Global Patents,” $100,000, SGER, January 2007-December 2007.
7.   Principal investigator (PI), NSF, “Multilingual Online Stylometric Authorship Identification: An
     Exploratory Study,” $75,000 (IIS-0646942), SGER, October 2006-September 2007.
8.   Founder, International BioComputing Corporation, received NSF SBIR funding (PI: H. Su),
     “BioPortal: An Informatics Infrastructure for Infectious Disease and Biosecurity Information Sharing,
     Analysis, and Visualization,” $100,000, January 2007-June 2007.
9.   Principal investigator (PI), DHS, USDA, DOD, Defense Intelligence Agency, Armed Forces Medical
     Intelligence Center (AFMIC), “Foot-and-Mouth (FMD) BioPortal: Global FMD Surveillance,
     Information Sharing, and Analysis,” $260,000, September 2006-March 2008.
10. Principal Investigator (PI), NSF (from DHS RISC Regional Information Sharing and Collaboration
    Program, “Supplement to COPLINK Center for Intelligence and Security Informatics – A Crime Data
    Mining Approach to Developing Border Safe Research,” $300,000 (EIA-0326348), July 2006-August
    2007.
11. Principal investigator (PI), NSF (CIA/DHS), “International Conference on Intelligence and Security
    Informatics (ISI 2006),” $100,000 (IIS-0636210), July 2006-June 2007.
12. Principal investigator (PI), NSF, “Arizona Biosurveillance Workshops,” $20,000 (IIS-0636637),
    August 2006-July 2007.
13. Principal investigator (PI), NSF, “NanoMap: Mapping Nanotechnology Development,” $200,000
    (DMI-0533749), August 2005-July 2007.
14. Principal investigator (PI), Federal Government (Non-Disclosure Agreement), “Terrorism Informatics
    Workshop,” $150,000, October 2007-June, 2008.
15. Principal investigator (PI), Arizona Department of Public Health, “Chief Complaint and Disease
    Surveillance,” $250,000, September 2005-October 2006.
16. Principal investigator (PI), Kansas State University, DOD, Defense Intelligence Agency, Armed
    Forces Medical Intelligence Center (AFMIC), “Enhancing and Extending RSVP-A Based on the
    BioPortal Framework,” $250,000, July 2005-December 2006.




                                                   20
17. Principal investigator (PI), NSF, “Mapping Nanotechnology Development based on the ISI Literature-
    Citation Database,” $100,000, SGER, September 2005-August 2006.
18. Principal investigator (PI), Library of Congress, “Capture of Multimedia, Multilingual Open Source
    Web-based Terrorist Content,” $60,000, July 2005-June 2006.
19. Principal Investigator (PI), Department of Homeland Security (DHS), CNRI, “BorderSafe Initiative
    Phase-2,” $780,000, June 2004-October 2005. subcontract: Tucson Police Department. (UA matching:
    $100,000)
20. Principal investigator (PI), NIH, NLM, Innovations in Biomedical Information Science and
    Technology Program, “GeneScene: A Toolkit for Gene Pathway Analysis,” $1,394,224 (1 R33
    LM07299-01), January 2002-December 2006.
21. Principal Investigator (PI), Department of Homeland Security (DHS), CNRI, “BorderSafe Initiative
    Phase-2 DHS Relevance Extension (CBP),” $200,000, October 2004-October 2005. (UA matching:
    $15,000)
22. Principal investigator (PI), NSF/CIA/DHS, “Workshop: Symposium on Intelligence and Security
    Informatics (ISI 2005),” $120,000, January 2005-December 2005.
23. Principal Investigator (PI), NSF/CIA, Knowledge Discovery and Dissemination (KDD) Program,
    “Detecting Identity Concealment,” $150,000, September 2004-August 2005. (UA matching: $25,000)
24. Principal Investigator (PI), Department of Homeland Security (DHS), CNRI, “BorderSafe Initiative,”
    $550,000, October 2003-September 2004. subcontracts: Tucson Police Department and Arizona
    Department of Customs and Border Protection. (UA matching: $100,000)
25. Principal investigator (PI), NSF/CIA/DHS, “Workshop: IEEE Intelligence and Security Informatics
    Conference (ISI 2004),” $120,000, September 2004-August 2005.
26. Co-Principal Investigator (Co-PI, PI: D. Zeng), NSF, Information Technology Research (ITR)
    Program, “Developing a Collaborative Information and Knowledge Management Infrastructure,”
    $220,000 (IIS-0114011), 2001-2004.
27. Principal investigator (PI), NSF/CIA/DHS, “Workshop: Symposium on Intelligence and Security
    Informatics (ISI 2003),” $90,000, January 2004-December 2004.
28. Principal Investigator (PI, Co-PIs: Ed Fox, Ann Lally), NSF, National Science Digital Library (NSDL)
    Program, “Intelligent Collection Services for and about Educators and Students: Logging, Spidering,
    Analysis and Visualization,” $480,000 (DUE-012741), 2001-2004.
29. Principal investigator (PI), NSF, “NSF/CIA KDD ARJIS/COPLINK Border Safe Research and
    Testbed,” (in collaboration with TPD and San Diego ARJIS), $751,996 (EIA-9983304), supplement to
    “COPLINK Center: Information and Knowledge Management for Law Enforcement,” March 2003-
    March 2004. (UA matching: $62,500)
30. Co-Principal Investigator (Co-PI, PIs: Jim Cox, Daniel Zeng, Jim Austin), NSF, National Science
    Digital Library (NSDL) Program, “An Active Object-Oriented Digital Library for Microeconomics
    Education,” $700,000, September 2002-August 2004.
31. Principal Investigator (PI, Co-PI: D. Zeng; subcontracts: NY and CA Departments of Health), NSF,
    “COPLINK Center (Disease Informatics Supplemental Request): Developing a National Infectious
    Disease Information Infrastructure: An Experiment in West Nile Virus and Botulism,” $800,000
    (EIA-9983304), October 2003-March 2004. subcontracts: New York State Department of Health and
    California Department of Health Services. (UA matching: $50,000)
32. Principal Investigator (PI), NSF, Digital Government Program, “COPLINK Center: Information and
    Knowledge Management for Law Enforcement,” $1,600,000 (EAI-9983304), July, 2000-March, 2004.
33. Principal investigator (PI), NSF, SGER, “Intelligent Patent Analysis and Visualization,” $100,000
    (IIS-0311628), May 2003-April 2004. (UA matching: $25,000)




                                                  21
34. Principal investigator (PI), NSF, SGER, “Intelligent Patent Analysis for Nanoscale Science and
    Engineering,” $99,935 (CTS-0311652), May 2003-April 2004. (UA matching: $25,000)
35. Principal investigator (PI), NSF, SGER, “DGPort: Intelligent Web Searching for Digital Government
    Research,” $92,965 (EIA-0302353), January 2003-December 2003. (UA matching: $23,000)
36. Principal investigator (PI), NSF/CIA, “Workshop: Symposium on Intelligence and Security
    Informatics (ISI 2003),” $90,000 (EIA-0317269), March 2003-December 2003.
37. Principal Investigator (PI, Co-PI: Bob Fund, Knowledge Computing Corporation), NSF/CIA,
    Knowledge Discovery and Dissemination (KDD) Program, “COPLINK Testbed for Homeland
    Security Data Mining,” $201,000, September 2002-June 2003.
38. Principal investigator (PI), NIH, NLM, “UMLS-Enhanced Dynamic Agents to Manage Medical
    Knowledge,” $400,000 (1 R01 LM06319-01 A1), February 2000-January 2003.
39. Principal Investigator (PI), The University of Arizona NSF Digital Government Matching Account
    #210199, $100,000, July, 2000-June 2003.
40. Principal investigator (PI), NSF, SGER, “NanoPort: Intelligent Web Searching for Nanoscale Science
    and Engineering,” $99,980 (CTS-0304375), January 2002-December 2002.
41. Principal Investigator (PI), The University of Arizona Intellectual Property Account #239760, $34,000,
    2001.
42. Principal investigator (PI), NSF Digital Library Initiative-2, “High-performance Digital Library
    Systems: From Information Retrieval to Knowledge Management,” $500,000 (IIS-9817473), April
    1999-May 2002.
43. Principal investigator (PI), NSF/CISE/CSS, “An Intelligent CSCW Workbench: Personalized Analysis
    and Visualization,” $331,451 (IIS-9800696), June 1998-June 2001.
44. Founding Director, Mark and Susan Hoffman E-Commerce Lab, $1M lab naming endowment;
    $500,000 equipment donation fro HP; ERP and e-commerce software donations from Oracle, SAP,
    J.D. Edward, IBM, Microsoft, and IFS for a combined value of $10M, October 2000.
45. Principal investigator (PI), Digital Equipment Corporation, External Technology Grants Program,
    “COPLINK: Database Integration and Access for a Law Enforcement Intranet,” DEC AlphaServer
    4100 (5/533 Mhz CPU, 2 GBs RAM, 100 GBs disk), $184,893, 1997-2001 (equipment donation).
46. Principal Investigator (PI, Co-PI: O. Sheng), “E-Commerce Agent Research and Curriculum
    Development through HP E-speak: A Framework for Creating Wireless B2B Solutions,” $122,729,
    June, 2000-May, 2001.
47. Principal investigator (PI), City of Tucson, “Coplink Concept Space: An Intelligence Analysis Tool,”
    $250,000, January-September, 2000.
48. Principal investigator (PI), Hewlett-Packard Company University Grant, “Hewlett-Packard Enterprise
    Computing Lab for Enterprise Information Systems Education and Research,” $305,578, July, 1999.
49. Principal investigator (PI), Silicon Graphics Inc. (SGI), SGI Origin2000 supercomputer (8 R10000
    processors, 1 GB RAM, 100 GBs disk), $210,000, 1998-2001 (equipment donation).
50. National Center for Supercomputing Applications (NCSA), “Parallel Computation for a Semantic
    Interoperability Environment,” High-performance Computing Resources Grants on SGI/Cray
    Origin2000 (512 processors), July 1997-June 2000.
51. Principal investigator (PI, with B. Schatz at NCSA), Department of Defense, Advanced Research
    Projects Agency (DARPA), “The Interspace Prototype: An Analysis Environment based on Scalable
    Semantics,” $3,309,000, June 1997-May 2001 (subcontract to H. Chen, PI, University of Arizona:
    $1,078,991, N66001-97-C-8535).
52. Principal investigator (PI), National Cancer Institute, National Institutes of Health (NIH), “Information
    Analysis and Visualization for Cancer Literature: Phase II,” $100,000, January 1999-December 1999.


                                                     22
53. Principal investigator (PI, with D. Smith, Chief of Tucson Police Department) National Institute of
    Justice, “COPLINK: Database Integration and Access for a Law Enforcement Intranet,” $1,200,459,
    July 1997-January 2000 (subcontract to H. Chen, PI, University of Arizona: $941,887).
54. Principal investigator (PI), 3COM, “High-Performance Multimedia System Benchmarking: An
    Experiment for Internt-2,” $90,000, October 1998-February 1999.
55. Principal investigator (PI), SAP University Alliance Grant Awards, “Knowledge Management for SAP
    R/3: An Experiment on Call Center Record Management,” $75,000, January 1999-December 1999.
56. Principal investigator (PI), Department of Defense, Advanced Research Projects Agency (DARPA),
    “GeoWorlds, Task 5.1 Under Dasher” $194,000, June 1998-December 1998.
57. Co-Principal investigator (Co-PI, PI: B. Schatz, University of Illinois) Digital Library Initiative, NSF/
    ARPA/NASA, “Building the Interspace: Digital Library Infrastructure for a University Engineering
    Community,” $4,000,000, September 1994-August 1998 (IRI9411318) (subcontracts to H. Chen, PI,
    University of Arizona, Period 1 (9/94-2/95): $61,880; Period 2 (2/95-2/96): $85,760; Period 3
    (2/96-2/97): $188,368; Period 4 (2/97-2/98): $242,032; Period 5 (2/98-9/98): $150,000).
58. Principal investigator (PI), National Science Foundation, CISE, IRIS, “Concept-based Categorization
    and Search on Internet: A Machine Learning, Parallel Computing Approach,” $200,755, September
    1995-August 1998 (IRI9525790).
59. Co-Principal investigator (Co-PI, PI: T. Smith, UCSB), NSF, CISE, “Supplement to Alexandria DLI
    Project: A Semantic Interoperability Experiment for Spatially-Oriented Multimedia Data,” $100,000,
    June 1996-May 1998 (subcontract to H. Chen, PI, University of Arizona, $49,220, KK7022,
    IRI9411330).
60. National Center for Supercomputing Applications (NCSA), “Medical Information Analysis and
    Knowledge Discovery,” High-performance Computing Resources Grants on SGI/Cray Origin2000
    (512 processors), January 1997-July 1997.
61. Principal investigator (PI, with B. Schatz at National Center for Supercomputing Applications),
    National Cancer Institute, National Institutes of Health (NIH), “Information Analysis and Visualization
    for Cancer Literature,” $150,000, July 1996-July 1997.
62. Principal investigator, Special Information Services, National Library of Medicine, NLM Research
    Participant Program (sponsoring two research fellows: M. Ramsey and K. Tolle), “Semantic Retrieval
    for Toxicology and Hazardous Substance Databases,” $50,000, October 1996-July 1997.
63. Principal investigator, National Center for Supercomputing Applications (NCSA), “Parallel Semantic
    Analysis for Spatially-Oriented Multimedia GIS Data,” High-performance Computing Resources
    Grants (Peer Review Board), on Convex Exemplar (64 processors, 24,000 SUs), June 1996-June 1997
    (IRI960001N).
64. Co-Investigator (Co-I, PI: J. Yen, Hong Kong University of Science and Technology), Hong Kong
    Research Grants Council, “Intelligent Agent for the Financial Databases,” HK$544,000, July 1995-
    June 1997.
65. Principal investigator (PI), National Center for Supercomputing Applications (NCSA), “Parallel
    Computation for a Semantic Interoperability Environment,” High-performance Computing Resources
    Grants (Peer Review Board), on SGI Power Challenge Array (128 R8000 processors, 8000 SUs) and
    CRAY SGI Origin2000 (128 R10000 processors, 4,000 SUs), June 1997-June 1998 (IRI970002N).
66. Principal investigator (PI), National Center for Supercomputing Applications, “Information Analysis
    and Visualization for Business Applications,” $20,000, May 1996-December 1996.
67. Principal investigator (PI), AT&T Foundation Special Purpose Grants in Science and Engineering,
    “Intelligent Internet Resource Categorization and Discovery,” $10,000, October 1996-September 1996.
68. Principal investigator (PI), National Center for Supercomputing Applications (NCSA), “Information
    Analysis and Knowledge Discovery for Digital Libraries,” High-performance Computing Resources




                                                    23
Grants (Peer Review Board), on SGI Power Challenge Array (48 R8000 processors, 3000 SUs),
    October 1995-September 1996 (IRI950001N).
69. Co-Investigator (Co-I, PI: N. Strausfeld, University of Arizona), National Science Foundation,
    Database Activities Program - Division of Biological Intrumentations and Resources, Database
    Activities Relating to identifiable Neurons, “FLYBRAIN, The First in a Federation of Databases for
    Insect Neurology,” $896,424, September 1995-August 1998.
70. Principal investigator (PI), National Center for Supercomputing Applications (NCSA),
    “NSF/ARPA/NASA Digital Libraries,” High-performance Computing Resources Grants, on Cray
    CS6400 (8 processors) July 15, 1995-Dec 31, 1995 (IRI950003N).
71. Principal investigator (PI), National Center for Supercomputing Applications (NCSA), “Terabyte
    Information Analysis and Knowledge Discovery,” High-performance Computing Resources Grants, on
    Connection Machine CM-5 (521 nodes), SGI Power Challenge (16 R8000 processors), and Convex
    Exemplar (24 HP processors), September 1994-July 1995 (IRI950001N).
72. Principal investigator (PI), AT&T Foundation Special Purpose Grants in Science and Engineering, “An
    Artificial Intelligence Approach to Creating an Intelligent GroupSystems Environment,” $10,000,
    September 1994-August 1995.
73. Principal investigator (PI), College of Business and Public Administration Summer Research Grant,
    University of Arizona, “Using AI Techniques for GroupSystems,” $13,000, June-August, 1994.
74. Principal investigator (PI), Small Grants Program, University of Arizona, “A Concept Space Approach
    to Multilingual Information Access,” $4,540, January 1, 1994- December 31, 1994.
75. Principal investigator (PI), Research Initiation Award, National Science Foundation, “Building a
    Concept Space for an Electronic Community System,” $63,804, June 1, 1992- November 30, 1994
    (IRI9211418).
76. Principal investigator (PI), International Program Development Funds, University of Arizona,
    “UA/ITESM International Technology and Business Information System,” $4,000, 1992-1993.
77. Faculty mentor/sponsor (MIS Department senior: Wilcox), Undergraduate Summer Research Grant,
    University of Arizona, “Building an Internet Spider,” $1,000, 1996-1997.
78. Faculty mentor/sponsor (MIS Department seniors: Buntin, Sommer, Neely, Womersley),
    Undergraduate Summer Research Grant, University of Arizona, “A Machine Learning Approach to
    Prediction: A Greyhound Racing Example,” $800, 1992-1993.
79. Principal investigator (PI), Biomedical Research Support Grant Program, Division of Research
    Resources, National Institutes of Health, “A Neural Network Approach to the Estimation of the
    Aqueous Activity Coefficients (Solubility),” $5,000, 1992-1993 (BRSG S07RR07002).
80. Principal investigator (PI), SIM (The Society for Information Management) grant, “A Knowledge-
    Based Approach to the Design of Information Retrieval Systems,” $3,000, 1989-1990.

Founder of UA Spin-off Companies

1. Knowledge Computing Corporation (venture capital funding, 2000-, $4.6M): Founder of a
    University of Arizona technology spin-off company. Knowledge Computing Corporation (KCC)
    receives exclusive licensing from the University of Arizona for the Artificial Intelligence Lab
    technologies. In return, the University receives annual licensing and royalty fees. KCC is based in
    Tucson and is committed to making Tucson a successful community for information technology
    companies. The company has grown to more than 40 employees and is managed and owned by
    professional managers and software engineers. The company has received more than $4.6M in VC
    funding (from Arizona, Silicon Valley, and overseas VCs) and is growing rapidly in the law
    enforcement and knowledge management sectors. KCC’s most recent annual revenues total more than
    $15M with over $4M in profits. KCC’s major product, COPLINK Solution Suite, has been adopted by




                                                  24
more than 3,500 police agencies in 20 states. KCC was purchased by a private equity firm for $40M in
    July 2009 and merged with I2, the industry leader in crime analytics.

2. International BioComputing Corporation (2006-): Co-founder of IBC (with D. Zeng and L. Tseng)
    for international biosurveillance. IBC received SBIR funding ($100,000) from NSF in January 2007.
    The company currently targets at public health and biodefense agencies.

Industrial Consulting

NCSA Commercial Application Group (digital libraries, knowledge discovery), Convex/Hewlett Packard
(supercomputing applications, call center), Caterpillar Corporation (textual knowledge discovery), National
Cancer Institute (textual analysis), National Institute of Allergy and Infectious Disease (medical concept
mapping), Caterpillar (knowledge management), Ventana Corporation (collaborative computing), Honk
Kong University of Science and Technology (financial digital libraries), Information Handling Services
(automatic indexing), AllState (Intranet/Internet), IBM (competitive intelligence), 3Com (QoS
applications), Allied Signal (competitive intelligence), Andersen Consulting (knowledge management).

Refereed Journal Publications: Published and Forthcoming
1. H. Chen and V. Dhar, “User Misconceptions of Information Retrieval Systems,” International Journal
    of Man-Machine Studies, Volume 32, Number 6, Pages 673-692, 1990.
2. H. Chen and V. Dhar, “Cognitive Process as a Basis for Intelligent Retrieval Systems Design,”
    Information Processing and Management, Volume 27, Number 5, Pages 405-432, 1991.
3. H. Chen, K. J. Lynch, A. K. Himler, and S. E. Goodman, “Information Management in Research
    Collaboration,” International Journal of Man-Machine Studies, Volume 36, Number 3, Pages 419-445,
    March, 1992.
4. H. Chen, “Knowledge-Based Document Retrieval: Framework and Design,” Journal of Information
    Science: Principles & Practice, Volume 18, Number 3, Pages 293-314, June, 1992.
5. H. Chen and K. J. Lynch, “Automatic Construction of Networks of Concepts Characterizing Document
    Databases,” IEEE Transactions on Systems, Man, and Cybernetics, Volume 22, Number 5, Pages
    885-902, 1992.
6. E. Carmel, S. F. Crawford, and H. Chen, “Browsing in Hypertext: A Cognitive Study,” IEEE
    Transactions on Systems, Man, and Cybernetics, Volume 22, Number 5, Pages 865-884, 1992.
7. E. M. Roche, S. E. Goodman, and H. Chen, “The Landscape of International Computing,” Advances in
    Computers, Edited by M. C. Yovits, Volume 35, Pages 326-371, 1992.
8. H. Chen, K. J. Lynch, K. Basu, and T. Ng, “Generating, Integrating, and Activating Thesauri for
    Concept-Based Document Retrieval,” IEEE Expert, Special Series on Artificial Intelligence in Text-
    Based Information Systems, Volume 8, Number 2, Pages 25-34, April, 1993.
9. H. Chen, “Collaborative Systems: Solving the Vocabulary Problem,” IEEE COMPUTER, Special
    Issue on Computer-Supported Cooperative Work, Volume 27, Number 5, Pages 58-66, May, 1994.
10. H. Chen, A. K. Danowitz, K. J. Lynch, S. E. Goodman, and W. K. McHenry, “Explaining and
    Alleviating Information Management Indeterminism: A Knowledge-Based Framework,” Information
    Processing and Management, Volume 30, Number 4, Pages 557-570, July-August, 1994.
11. H. Chen, P. Hsu, R. Orwig, L. Hoopes, and J. Nunamaker, “Automatic Concept Classification of Text
    from Electronic Meetings,” Communications of the ACM, Volume 37, Number 10, Pages 56-73,
    October 1994.




                                                    25
12. H. Chen, P. Buntin, L. She, S. Sutjahjo, C. Sommer, and D. Neely, “Expert Prediction, Symbolic
    Learning, and Neural Networks: An Experiment on Greyhound Racing,” IEEE EXPERT, Volume 9,
    Number 6, Pages 21-27, December 1994.
13. H. Chen and J. Kim, “GANNET: A Machine Learning Approach to Document Retrieval,” Journal of
    Management Information Systems, Volume 11, Number 3, Pages 9-43, Winter 1994/95.
14. H. Chen, B. Schatz, T. Yim, and D. Fye, “Automatic Thesaurus Generation for an Electronic
    Community System,” Journal of the American Society for Information Science, Volume 46, Number 3,
    Pages 175-193, April 1995.
15. H. Chen, “Machine Learning for Information Retrieval: Neural Networks, Symbolic Learning, and
    Genetic Algorithms,” Journal of the American Society for Information Science, Volume 46, Number 3,
    Pages 194-216, April 1995.
16. H. Chen and T. Ng, “An Algorithmic Approach to Concept Exploration in a Large Knowledge
    Network (Automatic Thesaurus Consultation): Symbolic Branch-and-bound Search vs. Connectionist
    Hopfield Net Activation,” Journal of the American Society for Information Science, Volume 46,
    Number 5, Pages 348-369, June 1995.
17. H. Chow, H. Chen, T. Ng, P. Myrdal, and S. H. Yalkowsky, “Using Backpropagation Networks for the
    Estimation of Aqueous Activity Coefficients of Aromatic Organic Compounds,” Journal of Chemical
    Information and Computer Sciences, American Chemical Society, Volume 35, Number 4, Pages
    723-728, July/August 1995.
18. C. Lin and H. Chen, “An Automatic Indexing and Neural Network Approach to Concept Retrieval and
    Classification of Multilingual (Chinese-English) Documents,” IEEE Transactions on Systems, Man,
    and Cybernetics, Volume 26, Number 1, Pages 1-14, February 1996.
19. H. Chen, C. Schuffels, and R. Orwig, “Internet Categorization and Search: A Machine Learning
    Approach,” Journal of Visual Communication and Image Representation, Special Issue on Digital
    Libraries, Volume 7, Number 1, Pages 88-102, 1996.
20. B. Schatz and H. Chen, “Building Large-Scale Digital Libraries,” IEEE Computer, Special Issue on
    “Building Large-scale Digital Libraries,” Volume 29, Number 5, Pages 22-27, May, 1996.
21. B. Schatz, B. Mischo, T. Cole, J. Hardin, A. Bishop, and H. Chen, “Federating Diverse Collections of
    Scientific Literature,” IEEE Computer, Special Issue on “Building Large-scale Digital Libraries,”
    Volume 29, Number 5, Pages 28-36, May, 1996.
22. H. Chen, A. Houston, J. Yen, and J. F. Nunamaker, “Toward Intelligent Meeting Agents,” IEEE
    Computer, Volume 29, Number 8, Pages 62-70, August, 1996.
23. H. Chen, B. R. Schatz, T. D. Ng, J. P. Martinez, A. J. Kirchhoff, C. Lin, “A Parallel Computing
    Approach to Creating Engineering Concept Spaces for Semantic Retrieval: The Illinois Digital Library
    Initiative Project,” IEEE Transactions on Pattern Analysis and Machine Intelligence, Special Section
    on Digital Libraries: Representation and Retrieval, Volume 18, Number 8, Pages 771-782, August,
    1996.
24. R. Orwig, H. Chen, D. Vogel, and J. F. Nunamaker, “A Multi-Agent View of Strategic Planning Using
    Group Support Systems and Artificial Intelligence,” Group Decision and Negotiation, Volume 5,
    Pages 37-59, 1996.
25. H. Chen, J. Martinez, T. D. Ng, and B. R. Schatz, “A Concept Space Approach to Addressing the
    Vocabulary Problem in Scientific Information Retrieval: An Experiment on the Worm Community
    System,” Journal of the American Society for Information Science, Volume 48, Number 1, Pages
    17-31, January, 1997.




                                                  26
26. R. E. Orwig, H. Chen, and J. F. Nunamaker, “A Graphical, Self-Organizing Approach to Classifying
    Electronic Meeting Output,” Journal of the American Society for Information Science, Volume 48,
    Number 2, Pages 157-170, February, 1997.
27. H. Chow, K. Tolle, D. Roe, V. Elsberry, and H. Chen, “Application of Neural Networks to Population
    Pharmacokinetics Data Analysis,” Journal of Pharmaceutical Sciences, Volume 86, Number 7, Pages
    840-845, July, 1997.
28. H. Chen, T. R. Smith, M. L. Larsgaard, L. L. Hill, and M. Ramsey, “A Geographic Knowledge
    Representation System (GKRS) for Multimedia Geospatial Retrieval and Analysis,” International
    Journal of Digital Libraries, Volume 1, Number 2, Pages 132-152, September, 1997.
29. H. Chen, G. Shankaranarayanan, A. Iyer, and L. She “A Machine Learning Approach to Inductive
    Query by Examples: An Experiment Using Relevance Feedback, ID3, Genetic Algorithms, and
    Simulated Annealing,” Journal of the American Society for Information Science, Volume 49, Number
    8, Pages 693-705, June 1998.
30. H. Chen, J. Martinez, A. Kirchhoff, T. D. Ng, and B. R. Schatz, “Alleviating Search Uncertainty
    Through Concept Associations: Automatic Indexing, Co-occurrence Analysis, and Parallel
    Computing,” Journal of the American Society for Information Science, Special Issue on “Management
    of Imprecision and Uncertainty in Information Retrieval and Database Management Systems,” Volume
    49, Number 3, Pages 206-216, 1998.
31. H. Chen, “Artificial Intelligence Techniques for Emerging Information Systems Applications:
    Trailblazing Path to Semantic Interoperability,” Journal of the American Society for Information
    Science, Volume 49, Number 7, Pages 579-581, 1998.
32. H. Chen, A. L. Houston, R. R. Sewell, and B. R. Schatz, “Internet Browsing and Searching: User
    Evaluation of Category Map and Concept Space Techniques,” Journal of the American Society for
    Information Science, Special Issue on AI Techniques for Emerging Information Systems Applications,
    Volume 49, Number 7, Pages 582-603, 1998.
33. H. Chen, Y. Chung, M. Ramsey, and C. Yang, “A Smart Itsy Bitsy Spider for the Web,” Journal of the
    American Society for Information Science, Special Issue on AI Techniques for Emerging Information
    Systems Applications, Volume 49, Number 7, Pages 604-618, 1998.
34. D. Roussinov and H. Chen, “A Scalable Self-Organizing Map Algorithm for Textual Classification: A
    Neural Network Approach to Automatic Thesaurus Generation,” Communication and Cognition in
    Artificial Intelligence Journal (CC-AI), Volume 15, Number 1-2, Pages 81-111, 1998.
35. H. Chen, O. Titkova, R. Orwig, and J. F. Nunamaker, “Information Visualization for Collaborative
    Computing,” IEEE Computer, Volume 31, Number 8, Pages 75-82, August, 1998.
36. H. Chen, Y. Chung, M. Ramsey, and C. Yang, “An Intelligent Personal Spider (Agent) for Dynamic
    Internet/Intranet Searching,” Decision Support Systems, Volume 23, Pages 41-58, 1998.
37. H. Chen, Y. Zhang, and A. Houston, “Semantic Indexing and Searching Using a Hopfield Net,”
    Journal of Information Science, Volume 24, Number 1, Pages 3-18, 1998.
38. B. R. Schatz, W. Mischo, T. Cole, A. Bishop, S. Harum, E. Johnson, L. Neumann, H. Chen, D. T. Ng,
    “Federated Search of Scientific Literature,” IEEE Computer, Special Issue on Digital Libraries,
    Volume 32, Number 2, Pages 51-59, February, 1999.
39. B. R. Schatz and H. Chen, “Digital Libraries: Technological Advances and Social Impacts,” IEEE
    Computer, Special Issue on Digital Libraries, Volume 32, Number 2, Pages 45-50, February, 1999.
40. H. Chen, “Digital Library Research in Asia,” IEEE Computer, Special Issue on Digital Libraries,
    Volume 32, Number 2, Pages 48-49, February, 1999.




                                                  27
41. B. Zhu, M. Ramsey, T. D. Ng, H. Chen, and B. R. Schatz, “Creating a Large-Scale Digital Library for
    Georeferenced Information,” D-Lib Magazine, Volume 5, Number 7/8, July/August, 1999.
42. H. Chen, “Semantic Research for Digital Libraries,” D-Lib Magazine, Volume 5, Number 10/11,
    October/November, 1999.
43. H. Chen and A. Houston, “Digital Libraries: Social Issues and Technological Advances,” in Advances
    in Computers, Edited by M. Zelkowitz, Volume 48, Pages 257-314, 1999.
44. M. Ramsey, H. Chen, B. Zhu, and B. R. Schatz, “A Collection of Visual Thesauri for Browsing Large
    Collections of Geographic Images,” Journal of the American Society for Information Science, Volume
    50, Number 9, pages 826-834, 1999.
45. H. Chen, “From Information Retrieval to Knowledge Management: Enabling Technologies and Best
    Practices,” Decision Support Systems, Volume 27, Number 1-2, Pages 1-4, November 1999.
46. D. Roussinov and H. Chen, “Document Clustering for Electronic Meetings: An Experimental
    Comparison of Two Techniques,” Decision Support Systems, Volume 27, Number 1, Pages 67-80,
    November 1999.
47. M. McQuaid, T. Ong, H. Chen, and J. F. Nunamaker, “Multidimensional Scaling for Group Memory
    Visualization,” Decision Support Systems, Volume 27, Number 1-2, Pages 163-176, November 1999.
48. L. Houston, H. Chen, S. M. Hubbard, B. R. Schatz, T. D., Ng, R. R. Sewell, and K. M. Tolle, “Medical
    Data Mining on the Internet: Research on a Cancer Information System,” Artificial Intelligence
    Review, Volume 13, Pages 437-466, 1999.
49. B. Zhu, M. Ramsey, and H. Chen, “Creating a Large-scale Content-based Airphoto Image Digital
    Library,” IEEE Transactions on Image Processing, Special Issue on Image and Video Processing for
    Digital Libraries, Volume 9, Number 1, Pages 163-167, January, 2000.
50. K. Tolle and H. Chen, “Comparing Noun Phrasing Techniques for Use with Medical Digital Library
    Tools,” Journal of the American Society for Information Science, Special Issue on Digital Libraries,
    Volume 51, Number 4, Pages 352-370, 2000.
51. H. Chen, “Introduction to the Special Topic Issue: Part 1, Digital Libraries, The Field,” Journal of the
    American Society for Information Science, Special Issue on Digital Libraries, Volume 51, Number 3,
    Pages 213-215, 2000.
52. C. C. Yang, J. Yen, and H. Chen, “Intelligent Internet Searching Engine based on Hybrid Simulated
    Annealing,” Decision Support Systems, Volume 28, Number 3, Pages 269-277, 2000.
53. H. Chen, “Introduction to the Special Topic Issue: Part 2, Towards Building a Global Digital Library,”
    Journal of the American Society for Information Science, Special Issue on Digital Libraries, Volume
    51, Number 4, Pages 311-312, 2000.
54. B. Zhu and H. Chen, “Validating a Geographic Image Retrieval System,” Journal of the American
    Society for Information Science, Volume 51, Number 7, Pages 625-634, 2000.
55. C. Lin, H. Chen and J. F. Nunamaker, “Verifying the Proximity Hypothesis for Self-Organizing
    Maps,” Journal of Management Information Systems, Volume 16, Number 3, Pages 57-70, 2000.
56. L. Houston, H. Chen, B. R. Schatz, R. R. Sewell, K. M. Tolle, T. E. Doszkocs, S. M. Hubbard, and D.
    T. Ng, “Exploring the Use of Concept Spaces to Improve Medical Information Retrieval.” Decision
    Support Systems, Special Issue on Decision Support for Health Care in a New Information Age,
    Volume 30, Number 2, Pages 171-186, 2000.
57. K. M. Tolle, H. Chen, and H. Chow, “Estimating Drug/plasma Concentration Levels by Applying
    Neural Networks to Pharmacokinetic Data Sets,” Decision Support Systems, Special Issue on Decision
    Support for Health Care in a New Information Age, Volume 30, Number 2, Pages 139-152, 2000.



                                                    28
58. R. V. Hauck, R. Sewell, T. D. Ng, and H. Chen, “Concept Based Searching and Browsing: A
    Geoscience Experiment,” Journal of Information Science, Volume 27, Number 4, Pages 199-210,
    2001.
59. H. Chen, H. Fan, M. Chau, and D. Zeng, “MetaSpider: Meta-Searching and Categorization on the
    Web,” Journal of the American Society for Information Science, Volume 52, Number 13, Pages
    1134-1147, 2001.
60. G. Leroy and H. Chen, “Meeting Medical Terminology Needs: The Ontology-Enhanced Medical
    Concept Mapper,” IEEE Transactions on Information Technology in Biomedicine, Volume 5, Number
    4, Pages 261-270, 2001.
61. R. V. Hauck, H. Atabakhsh, P. Ongvasith, H. Gupta, and H. Chen, “Using Coplink to Analyze
    Criminal-Justice Data,” IEEE Computer, Volume 35, Number 3, Pages 30-37, 2002.
62. D. G. Roussinov and H. Chen, “Information Navigation on the Web by Clustering and Summarizing
    Query Results,” Information Processing and Management, Volume 37, Number 6, Pages 789-816,
    2002.
63. H. Chen, M. C. Chau, and D. Zeng, “CI Spider: A Tool for Competitive Intelligence on the Web,”
    Decision Support Systems, Volume 34, Number 1, Pages 1-17, December, 2002.
64. H. Chen, D. Zeng, H. Atabakhsh, W. Wyzga, J. Schroeder, “COPLINK: Managing Law Enforcement
    Data and Knowledge,” Communications of the ACM, Volume 46, Number 1, Pages 28-34, January
    2003.
65. H. Chen, “Digital Government: Technologies and Practices,” Decision Support Systems, Volume 34,
    Number 3, Pages 223-227, February 2003.
66. H. Chen, J. Schroeder, R. V. Hauck, L. Ridgeway, H. Atabakhsh, H. Gupta, C. Boarman, K.
    Rasmussen, and A. W. Clements, “COPLINK Connect: Information and Knowledge Management for
    Law Enforcement,” Decision Support Systems, Special Issue on Digital Government, Volume 34,
    Number 3, Pages 271-286, February 2003.
67. H. Chen, “Web Retrieval and Mining,” Decision Support Systems, Special Issue on Web Retrieval and
    Mining, Volume 35, Number 1, Pages 1-5, April 2003.
68. M. Chau, D, Zeng, H. Chen, N. Huang, and D. Hendriawan, “Design and Evaluation of a Multi-Agent
    Collaborative Web Mining Systems,” Decision Support Systems, Special Issue on Web Retrieval and
    Mining, Volume 35, Number 1, Pages 167-183, April 2003.
69. C. C. Yang, H. Chen, and K. Hong, “Visualization of Large Category Map for Internet Browsing,”
    Decision Support Systems, Special Issue on Web Retrieval and Mining, Volume 35, Number 1, Pages
    89-102, April 2003.
70. N. C. Romano, C. B. Bauer-Donovan, H. Chen, and J. F. Nunamaker, “A Methodology for Analyzing
    Web-Based Qualitative Data,” Journal of Management Information Systems, Volume 19, Number 4,
    Pages 213-246, Spring, 2003.
71. M. Chau and H. Chen, “Comparison of Three Vertical Search Spiders,” IEEE Computer, Volume 36,
    Number 5, Pages 56-62, 2003.
72. H. Chen, “Web Retrieval and Mining: a Machine Learning Perspective,” Journal of the American
    Society for Information Science and Technology, Volume 54, Number 7, Pages 621-624, 2003.
73. H. Chen, A. M. Lally, and M. Chau, “HelpfulMed: Intelligent Searching for Medical Information over
    the Internet,” Journal of the American Society for Information Science and Technology, Volume 54,
    Number 7, Pages 683-694, 2003.




                                                 29
74. G. Leroy and H. Chen, “The Use of Dynamic Contexts to Improve Casual Internet Searching,” ACM
    Transactions on Information Systems, Volume 21, Number 3, Pages 229-253, July 2003.
75. H. Chen, H. Fan, M. Chau, and D. Zeng, “Testing A Cancer Meta Spider,” International Journal of
    Human-Computer Studies, Volume 59, Number 5, Pages 755-776, 2003.
76. Z. Huang, H. Chen, A. Yip, G. Ng, F. Guo, Z. Chen, and M. C. Roco, “Longitudinal Patent Analysis
    for Nanoscale Science and Engineering: Country, Institution and Technology Field,” Journal of
    Nanoparticle Research, Volume 5, Pages 333-363, 2003.
77. G. Leroy, H. Chen, and J. D. Martinez, “A Shallow Parser Based on Closed-Class Words to Capture
    Semantic Relations in Biomedical Text,” Journal of Biomedical Informatics (JBI), Volume 36, Pages
    145-158, June 2003.
78. M. Chau, Z. Huang, and H. Chen, “Teaching Key Topics in Computer Science and Information
    Systems through a Web Search Engine Project,” ACM Journal of Educational Resources in
    Computing, Volume 3, Number 3, Pages 1-14, 2003.
79. H. Chen and M. Chau, “Web Mining: Machine Learning for Web Applications,” Annual Review of
    Information Science and Technology (ARIST), Volume 38, Pages 289-329, 2004.
80. Z. Huang, W. Chung, and H. Chen, “A Graph Model for E-Commerce Recommender Systems,”
    Journal of the American Society for Information Science and Technology, Volume 55, Number 3,
    Pages 259-274, 2004.
81. G. Wang, H. Chen, and H. Atabakhsh, “Automatically Detecting Deceptive Criminal Identities,”
    Communications of the ACM, Volume 47, Number 3, Pages 71-76, 2004.
82. G. Wang, H. Chen, and H. Atabakhsh, “Criminal Identity Deception and Deception Detection in Law
    Enforcement,” Group Decision and Negotiation, Volume 13, Number 2, Pages 111-127, 2004.
83. H. Chen, W. Chung, J. Xu, G. Wang, Y. Qin, and M. Chau, “Crime Data Mining: A General
    Framework and Some Examples,” IEEE Computer, Volume 37, Number 4, Pages 50-56, 2004.
84. Z. Huang, H. Chen, and D. Zeng, “Applying Associative Retrieval Techniques to Alleviate the
    Sparsity Problem in Collaborative Filtering,” ACM Transactions on Information Systems, Volume 22,
    Number 1, Pages 116-142, 2004.
85. Z. Huang, H. Chen, C. J. Hsu, W. H. Chen, and S. Wu, “Credit Rating Analysis with Support Vector
    Machines and Neural Networks: A Market Comparative Study,” Decision Support Systems, Volume
    37, Number 4, Pages 543-558, 2004.
86. W. Chung, Y. Zhang, Z. Huang, G. Wang, T. Ong, and H. Chen, “Internet Searching and Browsing in
    a Multilingual World: An Experiment on the Chinese Business Intelligence Portal (CBizPort),”
    Journal of the American Society for Information Science and Technology, special issue on Information
    Seeking Research, Volume 55, Number 9, Pages 818-831, 2004.
87. C. Lin, P. J. Hu, and H. Chen, “Technology Implementation Management in Law Enforcement:
    COPLINK System Usability and User Acceptance Evaluations,” Social Science Computer Review
    (SSCR) special issue on Digital Government, Volume 22, Number 1, Pages 24-36, 2004.
88. B. Marshall, D. McDonald, H. Chen, and W. Chung, “EBizPort: Collecting and Analyzing Business
    Intelligence Information,” Journal of the American Society for Information Science and Technology,
    special issue on Document Search Interface for Large-scale Collections and Intelligent Access,
    Volume 55, Number 10, Pages 873-891, August, 2004.
89. H. Chen, “Digital library research in the US: an overview with a knowledge management perspective,”
    Program: Electronic Library and Information Systems, Volume 38, Number 3, Pages 157-167, 2004.




                                                  30
90. J. Xu and H. Chen, “Fighting Organized Crimes: Using Shortest-Path Algorithms to Identify
    Associations in Criminal Networks,” Decision Support Systems, Volume 38, Number 3, Pages
    473-488, 2004.
91. H. Chen, F. Y. Wang, and D. Zeng, “Intelligence and Security Informatics for Homeland Security:
    Information, Communication, and Transportation,” IEEE Transactions on Intelligent Transportation
    Systems, Volume 5, Number 4, Pages 329-341, 2004.
92. Z. Huang, H. Chen, Z. Chen, and M. C. Roco, “International Nanotechnology Development in 2003:
    Country, Institution and Technology Field Analysis Based on USPTO Database,” Journal of
    Nanoparticle Research, Volume 6, Number 4, Pages 325-354, 2004.
93. D. M. McDonald, H. Chen, H. Su, and B. B. Marshall, “Extracting Gene Pathway Relations Using a
    Hybrid Grammar: The Arizona Relation Parser,” Bioinformatics, Volume 20, Number 18, Pages
    3370-3378, 2004.
94. E. Lim, H. Chen, E. J. Neuhold, S. Sugimoto, and J. Li, “Introduction to the Journal on Digital
    Libraries special issue on Asian digital libraries,” International Journal on Digital Libraries, Volume
    4, Number 4, 245-246, 2004.
95. B. Zhu and H. Chen, “Information Visualization,” Annual Review of Information Science and
    Technology (ARIST), Volume 39, Pages 139-178, 2005.
96. W. Chung, H. Chen, L. G. Chaboya, C. O’Toole, and H. Atabakhsh, “Evaluating Event Visualization:
    A Usability Study of COPLINK Spatio-Temporal Visualizer,” International Journal of Human-
    Computer Studies, Volume 62, Number 1, Pages 127-157, 2005.
97. H. Chen, “Intelligence and Security Informatics,” Journal of the American Society for Information
    Science and Technology, special issue on Intelligence and Security Informatics, Volume 56, Number 3,
    Pages 217-220, 2005.
98. P. J. Hu, C. Lin, and H. Chen, “User Acceptance of Intelligence and Security Informatics Technology:
    A Study of COPLINK,” Journal of the American Society for Information Science and Technology,
    special issue on Intelligence and Security Informatics, Volume 56, Number 3, Pages 235-244, 2005.
99. G. Leroy and H. Chen, “GeneScene: An Ontology-enhanced Integration of Linguistic and Co-
    occurrence based Relations in Biomedical Texts,” Journal of the American Society for Information
    Science and Technology, Volume 56, Number 5, Pages 457-468, 2005.
100.W. Chung, H. Chen and J. F. Nunamaker, “A Visual Knowledge Map Framework for the Discovery
    of Business Intelligence on the Web,” Journal of Management Information Systems, Volume 21,
    Number 4, Pages 57-84, 2005.
101.T. Ong, H. Chen, W. Sung, and B. Zhu, “NewsMap: A Knowledge Map for Online News,” Decision
    Support Systems, Volume 39, Number 4, Pages 583-598, June, 2005.
102.P. Zhang, J. Sun, and H. Chen, “Frame-based Argumentation for Group Decision Task Generation
    and Identification,” Decision Support Systems, Volume 39, Number 4, Pages 643-660, June, 2005.
103.J. Xu and H. Chen, “CrimeNet Explorer: A Framework for Criminal Network Knowledge Discovery,”
    ACM Transactions on Information Systems, Volume 23, Number 2, Pages 201-226, April, 2005.
104.J. Xu and H. Chen, “Criminal Network Analysis and Visualization,” Communications of the ACM,
    Volume 48, Number 6, Pages 101-107, 2005.
105.B. Zhu and H. Chen, “Using 3D Interfaces to Deliver Knowledge from a Multimedia Knowledge
    Repository,” Decision Support Systems, Volume 40, Number 2, Pages 167-182, August 2005
106.H. Chen and F. Wang, “Artificial Intelligence for Homeland Security,” IEEE Intelligent Systems,
    special issue on AI for Homeland Security, Volume 20, Number 5, Pages 12-16, 2005.



                                                   31
107.Y. Zhou, E. Reid, J. Qin, H. Chen, and G. Lai, “U.S. Domestic Extremist Groups on the Web: Link
    and Content Analysis,” IEEE Intelligent Systems, special issue on AI for Homeland Security, Volume
    20, Number 5, Pages 44-51, 2005.
108.A. Abbasi and H. Chen, “Applying Authorship Analysis to Extremist-Group Web Forum Messages,”
    IEEE Intelligent Systems, special issue on AI for Homeland Security, Volume 20, Number 5, Pages
    67-75, 2005.
109.Y. Xiang, M. Chau, H. Atabakhsh, and H. Chen, “Visualizing Criminal Relationships: Comparison of
    a Hyperbolic Tree and a Hierarchical List,” Decision Support Systems, Volume 41, Number 1, Pages
    69-83, 2005.
110.Z. Huang, H. Chen, L. Yan, and M. C. Roco, “Longitudinal Nanotechnology Development
    (1991-2002): National Science Foundation Funding and Its Impact on Patients,” Journal of
    Nanoparticle Research, Volume 7, Pages 343-376, 2005.
111.B. Marshall, H. Su, D. McDonald, S. Eggers, and H. Chen, “Aggregating Automatically Extracted
    Regulatory Pathway Relations,” IEEE Transactions on Information Technology in Biomedicine,
    Volume 10, Number 1, Pages 100-108, 2006.
112.H. Chen and J. Xu, “Intelligence and Security Informatics for National Security: A Knowledge
    Discovery Perspective,” Annual Review of Information Science and Technology (ARIST), Volume 40,
    Pages 229-289, 2006.
113.H. Chen, “Intelligence and Security Informatics: Information Systems Perspective,” Decision Support
    Systems, special issue on Intelligence and Security Informatics, Volume 41, Number 3, Pages 555-559,
    March 2006.
114.J. L. Zhao, H. H. Bi, H. Chen, D. Zeng, C. Lin, and M. Chau “Process-Driven Collaboration Support
    for Intra-Agency Crime Analysis,” Decision Support Systems, special issue on Intelligence and
    Security Informatics, Volume 41, Number 3, Pages 616-633, March 2006.
115.W. Chung, H. Chen, W. Chang, and S. Chou, “Fighting Cybercrime: A Review and the Taiwan
    Experience,” Decision Support Systems, special issue on Intelligence and Security Informatics,
    forthcoming, Volume 41, Number 3, Pages 669-682, March 2006.
116.R. Zheng,, J. Li, H. Chen, and Z. Huang, “A Framework for Authorship Identification of Online
    Messages: Writing-Style Features and Classification Techniques,” Journal of the American Society for
    Information Science and Technology, Volume 57, Number 3, Pages 378-393, 2006.
117.J. Qin, Y. Zhou, M. Chau, and H. Chen, “Multilingual Web Retrieval: An Experiment in English-
    Chinese Business Intelligence,” Journal of the American Society for Information Science and
    Technology, special issue on Multilingual Information Systems, Volume 57, Number 5, Pages
    671-683, 2006.
118.B. Marshall, H. Chen, R. Shen, and E. Fox, “Moving Digital Libraries into the Student Learning
    Space: the GetSmart Experience,” ACM Journal of Educational Resources in Computing (JERIC),
    Volume 6, Number 1, March 2006.
119.J. Li, R. Zheng, and H. Chen, “From Fingerprint to Writeprint,” Communications of the ACM,
    Volume 49, Number 4, Pages 76-82, April 2006.
120.D. M. McDonald and H. Chen, “Summarization in Context: Searching vs. Browsing,” ACM
    Transactions on Information Systems, Volume 24, Number 1, Pages 111-141, 2006.
121.E. Reid and H. Chen, “Extremist Social Movement Groups and Their Online Digital Libraries,”
    Information Outlook, Volume 10, Number 6, Pages 57-65, June 2006.




                                                  32
122.J. Li, X. Li, H. Su, H. Chen, and D. Galbraith, “A Framework of Integrating Gene Relations from
    Heterogeneous Data Sources: An Experiment on Arabidopsis thaliana,” Bioinformatics, Volume 22,
    Number 16, Pages 2037-2043, 2006.
123.D. Zeng, M. Dror, and H. Chen, “Efficient Scheduling of Periodic Information Monitoring Requests,”
    European Journal of Operation Research, Volume 173, Pages 583-599, 2006.
124.G. Wang, J. Xu,, H. Chen, and H. Atabakhsh, “Automatically Detecting Criminal Identity Deception:
    An Adaptive Detection Algorithm,” IEEE Transactions on Systems, Man, and Cybernetics, Part A,
    Volume 36, Number 5, Pages 988-999, 2006.
125.M. Chau, Z. Huang, J. Qin, Y. Zhou, and H. Chen, “Building a Scientific Knowledge Web Portal: The
    NanoPort Experience,” Decision Support Systems, Volume 42, Number 2, Pages 1216-1238, 2006.
126.B. Marshall, H. Chen, and T. Madhusudan, “Matching Knowledge Elements in Concept Maps Using a
    Similarity Flooding Algorithm,” Decision Support Systems, Volume 42, Number 3, Pages 1290-1306,
    December 2006.
127.Z. Huang, H. Chen, F. Guo, J. Xu, S. Wu, and W. Chen, “Expertise Visualization: An Implementation
    and Study based on Cognitive Fit Theory,” Decision Support Systems, Volume 42, Number 3, Pages
    1539-1558, December 2006.
128.Y. Zhou, J. Qin and H. Chen, “CMedPort: An Integrated Approach to Facilitating Chinese Medical
    Information Seeking,” Decision Support Systems, Volume 42, Number 3, Pages 1431-1448, 2006.
129.W. Chung, A. Bonillas, G. Lai, W. Xi, and H. Chen, “Supporting Non-English Web Searching: An
    Experiment on the Spanish Business and the Arabic Medical Intelligence Portals,” Decision Support
    Systems, Volume 42, Number 3, Pages 1697-1714, 2006.
130.Z. Huang, H. Chen, X. Li, and M. C. Roco, “Connecting NSF Funding to Patent Innovation in
    Nanotechnology (2001-2004),” Journal of Nanoparticle Research, Volume 8, Number 6, Pages
    859-879, 2006.
131.R. Schumaker, M. Ginsburg, H. Chen, and Y. Liu, “An Evaluation of the Chat and Knowledge
    Discovery Components of a Low-Level Dialog System: The AZ-ALICE Experiment,” Decision
    Support Systems, Volume 42, Number 4, Pages 2236-2246, 2006.
132.R. Schumaker, Y. Liu, M. Ginsburg, and H. Chen, “Evaluating Mass Knowledge Acquisition using
    the ALICE Chatterbot: The AZ-ALICE Dialog System,” International Journal of Human-Computer
    Studies, Volume 64, Number 11, Pages 1132-1140, 2007.
133.E. Reid and H. Chen, “Mapping the Contemporary Terrorism Research Domain,” International
    Journal of Human-Computer Studies, special issue on Information Security in the Knowledge
    Economy, Volume 65, Pages 42-56, 2007.
134.J. Qin, Y. Zhou, E. Reid, G. Lai, and H. Chen, “Analyzing Terror Campaign on the Internet:
    Technical Sophistication, Content Richness, and Web Interactivity,” International Journal of Human-
    Computer Studies, special issue on Information Security in the Knowledge Economy, Volume 65,
    Pages 71-84, 2007.
135.M. Chau, B. Shiu, I. Chan and H. Chen, “Redips: Backlink Search and Analysis on the Web for
    Business Intelligence Analysis,” Journal of the American Society for Information Science and
    Technology, Volume 58, Number 3, Pages 351-365, 2007.
136.J. Schroeder, J. Xu, M. Chau and H. Chen, “Automated Criminal Link Analysis
    Based on Domain Knowledge,” Journal of the American Society for Information Science and
    Technology, Volume 58, Number 6, Pages 842-855, 2007.




                                                 33
137.M. Chau and H. Chen, “Incorporating Web Analysis into Neural Networks: An Example in Hopfield
    Net Searching,” IEEE Transactions on Systems, Man, and Cybernetics, Volume 37, Number 3, Pages
    352-358, 2007.
138.R. Schumaker, Y Liu, M. Ginsberg, and H. Chen, “Evaluating the Efficacy of a Terrorism Question
    Answer System,” Communications of the ACM, Volume 50, Number 7, Pages 74-80, July 2007.
139.P. J-H. Hu, D. Zeng, H. Chen, C. Larson, W. Chang, C. Tseng, and J. Ma, “A System for Infectious
    Disease Information Sharing and Analysis: Design and Evaluation,” IEEE Transactions on
    Information Technology in Biomedicine, Volume 11, Number 4, Pages 483-492, 2007.
140.J. Li, H. Su, H. Chen, and B. W. Futscher, “Optimal Search-Based Gene Subset Selection for Gene
    Array Cancer Classification,” IEEE Transactions on Information Technology in Biomedicine, Volume
    11, Number 4, Pages 398-405, 2007.
141.Z. Huang, D. Zeng, and H. Chen, “Analyzing Consumer-Product Graphs: Empirical Findings and
    Applications in Recommendation Systems,” Management Science, Volume 53, Number 7, Pages
    1146-1164, July 2007.
142.E. Reid and H. Chen, “Internet-savvy U.S. and Middle Eastern Extremist Groups,” Mobilization: An
    International Quarterly Review, Volume 12, Number 2, Pages 177-192, 2007.
143.S. Kaza, Y. Wang, and H. Chen, “Enhancing Border Security: Mutual Information Analysis to
    Identify Suspect Vehicles,” Decision Support Systems, Volume 43, Number 1, Pages 199-210, 2007.
144.K. Quinones, H. Su, B. Marshall, S. Eggers, and H. Chen, “User-Centered Evaluation of Arizona
    BioPathway: An Information Extraction, Integration, and Visualization System,” IEEE Transactions
    on Information Technology in Biomedicine, Volume 11, Issue 5, Pages 527-536, 2007.
145.D. Hu, H. Chen, and M. C. Roco, “Longitudinal Study on Patent Citations to Academic Research
    Articles in Nanotechnology,” Journal of Nanoparticle Research, Volume 9, Pages 529-542, 2007.
146.Z. Huang, D. Zeng, and H. Chen, “A Comparative Study of Collaborative-Filtering Recommendation
    Algorithms for E-Commerce,” IEEE Intelligent Systems, Volume 22, Number 5, Pages 68-78, 2007.
147.G. Leroy and H. Chen, “Decision Support in Medicine,” Decision Support Systems, Volume 43,
    Number 4, Pages 1203-1206, 2007.
148.Z. Huang, J. Li, H. Su, G. S. Watts, and H. Chen, “Large-scale Regulatory Network Analysis from
    Microarray Data: Modified Bayesian Network Learning and Association Rule Mining,” Decision
    Support Systems, Volume 43, Number 4, Pages 1207-1225, 2007.
149.T. S. Raghu and H. Chen, “Cyberinfrastructure for Homeland Security: Advances in Information
    Sharing, Data Mining, and Collaboration Systems,” Decision Support Systems, Volume 43, Number 4,
    Pages 1321-1323, 2007.
150.R. Schumaker and H. Chen, “Leveraging Question Answer Technology to Address Terrorism
    Inquiry,” Decision Support Systems, Volume 43, Number 4, Pages 1419-1430, 2007.
151.X. Li, H. Chen, Z. Huang, and M. C. Roco, “Patent Citation Network in Nanotechnology
    (1976-2004),” Journal of Nanoparticle Research, Volume 9, Number 3, Pages 337-352, 2007.
152.X. Li, Y. Lin, H. Chen, Z. Huang, and M. C. Roco, “Worldwide Nanotechnology Development: A
    Comparative Study of USPTO, EPO, and JPO Patents (1976-2004),” Journal of Nanoparticle
    Research, Volume 9, Number 6, Pages 977-1002, 2007.
153.P. Yan, H. Chen and D. Zeng, “Syndromic Surveillance Systems,” Annual Review of Information
    Science and Technology (ARIST), Volume 41, Pages 425-495, 2007.




                                                 34
154.X. Li, H. Chen, Z. Huang, H. Su, and J. Martinez, “Global Mapping of Gene/Protein Interactions in
    PubMed Abstracts: A Framework and an Experiment with P53 Interactions,” Journal of Biomedical
    Informatics (JBI), Volume 40, Number 5, Pages 453-464, 2007.
155.G. Leroy, J. Xu, W. Chung, S. Eggers, and H. Chen, “An End User Evaluation of Query Formulation
    and Results Tools in Three Meta-search Engines,” International Journal of Medical Informatics,
    Volume 76, Number 11-12, Pages 780-789, November-December 2007.
156.M. Chau and H. Chen, “A Machine Learning Approach to Web Page Filtering using Web Content and
    Web Structure Analysis,” Decision Support Systems, Volume 44, Number 2, Pages 482-494, 2008.
157.W. Chung, G. Lai, A. Bonillas, W. Xi, and H. Chen, “Organizing Domain-specific information on the
    Web: An Experiment on the Spanish Business Web Directory,” International Journal of Human-
    Computer Studies, Volume 66, Number 2, Pages 51-66, 2008.
158.R. Schumaker and H. Chen, “Evaluating a News-Aware Quantitative Trader: The Effect of
    Momentum and Contrarian Stock Selection Strategies,” Journal of the American Society for
    Information Science and Technology, Volume 59, Number 2, Pages 247-255, 2008.
159.J. Li, X. Li, Z, Zhang, and H. Chen, “Kernel-based Learning for Biomedical Relation Extraction,”
    Journal of the American Society for Information Science and Technology, Volume 59, Number 5,
    Pages 756-769, 2008.
160.H.-M. Lu, D. Zeng, L. Trujillo, K. Komatsu, and H. Chen, "Ontology-enhanced Automatic Chief
    Complaint Classification for Syndromic Surveillance," Journal of Biomedical Informatics, Volume 4,
    Issue 2, Pages 340-356, April 2008.
161.H. Chen, M. Roco, X. Li, and Y. Lin, “Trends in Nanotechnology Patents,” Nature Nanotechnology,
    Volume 3, Pages 123-125, March, 2008.
162.A. Abbasi and H. Chen, “Writeprints: A Stylometric Approach to Identify-Level Identification and
    Similarity Detection in Cyberspace,” ACM Transactions on Information Systems, Volume 26, Number
    2, Pages 7:1-7:29, 2008.
163.A. Abbasi, H. Chen, and A. Salem, “Sentiment Analysis in Multiple Languages: Feature Selection for
    Opinion Classification in Web Forums,” ACM Transactions on Information Systems, Volume 26,
    Number 3, Pages 12:1-12:34, 2008.
164.T. J. Fu, A. Abbasi, and H. Chen, “A Hybrid Approach to Web Forum Interactional Coherence
    Analysis,” Journal of the American Society for Information Science and Technology, Volume 59,
    Number 8, Pages 1195-1209, 2008.
165.H. Chen, W. Chung, J. Qin, E. Reid, M. Sageman, and G. Weinmann, “Uncovering the Dark Web: A
    Case Study of Jihad on the Web,” Journal of the American Society for Information Science and
    Technology, Volume 59, Number 8, Pages 1347-1359, 2008.
166.Y. Zhou, F. Huang, and H. Chen, “Combining Probability Models and Web Mining Models: A
    Framework for Proper Name Transliteration,” Information Technology and Management, Volume 9,
    Issue 2, Pages 91-103, 2008.
167.A. Abbasi, H. Chen and J. F. Nunamaker, “Stylometric Identification in Electronic Markets:
    Scalability and Robustness,” Journal of Management Information Systems, Volume 25, Number 1,
    Pages 49-78, 2008.
168.D. Zeng, H. Chen, F. Wang, and H. Kargupta, “Special Section on Intelligence and Security
    Informatics,” IEEE Transactions on Knowledge and Data Engineering, Volume 20, Number 8, Pages
    1009-1012, 2008.
169.X. Yang, C. Wei, and H. Chen, “Introduction Special Issue on Multilingual Knowledge
    Management,” Decision Support Systems, Volume 45, Number 3, Pages 551-553, June 2008.


                                                 35
170.M. Chau, J. Qin, Y. Zhou, C. Tseng, and H. Chen, “SpiderRUs: Creating Specialized Search Engines
    in Multiple Languages,” Decision Support Systems, Volume 45, Number 3, Pages 621-640, June 2008.
171.C. Chung, D. Zeng, and H. Chen, “A Stack-based Prospective Spatio-temporal Data Analysis
    Approach,” Decision Support Systems, Volume 45, Number 4, Pages 697-713, 2008.
172.S. Kaza and H. Chen, “Evaluating Ontology Mapping Technologies: An Experiment in Public Safety
    Information Sharing,” Decision Support Systems, Volume 45, Number 4, Pages 714-728, 2008.
173.B. Zhu and H. Chen, “Communication Garden Systems: Visualizing a Computer-Mediated
    Communication Process,” Decision Support Systems, Volume 45, Number 4, Pages 778-794, 2008.
174.A. Salem, E. Reid, and H. Chen, “Multimedia Content Coding and Analysis: Unraveling the Content
    of Jihadi Extremist Groups’ Videos,” Studies in Conflict & Terrorism, Volume 31, Number 7, Pages
    605-626, July 2008.
175.A. Abbasi, H. Chen, S. Thoms, and T. J. Fu, “Affect Analysis of Web Forums and Blogs using
    Correlation Ensembles,” IEEE Transactions on Knowledge and Data Engineering, Volume 20,
    Number 9, Pages 1168-1180, September 2008.
176.J. Xu and H. Chen, “The Topology of Dark Networks,” Communications of the ACM, Volume 51,
    Number 10, Pages 58-65, 2008.
177.X. Li, H. Chen, Y. Dang, Y. Lin, C. A. Larson, and M. C. Roco, “A Longitudinal Analysis of
    Nanotechnology Literature: 1976-2004,” Journal of Nanoparticle Research, Volume 10, Pages 3-22,
    2008.
178.B. Marshall, S. Kaza, and H. Chen, “Using Importance Flooding to Identify Interesting Networks of
    Criminal Activity,” Journal of the American Society for Information Science and Technology, Volume
    59, Number 13, Pages 2099-2114, 2008.
179.A. Abbasi and H. Chen, “CyberGate: A System and Design for Text Analysis of Computer Mediated
    Communications,” MIS Quarterly, Volume 32, Number 4, Pages 811-837, December 2008.
180.X. Li, D. Hu, Y. Dang, H. Chen, M. C. Roco, C. A. Larson, and J. Chan, “Nano Mapper: An Internet
    Knowledge Mapping System for Nanotechnology Development,” Journal of Nanoparticle Research,
    Volume 10, 2008.
181.W. Chang, D. Zeng, and H. Chen, “A Stack-based Spatio-Temporal Data Analysis Approach based on
    Prospective Support Vector Clustering,” Decision Support Systems, Volume 45, Number 4, Pages
    697-713, 2008.
182.W. Chung, H. Chen, and E. Reid, “Business Stakeholder Analyzer: An Experiment of Classifying
    Stakeholders on the Web,” Journal of the American Society for Information Science and Technology,
    Volume 60, Number 1, Pages 59-74, 2009.
183.W. Chung and H. Chen, “Browsing the Underdeveloped Web: An Experiment on the Arabic Medical
    Web Directory,” Journal of the American Society for Information Science and Technology, Volume
    60, Number 3, Pages 595-607, 2009.
184.R. Schumaker and H. Chen, “Textual Analysis of Stock Market Prediction Using Breaking Financial
    News: The AZFinText System,” ACM Transactions on Information Systems, Volume 27, Number 2,
    April 2009.
185.S. Kaza, J. Xu, B. Marshall, and H. Chen, “Topological Analysis of Criminal Activity Networks:
    Enhancing Transportation Security,” IEEE Transactions on Intelligent Transportation Systems,
    Volume 10, Number 1, Pages 83-91, 2009.




                                                 36
186.D. Hu, S. Kaza, and H. Chen, “Identifying Significant Facilitators of Dark Network Evolution,”
    Journal of the American Society for Information Science and Technology, Volume 60, Number 4,
    Pages 655-665, 2009.
187.Y. Dang, Y. Zhang, H. Chen, P. J. Hu, S. Brown, and C. Larson, “Arizona Literature Mapper: An
    Integrated Approach to Monitor and Analyze Global Bioterrorism Research Literature,” Journal of the
    American Society for Information Science and Technology, Volume 60, Number 7, Pages 1466-1485,
    2009.
188.H. Chen, “AI and Global Science and Technology Assessment,” IEEE Intelligent Systems, Volume
    24, Number 4, Pages 68-71, July/August, 2009.
189.H. Chen, “AI, E-Government, and Politics 2.0,” IEEE Intelligent Systems, Volume 24, Number 5,
    Pages 64-67, September/October, 2009.
190.X. Li, H. Chen, Z. Zhang, J. Li, and J. F. Nunamaker, “Managing Knowledge in Light of its Evolution
    Process: An Experimental Study on Citation Network-based Patent Classification,” Journal of
    Management Information Systems, Volume 26, Number 1, Pages 129-153, 2009.
191.A. M. Perez, D. Zeng, C. Tseng, H. Chen, Z. Whedbee, D. Paton, and M. C. Thurmond, “A Web-
    based System for Near Real-time Surveillance and Space-time Cluster Analysis of Foot-and-mouth
    Disease and Other Animal Diseases,” Preventive Veterinary Medicine, Volume 91, Number 1, Pages
    39-45, 2009.
192.R. Schumaker and H. Chen, “A Quantitative Stock Prediction System based on Financial News,”
    Information Processing and Management, Volume 45, Number 5, Pages 571-583, 2009.
193.R. Schumaker, O. Solieman, and H. Chen, “Sports Knowledge Management and Data Mining,”
    Annual Review of Information Science and Technology (ARIST), Volume 44, 2009.
194.Y. Dang, H. Chen, Y. Zhang, and M. Roco, “Knowledge Sharing and Diffusion Patterns: International
    Patent and Patent Family Analysis,” IEEE Nanotechnology, Volume 3, Number 3, Pages 16-21, 2009.
195.H.-M. Lu, D. Zeng, and H. Chen, "Multilingual Chief Complaint Classification for Syndromic
    Surveillance: An Experiment with Chinese Chief Complaints," International Journal of Medical
    Informatics, Volume 78, Number 5, Pages 308-320, 2009.
196.A. Abbasi and H. Chen, “A Comparison of Tools for Detecting Fake Websites,” IEEE Computer,
    Volume 42, Number 10, Pages 78-86, October 2009.
197.X. Liu, P. Zhang, X. Li, H. Chen, Y. Dang, Y. Lin, C. A. Larson, M. C. Roco, and X. Wang “Trends
    for Nanotechnology Development in China, Russia, and India,” Journal of Nanoparticle Research,
    Volume 11, Number 8, Pages 1845-1866, November, 2009.
198.H. Chen, X. Li, M. Chau, Y. Ho, and C. Tseng “Using Open Web APIs in Teaching Web Mining,”
    IEEE Transactions on Education, Volume 52, Number 4, Pages 482-490, 2009.
199.H. Chen and D. Zeng, “AI for Global Disease Surveillance,” IEEE Intelligent Systems, Volume 24,
    Number 6, Pages 66-69, November/December, 2009.
200.D. Zeng, H. Chen, Z. Cao, F. Wang, X. Zheng, and Q. Wang, “Disease Surveillance Based on Spatial
    Contact Networks: A Case Study of Beijing 2003 SARS Epidemic,” IEEE Intelligent Systems, Volume
    24, Number 6, Pages 77-82, November/December, 2009.
201.Y. Chen, A. Abbasi, and H. Chen, “Framing Social Movement Identity with Cyber-Artifacts: A Case
    Study of the International Falun Gong Movement,” Annals of Information Systems, Volume 9, Pages
    1-24, 2009.
202.R. Schumaker and H. Chen, “A Discrete Stock Prediction Engine based on Financial News,” IEEE
    Computer, Volume 43, Number 1, Pages 51-56, January 2009.



                                                    37
203.R. Schumaker and H. Chen, “Interaction Analysis of the ALICE Chatterbot: A Two-Study
    Investigation of Dialog and Domain Questioning,” IEEE Transactions on Systems, Man, and
    Cybernetics, Volume 40, Number 1, Pages 40-51, 2010.
204.M. Chau, C. Wong, Y. Zhou, J. Qin, and H. Chen, “Evaluating the Use of Search Engine
    Development Tools in IT Education,” Journal of the American Society for Information Science and
    Technology, Volume 61, Number 2, Pages 288-299, 2010.
205.H. Chen, “Business and Market Intelligence 2.0,” IEEE Intelligent Systems, Volume 25, Number 1,
    Pages 68-71, January/February, 2010.
206.Y. Liu, Y. Chen, R. F. Lusch, H. Chen, D. Zimbra, and S. Zeng “User-Generated Content on Social
    Media: Predicting Market Success with Online Word-of-Mouth,” IEEE Intelligent Systems, Volume
    25, Number 1, Pages 75-78, January/February, 2010.
207.H. Lu, D. Zeng, and H. Chen, “Prospective Infectious Disease Outbreak Detection Using Markov
    Switching Models,” IEEE Transactions on Knowledge and Data Engineering, Volume 22, Number 4,
    Pages 565-577, 2010.
208.B. Zhu, S. Watts, and H. Chen, “Visualizing Social Network Concepts,” Decision Support Systems,
    forthcoming, 2010.
209.A. Abbasi, Z. Zhang, D. Zimbra, H. Chen, and J. F. Nunamaker, “Applying Statistical Learning
    Methods to Fake Website Detection,” MIS Quarterly, forthcoming, 2010.
210.A. Abbasi, H. Chen, and Z. Zhang, “Selecting Attributes for Sentiment Classification using Feature
    Relation Networks,” IEEE Transactions on Knowledge and Data Engineering, forthcoming, 2010.
211.Y. Dang, Y. Zhang, L. Fan, H. Chen, and M. C. Roco, “Trends in Worldwide Nanotechnology Patent
    Applications: 1991 to 2008,” Journal of Nanoparticle Research, forthcoming, 2010.
212.Y. Dang, Y, Zhang, and H. Chen, “A Lexicon Enhanced Method for Sentiment Classification: An
    Experiment on Online Product Reviews,” IEEE Intelligent Systems, forthcoming, 2010.
213.H. Chen, Y Zhang, and Y. Dang, “Intelligence and Security Informatics,” Encyclopedia of Library
    and Information Sciences, forthcoming, 2010.
214.T. J. Fu, A. Abbasi, and H. Chen, “A Focused Crawler for Dark Web Forums,” Journal of the
    American Society for Information Science and Technology, forthcoming, 2010.
215.Y. Dang, Y, Zhang, and H. Chen, “Knowledge Mapping for Rapidly Evolving Domains,” Decision
    Support Systems, forthcoming, 2010.
216.E. Reid and H. Chen, “Contemporary Terrorism Researchers’ Patterns of Collaboration and
    Influence,” Journal of the American Society for Information Science and Technology, forthcoming,
    2010.
217.D. Zeng, H. Chen, and C. Lynch, “BioPortal: Sharing, Analyzing, and Visualizing Infectious Disease
    Information,” Communications of the ACM, forthcoming, 2010.
218.S. Kaza and H. Chen, “Mapping Ontologies using WordNet and Mutual Information: An Experiment
    in Public Safety Information Sharing,” Decision Support Systems, forthcoming, 2010.
219.J. Xu, D. Hu, and H. Chen, “Dynamics of Terrorist Networks,” Journal of Homeland Security and
    Emergency Management, forthcoming, 2010.
220.G. Wang and H. Chen, “A Hierarchical Naïve Bayes Model for Approximate Identity Matching,”
    Decision Support Systems, forthcoming, 2010.
221.Y. Zhang, Y. Dang, H. Chen, M. Thurmond, and C. Larson, “Automatic Online News Monitoring and
    Classification for Syndromic Surveillance,” Decision Support Systems, forthcoming, 2010.


                                                   38
222.D. Zimbra, A. Abbasi, and H. Chen, “A Cyber-archeology Approach to Social Movement Research:
    Framework and Case Study,” Journal of Computer-Mediated Communication, forthcoming, 2010.
223.A. Sun, D. Zeng, and H. Chen, “Burst Detection from Multiple Data Streams,” IEEE Transactions on
    Systems, Man, and Cybernetics, Part C, forthcoming, 2010.

Books (Monograph and Edited Volume)
1. R. Schumaker, O. Solieman, and H. Chen, “Sports Data Mining,” Springer, forthcoming, 2010.
2. N. Memon, J. Xu, D. Hicks, and H. Chen, (Eds.), “Data Mining for Social Network Data,” Springer,
    forthcoming, 2010.
3. D. Zeng and H. Chen, (Eds.), “Infectious Disease Informatics,” Springer, forthcoming, 2010.
4. H. Chen, D. Zeng, and P. Yan, “Infectious Disease Informatics Syndromic Surveillance for
    Public Health and Biodefense,” Springer, 2010.
5. C. Yang, M. Chau, J. Wang, and H. Chen (Eds.), “Security Informatics,” Annals of Information
    Systems, Springer, 2010.
6. H. Chen and M. Roco, “Mapping Nanotechnology Innovations and Knowledge: Global and
    Longitudinal Patent and Literature Analysis,” Springer, 2009.
7. H. Chen and C. Yang (Eds.), “Intelligence and Security Informatics: Techniques and Applications,”
    Springer, 2008.
8. H. Chen, E. Reid, J. Sinai, A. Silke, and B. Ganor (Eds.), “Terrorism Informatics: Knowledge
    Management and Data Mining for Homeland Security,” Springer, 2008.
9. H. Chen, L. Brandt, V. Gregg, R. Traunmuller, A. McIntosh, S. Dawes, E. Hovy, and C. A.
    Larson (Eds.), “Digital Government:                 E-Government   Research,   Case   Studies,   and
    Implementation,” Springer, 2007.
10. H. Chen, T. S. Raghu, R. Ramesh, A. Vinze, and D. Zeng (Eds.), “Handbooks in Information Systems
    -- National Security,” Elsevier Scientific, 2007.
11. H. Chen, “Intelligence and Security Informatics for International Security: Information Sharing
    and Data Mining,” Springer, 2006.
12. H. Chen, S. F. Fuller, C. Friedman, and W. Hersh (Eds.), “Medical Informatics: Knowledge
    Management and Data Mining in Biomedicine,” Springer, 2005.
13. H. Chen, Trailblazing a Path Towards Knowledge and Transformation: E-Library, E-Government,
    and E-Commerce, The University of Arizona, Tucson, Arizona, January, 2003.
14. H. Chen, Knowledge Management Systems: A Text Mining Perspective, University of Arizona,
    Tucson, Arizona, November, 2001.

Conference and Workshop Proceedings
1. H. Chen, M. Dacier, et al., (Eds.), Proceedings the ACM SIGKDD Workshop on CyberSecurity and
    Intelligence Informatics, Paris, France, June 2009.
2. D. Zeng, L. Khan, L. Zhou, M. Day, C. Yang, B. Thuraisingham, and H. Chen (Eds.), Proceedings the
    2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009, Dallas, Texas,
    June 2009.
3. H. Chen, C. Yang, M. Chau, and S. Li (Eds.), Intelligence and Security Informatics, Proceedings the
    Pacific-Asia Workshop, PAISI 2009, Bangkok, Thailand, Lecture Notes in Computer Science (LNCS
    5477), Springer-Verlag, 2009.


                                                        39
4. C. Yang, H. Chen, et al., “Intelligence and Security Informatics,” IEEE ISI 2008 International
    Workshops: PAISI, PACCF, and SOCO, Taipei, Taiwan, June 2008, Proceedings, Lecture Notes in
    Computer Science (LNCS 5075), Springer-Verlag, 2008.
5. D. Zeng, H. Chen, H. Rolka, and B. Lober, (Eds.), Biosurveillance and BioSecurity, International
    Workshop, BioSecure 2008, Springer-Verlag, December 2008.
6. D. Zeng, I. Gotham, K. Komatsu, C. Lynch, M. Thurmond, D. Madigan, B. Lober, J. Kvach, and H.
    Chen, (Eds.), Intelligence and Security Informatics: Biosurveillance, Proceedings the Second NSF
    Workshop, BioSurveillance 2007, Lecture Notes in Computer Science (LNCS 4506), Springer-Verlag,
    2007.
7. C. Yang, D. Zeng, M. Chau, K. Chang, Q. Yang, X. Cheng, J. Wang, F. Wang, and H. Chen. (Eds.),
    Intelligence and Security Informatics, Proceedings the Pacific-Asia Workshop, PAISI 2007, Chengdu,
    China, Lecture Notes in Computer Science (LNCS 4430), Springer-Verlag, 2007.
8. S. Mehrotra, D. Zeng, H. Chen, B. Thursaisingham, and F. Wang (Eds.), Intelligence and Security
    Informatics, Proceedings the IEEE International Conference on Intelligence and Security Informatics,
    ISI 2006, Lecture Notes in Computer Science (LNCS 3975), Springer-Verlag, 2006.
9. H. Chen, F. Wang, C. Yang, D. Zeng, M. Chau, and K. Chang (Eds.), Intelligence and Security
    Informatics, Proceedings the Workshop on Intelligence and Security Informatics, WISI 2006,
    Singapore, Lecture Notes in Computer Science (LNCS 3917), Springer-Verlag, 2006.
10. P. Kantor, G. Muresan, F. Roberts, D. Zeng, F. Wang, H. Chen, and R. Merkle (Eds.), Intelligence and
    Security Informatics, Proceedings the IEEE International Conference on Intelligence and Security
    Informatics, ISI 2005, Lecture Notes in Computer Science (LNCS 3495), Springer-Verlag, 2005.
11. Z. Chen, H. Chen, Q. Miao, Y. Fu, E. Fox, and E. Lim (Eds.), Digital Libraries: International
    Collaboration and Cross-Fertilization, Proceedings of the 7th International Conference on Asian
    Digital Libraries, ICADL 2004, Lecture Notes in Computer Science (LNCS 3334), Springer-Verlag,
    2004.
12. H. Chen, M. Christel, and E. Lim (Eds.), Proceedings of the Fourth ACM/IEEE Joint Conference on
    Digital Libraries, JCDL 2004, Tucson, Arizona, June 2004, ACM Press, 2004.
13. H. Chen, R. Moore, D. Zeng, and J. Leavitt (Eds.), Intelligence and Security Informatics, Proceedings
    of the Second Symposium on Intelligence and Security Informatics, ISI 2004, Lecture Notes in
    Computer Science (LNCS 3073), Springer-Verlag, 2004.
14. H. Chen, R. Miranda, D. Zeng, T. Madhusudan, C. Demchak, and J. Schroeder (Eds.), Intelligence and
    Security Informatics, Proceedings of the First NSF/NIJ Symposium on Intelligence and Security
    Informatics, ISI 2003, Lecture Notes in Computer Science (LNCS 2665), Springer-Verlag, 2003.
15. M. Tengku, B. Halimah, H. Chen, S. Urs, and S. H. Myaeng (Eds.), Digital Libraries: Technology
    and Management of Indigenous Knowledge and Global Access, Proceedings of the 6th International
    Conference on Asian Digital Libraries, ICADL 2003, Lecture Notes in Computer Science (LNCS
    2911), Springer-Verlag, 2003.
16. E. Lim, S. Foo, C. Khoo, H. Chen, E. Fox, S. Urs, and C. Thanos (Eds.), Digital Libraries: People,
    Knowledge, and Technology, Proceedings of the 5th International Conference on Asian Digital
    Libraries, ICADL 2002, Lecture Notes in Computer Science (LNCS 2555), Springer-Verlag, 2002.

Refereed Book Chapters
1. Y. Zhou, J. Qin, and H. Chen, “Developing an Intelligent Multi-Regional Chinese Medical Portal,”
    Editor: Y. Zhang, in Computational Web Intelligence: Intelligence Technology for Web Applications,
    2009, forthcoming.




                                                   40
2. J. Xu and H. Chen, “Understanding the Nexus of Terrorist Web Sites,” Editors: H. Chen and C. Yang,
    in Intelligence and Security Informatics: Techniques and Applications, 65-78, 2008.
3. D. Zeng, J. Ma, W. Chang, and H. Chen, “Spatial-Temporal Data Analysis and Its Applications in
    Infectious Disease Informatics,” Editors: G. Adomavicius and A. Gupta, in Emerald Handbooks of
    Information Systems Series – Business Computing, Pages 207-236, 2009.
4. W. Chung and H. Chen, “Web-based Business Intelligence Systems: A Review and Case Studies,”
    Editors: G. Adomavicius and A. Gupta, in Emerald Handbooks of Information Systems Series –
    Business Computing, 373-400, 2009.
5. J. Wang, T. Fu, H. Lin, and H. Chen, “Exploring Gray Web Forums: Analysis and Investigation of
    Forum-based Communities in Taiwan,” Editors: H. Chen and C. Yang, in Intelligence and Security
    Informatics: Techniques and Applications, 121-134, 2008.
6. S. Kaza and H. Chen, “Suspect Vehicle Identification for Border Safety,” Editors: H. Chen and C.
    Yang, in Intelligence and Security Informatics: Techniques and Applications, 305-318, 2008.
7. S. Kaza and H. Chen, “Public Safety Information Sharing: An Ontological Perspective,” Editors: H.
    Chen, et al., in Digital Government: E-Government Research, Case Studies, and Implementation,
    Pages 273-282, 2007.
8. D. Zeng, H. Chen, and P. Yan, “Infectious Disease Informatics and Syndromic Surveillance,” Editors:
    H. Chen, et al., in Digital Government: E-Government Research, Case Studies, and Implementation,
    Pages 531-560, 2007.
9. F. Hsu, P. Hu, and H. Chen, “Business-Technology Alighments in e-Government: A Large-scale
    Taiwan Government Electronic Record Management Systems Study,” Editors: H. Chen, et al., in
    Digital Government: E-Government Research, Case Studies, and Implementation, Pages 585-614,
    2007.
10. J. Li, H. Su, and H. Chen, “Identification of Marker Genes from High-Dimensional Microarray Data
    for Cancer Classification,” Editors: X. Hu and Y. Pan, in Knowledge Discovery in Bioinformatics:
    Techniques, Methods, and Applications, Pages 169-196, 2007.
11. E. Reid, H. Chen, and J. Xu, “Social Network Analysis for Terrorism Informatics,” Editors: H. Chen,
    T. S. Raghu, R. Ramesh, A. Vinze, and D. Zeng, in Handbooks in Information Systems: National
    Security, Elsevier Scientific, Pages 243-272, 2007.
12. D. Zeng, H. Chen, and W. Chang, “Spatio-Temporal Data Analysis in Security Informatics,” Editors:
    H. Chen, T. S. Raghu, R. Ramesh, A. Vinze, and D. Zeng, in Handbooks in Information Systems:
    National Security, Elsevier Scientific, Pages 165-186, 2007.
13. H. Chen, S. F. Fuller, C. Friedman, and W. Hersh, “Knowledge Management, Data Mining, and Text
    Mining in Medical Informatics,” Editors: H. Chen, S. F. Fuller, C. Friedman, and W. Hersh, in
    Medical Informatics: Knowledge Management and Data Mining in Biomedicine, Springer, Pages 3-33,
    2005.
14. S. Eggers, Z. Huang, H. Chen, L. Yan, C. Larson, A. Rashid, M. Chau, and C. Lin, “Mapping Medical
    Informatics Research,” Editors: H. Chen, S. F. Fuller, C. Friedman, and W. Hersh, in Medical
    Informatics: Knowledge Management and Data Mining in Biomedicine, Springer, Pages 35-62, 2005.
15. D. Zeng, H. Chen, C. Lynch, M. Eidson, and I. Gotham, “Infectious Disease Informatics and Outbreak
    Detection,” Editors: H. Chen, S. F. Fuller, C. Friedman, and W. Hersh, in Medical Informatics:
    Knowledge Management and Data Mining in Biomedicine, Springer, Pages 359-395, 2005.
16. D. M. McDonald, H. Su, J. Xu, C. Tseng, H. Chen, and G. Leroy, “Gene Pathway Text Mining and
    Visualization,” Editors: H. Chen, S. F. Fuller, C. Friedman, and W. Hersh, in Medical Informatics:
    Knowledge Management and Data Mining in Biomedicine, Springer, Pages 519-545, 2005.



                                                   41
17. Z. Huang, H. Su, and H. Chen, “Joint Learning Using Multiple Types of Data and Knowledge,”
    Editors: H. Chen, S. F. Fuller, C. Friedman, and W. Hersh, in Medical Informatics: Knowledge
    Management and Data Mining in Biomedicine, Springer, Pages 593-624, 2005.
18. H. Chen and Y. Zhou “Survey and History of Digital Library Development in Asia Pacific,” Editors:
    Y. Theng and S. Foo, in Design and Usability of Digital Libraries: Case Studies in the Asia Pacific,
    Editors: Y. Theng and S. Foo, Information Science Publishing, Pages 1-20, 2005.
19. H. Chen, “Knowledge Management and Text Mining: Overview and Case Study,” Editors: K.
    Srikantaiah and M. Koenig, in Knowledge Management Lessons Learned, ASIST Monograph Series,
    Pages 239-268, 2004.
20. M. Chau and H. Chen , “Personalized and Focused Web Spiders,” ,” Editors: N. Zhang, J. Liu, and Y.
    Yao, in Web Intelligence, Springer, Berlin, Germany, Pages 197-217, 2003.
21. R. V. Hauck, M. Chau, and H. Chen, “COPLINK: Arming Law Enforcement with New Knowledge
    Management Technologies,” Editors: B. McIver and A. Elmagarmid, in Advances in Digital
    Government, Kluwer Academics, Pages 163-179, 2002.
22. H. Chen and B. R. Schatz, “A Path to Concept-based Information Access: From National
    Collaboratories to Digital Libraries,” Editors: G. M. Olson, T. W. Malone, and J. B. Smith, in
    Coordination Theory and Collaboration Technology, Lawrence Erlbaum Associates, Mahwah, NJ,
    Pages 739-760, 2001.
23. A. Houston and H. Chen, “Electronic Commerce and Digital Libraries,” Editors: M. Shaw, B.
    Blanning, T. Strader, and A. Whinston, in Handbook on Electronic Commerce, Springer, Berlin,
    Germany, Pages 339-363, 2000.
24. K. Tolle and H. Chen , “Intelligent Software Agents for Electronic Commerce,” ,” Editors: M. Shaw,
    B. Blanning, T. Strader, and A. Whinston, in Handbook on Electronic Commerce, Springer, Berlin,
    Germany, Pages 365-382, 2000.
25. H. Chen, “Semantic Issues for Digital Libraries,” in Annual Clinic on Library Applications of Data
    Processing, GSLIS, UIUC, Pages 51-60, 2000.
26. B. R. Schatz, W. Mischo, T. Cole, A. Bishop, S. Harum, E. Johnson, L. Neumann, H. Chen, and D.
    Ng, “Federated Search of Scientific Literatures: A Retrospective On the Illinois Digital Library
    Project,” in Successes and Failures of Digital Libraries, 35th Annual Clinic on Library Applications of
    Data Processing, Editors: S. Harum and M. Twindale, GSLIS, UIUC, Pages 41-57, 2000.
27. H. Chen, “Semantic Issues for Digital Libraries,” in Successes and Failures of Digital Libraries, 35th
    Annual Clinic on Library Applications of Data Processing, Editors: S. Harum and M. Twindale,
    GSLIS, UIUC, Pages 70-79, 2000.
28. H. Chen, M. Ramsey, and P. Li, “The Java Search Agent Workshop,” Editors: P. Gabriella and F.
    Crestani, in Soft Computing in Information Retrieval, Physica-Verlag, Pages 122-140, 2000.

Refereed Conference Publications
1. H. Chen, “IEDs in the Dark Web: Lexicon Expansion and Genre Classification,” Proceedings of 2009
    IEEE International Conference on Intelligence and Security Informatics, ISI 2009, Dallas, Texas, June
    2009.
2. T. Fu, C. Huang, and H. Chen, “Identification of Extremist Vidoes in Online Video Sharing Sites,”
    Proceedings of 2009 IEEE International Conference on Intelligence and Security Informatics, ISI
    2009, Dallas, Texas, June 2009.
3. Y. Zhang, Y. Dang, and H. Chen, “Gender Difference Analysis of Political Web Forums: An
    Experiment on an International Islamic Women’s Forum,” Proceedings of 2009 IEEE International
    Conference on Intelligence and Security Informatics, ISI 2009, Dallas, Texas, June 2009.


                                                   42
4. Y. Zhang, S. Zeng, L. Fan, Y. Dang, C. Larson, and H. Chen, “Dark Web Forums Portal: Searching
    and Analyzing Jihadist Forums,” Proceedings of 2009 IEEE International Conference on Intelligence
    and Security Informatics, ISI 2009, Dallas, Texas, June 2009.
5. S. Kaza and H. Chen, “Effect of Inventor Status on Intra-Organizational Innovation Evolution,”
    HICSS 2009, Hawaii.
6. X. Li and H. Chen, “Recommendation as Link Prediction: A Graph Kernel-based Machine Learning
    Approach,” ACM/IEEE JCDL 2009.
7. P. Hu, H. Chen, and H. Hu, “Examining Law Enforcement Officers’ Acceptance of Advanced E-
    Government Technology: A Survey Study of COPLINK Mobile,” International Conference on
    Electronic Commerce (ICEC), Taipei, Taiwan, August 2009.
8. H. Chen, “Nuclear Threat Detection via the Nuclear Web and Dark Web: Framework and Preliminary
    Study,” Proceedings of the First European Conference on Intelligence and Security Informatics,
    EuroISI 2008, Esbjerg, Denmark, December 2008.
9. C. Mielke and H. Chen, “Mapping Dark Web Geolocation,” Proceedings of the First European
    Conference on Intelligence and Security Informatics, EuroISI 2008, Esbjerg, Denmark, December
    2008.
10. C. Mielke and H. Chen, “Botnets, and the CyberCriminal Underground,” Proceedings of 2008 IEEE
    International Conference on Intelligence and Security Informatics, ISI 2008, Taipei, Taiwan, June
    2008.
11. T. Fu and H. Chen, “Analysis of Cyberactivism: A Case Study of Online Free Tibet Activities,”
    Proceedings of 2008 IEEE International Conference on Intelligence and Security Informatics, ISI
    2008, Taipei, Taiwan, June 2008.
12. Y. Chen, A. Abbasi, and H. Chen, “Developing Ideological Networks Using Social Network Analysis
    and Writeprints: A Case Study of the International Falun Gong Movement,” Proceedings of 2008 IEEE
    International Conference on Intelligence and Security Informatics, ISI 2008, Taipei, Taiwan, June
    2008.
13. H. Lu, D. Zeng, and H. Chen, “Bioterrorism Event Detection Based on the Markov Switching Model:
    A Simulated Anthrax Outbreak Study,” Proceedings of 2008 IEEE International Conference on
    Intelligence and Security Informatics, ISI 2008, Taipei, Taiwan, June 2008.
14. H. Chen, “Discovery of Improvised Explosive Device Content in the Dark Web,” Proceedings of 2008
    IEEE International Conference on Intelligence and Security Informatics, ISI 2008, Taipei, Taiwan,
    June 2008.
15. H. Chen, “IEDs in the Dark Web: Genre Classification of Improvised Explosive Device Web Pages,”
    Proceedings of 2008 IEEE International Conference on Intelligence and Security Informatics, ISI
    2008, Taipei, Taiwan, June 2008.
16. H. Chen, “Cyber Terrorism in Web 2.0: An Exploratory Study of International Jihadist Groups,”
    Proceedings of 2008 IEEE International Conference on Intelligence and Security Informatics, ISI
    2008, Taipei, Taiwan, June 2008.
17. H. Chen, “Sentiment and Affect Analysis of Dark Web Forums: Measuring Radicalization on the
    Internet,” Proceedings of 2008 IEEE International Conference on Intelligence and Security
    Informatics, ISI 2008, Taipei, Taiwan, June 2008.
18. J. Li, A. Wang, and H. Chen, “PRM-Based Identity Matching using Social Context,” Proceedings of
    2008 IEEE International Conference on Intelligence and Security Informatics, ISI 2008, Taipei,
    Taiwan, June 2008.




                                                 43
19. Y. Dang, Y. Zhang, N. Suyakkaphong, C. Larson, and H. Chen, “An Integrated Approach to Mapping
    Worldwide Bioterrorism Research Capabilities,” Proceedings of 2008 IEEE International Conference
    on Intelligence and Security Informatics, ISI 2008, Taipei, Taiwan, June 2008.
20. Y. Zhou, J. Qin, G. Lai, and H. Chen, “Collection of U.S. Extremist Online Forums,” HICSS 2007,
    Hawaii.
21. A. Abbasi and H. Chen, “Categorization and Analysis of Text in Computer-Mediated Communication
    Archives using Visualization,” Proceedings of the 7th ACM/IEEE Joint Conference on Digital
    Libraries, JCDL 2007, Vancouver, British Columbia, Canada, June 18-23, 2007, IEEE Press.
22. X. Li, H. Chen, Z. Zhang, and J. Li, “Automatic Patent Classification using Citation Network
    Information: An Experimental Study in Nanotechnology,” Proceedings of the 7 th ACM/IEEE Joint
    Conference on Digital Libraries, JCDL 2007, Vancouver, British Columbia, Canada, June 18-23, 2007,
    IEEE Press.
23. M. Thurmond, A. Perez, C. Tseng, H. Chen, and D. Zeng, “Global Foot-and-Mouth Disease
    Surveillance Using BioPortal,” Intelligence and Security Informatics: Biosurveillance, Proceedings of
    the Second Workshop, BioSurveillance 2007, New Brunswick, NJ, May 2007, Lecture Notes in
    Computer Science (LNCS 4506), Springer-Verlag.
24. P. Hu, D. Zeng, H. Chen, C. Larson, and C. Tseng, “A Web-based System for Infectious Disease Data
    Integration and Sharing: Evaluating Outcome, Task Performance Efficiency, User Information
    Satisfaction, and Usability,” Intelligence and Security Informatics: Biosurveillance, Proceedings of the
    Second Workshop, BioSurveillance 2007, New Brunswick, NJ, May 2007, Lecture Notes in Computer
    Science (LNCS 4506), Springer-Verlag.
25. H. Lu, C. C. King, T. Wu, F. Shih, J. Hsiao, D. Zeng, and H. Chen, “Chinese Chief Complaint
    Classification for Syndromic Surveillance,” Intelligence and Security Informatics: Biosurveillance,
    Proceedings of the Second Workshop, BioSurveillance 2007, New Brunswick, NJ, May 2007, Lecture
    Notes in Computer Science (LNCS 4506), Springer-Verlag.
26. Y. Chen, C. Tseng, C. C. King, T. Wu, and H. Chen, “Incorporating Geographical Contacts into Social
    Network Analysis for Contact Tracing in Epidemiology: A Study on Taiwan SARS Data,” Intelligence
    and Security Informatics: Biosurveillance, Proceedings of the Second Workshop, BioSurveillance
    2007, New Brunswick, NJ, May 2007, Lecture Notes in Computer Science (LNCS 4506), Springer-
    Verlag.
27. H. Lu, D. Zeng, and H. Chen, “Medical Ontology-enhanced Text Processing for Infectious Disease
    Informatics,” Proceedings of 2007 IEEE Intelligence and Security Informatics, ISI 2007, New
    Brunswick, NJ, May 2007.
28. T. Fu, A. Abbasi and H. Chen, “Interaction Coherence for Dark Web Forums,” Proceedings of 2007
    IEEE Intelligence and Security Informatics, ISI 2007, New Brunswick, NJ, May 2007.
29. A. Abbasi and H. Chen, “Affect Intensity Analysis of Dark Web Forums,” Proceedings of 2007 IEEE
    Intelligence and Security Informatics, ISI 2007, New Brunswick, NJ, May 2007.
30. S. Kaza, D. Hu, and H. Chen, “Dynamic Social Network Analysis of a Dark Network: Identifying
    Significant Facilitators,” Proceedings of 2007 IEEE Intelligence and Security Informatics, ISI 2007,
    New Brunswick, NJ, May 2007.
31. G. Wang, S. Kaza, S. Joshi, K. Chang, C. Tseng, H. Atabakhsh, and H. Chen, “The Arizona
    IDMatcher: A Probabilistic Identity Matching System,” Proceedings of 2007 IEEE Intelligence and
    Security Informatics, ISI 2007, New Brunswick, NJ, May 2007.
32. S. Kaza, D. Hu, H. Atabakhsh, and H. Chen, “Predicting Criminal Relationships using Multivariate
    Survival Analysis,” Proceedings of the 8TH Annual International Digital Government Research
    Conference, DG.O 2007, Philadelphia, Pennsylvania, May 2007.



                                                    44
33. G. Wang, S. Kaza, S. Joshi, K. Chang, C. Tseng, H. Atabakhsh, and H. Chen, “The Arizona
    IDMatcher: Developing an Identity Matching Tool for Law Enforcement,” Proceedings of the 8 TH
    Annual International Digital Government Research Conference, DG.O 2007, Philadelphia,
    Pennsylvania, May 2007.
34. H. Chen, “Exploring Extremism and Terrorism on the Web: The Dark Web Project,” Intelligence and
    Security Informatics, Proceedings the Pacific-Asia Workshop, PAISI 2007, Chengdu, China, April
    2007, Lecture Notes in Computer Science (LNCS 4430), Springer-Verlag.
35. C. Yang, T. Ng, J. Wang, C. Wei, and H. Chen, “Analyzing and Visualizing Gray Web Forum
    Structure,” Intelligence and Security Informatics, Proceedings the Pacific-Asia Workshop, PAISI
    2007, Chengdu, China, April 2007, Lecture Notes in Computer Science (LNCS 4430), Springer-
    Verlag.
36. B. Marshall and H. Chen, “Using Importance Flooding to Identify Interesting Networks of Criminal
    Activity,” Intelligence and Security Informatics, Proceedings of the IEEE International Conference on
    Intelligence and Security Informatics, ISI 2006, San Diego, CA, May 2006, Lecture Notes in
    Computer Science (LNCS 3975), Springer-Verlag.
37. A. Abbasi and H. Chen, “Visualizing Authorship for Identification,” Intelligence and Security
    Informatics, Proceedings of the IEEE International Conference on Intelligence and Security
    Informatics, ISI 2006, San Diego, CA, May 2006, Lecture Notes in Computer Science (LNCS 3975),
    Springer-Verlag.
38. P. Yan, D. Zeng, and H. Chen, “A Review of Public Health Syndromic Surveillance Systems,”
    Intelligence and Security Informatics, Proceedings of the IEEE International Conference on
    Intelligence and Security Informatics, ISI 2006, San Diego, CA, May 2006, Lecture Notes in
    Computer Science (LNCS 3975), Springer-Verlag.
39. S. Kaza, Y. Wang, and H. Chen, “Suspect Vehicle Identification for Border Safety with Modified
    Mutual Information,” Intelligence and Security Informatics, Proceedings of the IEEE International
    Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, May 2006, Lecture
    Notes in Computer Science (LNCS 3975), Springer-Verlag.
40. J. Xu, H. Chen, Y. Zhou, and J. Qin, “On the Topology of the Dark Web of Terrorist groups,”
    Intelligence and Security Informatics, Proceedings of the IEEE International Conference on
    Intelligence and Security Informatics, ISI 2006, San Diego, CA, May 2006, Lecture Notes in
    Computer Science (LNCS 3975), Springer-Verlag.
41. G. Wang, H. Chen, and H. Atabakhsh, “A Multi-layer Naïve Bayes Model for Approximate Identity
    Matching,” Intelligence and Security Informatics, Proceedings of the IEEE International Conference
    on Intelligence and Security Informatics, ISI 2006, San Diego, CA, May 2006, Lecture Notes in
    Computer Science (LNCS 3975), Springer-Verlag.
42. J. Wang, T. Fu, H. Lin, and H. Chen, “A Framework for Exploring Gray Web Forums: Analysis of
    Forum-based Communications in Taiwan,” Intelligence and Security Informatics, Proceedings of the
    IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA,
    May 2006, Lecture Notes in Computer Science (LNCS 3975), Springer-Verlag.
43. J. Ma, D. Zeng, and H. Chen, “Spatial-temporal Cross-Correlation Analysis: A New Measure and a
    Case Study in Infectious Disease Informatics,” Intelligence and Security Informatics, Proceedings of
    the IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA,
    May 2006, Lecture Notes in Computer Science (LNCS 3975), Springer-Verlag.
44. A. Salem, E. Reid, and H. Chen, “Content Analysis of Jihadi Extremist Groups’ Videos,” Intelligence
    and Security Informatics, Proceedings of the IEEE International Conference on Intelligence and
    Security Informatics, ISI 2006, San Diego, CA, May 2006, Lecture Notes in Computer Science (LNCS
    3975), Springer-Verlag.



                                                  45
45. Y. Zhou, J. Qin, G. Lai, E. Reid, and H. Chen, “Exploring the Dark Side of the Web: Collection and
    Analysis of U.S. Extremist Online Forums,” Intelligence and Security Informatics, Proceedings of the
    IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA,
    May 2006, Lecture Notes in Computer Science (LNCS 3975), Springer-Verlag.
46. Y. Zhou, J. Qin, G. Lai, E. Reid, and H. Chen, “Unraveling International Terrorist Groups’
    Exploitation of the Web: Technical Sophistication, Media Richness, and Web Interactivity,”
    Intelligence and Security Informatics, Proceedings of the International Worksop on Intelligence and
    Security Informatics, WISI 2006, Singapore, April 2006, Lecture Notes in Computer Science (LNCS
    3917), Springer-Verlag.
47. H. Chen, “Digital Library Development in the Asia Pacific,” Digital Libraries: Implementing
    Strategies and Sharing Experiences, Proceedings of the 8th International Conference on Asian Digital
    Libraries, ICADL 2005, Bangkok, Thailand, December 2005, Lecture Notes in Computer Science
    (LNCS 3815), Springer-Verlag.
48. K. Siddharth, T. Wang, H. Gowda,, and H. Chen, “Target Vehicle Identification for Border Safety
    Using Mutual Information,” Proceedings of the 8th IEEE International Conference on Intelligent
    Transportation Systems (ITSC 2005), Vienna, Austria, September 5-8, 2005.
49. W. Chang, D. Zeng,, and H. Chen, “Prospective Spatio-Temporal Data Analysis for Security
    Informatics,” Proceedings of the 8th IEEE International Conference on Intelligent Transportation
    Systems (ITSC 2005), Vienna, Austria, September 5-8, 2005.
50. A. Abbasi and H. Chen, “Applying Authorship Analysis to Arabic Web Content,” Intelligence and
    Security Informatics, Proceedings of the IEEE International Conference on Intelligence and Security
    Informatics, ISI 2005, Atlanta, Georgia, May 2005, Lecture Notes in Computer Science (LNCS 3495),
    Springer-Verlag.
51. P. Hu, D. Zeng, H. Chen, C. Larson, W. Chang, and C. Tseng, “Evaluating an Infectious Disease
    Information Sharing and Analysis System,” Intelligence and Security Informatics, Proceedings of the
    IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, Georgia,
    May 2005, Lecture Notes in Computer Science (LNCS 3495), Springer-Verlag.
52. J. Qin, J. Xu, D. Hu, M. Sageman, and H. Chen, “Analyzing Terrorist Networks: A Case Study of the
    Global Salafi Jihad Network,” Intelligence and Security Informatics, Proceedings of the IEEE
    International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, Georgia, May
    2005, Lecture Notes in Computer Science (LNCS 3495), Springer-Verlag.
53. E. Reid and H. Chen, “Mapping the Contemporary Terrorism Research Domain: Researchers,
    Publications, and Institutional Analysis,” Intelligence and Security Informatics, Proceedings of the
    IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, Georgia,
    May 2005, Lecture Notes in Computer Science (LNCS 3495), Springer-Verlag.
54. A. G. Wang, H. Atabakhsh, T. Petersen, and H. Chen, “Discovering Identity Problems: A Case
    Study,” Intelligence and Security Informatics, Proceedings of the IEEE International Conference on
    Intelligence and Security Informatics, ISI 2005, Atlanta, Georgia, May 2005, Lecture Notes in
    Computer Science (LNCS 3495), Springer-Verlag.
55. E. Reid, J. Qin, Y. Zhou, G. Lai, M. Sageman, G. Weimann, and H. Chen, “Collecting and Analyzing
    the Presence of Terrorists on the Web: A Case Study of Jihad Websites,” Intelligence and Security
    Informatics, Proceedings of the IEEE International Conference on Intelligence and Security
    Informatics, ISI 2005, Atlanta, Georgia, May 2005, Lecture Notes in Computer Science (LNCS 3495),
    Springer-Verlag.
56. H. Chen, H. Atabakhsh, J. Xu, A. Gang, B. Marshall, S. Kaza, C. Tseng, S. Eggers, H. Gowda, T.
    Petersen, and C. Violette, “Intelligence and Security Informatics: A Crime Data Mining Approach to
    Developing BroderSafe Research,” Proceedings of the 6th National Conference on Digital Government
    Research, DG.O 2005, Atlanta, Georgia, May 2005.


                                                  46
57. H. Chen, H. Atabakhsh, S. Kaza, B. Marshall, J. Xu, A. Gang, T. Petersen, and C. Violette,
    “BorderSafe: Cross-Jurisdictional Information Sharing, Analysis, and Visualization,” Proceedings of
    the 6th National Conference on Digital Government Research, DG.O 2005, Atlanta, Georgia, May
    2005.
58. S. Kaza, J. Xu, B. Marshall, and H. Chen, “Topological Analysis of Criminal Activity Networks in
    Multiple Jurisdictions,” Proceedings of the 6th National Conference on Digital Government Research,
    DG.O 2005, Atlanta, Georgia, May 2005.
59. H. Chen, D. Zeng, C. Tseng, C. Larson, M. Eidson, I. Gotham, C. Lynch, and P. Hu, “A National
    Center of Excellence for Infectious Disease Informatics,” Proceedings of the 6th National Conference
    on Digital Government Research, DG.O 2005, Atlanta, Georgia, May 2005.
60. D. Zeng, H. Chen, C. Tseng, C. Larson, M. Eidson, I. Gotham, C. Lynch, and M. Ascher, “BioPortal:
    An Integrated Infectious Disease Information Sharing and Analysis Environment,” Proceedings of the
    6th National Conference on Digital Government Research, DG.O 2005, Atlanta, Georgia, May 2005.
61. H. Chen, D, H. Atabakhsh, C. Tseng, B. Marshall, S. Kaza, S. Eggers, H. Gowda, A. Shah, T.
    Petersen, and C. Violette “Visualization in Law Enforcement,” Proceedings of the 6th National
    Conference on Digital Government Research, DG.O 2005, Atlanta, Georgia, May 2005.
62. W. Chung, T. Elhourani, A. Bonilla, G. Lai, W. Xi, and H. Chen, “Supporting Information Seeking in
    Multinational Organizations: A Knowledge Portal Approach,” Proceedings of the 38th Annual Hawaii
    International Conference on System Sciences (HICSS-38), Big Island, Hawaii, January 3-6, 2005.
63. H. Chen, “Biomedical Informatics and Security Informatics Research in Digital Library,” Proceedings
    of the 7th International Conference on Asian Digital Libraries, ICADL 2004, Shanghai, China,
    December 2004, Lecture Notes in Computer Science (LNCS 3334), Springer-Verlag.
64. M. Chau and H. Chen, “CMedPort: Using Content-Based and Link-Based Analysis in Building
    Vertical Search Engines,” Proceedings of the 7th International Conference on Asian Digital Libraries,
    ICADL 2004, Shanghai, China, December 2004, Lecture Notes in Computer Science (LNCS 3334),
    Springer-Verlag.
65. Z. Huang, D. Zeng, and H. Chen, “A Unified Recommendation Framework Based on Probablistic
    Relational Models,” Proceedings of the 14th Annual Workshop on Information Technologies and
    Systems (WITS’04), Washington, DC, December, 2004.
66. B. Marshall, K. Siddharth, J. Xu, H. Atabakhsh, T. Peterson, C. Violette, and H. Chen, “Cross-
    jurisdictional Criminal Activity Networks to Support Border and Transportation Security,”
    Proceedings of the 7th IEEE International Conference on Intelligent Transportation Systems (ITSC
    2004), Washington, DC, October 3-6, 2004.
67. H. Chen, J. Qin, E. Reid, W. Chung, Y. Zhou, W. Xi, G. Lai, A. Bonillas, F. Wang, and M. Sageman
    “The Dark Web Portal: Collecting and Analyzing the Presence of Domestic and International Terrorist
    Groups in the Web,” Proceedings of the 7th IEEE International Conference on Intelligent
    Transportation Systems (ITSC 2004), Washington, DC, October 3-6, 2004.
68. D. Zeng, W. Chang, and H. Chen, “A Comparative Analysis of Spatio-Temporal Hotspot Analysis
    Techniques in Security Informatics,” Proceedings of the 7th IEEE International Conference on
    Intelligent Transportation Systems (ITSC 2004), Washington, DC, October 3-6, 2004.
69. Z. Huang, H. Chen, F. Guo, J. Xu, S. Wu, and W. H. Chen, “Visualizing the Expertise Space,”
    Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS-37), Big
    Island, Hawaii, January 3-6, 2004.
70. D. Zeng, H. Chen, C. Tseng, C. Larson, M. Eidson, I, Gotham, C. Lynch, and M. Ascher, “West Nile
    Virus and Botulism Portal: A Case Study in Infectious Disease Informatics,” Intelligence and Security




                                                  47
Informatics, Proceedings of the Second Symposium on Intelligence and Security Informatics, ISI 2004,
    Tucson, Arizona, June 2004, Lecture Notes in Computer Science (LNCS 3073), Springer-Verlag.
71. E. Reid, J. Qin, W. Chung, J. Xu, Y. Zhou, R. Schumaker, M. Sageman, and H. Chen, “Terrorism
    Knowledge Portal:: A Knowledge Discovery Approach to Addressing the Threat of Terrorism,”
    Intelligence and Security Informatics, Proceedings of the Second Symposium on Intelligence and
    Security Informatics, ISI 2004, Tucson, Arizona, June 2004, Lecture Notes in Computer Science
    (LNCS 3073), Springer-Verlag.
72. J. Xu, B. Marshall, S. Kaza, and H. Chen, “Analyzing and Visualizing Criminal Network Dynamics:
    A Case Study,” Intelligence and Security Informatics, Proceedings of the Second Symposium on
    Intelligence and Security Informatics, ISI 2004, Tucson, Arizona, June 2004, Lecture Notes in
    Computer Science (LNCS 3073), Springer-Verlag.
73. H. Atabakhsh, C. Larson, T. Petersen, C. Violette, and      H. Chen, “Information Sharing and
    Collaboration Policies within Government Agencies,” Intelligence and Security Informatics,
    Proceedings of the Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson,
    Arizona, June 2004, Lecture Notes in Computer Science (LNCS 3073), Springer-Verlag.
74. Y. Zhou, J. Qin, and H. Chen, “CMedPort: Intelligent Searching for Chinese Medical Information,”
    Proceedings of the 6th International Conference on Asian Digital Libraries, ICADL 2003, Kuala
    Lumpur, Malaysia, December 2003, Lecture Notes in Computer Science (LNCS 2911), Springer-
    Verlag.
75. D. Zeng, H. Chen, C. Tseng, C. Larson, M. Eidson, I, Gotham, C. Lynch, and M. Ascher, “Towards a
    National Infectious Disease Information Infrastructure: A Case Study in West Nile Virus and
    Botulism,” Proceedings of the National Conference on Digital Government Research, DG.O 2004,
    Seattle, Washington, May 2004, Digital Government Research Center.
76. H. Chen, H. Atabakhsh, T. Petersen, and C. Violette, “COPLINK Center: Information and Knowledge
    Management for Law Enforcement,” Proceedings of the National Conference on Digital Government
    Research, DG.O 2004, Seattle, Washington, May 2004, Digital Government Research Center.
77. H. Chen, Y. Zhou, J. Qin, and C. Larson, “Digital Government Portal: A Tool for Digital Government
    Research,” Proceedings of the National Conference on Digital Government Research, DG.O 2004,
    Seattle, Washington, May 2004, Digital Government Research Center.
78. J. Qin, Y. Zhou and H. Chen, “Supporting Multilingual Information Retrieval in Web Applications: An
    English-Chinese Web Portal Experiment,” Proceedings of the 6th International Conference on Asian
    Digital Libraries, ICADL 2003, Kuala Lumpur, Malaysia, December 2003, Lecture Notes in Computer
    Science (LNCS 2911), Springer-Verlag.
79. R. Zheng, Y. Qin, Z. Huang, and H. Chen, “Authorship Analysis in Cybercrime Investigation,”
    Proceedings of the 1st NSF/NIJ Symposium on Intelligence and Security Informatics, ISI 2003,
    Tucson, Arizona, June 2003, Lecture Notes in Computer Science (LNCS 2665), Springer-Verlag.
80. J. Schroeder, J. Xu, and H. Chen, “CrimeLink Explorer: Using Domain Knowledge to Facilitate
    Automated Crime Association Analysis,” Proceedings of the 1st NSF/NIJ Symposium on Intelligence
    and Security Informatics, ISI 2003, Tucson, Arizona, June 2003, Lecture Notes in Computer Science
    (LNCS 2665), Springer-Verlag.
81. T. Buetow, L. Chaboya, C. O’Tolle, T. Cushna, D. Daspit, T. Peterson, H. Atabakhsh, and H. Chen,
    “A Spatial Temporal Visualizer for Law Enforcement,” Proceedings of the 1 st NSF/NIJ Symposium on
    Intelligence and Security Informatics, ISI 2003, Tucson, Arizona, June 2003, Lecture Notes in
    Computer Science (LNCS 2665), Springer-Verlag.
82. P. J. Hu, C. Lin, and H. Chen, “Examining Technology Acceptance by Individual Law Enforcement
    Officers: An Exploratory Study,” Proceedings of the 1st NSF/NIJ Symposium on Intelligence and




                                                  48
Security Informatics, ISI 2003, Tucson, Arizona, June 2003, Lecture Notes in Computer Science
    (LNCS 2665), Springer-Verlag.
83. R. Chang, W. Chung and H. Chen, “An International Perspective on Fighting Cybercrime,”
    Proceedings of the 1st NSF/NIJ Symposium on Intelligence and Security Informatics, ISI 2003,
    Tucson, Arizona, June 2003, Lecture Notes in Computer Science (LNCS 2665), Springer-Verlag.
84. D. Zeng, H. Chen, D. Daspit, F. Shan, S. Nandiraju, M. Chau, and C. Lin, “COPLINK Agent: An
    Architecture for Information Monitoring and Sharing in Law Enforcement,” Proceedings of the 1st
    NSF/NIJ Symposium on Intelligence and Security Informatics, ISI 2003, Tucson, Arizona, June 2003,
    Lecture Notes in Computer Science (LNCS 2665), Springer-Verlag.
85. L. L. Zhao, H. H. Bi, and H. Chen, “Collaborative Workflow Management for Interagency Crime
    Analysis,” Proceedings of the 1st NSF/NIJ Symposium on Intelligence and Security Informatics, ISI
    2003, Tucson, Arizona, June 2003, Lecture Notes in Computer Science (LNCS 2665), Springer-
    Verlag.
86. J. Xu and H. Chen, “Untangling Criminal Networks: A Case Study,” Proceedings of the 1st NSF/NIJ
    Symposium on Intelligence and Security Informatics, ISI 2003, Tucson, Arizona, June 2003, Lecture
    Notes in Computer Science (LNCS 2665), Springer-Verlag.
87. G. Leroy, H. Chen, J. D. Martinez, S. Eggers, R. Falsey, K. Kislin, Z. Huang, J. Li, J. Xu, D.
    McDonald, and G. Ng, “Genescene: Biomedical Text and Data Mining,” Proceedings of the Third
    ACM/IEEE-CS Joint Conference on Digital Libraries, JCDL 2003, Houston, Texas, May 27-31, 2003.
88. B. Marshall, Y. Zhang, H. Chen, A. Lally, R. Shen, E. Fox, and L. N. Cassel, “Convergence of
    Knowledge Management and E-Learning: The GetSmart Experience,” Proceedings of the Third ACM/
    IEEE-CS Joint Conference on Digital Libraries, JCDL 2003, Houston, Texas, May 27-31, 2003.
89. H. Chen, H. Atabakhsh, and M. Chau, “COPLINK: Visualization for Crime Analysis,” Proceedings of
    the Third National Conference on Digital Government Research, Los Angeles, CA, May 18-21, 2003.
90. H. Chen, W. Chung, Y. Qin, M. Chau, J. Xu, G. Wang, R. Zheng, and H. Atabakhsh “Crime Data
    Mining: An Overview and Case Studies,” Proceedings of the Third National Conference on Digital
    Government Research, Los Angeles, CA, May 18-21, 2003.
91. C. Lin, P. J. Hu, and H. Chen, “Technology Implementation in Law Enforcement: COPLINK System
    Usability and User Acceptance Evaluations,” Proceedings of the Third National Conference on Digital
    Government Research, Los Angeles, CA, May 18-21, 2003.
92. C. Q. Yin, D. Nickels, T. G. Ng, and H. Chen, “DGPort: A Web Portal for Digital Government,”
    Proceedings of the Third National Conference on Digital Government Research, Los Angeles, CA,
    May 18-21, 2003.
93. W. Chung, H. Chen, and J. F. Nunamaker, “Business Intelligence Explorer: A Knowledge Map
    Framework for Discovering Business Intelligence on the Web,” Proceedings of the 36th Annual
    Hawaii International Conference on System Sciences (HICSS-27), Big Island, Hawaii, January 6-7,
    2003.
94. M. A. Grayson, D. P. Biros, M. Ward, and H. Chen, “Air Force Organizational Memory Information
    System: A Computer-Mediated Communication Perspective,” IASTED International Conference on
    Information and Knowledge Sharing (IKS’02), St. Thomas, Virgin Islands, November 18-20, 2002.
95. G. Leroy and H. Chen, “MedTextus: An Ontology-enhanced Medical Portal,” Proceedings of
    Workshop on Information Technology and Systems (WITS 2001) Conference, Barcelona, Spain,
    December 14-15, 2002.
96. H. Chen, “From Digital Library to Digital Government: A Case Study in Crime Data Mapping and
    Mining,” Proceedings of The 5th International Conference of Asian Digital Libraries, ICADL 2002,
    Singapore, December 11-14, 2002, Lecture Notes in Computer Science, Springer-Verlag.


                                                  49
97. D. McDonald and H. Chen, “Using Sentence-Selection Heuristics to Rank Text Segments in
    TXTRACTOR,” Proceedings of the Second ACM/IEEE-CS Joint Conference on Digital Libraries,
    JCDL 2002, Portland, Oregon, July 14-18, 2002.
98. Z. Huang, W. Chung, T. Ong, and H. Chen, “A Graph-based Recommender System for Digital
    Library,” Proceedings of the Second ACM/IEEE-CS Joint Conference on Digital Libraries, JCDL
    2002, Portland, Oregon, July 14-18, 2002.
99. M. Chau, H. Chen, J. Qin, Y. Zhou, Y. Qin, W. Sung, and D. McDonald, “Comparison of Two
    Approaches to Building a Vertical Search Tool: A Case Study in the Nanotechnology Domain,”
    Proceedings of the Second ACM/IEEE-CS Joint Conference on Digital Libraries, JCDL 2002,
    Portland, Oregon, July 14-18, 2002.
100.H. Chen, “E-Library, E-Government, and E-Commerce: Common Threads and New Opportunities,”
    Proceedings of the First China Digital Library Conference, Beijing, China, July 9-11, 2002.
101.J. Xu and H. Chen, “Using Shortest Path Algorithms to Identify Criminal Associations,” Proceedings
    of the Second National Conference on Digital Government Research, Los Angeles, CA, May 20-22,
    2002.
102.M. Chau, J. Xu, and H. Chen, “Extracting Meaningful Entities from Police Narrative Reports,”
    Proceedings of the Second National Conference on Digital Government Research, Los Angeles, CA,
    May 20-22, 2002.
103.H. Chen, H. Atabakhsh, D. Zeng, J. Schroeder, T. Peterson, D. Casey, M. Chen, Y. Xiang, D. Daspit,
    S. Nandiraju, and S. Fu, “COPLINK: Visualization and Collaboration for Law Enforcement,”
    Proceedings of the Second National Conference on Digital Government Research, Los Angeles, CA,
    May 20-22, 2002.
104.G. Leroy and H. Chen, “Filling Preposition-based Template to Capture Information from Medical
    Abstracts,” Proceedings of Pacific Symposium on Biocomputing (PSB 2002), Kauai, Hawaii, January,
    2002, Pages 350-361.
105.H. Chen, “Medical Text Mining: A DLI-2 Status Report,” Proceedings of The 4th International
    Conference of Asian Digital Libraries (ICADL 2001), Bangalore, India, December 10-12, 2001.
106.H. Chen, “Knowledge Management Systems: A Text Mining Perspective,” Invited Tutorial for The
    4th International Conference of Asian Digital Libraries (ICADL 2001), Bangalore, India, December
    10-12, 2001.
107.B. Zhu and H. Chen, “Social Visualization for Computer-Mediated Communication: A Knowledge
    Management Perspective,” Proceedings of Workshop on Information Technology and Systems (WITS
    2001) Conference, New Orleans, Louisiana, December 15-16, 2001.
108.H. Chen, “COPLINK: Knowledge Management for Law Enforcement,” Proceedings of the National
    Conference on Digital Government Research, Los Angeles, CA, May 21-23, 2001.
109.H. Chen, “A Case of Information Categorization in NSF DLI Research,” Proceedings of The Second
    International Roundtable on Terminology, Seoul, Korea, December 10, 2000.
110.H. Chen, “High-Performance Digital Library Classification Systems: An Experiment in Medical
    Informatics,” Proceedings of the Third International Asian Digital Library Conference, Seoul, Korea,
    December 6-9, 2000.
111.H. Chen, “UMLS and Linguistics Enhanced Medical Information Retrieval,” Proceedings of NHRI
    (National Health Research Institute) Research Resources 2000, Taipei, Taiwan, April 27, 2000.
112.N. C. Romano, C. Baur, H. Chen, and J. F. Nunamaker, “The MindMine Comment Analysis Tool for
    Collaborative Attitude Solicitation, Analysis, Sense-making and Visualization,” Proceedings of the



                                                   50
33th Annual Hawaii International Conference on System Sciences (HICSS-33), Maui, Hawaii, January
    7-10, 2000.
113.T. Ong and H. Chen, “Updateable PAT-Tree Approach to Chinese Key Phrase Extraction Using
    Mutual Information: A Linguistic Foundation for Knowledge Management,” Proceedings of the
    Second Asian Digital Library Conference, Taipei, Taiwan , November 8-9, 1999.
114.G. Leroy, K. Tolle, and H. Chen, “Customizable and Ontology-Enhanced Medical Information
    Retrieval Interfaces,” Proceedings of International Medical Informatics Association Working Group 6
    on Medical Concept Representation, Phoenix, Arizona, December 16-19, 1999.
115.B. Zhu, M. Ramsey, H. Chen, R. V. Hauck, T. D. Ng, and B. R. Schatz, “Support Concept-based
    Multimedia Information Retrieval: A Knowledge Management Approach,” Proceedings of the ICIS
    Conference, Charlotte, North Carolina, December 12-15, 1999.
116.R. V. Hauck and H. Chen, “COPLINK: A Case of Intelligent Analysis and Knowledge Management,”
    Proceedings of the ICIS Conference, Charlotte, North Carolina, December 12-15, 1999.
117.N. C. Romano, D. Roussonov, J. F. Nunamaker, and H. Chen, “Collaborative information Retrieval
    Environment: Integration of Information Retrieval with Group Support Systems,” Proceedings of the
    32th Annual Hawaii International Conference on System Sciences (HICSS-32), Maui, Hawaii, January
    7-10, 1999.
118.H. Chen, “The Illinois Digital Library Initiative Project: Federating Repositories and Semantic
    Research,” Proceedings of The First Asia Digital Library Workshop '98, Hong Kong, August 6-7,
    1998.
119.M. Ramsey, T. Ong, and H. Chen, “Multilingual Input System for the Web - an Open Multimedia
    Approach of Keyboard and Handwritten Recognition for Chinese and Japanese,” Proceedings of IEEE
    Advances in Digital Libraries Conference (ADL '98), Santa Barbara, CA, April 22-24, 1998, Pages
    188-195.
120.H. Chen, Y. Chung, M. Ramsey, C. Yang, P. Ma, and J. Yen, “Intelligent Agents on the Internet,”
    Proceedings of the 30th Annual Hawaii International Conference on System Sciences (HICSS-30),
    Maui, Hawaii, January 7-10, 1997.
121.B. Schatz, E. Johnson, P. Cochrane, and H. Chen, “Interactive Term Suggestion for Users of Digital
    Libraries: Using Subject Thesauri and Co-occurrence Lists for Information Retrieval,” ACM Digital
    Library Conference, 1996, Pages 126-133.
122.H. Chen, B. R. Schatz, C. Lin, “Concept Classification and Search on Internet Using Machine
    Learning and Parallel Computing Techniques,” World Wide Web 4 Conference, Boston, MA,
    December 11-14, 1995, Pages 58-59, Poster Proceedings.
123.J. Yen, H. Chen, P. Ma, and T. Bui, “An Issues Identifier for Online Financial Databases,”
    Proceedings of the International Society for Decision Support Systems Third International
    Conference, ISDSS'95, Hong Kong, June 22-23, 1995.
124.H. Chen and B. Schatz, “Semantic Retrieval for the NCSA Mosaic,” Proceedings of the Second
    International World Wide Web Conference '94, Chicago, Illinois, October 17-20, 1994.
125.J. Martinez and H. Chen, “Cognitive Studies on the Use of Automatic Thesauri for Information
    Retrieval in Biological Domains,” AzLA Annual Conference, November, 1994.
126.H. Chen and L. She, “Inductive Query by Examples (IQBE): A Machine Learning Approach,”
    Proceedings of the 27th Annual Hawaii International Conference on System Sciences (HICSS-27),
    Maui, Hawaii, January 4-7, 1994.




                                                  51
127.H. Chen, “An Algorithmic Approach to Building Organizational Memory for a Scientific
    Community,” Proceedings of the 27th Annual Hawaii International Conference on System Sciences
    (HICSS-27), Maui, Hawaii, January 4-7, 1994.
128.H. Chen, “A Machine Learning Approach to Document Retrieval: An Overview and an Experiment,”
    Proceedings of the 27th Annual Hawaii International Conference on System Sciences (HICSS-27),
    Maui, Hawaii, January 4-7, 1994.
129.H. Chen, “Approaching the Vocabulary Problem in Collaboration,” Proceedings of the National
    Science Foundation Coordination Theory and Collaboration Technology Workshop (NSF CTCT), July
    8-10, 1993, Arlington, VA.
130.B. Schatz, E. Grossman, T. Friedman, K. Powell, J. Calley, H. Chen, L. Star, S. Hudson, and S. Ward,
    “The Worm Community System, Release 2,” 1993 Meeting on C. elegans, University of Wisconsin,
    Madison, Wisconsin, June 2-6, 1993.
131.K. J. Lynch and H. Chen, “Knowledge Discovery from Historical Data: An Algorithmic Approach,”
    Proceedings of the 25th Annual Hawaii International Conference on System Sciences (HICSS-25),
    Kaui, Hawaii, January 7-10, 1992, Pages 70-79.
132.H. Chen and V. Dhar, “Online Query Refinement on Information Retrieval Systems: A Process Model
    of Searcher/System Interactions,” Proceedings of the 13th International Conference on Research and
    Development in Information Retrieval (SIGIR-90), Brussels, Belgium, 1990.
133.H. Chen and V. Dhar, “A Knowledge-Based Approach to the Design of Document-Based Retrieval
    Systems,” Proceedings of the 5th Conference on Office Information Systems (COIS-90), Boston,
    Massachusetts, 1990.
134.H. Chen, “A Knowledge-Based Design for Hypertext-Based Document Retrieval Systems,”
    Proceedings of the International Conference on Data Base and Expert Systems Applications
    (DEXA-90), Vienna, Austria, 1990.
135.H. Chen and V. Dhar, “Reducing Indeterminism in Consultation: A Cognitive Model of
    User/Librarian Interactions,” Proceedings of the 6th National Conference on Artificial Intelligence
    (AAAI-87), Seattle, Washington, 1987.




                                                  52

More Related Content

DOC
Tacoma, WA 98422
PDF
A42020106
PDF
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
PPTX
Brown Bag: New Models of Scholarly Communication for Digital Scholarship, by ...
PPTX
Internet search btp_r[1].pptx edit
PPTX
Ica2012 preconference keynote
PDF
Event detection in twitter using text and image fusion
PDF
Data-Mining Twitter for Political Science -Hickman, Alfredo - Honors Thesis
Tacoma, WA 98422
A42020106
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
Brown Bag: New Models of Scholarly Communication for Digital Scholarship, by ...
Internet search btp_r[1].pptx edit
Ica2012 preconference keynote
Event detection in twitter using text and image fusion
Data-Mining Twitter for Political Science -Hickman, Alfredo - Honors Thesis

What's hot (19)

PPT
Semantics for Bioinformatics: What, Why and How of Search, Integration and An...
PDF
Research Metadata Mechanics - Simon Porter
PPTX
Webometrics Revisited in Big Data Age_DISC2013
PPTX
Relationship Web: Trailblazing, Analytics and Computing for Human Experience
PDF
Semantic Web for 360-degree Health: State-of-the-Art & Vision for Better Inte...
PPT
How to social scientists use link data (11 june2010)
PPTX
Social media-based systems: an emerging area of information systems research ...
PDF
Research Data Census
PDF
Detecting fake news_with_weak_social_supervision
PPTX
Characterizing Data and Software for Social Science Research
PPT
Information Seeking Behavior
PDF
Asia Triple Helix Society Summer Seminar/Conference Proceedings
PDF
Disc2013 keynote speakers
PPT
Information Seeking Behaviour Models
PDF
Data collection thru social media
PPTX
How to utilize ‘big data’ on SNS for academic purpose?
PPTX
The Roots: Linked data and the foundations of successful Agriculture Data
PDF
ANALYSIS OF TOPIC MODELING WITH UNPOOLED AND POOLED TWEETS AND EXPLORATION OF...
PPT
Infrastructures Supporting Inter-disciplinary Research - Exemplars from the UK

Semantics for Bioinformatics: What, Why and How of Search, Integration and An...
Research Metadata Mechanics - Simon Porter
Webometrics Revisited in Big Data Age_DISC2013
Relationship Web: Trailblazing, Analytics and Computing for Human Experience
Semantic Web for 360-degree Health: State-of-the-Art & Vision for Better Inte...
How to social scientists use link data (11 june2010)
Social media-based systems: an emerging area of information systems research ...
Research Data Census
Detecting fake news_with_weak_social_supervision
Characterizing Data and Software for Social Science Research
Information Seeking Behavior
Asia Triple Helix Society Summer Seminar/Conference Proceedings
Disc2013 keynote speakers
Information Seeking Behaviour Models
Data collection thru social media
How to utilize ‘big data’ on SNS for academic purpose?
The Roots: Linked data and the foundations of successful Agriculture Data
ANALYSIS OF TOPIC MODELING WITH UNPOOLED AND POOLED TWEETS AND EXPLORATION OF...
Infrastructures Supporting Inter-disciplinary Research - Exemplars from the UK

Ad

Similar to Hsinchun Chen.doc.doc (20)

PPTX
The UVA School of Data Science
PPTX
UVA School of Data Science
PDF
PPTX
The Internet (Nursing Informatics)
PDF
Resume It Industry Strath Address
PPTX
Zeng marcia ifla-subjectaccesssmartdatadh
PPTX
Value Co-Creation in Innovation Ecosystems (English)
PPTX
8 2-10 hkust eng
PDF
Steve's CV
PDF
Agent-Based Problem Solving Methods In Big Data Environment
PPTX
Biodiversity Informatics: An Interdisciplinary Challenge
PDF
Relation of Coffee Break and Productivity
PDF
Sensors, Signals and Sense-making in Human-Energy Relationships
PDF
Encyclopedia Of Algorithms Kao Mingyangeditor
PPTX
What's up at Kno.e.sis?
PPTX
OII Summer Doctoral Programme 2010: Global brain by Meyer & Schroeder
PDF
RRossBiosketch2015
DOCX
RDAP 16: DMPs and Public Access: Agency and Data Service Experiences
DOCX
Alejandro Arizpe - Artificial Intelligence, Machine Learning, and Databases i...
The UVA School of Data Science
UVA School of Data Science
The Internet (Nursing Informatics)
Resume It Industry Strath Address
Zeng marcia ifla-subjectaccesssmartdatadh
Value Co-Creation in Innovation Ecosystems (English)
8 2-10 hkust eng
Steve's CV
Agent-Based Problem Solving Methods In Big Data Environment
Biodiversity Informatics: An Interdisciplinary Challenge
Relation of Coffee Break and Productivity
Sensors, Signals and Sense-making in Human-Energy Relationships
Encyclopedia Of Algorithms Kao Mingyangeditor
What's up at Kno.e.sis?
OII Summer Doctoral Programme 2010: Global brain by Meyer & Schroeder
RRossBiosketch2015
RDAP 16: DMPs and Public Access: Agency and Data Service Experiences
Alejandro Arizpe - Artificial Intelligence, Machine Learning, and Databases i...
Ad

More from butest (20)

PDF
EL MODELO DE NEGOCIO DE YOUTUBE
DOC
1. MPEG I.B.P frame之不同
PDF
LESSONS FROM THE MICHAEL JACKSON TRIAL
PPT
Timeline: The Life of Michael Jackson
DOCX
Popular Reading Last Updated April 1, 2010 Adams, Lorraine The ...
PDF
LESSONS FROM THE MICHAEL JACKSON TRIAL
PPTX
Com 380, Summer II
PPT
PPT
DOCX
The MYnstrel Free Press Volume 2: Economic Struggles, Meet Jazz
DOC
MICHAEL JACKSON.doc
PPTX
Social Networks: Twitter Facebook SL - Slide 1
PPT
Facebook
DOCX
Executive Summary Hare Chevrolet is a General Motors dealership ...
DOC
Welcome to the Dougherty County Public Library's Facebook and ...
DOC
NEWS ANNOUNCEMENT
DOC
C-2100 Ultra Zoom.doc
DOC
MAC Printing on ITS Printers.doc.doc
DOC
Mac OS X Guide.doc
DOC
hier
DOC
WEB DESIGN!
EL MODELO DE NEGOCIO DE YOUTUBE
1. MPEG I.B.P frame之不同
LESSONS FROM THE MICHAEL JACKSON TRIAL
Timeline: The Life of Michael Jackson
Popular Reading Last Updated April 1, 2010 Adams, Lorraine The ...
LESSONS FROM THE MICHAEL JACKSON TRIAL
Com 380, Summer II
PPT
The MYnstrel Free Press Volume 2: Economic Struggles, Meet Jazz
MICHAEL JACKSON.doc
Social Networks: Twitter Facebook SL - Slide 1
Facebook
Executive Summary Hare Chevrolet is a General Motors dealership ...
Welcome to the Dougherty County Public Library's Facebook and ...
NEWS ANNOUNCEMENT
C-2100 Ultra Zoom.doc
MAC Printing on ITS Printers.doc.doc
Mac OS X Guide.doc
hier
WEB DESIGN!

Hsinchun Chen.doc.doc

  • 1. April 10, 2010 Hsinchun Chen Management Information Systems Department Office: (520) 621-2748 Eller College of Management FAX: (520) 621-2433 The University of Arizona hchen@eller.arizona.edu McClelland Hall 430Z http://ai.arizona.edu Tucson, Arizona 85721 Education Ph.D. Information Systems New York University 1989 M.S. Information Systems New York University 1987 MBA Management Information Systems State University of New York at 1985 Management Science Buffalo Finance B.S. Management Science National Chiao-Tung University, 1981 Taiwan Ph.D. Dissertation “An Artificial Intelligence Approach to the Design of Online Information Retrieval Systems,” October 1989 (Advisor: Vasant Dhar). Personal Background Born in Taiwan; US Citizen; Security Clearance (FBI: Secret, effective 2007, expired 3/31/2010; CIA: Top Secret, TS/SI/TK/G/HCS effective 4/23/2009); Married with two children. Academic/Professional Experience and Employment Honorary/Distinguished Chair Professor, National Taiwan University, Taiwan Central Police University, Taiwan National Dong-Hua University, Shanghai Jiao-Tong University Director, NSF BioPortal Center for infectious disease and bioagent information sharing, analysis, and visualization research, 2004-2009 ($2.5M funding). Director, NSF COPLINK Center for public safety and homeland security IT research, 2003-2008 ($3M funding). Founding Director, Mark and Susan Hoffman E-Commerce Lab, University of Arizona, 2000-2005 ($2M in infrastructure funding and $10M in software donation from SAP, Oracle, Microsoft, IBM, etc., 7,000 square-foot). Founder, Knowledge Computing Corporation, a University of Arizona spin-off company in knowledge management, February, 2000 ($4.6M in VC funding). The company was acquired by Silverlake and I2 for $40M in July 2009. Founder, International Biocomputing Corporation, a University of Arizona spin-off company in infectious disease informatics, January, 2006 ($100K NSF SBIR funding). McClelland Endowed Professor of Management Information Systems, 1999. Andersen Consulting Professor of the Year, 1999. Director, Artificial Intelligence Laboratory, Management Information Systems Department, University of Arizona, 1990-present (35 research scientists, graduate assistants, and programmers, $30M in federal funding, see http://ai.bpa.arizona.edu). 1
  • 2. Visiting Senior Research Scientist, University of Illinois at Urbana-Champaign, National Center for Supercomputing Applications (NCSA), 1996-present. Member, Arizona Cancer Center, University of Arizona, 1997. Full Professor (with tenure), University of Arizona, Department of MIS, 1998-present. Associate Professor (with tenure), University of Arizona, Department of MIS, 1995-1998. Assistant Professor, University of Arizona, Department of MIS, 1989-1995. Major Project Activities Dark Web: Open-Source Terrorism Content Collection and Analysis (NSF, DOD, ITIC, $3M): PI of a major terrorism research project funded by NSF and ITIC. In partnership with selected terrorism study centers and intelligent community agencies, the project aims to develop a systematic, computational approach to collecting and analyzing international extremist-generated Internet contents (web site, forums, chat rooms, etc.). Current research efforts include: intelligent spidering/archiving, link (social network) analysis, content analysis, web metrics analysis, multimedia analysis, sentiment analysis, and authorship analysis of online extremism. (Collaborators: E. Reid, C. Ellis, M. Sageman) BioPortal: National Infectious Disease Infrastructure (NSF, ITIC, $2.5M): PI of a major bioinformatics demonstration project funded by NSF and ITIC. In partnership with the NY, CA, and AZ public health departments, the project aims to develop a scalable information sharing and data mining infrastructure for infectious diseases across jurisdictions and disease types. A prototype system has been developed with West Nile Virus and Boutulism information across CA and NY. Significant research efforts are under way in HL7/XML data sharing, agent-based alerting, spatial-temporal visualization, and hotspot analysis. (Collaborators: M. Ascher, M. Thurmond, C. Lynch, J. Kvach) National Security Research in BorderSafe (NSF/ITR. ITIC/KDD, DHS/CNRI, $1.5M)): PI of several major national security related projects. BorderSafe aims to develop an information sharing and data mining framework for the law enforcement and intelligence community. By partnering with several law enforcement and federal agencies in Southern California and Arizona, the project has developed significant criminal network analysis and (identify) deception detection components that have been adopted for national security and border protection activities. (Collaborators: J. Pitt, R. Friends, T. Petersen) GeneScene: Gene Pathway Analysis (NLM/NIH, 2002-, $1.4M): PI of a major NIH/NLM funded project. It is widely believed that elucidation of the genes and proteins that compose biochemical pathways will define the molecular targets for future drug therapies. GeneScene is designed to utilize information derived from various medical literature sources (e.g., Medline, CancerLit, UMLS) to help suggest possible interactions between genetic and biochemical pathways. It will assist in reviewing existing literature, identifying gaps in existing knowledge, comparing and integrating knowledge and data from different fields, and as such help lead the way to new and interesting hypotheses and field research. Significant research in the areas of data mining and text mining has been performed to develop GeneScene into a public resource for biomedical research and advancement. (Collaborators: J. Martinez, G. Leroy, Z. Huang, D. McDonald) NSDL Projects: GetSmart and EconPort (NSF, 2002-, $1.2M): PI of several major NSF funded NSDL projects. As part of the NSF National Science Digital Library (NSDL) program that aims to create sustainable, innovative digital library based e-learning and education collection, services, and research for various academic communities, our projects encompass various knowledge portals, concept mapping, and active digital library objects research activities. The GetSmart project, in collaboration with the Virginia Tech, develops concept mapping and digital library knowledge creation tools for the computer engineering domain. The EconPort project, in collaboration with the Economics Science Lab at the University of Arizona, creates a sustainable web portal environment for researching experimental economics and agent related issues on the Internet. (Collaborators: E. Fox, J. Cox, D. Zeng, B. Marshall, Y. Zhang, A. Lally, C. Larson) 2
  • 3. Mark and Susan Hoffman E-Commerce Lab (Hoffman/HP/IBM, 2000-, $4M): Founding Director of the University of Arizona Hoffman eCommerce Lab, a state-of-the-art eCommerce education, research, and outreach environment for BPA students of all levels. Located at the McClelland Hall 218 area (a 7,000 square-foot space of high-speed, wired and wireless facility), the lab has received over $2M in infrastructure funding from Hoffman, HP, and IBM and more than $10M in software donation from major eCommerce companies including Commerce One, Oracle, SAP, Microsoft, and IBM. The lab consists of a high-end lab space, a technology lounge, and an executive training classroom. The lab is also a major part of the UA/Eller Prop 301 Internet Technology and Commerce Initiative (ITCI), which received $5.5M state funding for education, research, and outreach development, 2001-2006. The lab currently consists of a staff of 2 full-time lab and software managers and 5 GTAs. (Collaborators: M. Hoffman of Commerce One, Garry Gray of HP, D. Zeng, M. Fenstermarcher, D. Meader, B. Newman, O. Sheng) COPLINK Center: Knowledge Management for Law Enforcement (NSF, 2000-2003, $2.5M): Principal investigator (PI) of a major NSF Digital Government project, which aims to develop information sharing and knowledge management technologies for law enforcement community and to understand the associated social and organizational impacts. The project is one of the major awards of the NSF Digital Government program, which aims to examine and develop technologies that could more efficiently and effectively deliver government services to the public in the Internet era. The COPLINK system has successfully linked the record management systems between Tucson Police Department and Phoenix Police Department and is in use by more than 500 police officers in the state of Arizona. (Collaborators: J. Schroeder of Tucson Police Department and J. Hindman of Phoenix Police Department, S. Weisband, D. Zeng, A. Lally, M. Chau) OOHAY, From Digital Library to Knowledge Management (NSF, 1998-2003, $1M): Principal investigator (PI) of several NSF-funded projects. Project OOHAY (Object Oriented Hierarchical Automatic Yellowpage, the reverse of YAHOO) is a multi-disciplinary, long-term project that aims to create system- aided technologies and methodologies for automatically analyzing and visualizing large collections of unstructured documents in a useful organizational context. In a new Digital Library Initiative (DLI) Phase 2 project, the OOHAY approach will be compared with human knowledge structures in several large-scale knowledge domains (e.g., National Library of Medicine's UMLS and the Yahoo! subject directory). In a separate NSF/CISE funded project, we are beginning to study agent-based analysis and visualization techniques which are grounded on emerging human-computer interaction principles and new visualization metaphors (e.g., 3D and virtual reality). (Collaborators: D. Meader, D. Zeng, R. Sewell, M. Ramsey, K. Tolle, B. Zhu) COPLINK, Database and Intranet Integration (DOJ/NIJ, 1997-2002, $1.5M): Principal investigator (PI) of an NIJ-funded project on “COPLINK: Database Integration and Access for a Law Enforcement Intranet.” The project, funded by the National Institute of Justice, is intended to be a catalyst to solve law enforcement information technology problems through a partnership between the AI Lab and the Tucson Police Department. Innovative and functional technologies will expand the uses of COPLINK from database integration, secured Intranet access, and mobile computing, to criminal intelligence and case analysis, mug-shot face recognition, and intelligent agents. (Collaborators: D. Smith, B. Fund, B. Cochrane, J. Wills at Tucson Police Department, K. Lynch, C. Lin, H. Gupta, A. Clements, K. Rasmusen, C. Boarman) Interspace Semantic Middleware (DARPA, 1997-2000, $1.1M): Principal investigator (PI) of an DARPA-funded project on “The Interspace Prototype: An Analysis Environment based on Scalable Semantics.” The foundation of our proposed analysis environment will be a “semantic middleware” for scalable distributed services, which consist of a hierarchy of statistical and pattern analysis algorithms that are valid across the range of object types (e.g., texts and images) and subject domains. This middleware will be used to construct a prototype Interspace with large collections across text (abstracts in engineering) and image (aerial photos in geography), and then across subjects (medical thesaurus relationships) and classifications (personal Web documents). We plan to use NCSA-unique computing, network, and visualization resources as a “time-machine” to simulate a generation-after-next hardware and software environment. (Collaborators: B. Schatz, B. Pottenger, D. Lawrie at UIUC, M. Ramsey, T. Ng, K. Tolle, B. Zhu, D. Roussinov) 3
  • 4. Medical Informatics (NCI/NLM, 1996-present, $300K): Principal investigator (PI) of several NIH- funded projects on “Information Analysis and Visualization for Medical Informatics.” These projects aim to create concept spaces and self-organizing categories for cancer and toxicology literature (Cancerlit and Toxline databases of National Library of Medicine). Automatic indexing, linguistic parsing, cluster analysis, neural networks, and information visualization techniques have been adopted. The resulting system-generated knowledge structures will be integrated with existing fine-grained medical knowledge sources (e.g., NLM's Unified Medical Language System) and will be used to enhance medical information retrieval and knowledge sharing. (Collaborators: B. Schatz at NCSA, T. Doszkocs at National Library of Medicine, S. Hubbard at National Cancer of Institute, A. Houston, R. Sewell, D. Ng, K. Tolle, G. Leroy) Geographic Information Systems (NSF, 1996-1998, $100K): Principal investigator (PI) of an NSF/CISE- funded project on “Supplement to Alexandria DLI Project: A Semantic Interoperability Experiment for Spatially-Oriented Multimedia Data.” This research aims to examine semantic interoperability issues related to spatially-oriented, multimedia geographic information access. Based on the concept space approach developed by the Illinois Digital Library Initiative (DLI) project and the Alexandria (University of California at Santa Barbara) geo-referenced collections, this research proposes to develop knowledge representations and structures to capture concepts of relevance to spatial and multimedia information (natural language phrases and geo-related textures). Selected machine learning techniques and general Artificial Intelligence (AI) graph traversal algorithms will also be adopted to assist in semantic, concept- based spreading activation in integrated knowledge networks. (Collaborators: T. Smith, B. Schatz, L. Carver, M. Larsgaard, L. Hill, B. Manjunath at University of California at Santa Barbara and T. Huang at University of Illinois, M. Ramsey, B. Zhu, D. Ng) Parallel Computing for Knowledge Discovery (NSF/NCSA, 1995-2001): Principal investigator (PI) of an National Center for Supercomputing Applications (NCSA) High-performance Computing Resources Grant (“Information Analysis and Knowledge Discovery for Digital Libraries”). The project aims to generate concept spaces for all engineering domains. The resulting concept spaces will be used to support concept-based retrieval and cross-domain vocabulary switching in scientific information retrieval. Thinking Machine's CM-5 (512 nodes), SGI's Power Challenge Array (48 nodes), Cray's CS6400 (8 nodes), and Convex's Exemplar (64 nodes) have been provided by NCSA. (Collaborators: B. Schatz, L. Smarr at NCSA) Internet Categorization (NSF, 1995-1998, $200K): Principal investigator (PI) of an NSF/CISE-funded “Internet Categorization and Search” project. The proposed approach, which is grounded on automatic textual analysis of Internet documents (homepages), attempts to address the Internet search problem by first categorizing the content of Internet documents and subsequently providing semantic search capabilities based on a concept space and a genetic algorithm spider (agent). (Collaborators: C. Lin, E. Jan, B. Wilcox, Y. Chung) Digital Library Initiative-1 (NSF/ARPA/NASA, 1994-1998, $500K): Co-Principal investigator (Co-PI) of an NSF/ARPA/NASA-funded “Digital Library Initiative” project. The project goal is to develop a large- scale testbed for building the next-generation digital libraries for the National Information Infrastructure (NII). The testbed collections are mainly in the engineering domains, to be contributed by major engineering societies and publishers e.g., IEEE, John Weily & Sons, etc. Project researchers mainly are information science and computer science faculty from the University of Illinois at Urbana-Champaign and research scientists from Illinois's National Center for Supercomputing Applications (the NCSA Mosaic development team). The initial platform will be based on the NCSA Mosaic, a popular multi-media, hypertext-based tool for internet resource discovery. As a Co-PI from Arizona, I am responsible for developing semantic (concept-based) retrieval, customized IR, and content-based information routing capabilities for the extended Mosaic. (Collaborators: B. Schatz, J. Harden, A. Bishop, W. Mischo, L. Star at University of Illinois) Intelligent Groupware (Army/AT&T, 1991-present, $100K): Principal designer for an Army and AT&T funded electronic meeting system project. Artificial intelligence and information science techniques for assisting concept classification and content-based information retrieval that have been tested include: neural network classification, genetic algorithms, inductive learning algorithms, vector space modeling, and 4
  • 5. parallel search and clustering algorithms. We have successfully developed an AI tool (agent) to automatically extract and classify topics (concepts) from the electronic brainstorming comments generated by meeting participants (using GroupSystems). We are in the process of using similar techniques to develop software which could automatically classify email and assist in email routing and filtering. We are also designing an “intelligent” (concept-based) meeting memory system. (Collaborators: J. Nunamaker, D. Vogel, R. Orwig, P. Hsu, L. Hoopes, J. Kim, L. She, G. Shankar, A. Iyer) Worm Community System (NSF, 1992-1995, $65K): Principal investigator (PI) of an NSF-funded “National Collaboratory” project. The project goal is to design a concept-based information retrieval and information sharing software for molecular biologists whose work is related to the Human Genome Initiative. A (nematode) worm concept space and a fly (Drosophila) concept space which can assist in cross-domain concept exploration and term suggestion during IR have been created and are in use by worm biologists. (Collaborators: B. Schatz, S. Ward, T. Yim, D. Fye, J. Martinez, K. Powell, E. Grossman, T. Friedman, J. Calley) Intelligence Analysis (1989-1994): Principal designer of an intelligence analysis and retrieval system, which supports intelligence analysts who study information technology policy, manufacturing, and proliferation in the (former) USSR countries. Extensive user requirements studies were conducted. A content-based intelligence analysis and retrieval system was developed in ANSI C and runs on VAX/VMS and DECStation (UNIX based). It includes a system-generated Russian computing “concept space” and a system-assisted relevance feedback and query refinement process. The system is currently in use by the intelligence analysts. (Collaborators: S. Goodman, W. McHenry, P. Wolcott, K. Lynch, A. Himler, R. Orwig, T. Ng, K. Basu) Neural Networks for Pharmaceutical Applications (1992-98): Principal investigator (PI) for an NIH- funded project investigating a neural network approach to pharmaceutical applications. Sample applications include drug solubility prediction and non-linear pharmacokinetics functions approximation. 1992-1993. (Collaborators: S. Yakowski, P. Myral, H. Chow, T. Ng) Multi-lingual Information Retrieval (1991-present): Principal investigator (PI) for a University of Arizona funded project designing “intelligent” multilingual information retrieval databases. An AI-based retrieval interface to foreign language databases in Chinese and in Spanish has been designed and tested. (Collaborators: H. Saldana, C. Lin, K. Leung, P. Rodriguez) Knowledge-based Information Retrieval (1986-1989): Principal designer and programmer for an NYU- supported project designing knowledge-based online cataloging systems. The system was designed in Lisp and runs on SUN workstations. 1986-1989. (Collaborator: V. Dhar) DBMS-ES Coupling (1986): Programmer for a major IBM-NYU software engineering project which evaluated and designed coupling mechanisms between the Expert System development language PROLOG and Relational Database Systems (using SQL). This was part of a joint project between IBM and NYU, January-September 1986. (Collaborators: M. Yarke, Y. Vassiliou, J. Clifford) Teaching Experience Instructor, “Advanced Topics in Artificial Intelligence” (Ph.D. course), MIS 680, 1989-1996. • Fall/1989: 5.25 on a 6-point scale. • Spring/1990: 5.13 on a 6-point scale. College of Business and Public Administration (BPA) Teaching Distinction List. • Fall/1990: 5.00 on a 6-point scale. • Spring/1991: 5.78 on a 6-point scale. BPA Teaching Distinction List. • Fall/1991: 5.33 on a 6-point scale. BPA Teaching Distinction List. 5
  • 6. Spring/1992: 5.75 on a 6-point scale. BPA Teaching Distinction List. • Spring/1996: 4.90 on a new UA 5-point scale (top 10%). Instructor, “Data Structures and Algorithms” (undergraduate course), using PASCAL/C, MIS 301, 1989-1998. Student instructor-evaluations: • Fall/1989: 5.22 on a 6-point scale. BPA Teaching Distinction List. • Spring/1990: 4.93 on a 6-point scale. • Fall/1990: 5.04 on a 6-point scale. • Fall/1991, 2 Sections: 5.08 and 5.15 on a 6-point scale. • Fall/1992, 2 Sections: 5.43 and 5.38 on a 6-point scale. Both on BPA Teaching Distinction List. • Fall/1993, 2 Sections: 4.52 and 4.80, on a new UA 5-point scale (top 10%). • Spring/1995, 2 Sections: 4.66 and 4.82, on a UA 5-point scale (top 10%). • Spring/1996: 4.69, on a UA 5-point scale (top 10%). • Spring/1998, 2 sections: 4.7 and 4.2, on a UA 5-point scale (top 10%). Instructor, “Data Structures and Algorithms” (MS/MBA course), using C/JAVA/C++, MIS 531A, 1989- present. Student instructor-evaluations: • Fall/1990: 3.86 on a 6-point scale. • Fall/1994: 4.43 on a new UA 5-point scale (top 10%). • Fall/1995: 4.52 on a new UA 5-point scale (top 10%). • Fall/1997: 4.60 on a new UA 5-point scale (top 10%). • Fall/1998, 2 sections: 4.60 and 4.7 on a new UA 5-point scale • Fall/1999, 2 sections: 4.60 and 4.4 on a UA 5-point scale • Fall/2000, 2 sections: 4.78 and 4.61 on a UA 5-point scale • Fall/2001, 2 sections, 4.81and 4.5 on a UA 5-point scale • Fall/2002, 2 sections, 4.63 and 4.39 on a UA 5-point scale • Fall/2005, 4.6 on a UA 5-point scale Instructor, “Introduction to Artificial Intelligence and Expert Systems” (MBA/MS/BS course), MIS 480/580, 1989-1997. Student instructor-evaluations: • Fall/1990: 4.79 on a 6-point scale. • Fall/1994: 4.75 on a new UA 5-point scale (top 10%). • Fall/1995: 4.70 on a UA 5-point scale (top 10%). • Fall/1997: 4.50 on a UA 5-point scale (top 10%). 6
  • 7. Instructor, “Knowledge Management: Technologies and Practices” (MBA/MS/BS course), MIS 480/580, 1998-present. Student instructor-evaluations: • Fall/1998: 4.30 on a UA 5-point scale (top 10%). • Fall/1999: 4.20 on a UA 5-point scale (top 10%). • Fall/2004: 3.90 on a UA 5-point scale • Fall/2005: 4.8 on a UA 5-point scale • Spring/2007: 4.5 on a UA 5-point scale • Spring/2008: 4.0 on a UA 5-point scale • Spring/2009: 4.0 on a UA 5-point scale Instructor, “Web Computing and Mining,” (MS course), MIS 510, new course in 2004. Student instructor- evaluations: • Fall/2004: 4.10 on a UA 5-point scale • Spring/2007: 4.5 on a UA 5-point scale • Spring/2008: 3.8 on a UA 5-point scale • Spring/2009: 4.2 on a UA 5-point scale Instructor, “Biomedical and Security Informatics,” (MS course), MIS 596A, new course in 2007. Student instructor-evaluations: • Spring/2007: 4.10 on a UA 5-point scale Instructor, “Information Systems for Management” (MBA course), New York University, June-August, 1988. Teaching Assistant, “AI: Concepts and Applications” (MBA course), New York University, using LISP, OPS5, FLAVORS, and PROLOG, December 1986-August 1988. Teaching Assistant, “Software Engineering Practice” (MBA course), New York University, using COBOL, January-December, 1986. Ph.D. Dissertations Supervised 1. Randy J. Johnson, “A Cognitive Approach to the Representation of Managerial Competitive Intelligence Knowledge,” 1994 2. Richard E. Orwig, “A Graphical Self-Organizing Approach to Classifying Electronic Meeting Output,” 1995 (Susquehanna University) 3. Andrea L. Houston, “Information Classification: Usability Studies of Two Automatic Approaches,” 1998 (Louisiana State University) 4. Dmitri Roussinov, “Information Foraging Through Automatic Clustering and Summarization: A Self- organizing Approach,” 1999 (Syracuse University, Arizona State University, University of Strathclyde, Scottland). CHI 1999 Consortium Student 7
  • 8. 5. Dorbin T. Ng, “A Concept Space Approach to Semantic Exchange,” 2000 (Carnegie Mellon University) 6. Bin Zhu, “Information Visualization for Knowledge Repositories: Applications and Impacts,” 2002 (Boston University). CHI 2001 Consortium Student 7. Gondy Leroy, “Facilitating Knowledge Discovery by Integrating Bottom-up and Top-Down Knowledge Sources: A Text Mining Approach,” 2003 (Claremont Graduate University) 8. Michael Chau, “Searching and Mining the Web for Personalized and Specialized Information,” 2003 (Hong Kong University) 9. Wingyan Chung, “An Automatic Text Mining Framework for Knowledge Discovery on the Web,” 2004 (University of Texas at El Paso; Santa Clara University) 10. Thian-Huat Ong, “Language and Domain-Independent Knowledge Maps: A Statistical Phrase Indexing Approach,” 2004 (Cal State University at Sacramento) 11. Chienting Lin, “Examining Technology Usability and Acceptance in Digital Government: A Case Study in Law Enforcement,” 2004 (Pace University) 12. Zan Huang, “Graph-based Analysis for E-Commerce Recommendation,” 2005 (Penn State University). International Conference on Information Systems (ICIS) 2005 Best Dissertation Award, December 2005 13. Jennifer Xu, “Mining Static and Dynamic Structural Patterns in Networks for Knowledge Management: A Computational Framework and Case Studies,” 2005 (Bentley College, Boston) 14. Byron Marshall, “Concept Mapping in Informal Node-Link Knowledge Representations,” 2005 (Oregon State University) 15. Alan Gang Wang, “Entity Matching for Intelligent Information Integration,” 2006 (Virginia Tech) 16. Yilu Zhou, “Supporting Multilingual Internet Searching and Browsing,” 2006 (George Washington University). 17. Jialun Qin, “Facilitating Knowledge Discovery by Mining the Content and Link Structure of the Web,” 2006 (University of Massachusetts) 18. Dan M. McDonald, “Combining Text Structure and Meaning to Support Text Mining,” 2006 (University of Utah) 19. Jason Jiexin Li, “Feature Construction, Selection, and Consolidation for Knowledge Discovery,” 2007 (Drexel University) 20. Rob Schumaker, “Knowledge Acquisition, Delivery and Prediction through Text Mining,” 2007 (Iona College) 21. Sidd Kaza, “Instance, Evolution, and Predictive Modeling of Social Networks,” 2008 (Towson University) 22. Ahmed Abbasi, “Categorization, Analysis, and Visualization of Computer-Mediated Communication and Electronic Markets,” 2008 (University of Wisconsin at Milwaukee) 8
  • 9. 23. Xin Li, “Graph Mining for Information Systems,” 2009 (City University of Hong Kong) Ongoing dissertations: Hsin-min Lu (surveillance systems), Yan Dang (knowledge mapping), Yulei Zhang (text mining), David Zimbra (web mining) Master's theses supervised: A. Himler, S. Cooper, P. Collins, S. Crawford, S. Nizyborski, T. Ng, T. Yim, C. Lin, V. Rajaraaman, L. She, Y. Chung, Y. Zhang, K. Ng, O. Titkova, K. Tolle, M. Ramsey, C. Chang, K. Rasmusen, H. Dwiyono, A. Clements, W. Wyzga, P. Li, D. Chen, D. Hendriwan, C. Boarman, H. Gupta, F. Ye, H. Gupta, S. Chen, L. Guo, H. Fang, M. Huang, F. Guo, J. Schroeder, Y. Lin. Professional Associations The Institute of Electrical and Electronics Engineers (IEEE), Fellow. American Association for the Advancement of Science (AAAS), Fellow. The Association of Computing Machinery (ACM). The American Association for Artificial Intelligence (AAAI). American Medical Informatics Association (AMIA) The American Society for Information Science (ASIS). Institute for Operations Research and the Management Science (INFORMS). Research Interests Digital library, intelligent information retrieval, automatic categorization and classification, concept space generation, automatic thesaurus browsing and traversal, inductive query by examples, machine learning for IR, large-scale information analysis and visualization. Internet resource discovery, digital libraries, IR for large-scale scientific and business databases, customized IR, multilingual IR. Groupware, computer-supported collaborative work (CSCW), intelligent CSCW agent, collaborative systems, meeting memory, email routing/filtering, organizational memory, intelligence systems, international computing. Knowledge-based systems design, knowledge discovery in databases, hypertext systems, machine learning, neural networks computing, genetic algorithms, simulated annealing. Cognitive modeling, human-computer interactions, IR behaviors, human problem-solving process. Large-scale knowledge discovery, parallel computing, commercial applications on supercomputers. Intramural Services Chair, Eller College Faculty Status Committee, 2006-2007. Member, MIS Graduate Committee, 2002-present. Member, MIS Head Search Committee, Graduate Committee, Prop 301 Committee, 2001-2004. Founding Director, Mark and Susan Hoffman E-Commerce Lab, College of BPA, University of Arizona, 2000 (obtained $2M in infrastructure funding , $10M in software donations, and $2M in Prop 301 funding). Chair, MIS Graduate Committee, 1999-2000. 9
  • 10. Member, BPA Undergraduate Curriculum Task Force, 1998-1999. Chair, MIS Department Faculty Search Committee, 1997-1999. Member, BPA Faculty Status Committee, 1998-1999. Member, College of Business Undergraduate Curriculum Task Force, Fall 1998. Member, University of Arizona Faculty Senate Committee on Intellectual Property and Scholarly Communication, Spring 1998-Fall 1999 (18-month ad hoc committee). Member, MIS Department Faculty Status Committee, Fall 1997. Chair, Sunset Review Committee for the Center for the Management of Information (with Smith and Zajac), College of Business and Public Administration, University of Arizona, Spring 1997. Chair, MIS Department Head Search Committee (with Puto, Issac, Holmes, Vogel, LaSalle, and Ram) College of Business and Public Administration, University of Arizona, Fall 1996-Spring 1997. Chair and member, Undergraduate Curriculum Committee (with LaSalle, Vogel, and Slaten), MIS Department, University of Arizona, Fall 1992-present. Ph.D. dissertation committees, Departments of MIS, ECE (Electronic and Computer Engineering), SIE (System and Industrial Engineering) and Computer Science, 1989-present. Member, Undergraduate Program Director Recruiting Committee, College of Business and Public Administration, University of Arizona, Fall 1993. Local Community Services and Activities COPLINK system, funded by NIJ and NSF, has been adopted by Tucson Police Department and the Phoenix Police Department as a statewide information sharing and intelligence analysis tool. It is currently in use by more than 5,000 police officers in the state of Arizona. Principal Investigator, COPLINK (database and Intranet) project for local (Tucson) law enforcement, jointly with Chief Doug Smith of Tucson Police Department (TPD), funded by National Institute of Justice (NIJ), $1.2M, 1997-1999. Founder/Presenter, Knowledge Computing Corporation (KCC), Arizona Venture Capitalist Conference (AVCC), Phoenix, AZ, November 13-14, 1997. Reported as cover stories at Arizona Daily Star, November 9, 1997 and December 20, 1997. Journal Editorial Board Editor in Chief, ACM Transactions on Management Information Systems, 2009-present. Associate Editor in Chief, IEEE Intelligent Systems, 2008-present. Member, Editorial Board, IEEE Computing Now, 2009-present. Member, Senior Editorial Board, Journal of Information Technology and Politics, 2006-present. Member, Editorial Board, International Journal of Digital Libraries, 2005-present. Member, Editorial Advisory Board, Encyclopedia of Library and Information Sciences, 2005-present. Vice Chair, Editorial Board, Library Journal, Shanghai Library and Shanghai Society for Library Science, 2004-present. 10
  • 11. Associate Editor, IEEE Transactions on Intelligent Transportation Systems, 2004-2007. Associate Editor, IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2003-present. Associate Editor, ACM Transactions on Information Systems, 2002-present. Member, Editorial Board, International Journal of Electronic Business, 2002-present. Area Editor (Digital and Web Computing), Decision Support Systems, 2001-present. Member, Editorial Board, Journal of the American Society for Information Science and Technology, 1997- present. Scientific Board Information Technology Counselor, Central Police University, Taiwan, 2006-2008. Member, Advisory Committee, Digital Library of China Project, National Library of China, China, 2004-2007. Member, Advisory Committee, Institute of Information Science, Academia Sinica, Taiwan, 2004-2008. Scientific Counselor, Board of Scientific Counselors, Lister Hill Center, National Library of Medicine, National Institutes of Health, 2002-2006. Professional Society Member, Board of Governors (BOG), IEEE Intelligent Transportation Systems Society (ITSS), 2004-2005. Chair, Technical Community (TC) on Intelligence and Security Informatics for Transportation Systems, IEEE Intelligent Transportation Systems Council (ITSC), 2004-present. Chair, Technical Committee on Homeland Security (TCHS), IEEE Systems, Man, and Cybernetics (SMC) Society, 2004-present. Member and Asian Digital Library liaison, Technical Committee on Digital Library (TCDL), IEEE Computer Society, 2004-present. ExCom (Executive Committee) member, IEEE Intelligent Transportation Systems Council (ITSC), representing IEEE Computer Society, 2004-present. Book Editing Editor (with E. Reid, J. Sinai, A. Silke, and B. Ganor), “Terrorism Informatics,” Springer, 2007, forthcoming. Editor (with L. Brandt, V. Gregg, R. Traunmuller, S. Dawes, E. Hovy, A. McIntosh, and C. Larson), “Digital Government: E-Government Research, Case Studies and Implementation,” Springer, 2007. Editor (with T. S. Raghu, R. Ramesh, A. Vinze, and D. Zeng), “Handbooks in Information Systems -- National Security,” Elsevier Scientific, 2007. Editor (with S. Fuller, C. Friedman, and W. Hersh), “Medical Informatics: Knowledge Management and Data Mining in Biomedicine,” Springer, 2005. Journal Guest Editing (Special Issue) 11
  • 12. Guest editor (with C. Yang and C. Wei), Decision Support Systems, special issue on “Multilingual Knowledge Management,” 2006. Gust editor (with F. Wang), IEEE Intelligent Systems, special issue on “Artificial Intelligence for Homeland Security,” 2005. Guest editor (with G. Leroy), Decision Support Systems, special issue on “Decision Support in Medicine,” 2005. Guest editor (with T. S. Raghu), Decision Support Systems, special issue on “Advances in Information Sharing, Data Mining, and Collaboration Systems,” 2005. Guest editor (with D. Zeng), ACM Transactions on Internet Technology, special issue on “Intelligence and Security Informatics,” 2004. Guest editor (with E. Lim, E. Neuhold, S. Sugimoto, and J. Li), International Journal of Digital Libraries, special issue on “Asian Digital Libraries,” 2004. Guest editor, Decision Support Systems, special issue on “Intelligence and Security Informatics: An Information Systems Perspective,” 2004. Guest editor, Journal of the American Society for Information Science and Technology special issue on “Intelligence and Security Informatics,” 2004. Guest editor, Journal of the American Society for Information Science special issue on “Web Retrieval and Mining,” 2003. Guest editor, Decision Support Systems, special issues on “Web Retrieval and Mining” and “Digital Government: Technologies and Practices,” 2002. Guest editor, International Journal of Decision Support Systems special issue on “From Information Retrieval to Knowledge Management: Enabling Technologies and Best Practices,” 1999. Guest editor, Journal of the American Society for Information Science special issue on “Digital Libraries,” 1999. Guest editor, IEEE Computer special issue on “Digital Libraries: Technological Advances and Social Impacts,” February 1999. Guest editor, Journal of the American Society for Information Science special issue on “Artificial Intelligence Techniques for Emerging Information Systems Applications,” 1998. Guest editor, IEEE Computer May 1996 special issue on “Building Large-scale Digital Libraries” (with B. R. Schatz). Conference/Workshop Chair and Keynote Speaker Conference Co-Chair, IEEE International Conference on Intelligence and Security Informatics, IEEE ISI-2009, Dallas, Texas, June 8-11, 2009. Honorary Chair and Keynote Speaker, First European Conference on Intelligence and Security Informatics, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Conference Co-Chair, IEEE International Conference on Intelligence and Security Informatics, IEEE ISI-2008, Taipei, Taiwan, June 17-20, 2008. Workshop Co-Chair, Second NSF Workshop on Intelligence and Security Informatics: Biosurveillance, BioSurveillance 2007, New Brunswick, NJ, May 22, 2007. 12
  • 13. Conference Co-Chair, IEEE International Conference on Intelligence and Security Informatics, IEEE ISI-2007, New Brunswick, NJ, May 23-24, 2007. Keynote speaker, “Exploring Extremism and Terrorism on the Web: The Dark Web Project,” Pacific-Asia Intelligence and Security Informatics Workshop, PAISI 2007, Chengdu, China, April 2007. Steering Committee Chair, IEEE International Conference on Intelligence and Security Informatics (IEEE ISI), 2002-present. Steering Committee Chair, International Conference on Asian Digital Libraries (ICADL), 1998-2006. Conference Co-Chair, IEEE International Conference on Intelligence and Security Informatics, IEEE ISI-2006, San Diego, CA, May 19-20, 2006. Keynote speaker, “Digital Library Development in the Asia-Pacific,” The 8th International Conference on Asian Digital Libraries (ICADL 2005), Bangkok, Thailand, December 12-14, 2005. Steering Committee Co-Chair, The 8th International Conference on Asian Digital Libraries (ICADL 2005), Bangkok, Thailand, December 12-14, 2005. Conference Co-Chair, IEEE International Conference on Intelligence and Security Informatics, IEEE ISI-2005, Atlanta, Georgia, May 19-20, 2005. Program Co-Chair, The 7th International Conference on Asian Digital Libraries (ICADL 2004), Shanghai, China, December 8-12, 2004. Technical Committee Co-Chair, The 2nd China Conference on Digital Libraries, Beijing, China, September 6-8, 2004. Conference Chair, ACM/IEEE Joint Conference on Digital Libraries, JCDL 2004, Tucson, Arizona, June 7-11, 2004. Symposium Chair, “NSF/DHS/ITIC/NIJ Symposium on Intelligence and Security Informatics,” Tucson, Arizona, June 10-11, 2004. Inaugural Speaker, “Knowledge Management Systems: Applications and Development,” International Conference on Digital Libraries (ICDL), New Delhi, India, February 24-27, 2004. Keynote Speaker, “Crime Data Mining and Visualization for Intelligence and Security Informatics,” IEEE Carnahan 2003, Taipei, Taiwan, October 14, 2003. Keynote Speaker, “Achieving Information Resources Empowerment: A Digital Library and Knowledge Management Perspective,” CONSAL (Congress of South East Asian Librarian) XII, Brunei Darussalam, October 20, 2003. Program Co-Chair, The 6th International Conference on Asian Digital Libraries (ICADL 2003), Kuala Lumpur, Malaysia, December 8-12, 2003. Symposium Co-Chair, “NSF/NIJ Symposium on Intelligence and Security Informatics,” Tucson, Arizona, June 2-3, 2003. Conference Co-Chair, The 5th International Conference on Asian Digital Libraries (ICADL 2002), Singapore, December 17-20, 2002. Keynote Speaker, “E-library, E-government, and E-commerce: Common Threads and New Opportunities,” The First China Digital Library Conference, Beijing, China, July 11, 2002. Chair, International Technical Committee, The First China Digital Library Conference, Beijing, China, July 9-11, 2002. 13
  • 14. Keynote Speaker, “DLI1, DLI2, NSDL, JCDL, ECDL, and ICADL,” The 4th International Conference of Asian Digital Libraries, Bangalore, India, December 10-12, 2001. Chair, COPLINK User Workshop, sponsored by NSF, January 18, 2002, Tucson, Arizona. Keynote Speaker, H. Chen, “UMLS and Linguistics Enhanced Medical Information Retrieval” and “Medical Information Retrieval in the WWW Era: Challenges and Opportunities,” NHRI (National Health Research Institute) Research Resources 2000, Taipei, Taiwan, April 27-28, 2000. General Chair/Keynote Speaker, “Information Visualization for Digital Libraries,” The Second Asian Digital Library Conference, Taipei, Taiwan, November 8-9, 1999. Conference General Chair, The 4th International Conference on Asian Digital Libraries (ICADL 2001), Bangalore, India, December 10-12, 2001. Conference General Chair, The Third Asia Digital Library Workshop '2000 (ICADL 2000), Seoul, Korea, December 6-9, 2000. Technical Track Chair, ICIS’2000, Brisbane, Australia, December 10-14, 2000. Conference General Chair, The Second Asia Digital Library Workshop '99 (ICADL 1999), Taipei, Taiwan, November 8-9, 1999. Conference General Chair, The First Asia Digital Library Workshop '98 (ICADL 1998), Hong Kong, August 6-7, 1998. Awards (University, Industry, and National) Hisnchun Chen, recipient of the INFORMS Design Science Award (for the COPLINK Project), Paris, France, December 2008. Hsinchun Chen, recipient of the IEEE Computer Society 2006 Technical Achievement Award (for his innovative contributions to digital libraries, medical informatics, and intelligence and security informatics). Hsinchun Chen, AAAS (American Association for the Advancement of Science) Fellow, Elected 2006 (for contributions to scholarship and development in information systems, digital library, biomedical informatics, and intelligence and security informatics). Hsinchun Chen, IEEE (Institute of Electrical and Electronic Engineers) Fellow, Elected 2006 (for contributions to the development of medical, intelligence, and security informatics). Hsinchun Chen, Outstanding Overseas Scholar of Chinese Academy of Sciences, China, July, 2005. Hsinchun Chen, Certificate of Honor, Outstanding University Achievements, University of Arizona, 2004-2005. 14
  • 15. Hsinchun Chen, National Chiao-Tung University Distinguished Alumnus Award, April, 2005. Best Paper Award in WITS 2004, “A Unified Recommendation Framework Based on Probabilistic Models,” Z. Huang, D. Zeng, and H. Chen, Fourteen Workshop on Information Technologies & Systems, Washington, DC, December 11-12, 2004.. Knowledge Computing Corporation (a UA spin-off company from the AI Lab), Finalist, Arizona Governors Technology Innovator of the Year Award, November, 2004. Hsinchun Chen, Certificate of Honor, Recognition of accomplishments on behalf of the University of Arizona, awarded by the Student Unions Advisory Council, October 2004. Hsinchun Chen, The First University of Arizona Technology Innovation Award, Outstanding Faculty Entrepreneur, September, 2004 (with a cash award of $10,000). Best Paper Award in SIGDSS (Special Interest Group in Decision Support Systems), “A Link Analysis Approach to Recommendation under Sparse Data,” Z. Huang, D. Zeng, and H. Chen, Tenth Annual Americas Conference on Information Systems, August 5-8, 2004, NY, NY. Recognition of Service Award, presented to Hsinchun Chen, In Appreciation for Contributions to ACM, General Chair, JCDL’04: ACM/IEEE Joint Conference on Digital Libraries, June 7-11, 2004, Association for Computing Machinery. TPD COPLINK program won the Best of Breed award based on the responses from the Digital Cities Survey 2002, Center for Digital Government, 2003. Tucson Police Department (TPD) COPLINK project receives the PTI Technology Solutions Award in the mid-size, public-safety category, January 27, 2003. The PTI Technology Solutions Awards is a national program recognizing local governments that use technology to increase revenues, improve service to their community, save tax dollars, or improve management. Tucson Police Department Award “presented to Dr. Hsinchun Chen, Head of the UA/MIS Artificial Intelligence Lab, in recognition of his outstanding service to the Public and the Law Enforcement Community. His dedicated efforts to promote Law Enforcement Technology Development through the CopLink Project are greatly appreciated.” Tucson Police Department (Chief Miranda), Phoenix Police Department (Chief Hardt), March 28, 2002. University of Arizona, Kault Award for Best Placement of Graduates, College of BPA, 2000. McClelland Named Professor of Management Information Systems, University of Arizona, 1999. Andersen Consulting Professor of the Year, 1999. SAP University Alliance Grant Awards in Research/Applications, 1998-1999. 1998 Honored Entrepreneurial Fellow, Karl Eller Center for the Study of Private Market Economy, University of Arizona. AT&T Foundation Award in Science and Engineering, 1994-1995. AT&T Foundation Award in Science and Engineering, 1995-1996. Best Paper Award, “A Machine Learning Approach to Document Retrieval: An Overview and an Experiment,” in the 27th Annual Hawaii International Conference on System Sciences (HICSS-27), Maui, Hawaii, January 4-7, 1994. 15
  • 16. NSF Research Initiation Award, Division of Information, Robotics, and Intelligent Systems, Directorate for Computer and Information Sciences and Engineering, 1992-1994. University of Arizona, College of Business and Public Administration Teaching Distinction List, 1989-1992. SIM (Society of Information Management) Doctoral Fellow, 1988. Recipient of the Taggart Fellowship, New York University, 1988-1989. Recipient of the Stern School of Business research assistantship, New York University, 1985-1988. Recipient of the Haakon Samuelson Memorial Award in the area of Management Science, State University of New York at Buffalo, 1985. Beta Gamma Sigma membership, elected 1985. Recognition (Press and Media) “National Dragnet Is a Click Away,” COPLINK system featured in cover page as the largest information sharing system for the US public safety agencies. The Washington Post, March 6, 2008. “New tool automates analysis of Jihad sites,” (Associated Press) Philadelphia Inquirer, November 18, 2007. “Dark Web project designed to find Internet’s most dangerous,” (Associated Press) AZ Central, November 12, 2007. “Arizona team’s tool could help law enforcement link online postings and track down terrorists,” (Associated Press) International Herald Tribune, November 12, 2007. “Dark Web tool seeks online terrorists,” (Associated Press) Business Week, November 11, 2007. “Project seeks to track terror web posts,” (Associated Press) Forbes, November 11, 2007. “Project seeks to track terror web posts,” (Associated Press) Chicago Tribune, November 11, 2007. “Project seeks to track terror web posts,” (Associated Press) Miami Herald, November 11, 2007. “Project seeks to track terror web posts,” (Associated Press) Newsweek, November 11, 2007. “Project seeks to track terror web posts,” (Associated Press) ABC News, November 11, 2007. “Project seeks to track terror web posts,” (Associated Press) Washington Post, November 11, 2007. “Researchers say tool could help trace online posts to terrorists,” (Associated Press) USA Today, November 11, 2007. “Project seeks to track terror web posts,” Associated Press, November 11, 2007. “University of Arizona tool could help fight terrorism,” ACC:15.com, November 5, 2007. “Germany in the crosshairs of terrorism – tracking down extremists,” Second German Television (ZDF), October 23, 2007. 16
  • 17. “Dark Web project takes on cyber-terrorism,” Fox News, October 12, 2007. “UA effort sifting web for terror-threat data,” Arizona Daily Star, September 24, 2007. “Mathematicians work to help targeting terrorists over the web,” National Public Radio, September 14, 2007. “UA Scientists Probe 'Dark Web' to Uncover Potential Terrorist Threats,” AI Lab Dark Web project featured in KVOA News 4 Tucson, September 12, 2006. “Trolling for terrorists,” AI Lab Dark Web project featured in Toronto Star, September 8, 2006. “UA’s Dark Web: Team Combing Internet to Track Terrorism,” AI Lab Dark Web project featured in Arizona Republic front page article, July 28, 2006. “The Future of Terrorism,” AI Lab Dark Web project featured in Discover Magazine cover article, June 2006. Zan Huang, ICIS 2005 Best Dissertation Award, “Graph-based Analysis for E-Commerce Recommendation,” co-supervised by Hsinchun Chen and Daniel Zeng, December 12-15, 2005, Las Vegas, USA. Hsinchun Chen, Honor Professor, National Dong Hwa University, Taiwan, December 2005. Hsinchun Chen was ranked #1 in publication productivity in Digital Library in an Information Processing and Management study (Liu, Bollen, Nelson, Van de Somel, “Co-authorship networks in the digital library research community,” Information Processing and Management, 41(6), December, 2005, Pages 1462-1480). Hsinchun Chen was ranked #8 in publication productivity in Information Systems in a Communications of the Association for Information Systems study (Huang and Hsu, “An Evaluation of Publication Productivity in Information Systems: 1999-2003, Communications of the AIS, 15, 2005, Pages 555-564). “LAPD hopes to Add High-Tech Partner to Force,” The COPLINK computer program can mesh data in minutes, a task that can take a detective weeks. Los Angeles Times, January 2, 2004. “Cops Could Hit the Links Soon: New Search Engine Would Catalog, Interpret Data for Investigations,” Los Angeles Daily News, December 6, 2003. “Software Joins Cops on the Beat: COPLINK program links databases, speeds police investigations,” COPLINK deployed at the state of Alaska. Anchorage Daily News, November 23, 2003. COLINK project recognized as a finalist (among a field 144 nominations) by the prestigious International Association of Chiefs of Police (IACP)/Motorola 2003 Weaver Seavey Award for Quality in Law Enforcement, IACP Conference, Philadelphia, PA, October 23, 2003. “Software Helps Police Draw Crime Links,” A front page story about COPLINK deployment at the Boston Police Department, Boston Globe, July 17, 2003 “Google For Cops: Software Helps Police Search for Cyber Clues to Bust Criminals,” ABC News, April 15, 2003. Also appeared on TechTV. 17
  • 18. “A Google for Cops,” COPLINK was considered as the Google search engine for cops, featured in NEWSWEEK, March 3, 2003. “Sniper probe to get help from Tucson,” Arizona Daily Star, October 23, 2002. “Tucson cops, local software to help in D.C. sniper probe,” Tucson Citizen, October 23, 2002. “An Electronic Cop that Plays Hunches,” COPLINK system was used to assist in DC sniper investigation and the project was featured in New York Times, November 2, 2002. “Making a Digital Government,” COPLINK project was featured in LA Times, May 20, 2002 as an exemplar digital government project that supports law enforcement information sharing and analysis. “Super Detective: When University of Arizona professor Hsinchun Chen combined police databases for a consortium of city police agencies, a super-detective was born.” Featured in DG (Digital Government) Online Special Issue on Homeland Security, December 2001. “Key professor: E-commerce expert Hsinchun Chen is a pioneer in the knowledge management and IT areas.” Featured in The 20 Tech-Savviest Business Schools, Business 2.0, November 2001. “Coplink Sifts and Shares Information – Fast,” Featured in POLICE The Law Enforcement Magazine, July 2001. “Software for Data Searchers,” Featured in Law Enforcement Technology, April 2001. Article related to self-organizing maps (SOM) and spider (in Spanish), Featured in Revista Digital de InfoVis.net, April 2001. “Information Sharing Systems: Coplink,” Featured in The POLICE CHIEF, March, 2001. “AI Lab’s Chinese semantic retrieval system is the engine behind UDN’s (United Daily News) acclaimed intelligent news search service,” Featured in United Daily News (Taiwan), February 2, 2001. “Technology developed in Tucson is helping police catch criminals faster. COPLINK product let police agencies rapidly share crime information across jurisdictional lines,” Featured in Arizona Daily Star, January 7, 2001. “Changing the Rules of the Game. How Coplink is helping police departments match evidence across boundaries of time and space,” Featured in FCW.com, April 3, 2000. “Map of the Month is based on the ET-Map created by a team lead by Dr. Hsinchun Chen,” Featured in Mapa Mundi Magazine, February, 2000. “A Cybermap Atlas: Envisioning the Internet,” Featured in TeleGeography, 2000. “Cartes interactives ou dynamiques (Dynamic and Interactive Maps),” article in French, Featured in Science & Vie, 2000. “A Smart Itsy Bitsy Spider for the Web,” Featured in BotSpot, 2000. “Beyond Geography: Mapping Unknowns of Cyberspace,” Featured in September 30, 1999 issue of New York Times (Technology – Circuits Section cover article). “Coplink: Database Detective,” Summer, 1999, TECH Beat (cover article). 18
  • 19. “Information Retrieval in Digital Libraries: Bring Search to the Net,” Featured in Volume 275 of Science, January 17, 1997 (cover article). “NCSA and the Digital Library Initiative: Finding Critical Information Quickly and Easily,” Featured in Hewlett Packard Technical Report (5965-3214E), September 1996. “The Ultimate Indexing Job,” Featured in Business Week, Developments to Watch Column, August 12, 1996. “DLI Breaks the Semantic Barrier,” Featured in Volume 10, No. 2 of Access, High-performance Computing Magazine (Page 17), National Center for Supercomputing Applications, Summer 1996. “Digital Libraries Computation Cracks Semantic Barriers between Databases,” Featured in Volume 272 of Science, June 7, 1996. “Digital Library Concept Space Research,” Featured in Volume 9, No. 2 of Access, High-performance Computing Magazine (Page 17), National Center for Supercomputing Applications, Summer 1995, Volume 269 of Science (Page 1361, “Off-the-Shelf Chips Conquer The Heights of Computing,” September 8, 1995. “Digital Library Initiative Tackles Grand Challenge of Information Science,” Featured in Volume 5, Number 15 of HPCWire, April 12, 1996 and Volume 2, Number 17 of WEBster, April 30, 1996 Research Grants ($30M since 1989) Current/Funded: ($5M+) 1. Principal investigator (PI), DOD Counter Terrorism Fellowship Program (CTFP), “Dark Web Research Program: Collection, Portal, Research, and Training,” $300,000, in partnership with Naval Postgraduate School (NPS), #N00104-10-C-Q381, March 2010-March 2011. 2. Principal investigator (PI), DOD Defense Threat Reduction Agency (DTRA), Basic and Applied Research Directorate, “WMD Intent Identification and Interaction Analysis Using the Dark Web,” $1,047,000, HDTRA-09-0058, July 2009-July 2012. 3. Principal investigator (PI), NSF, REU (Research Experience for Undergraduate) “Dark Web Research” $31,000, August 2009-July 2010. 4. Principal investigator (PI), NSF, “Unveiling Trends in Global Nanotechnology Research and Development, $250,000, EAGER, CMMI-0926270, May 2009-April 2011. 5. Principal investigator (PI), DHS, The National Center for Border Security and Immigration, “Project 3.2: Fusion of Spatial-Temporal Sensor Data,” $300,000 ($60,000 per year), August 2008-July, 2012. 6. Principal investigator (PI), Air Force Research Lab (AFRL), “Dark Web WMD-Terrorism Study,” $89,500, August 2008-May 2009. 7. Principal investigator (PI), (with Dr. Shu-Hsing Li of National Taiwan University), Taiwan National Science Council, “Text Mining for Business Intelligence Applications,” $70,000, January 2008- December, 2011. 8. Principal investigator (PI), NSF, “CRI: Developing a Dark Web Collection and Infrastructure for Computational and Social Sciences,” $500,000 (CNS-0709338), October 2007-Septembert 2010. 9. Principal investigator (PI), NSF, “EXP-LA: Explosives and IEDs in the Dark Web: Discovery, Categorization, and Analysis,” $800,000 (CBET-0730908), December 2007-November 2010. 10. Principal investigator (PI), NSF, REU (Research Experience for Undergraduate) “BioPortal Research” $12,000, August 2008-July 2009. 11. Principal Investigator (PI, Co-PI: D. Zeng), NSF, Information Technology Research (ITR) Program, “A National Center of Excellence for Infectious Disease Informatics,” $1,200,000 (IIS-0428241), 19
  • 20. August 2004-July 2009. (subcontracts: University of Utah, California Department of Health, and NY Department of Public Health) (UA matching: $75,000) Past/Funded: ($25M) 1. Principal Investigator (PI), NSF, Digital Government Program, “COPLINK Center: Social Network Analysis and Identity Deception Detection for Law Enforcement and Homeland Security,” $600,000 (IIS-0429364), September 2003-August 2009. (UA matching: $75,000) 2. Principal Investigator (PI, Co-PI: D. Zeng), NSF, Information Technology Research (ITR) Program, “COPLINK Center for Intelligence and Security Informatics – A Crime Data Mining Approach to Developing Border Safe Research,” $700,000 (EIA-0326348), September 2003-August 2009. (UA matching: $175,000) 3. Principal investigator (PI), Library of Congress, “Capture of Multimedia, Multilingual Open Source Web-based Terrorist Content – Phase 2,” $60,000, May 2007-April 2008. 4. Principal investigator (PI), New Mexico Tech, “Border Crossing Network Analysis,” $125,000, June 2007-September 2007. 5. Principal investigator (PI), NSF, “Inter-Repository Patent Analysis to Understand Worldwide Nanotechnology Research and Development, $100,000, SGER, December 2007-December 2008. 6. Principal investigator (PI), NSF, “Worldwide Nanotechnology Development: A Comparative Study of Global Patents,” $100,000, SGER, January 2007-December 2007. 7. Principal investigator (PI), NSF, “Multilingual Online Stylometric Authorship Identification: An Exploratory Study,” $75,000 (IIS-0646942), SGER, October 2006-September 2007. 8. Founder, International BioComputing Corporation, received NSF SBIR funding (PI: H. Su), “BioPortal: An Informatics Infrastructure for Infectious Disease and Biosecurity Information Sharing, Analysis, and Visualization,” $100,000, January 2007-June 2007. 9. Principal investigator (PI), DHS, USDA, DOD, Defense Intelligence Agency, Armed Forces Medical Intelligence Center (AFMIC), “Foot-and-Mouth (FMD) BioPortal: Global FMD Surveillance, Information Sharing, and Analysis,” $260,000, September 2006-March 2008. 10. Principal Investigator (PI), NSF (from DHS RISC Regional Information Sharing and Collaboration Program, “Supplement to COPLINK Center for Intelligence and Security Informatics – A Crime Data Mining Approach to Developing Border Safe Research,” $300,000 (EIA-0326348), July 2006-August 2007. 11. Principal investigator (PI), NSF (CIA/DHS), “International Conference on Intelligence and Security Informatics (ISI 2006),” $100,000 (IIS-0636210), July 2006-June 2007. 12. Principal investigator (PI), NSF, “Arizona Biosurveillance Workshops,” $20,000 (IIS-0636637), August 2006-July 2007. 13. Principal investigator (PI), NSF, “NanoMap: Mapping Nanotechnology Development,” $200,000 (DMI-0533749), August 2005-July 2007. 14. Principal investigator (PI), Federal Government (Non-Disclosure Agreement), “Terrorism Informatics Workshop,” $150,000, October 2007-June, 2008. 15. Principal investigator (PI), Arizona Department of Public Health, “Chief Complaint and Disease Surveillance,” $250,000, September 2005-October 2006. 16. Principal investigator (PI), Kansas State University, DOD, Defense Intelligence Agency, Armed Forces Medical Intelligence Center (AFMIC), “Enhancing and Extending RSVP-A Based on the BioPortal Framework,” $250,000, July 2005-December 2006. 20
  • 21. 17. Principal investigator (PI), NSF, “Mapping Nanotechnology Development based on the ISI Literature- Citation Database,” $100,000, SGER, September 2005-August 2006. 18. Principal investigator (PI), Library of Congress, “Capture of Multimedia, Multilingual Open Source Web-based Terrorist Content,” $60,000, July 2005-June 2006. 19. Principal Investigator (PI), Department of Homeland Security (DHS), CNRI, “BorderSafe Initiative Phase-2,” $780,000, June 2004-October 2005. subcontract: Tucson Police Department. (UA matching: $100,000) 20. Principal investigator (PI), NIH, NLM, Innovations in Biomedical Information Science and Technology Program, “GeneScene: A Toolkit for Gene Pathway Analysis,” $1,394,224 (1 R33 LM07299-01), January 2002-December 2006. 21. Principal Investigator (PI), Department of Homeland Security (DHS), CNRI, “BorderSafe Initiative Phase-2 DHS Relevance Extension (CBP),” $200,000, October 2004-October 2005. (UA matching: $15,000) 22. Principal investigator (PI), NSF/CIA/DHS, “Workshop: Symposium on Intelligence and Security Informatics (ISI 2005),” $120,000, January 2005-December 2005. 23. Principal Investigator (PI), NSF/CIA, Knowledge Discovery and Dissemination (KDD) Program, “Detecting Identity Concealment,” $150,000, September 2004-August 2005. (UA matching: $25,000) 24. Principal Investigator (PI), Department of Homeland Security (DHS), CNRI, “BorderSafe Initiative,” $550,000, October 2003-September 2004. subcontracts: Tucson Police Department and Arizona Department of Customs and Border Protection. (UA matching: $100,000) 25. Principal investigator (PI), NSF/CIA/DHS, “Workshop: IEEE Intelligence and Security Informatics Conference (ISI 2004),” $120,000, September 2004-August 2005. 26. Co-Principal Investigator (Co-PI, PI: D. Zeng), NSF, Information Technology Research (ITR) Program, “Developing a Collaborative Information and Knowledge Management Infrastructure,” $220,000 (IIS-0114011), 2001-2004. 27. Principal investigator (PI), NSF/CIA/DHS, “Workshop: Symposium on Intelligence and Security Informatics (ISI 2003),” $90,000, January 2004-December 2004. 28. Principal Investigator (PI, Co-PIs: Ed Fox, Ann Lally), NSF, National Science Digital Library (NSDL) Program, “Intelligent Collection Services for and about Educators and Students: Logging, Spidering, Analysis and Visualization,” $480,000 (DUE-012741), 2001-2004. 29. Principal investigator (PI), NSF, “NSF/CIA KDD ARJIS/COPLINK Border Safe Research and Testbed,” (in collaboration with TPD and San Diego ARJIS), $751,996 (EIA-9983304), supplement to “COPLINK Center: Information and Knowledge Management for Law Enforcement,” March 2003- March 2004. (UA matching: $62,500) 30. Co-Principal Investigator (Co-PI, PIs: Jim Cox, Daniel Zeng, Jim Austin), NSF, National Science Digital Library (NSDL) Program, “An Active Object-Oriented Digital Library for Microeconomics Education,” $700,000, September 2002-August 2004. 31. Principal Investigator (PI, Co-PI: D. Zeng; subcontracts: NY and CA Departments of Health), NSF, “COPLINK Center (Disease Informatics Supplemental Request): Developing a National Infectious Disease Information Infrastructure: An Experiment in West Nile Virus and Botulism,” $800,000 (EIA-9983304), October 2003-March 2004. subcontracts: New York State Department of Health and California Department of Health Services. (UA matching: $50,000) 32. Principal Investigator (PI), NSF, Digital Government Program, “COPLINK Center: Information and Knowledge Management for Law Enforcement,” $1,600,000 (EAI-9983304), July, 2000-March, 2004. 33. Principal investigator (PI), NSF, SGER, “Intelligent Patent Analysis and Visualization,” $100,000 (IIS-0311628), May 2003-April 2004. (UA matching: $25,000) 21
  • 22. 34. Principal investigator (PI), NSF, SGER, “Intelligent Patent Analysis for Nanoscale Science and Engineering,” $99,935 (CTS-0311652), May 2003-April 2004. (UA matching: $25,000) 35. Principal investigator (PI), NSF, SGER, “DGPort: Intelligent Web Searching for Digital Government Research,” $92,965 (EIA-0302353), January 2003-December 2003. (UA matching: $23,000) 36. Principal investigator (PI), NSF/CIA, “Workshop: Symposium on Intelligence and Security Informatics (ISI 2003),” $90,000 (EIA-0317269), March 2003-December 2003. 37. Principal Investigator (PI, Co-PI: Bob Fund, Knowledge Computing Corporation), NSF/CIA, Knowledge Discovery and Dissemination (KDD) Program, “COPLINK Testbed for Homeland Security Data Mining,” $201,000, September 2002-June 2003. 38. Principal investigator (PI), NIH, NLM, “UMLS-Enhanced Dynamic Agents to Manage Medical Knowledge,” $400,000 (1 R01 LM06319-01 A1), February 2000-January 2003. 39. Principal Investigator (PI), The University of Arizona NSF Digital Government Matching Account #210199, $100,000, July, 2000-June 2003. 40. Principal investigator (PI), NSF, SGER, “NanoPort: Intelligent Web Searching for Nanoscale Science and Engineering,” $99,980 (CTS-0304375), January 2002-December 2002. 41. Principal Investigator (PI), The University of Arizona Intellectual Property Account #239760, $34,000, 2001. 42. Principal investigator (PI), NSF Digital Library Initiative-2, “High-performance Digital Library Systems: From Information Retrieval to Knowledge Management,” $500,000 (IIS-9817473), April 1999-May 2002. 43. Principal investigator (PI), NSF/CISE/CSS, “An Intelligent CSCW Workbench: Personalized Analysis and Visualization,” $331,451 (IIS-9800696), June 1998-June 2001. 44. Founding Director, Mark and Susan Hoffman E-Commerce Lab, $1M lab naming endowment; $500,000 equipment donation fro HP; ERP and e-commerce software donations from Oracle, SAP, J.D. Edward, IBM, Microsoft, and IFS for a combined value of $10M, October 2000. 45. Principal investigator (PI), Digital Equipment Corporation, External Technology Grants Program, “COPLINK: Database Integration and Access for a Law Enforcement Intranet,” DEC AlphaServer 4100 (5/533 Mhz CPU, 2 GBs RAM, 100 GBs disk), $184,893, 1997-2001 (equipment donation). 46. Principal Investigator (PI, Co-PI: O. Sheng), “E-Commerce Agent Research and Curriculum Development through HP E-speak: A Framework for Creating Wireless B2B Solutions,” $122,729, June, 2000-May, 2001. 47. Principal investigator (PI), City of Tucson, “Coplink Concept Space: An Intelligence Analysis Tool,” $250,000, January-September, 2000. 48. Principal investigator (PI), Hewlett-Packard Company University Grant, “Hewlett-Packard Enterprise Computing Lab for Enterprise Information Systems Education and Research,” $305,578, July, 1999. 49. Principal investigator (PI), Silicon Graphics Inc. (SGI), SGI Origin2000 supercomputer (8 R10000 processors, 1 GB RAM, 100 GBs disk), $210,000, 1998-2001 (equipment donation). 50. National Center for Supercomputing Applications (NCSA), “Parallel Computation for a Semantic Interoperability Environment,” High-performance Computing Resources Grants on SGI/Cray Origin2000 (512 processors), July 1997-June 2000. 51. Principal investigator (PI, with B. Schatz at NCSA), Department of Defense, Advanced Research Projects Agency (DARPA), “The Interspace Prototype: An Analysis Environment based on Scalable Semantics,” $3,309,000, June 1997-May 2001 (subcontract to H. Chen, PI, University of Arizona: $1,078,991, N66001-97-C-8535). 52. Principal investigator (PI), National Cancer Institute, National Institutes of Health (NIH), “Information Analysis and Visualization for Cancer Literature: Phase II,” $100,000, January 1999-December 1999. 22
  • 23. 53. Principal investigator (PI, with D. Smith, Chief of Tucson Police Department) National Institute of Justice, “COPLINK: Database Integration and Access for a Law Enforcement Intranet,” $1,200,459, July 1997-January 2000 (subcontract to H. Chen, PI, University of Arizona: $941,887). 54. Principal investigator (PI), 3COM, “High-Performance Multimedia System Benchmarking: An Experiment for Internt-2,” $90,000, October 1998-February 1999. 55. Principal investigator (PI), SAP University Alliance Grant Awards, “Knowledge Management for SAP R/3: An Experiment on Call Center Record Management,” $75,000, January 1999-December 1999. 56. Principal investigator (PI), Department of Defense, Advanced Research Projects Agency (DARPA), “GeoWorlds, Task 5.1 Under Dasher” $194,000, June 1998-December 1998. 57. Co-Principal investigator (Co-PI, PI: B. Schatz, University of Illinois) Digital Library Initiative, NSF/ ARPA/NASA, “Building the Interspace: Digital Library Infrastructure for a University Engineering Community,” $4,000,000, September 1994-August 1998 (IRI9411318) (subcontracts to H. Chen, PI, University of Arizona, Period 1 (9/94-2/95): $61,880; Period 2 (2/95-2/96): $85,760; Period 3 (2/96-2/97): $188,368; Period 4 (2/97-2/98): $242,032; Period 5 (2/98-9/98): $150,000). 58. Principal investigator (PI), National Science Foundation, CISE, IRIS, “Concept-based Categorization and Search on Internet: A Machine Learning, Parallel Computing Approach,” $200,755, September 1995-August 1998 (IRI9525790). 59. Co-Principal investigator (Co-PI, PI: T. Smith, UCSB), NSF, CISE, “Supplement to Alexandria DLI Project: A Semantic Interoperability Experiment for Spatially-Oriented Multimedia Data,” $100,000, June 1996-May 1998 (subcontract to H. Chen, PI, University of Arizona, $49,220, KK7022, IRI9411330). 60. National Center for Supercomputing Applications (NCSA), “Medical Information Analysis and Knowledge Discovery,” High-performance Computing Resources Grants on SGI/Cray Origin2000 (512 processors), January 1997-July 1997. 61. Principal investigator (PI, with B. Schatz at National Center for Supercomputing Applications), National Cancer Institute, National Institutes of Health (NIH), “Information Analysis and Visualization for Cancer Literature,” $150,000, July 1996-July 1997. 62. Principal investigator, Special Information Services, National Library of Medicine, NLM Research Participant Program (sponsoring two research fellows: M. Ramsey and K. Tolle), “Semantic Retrieval for Toxicology and Hazardous Substance Databases,” $50,000, October 1996-July 1997. 63. Principal investigator, National Center for Supercomputing Applications (NCSA), “Parallel Semantic Analysis for Spatially-Oriented Multimedia GIS Data,” High-performance Computing Resources Grants (Peer Review Board), on Convex Exemplar (64 processors, 24,000 SUs), June 1996-June 1997 (IRI960001N). 64. Co-Investigator (Co-I, PI: J. Yen, Hong Kong University of Science and Technology), Hong Kong Research Grants Council, “Intelligent Agent for the Financial Databases,” HK$544,000, July 1995- June 1997. 65. Principal investigator (PI), National Center for Supercomputing Applications (NCSA), “Parallel Computation for a Semantic Interoperability Environment,” High-performance Computing Resources Grants (Peer Review Board), on SGI Power Challenge Array (128 R8000 processors, 8000 SUs) and CRAY SGI Origin2000 (128 R10000 processors, 4,000 SUs), June 1997-June 1998 (IRI970002N). 66. Principal investigator (PI), National Center for Supercomputing Applications, “Information Analysis and Visualization for Business Applications,” $20,000, May 1996-December 1996. 67. Principal investigator (PI), AT&T Foundation Special Purpose Grants in Science and Engineering, “Intelligent Internet Resource Categorization and Discovery,” $10,000, October 1996-September 1996. 68. Principal investigator (PI), National Center for Supercomputing Applications (NCSA), “Information Analysis and Knowledge Discovery for Digital Libraries,” High-performance Computing Resources 23
  • 24. Grants (Peer Review Board), on SGI Power Challenge Array (48 R8000 processors, 3000 SUs), October 1995-September 1996 (IRI950001N). 69. Co-Investigator (Co-I, PI: N. Strausfeld, University of Arizona), National Science Foundation, Database Activities Program - Division of Biological Intrumentations and Resources, Database Activities Relating to identifiable Neurons, “FLYBRAIN, The First in a Federation of Databases for Insect Neurology,” $896,424, September 1995-August 1998. 70. Principal investigator (PI), National Center for Supercomputing Applications (NCSA), “NSF/ARPA/NASA Digital Libraries,” High-performance Computing Resources Grants, on Cray CS6400 (8 processors) July 15, 1995-Dec 31, 1995 (IRI950003N). 71. Principal investigator (PI), National Center for Supercomputing Applications (NCSA), “Terabyte Information Analysis and Knowledge Discovery,” High-performance Computing Resources Grants, on Connection Machine CM-5 (521 nodes), SGI Power Challenge (16 R8000 processors), and Convex Exemplar (24 HP processors), September 1994-July 1995 (IRI950001N). 72. Principal investigator (PI), AT&T Foundation Special Purpose Grants in Science and Engineering, “An Artificial Intelligence Approach to Creating an Intelligent GroupSystems Environment,” $10,000, September 1994-August 1995. 73. Principal investigator (PI), College of Business and Public Administration Summer Research Grant, University of Arizona, “Using AI Techniques for GroupSystems,” $13,000, June-August, 1994. 74. Principal investigator (PI), Small Grants Program, University of Arizona, “A Concept Space Approach to Multilingual Information Access,” $4,540, January 1, 1994- December 31, 1994. 75. Principal investigator (PI), Research Initiation Award, National Science Foundation, “Building a Concept Space for an Electronic Community System,” $63,804, June 1, 1992- November 30, 1994 (IRI9211418). 76. Principal investigator (PI), International Program Development Funds, University of Arizona, “UA/ITESM International Technology and Business Information System,” $4,000, 1992-1993. 77. Faculty mentor/sponsor (MIS Department senior: Wilcox), Undergraduate Summer Research Grant, University of Arizona, “Building an Internet Spider,” $1,000, 1996-1997. 78. Faculty mentor/sponsor (MIS Department seniors: Buntin, Sommer, Neely, Womersley), Undergraduate Summer Research Grant, University of Arizona, “A Machine Learning Approach to Prediction: A Greyhound Racing Example,” $800, 1992-1993. 79. Principal investigator (PI), Biomedical Research Support Grant Program, Division of Research Resources, National Institutes of Health, “A Neural Network Approach to the Estimation of the Aqueous Activity Coefficients (Solubility),” $5,000, 1992-1993 (BRSG S07RR07002). 80. Principal investigator (PI), SIM (The Society for Information Management) grant, “A Knowledge- Based Approach to the Design of Information Retrieval Systems,” $3,000, 1989-1990. Founder of UA Spin-off Companies 1. Knowledge Computing Corporation (venture capital funding, 2000-, $4.6M): Founder of a University of Arizona technology spin-off company. Knowledge Computing Corporation (KCC) receives exclusive licensing from the University of Arizona for the Artificial Intelligence Lab technologies. In return, the University receives annual licensing and royalty fees. KCC is based in Tucson and is committed to making Tucson a successful community for information technology companies. The company has grown to more than 40 employees and is managed and owned by professional managers and software engineers. The company has received more than $4.6M in VC funding (from Arizona, Silicon Valley, and overseas VCs) and is growing rapidly in the law enforcement and knowledge management sectors. KCC’s most recent annual revenues total more than $15M with over $4M in profits. KCC’s major product, COPLINK Solution Suite, has been adopted by 24
  • 25. more than 3,500 police agencies in 20 states. KCC was purchased by a private equity firm for $40M in July 2009 and merged with I2, the industry leader in crime analytics. 2. International BioComputing Corporation (2006-): Co-founder of IBC (with D. Zeng and L. Tseng) for international biosurveillance. IBC received SBIR funding ($100,000) from NSF in January 2007. The company currently targets at public health and biodefense agencies. Industrial Consulting NCSA Commercial Application Group (digital libraries, knowledge discovery), Convex/Hewlett Packard (supercomputing applications, call center), Caterpillar Corporation (textual knowledge discovery), National Cancer Institute (textual analysis), National Institute of Allergy and Infectious Disease (medical concept mapping), Caterpillar (knowledge management), Ventana Corporation (collaborative computing), Honk Kong University of Science and Technology (financial digital libraries), Information Handling Services (automatic indexing), AllState (Intranet/Internet), IBM (competitive intelligence), 3Com (QoS applications), Allied Signal (competitive intelligence), Andersen Consulting (knowledge management). Refereed Journal Publications: Published and Forthcoming 1. H. Chen and V. Dhar, “User Misconceptions of Information Retrieval Systems,” International Journal of Man-Machine Studies, Volume 32, Number 6, Pages 673-692, 1990. 2. H. Chen and V. Dhar, “Cognitive Process as a Basis for Intelligent Retrieval Systems Design,” Information Processing and Management, Volume 27, Number 5, Pages 405-432, 1991. 3. H. Chen, K. J. Lynch, A. K. Himler, and S. E. Goodman, “Information Management in Research Collaboration,” International Journal of Man-Machine Studies, Volume 36, Number 3, Pages 419-445, March, 1992. 4. H. Chen, “Knowledge-Based Document Retrieval: Framework and Design,” Journal of Information Science: Principles & Practice, Volume 18, Number 3, Pages 293-314, June, 1992. 5. H. Chen and K. J. Lynch, “Automatic Construction of Networks of Concepts Characterizing Document Databases,” IEEE Transactions on Systems, Man, and Cybernetics, Volume 22, Number 5, Pages 885-902, 1992. 6. E. Carmel, S. F. Crawford, and H. Chen, “Browsing in Hypertext: A Cognitive Study,” IEEE Transactions on Systems, Man, and Cybernetics, Volume 22, Number 5, Pages 865-884, 1992. 7. E. M. Roche, S. E. Goodman, and H. Chen, “The Landscape of International Computing,” Advances in Computers, Edited by M. C. Yovits, Volume 35, Pages 326-371, 1992. 8. H. Chen, K. J. Lynch, K. Basu, and T. Ng, “Generating, Integrating, and Activating Thesauri for Concept-Based Document Retrieval,” IEEE Expert, Special Series on Artificial Intelligence in Text- Based Information Systems, Volume 8, Number 2, Pages 25-34, April, 1993. 9. H. Chen, “Collaborative Systems: Solving the Vocabulary Problem,” IEEE COMPUTER, Special Issue on Computer-Supported Cooperative Work, Volume 27, Number 5, Pages 58-66, May, 1994. 10. H. Chen, A. K. Danowitz, K. J. Lynch, S. E. Goodman, and W. K. McHenry, “Explaining and Alleviating Information Management Indeterminism: A Knowledge-Based Framework,” Information Processing and Management, Volume 30, Number 4, Pages 557-570, July-August, 1994. 11. H. Chen, P. Hsu, R. Orwig, L. Hoopes, and J. Nunamaker, “Automatic Concept Classification of Text from Electronic Meetings,” Communications of the ACM, Volume 37, Number 10, Pages 56-73, October 1994. 25
  • 26. 12. H. Chen, P. Buntin, L. She, S. Sutjahjo, C. Sommer, and D. Neely, “Expert Prediction, Symbolic Learning, and Neural Networks: An Experiment on Greyhound Racing,” IEEE EXPERT, Volume 9, Number 6, Pages 21-27, December 1994. 13. H. Chen and J. Kim, “GANNET: A Machine Learning Approach to Document Retrieval,” Journal of Management Information Systems, Volume 11, Number 3, Pages 9-43, Winter 1994/95. 14. H. Chen, B. Schatz, T. Yim, and D. Fye, “Automatic Thesaurus Generation for an Electronic Community System,” Journal of the American Society for Information Science, Volume 46, Number 3, Pages 175-193, April 1995. 15. H. Chen, “Machine Learning for Information Retrieval: Neural Networks, Symbolic Learning, and Genetic Algorithms,” Journal of the American Society for Information Science, Volume 46, Number 3, Pages 194-216, April 1995. 16. H. Chen and T. Ng, “An Algorithmic Approach to Concept Exploration in a Large Knowledge Network (Automatic Thesaurus Consultation): Symbolic Branch-and-bound Search vs. Connectionist Hopfield Net Activation,” Journal of the American Society for Information Science, Volume 46, Number 5, Pages 348-369, June 1995. 17. H. Chow, H. Chen, T. Ng, P. Myrdal, and S. H. Yalkowsky, “Using Backpropagation Networks for the Estimation of Aqueous Activity Coefficients of Aromatic Organic Compounds,” Journal of Chemical Information and Computer Sciences, American Chemical Society, Volume 35, Number 4, Pages 723-728, July/August 1995. 18. C. Lin and H. Chen, “An Automatic Indexing and Neural Network Approach to Concept Retrieval and Classification of Multilingual (Chinese-English) Documents,” IEEE Transactions on Systems, Man, and Cybernetics, Volume 26, Number 1, Pages 1-14, February 1996. 19. H. Chen, C. Schuffels, and R. Orwig, “Internet Categorization and Search: A Machine Learning Approach,” Journal of Visual Communication and Image Representation, Special Issue on Digital Libraries, Volume 7, Number 1, Pages 88-102, 1996. 20. B. Schatz and H. Chen, “Building Large-Scale Digital Libraries,” IEEE Computer, Special Issue on “Building Large-scale Digital Libraries,” Volume 29, Number 5, Pages 22-27, May, 1996. 21. B. Schatz, B. Mischo, T. Cole, J. Hardin, A. Bishop, and H. Chen, “Federating Diverse Collections of Scientific Literature,” IEEE Computer, Special Issue on “Building Large-scale Digital Libraries,” Volume 29, Number 5, Pages 28-36, May, 1996. 22. H. Chen, A. Houston, J. Yen, and J. F. Nunamaker, “Toward Intelligent Meeting Agents,” IEEE Computer, Volume 29, Number 8, Pages 62-70, August, 1996. 23. H. Chen, B. R. Schatz, T. D. Ng, J. P. Martinez, A. J. Kirchhoff, C. Lin, “A Parallel Computing Approach to Creating Engineering Concept Spaces for Semantic Retrieval: The Illinois Digital Library Initiative Project,” IEEE Transactions on Pattern Analysis and Machine Intelligence, Special Section on Digital Libraries: Representation and Retrieval, Volume 18, Number 8, Pages 771-782, August, 1996. 24. R. Orwig, H. Chen, D. Vogel, and J. F. Nunamaker, “A Multi-Agent View of Strategic Planning Using Group Support Systems and Artificial Intelligence,” Group Decision and Negotiation, Volume 5, Pages 37-59, 1996. 25. H. Chen, J. Martinez, T. D. Ng, and B. R. Schatz, “A Concept Space Approach to Addressing the Vocabulary Problem in Scientific Information Retrieval: An Experiment on the Worm Community System,” Journal of the American Society for Information Science, Volume 48, Number 1, Pages 17-31, January, 1997. 26
  • 27. 26. R. E. Orwig, H. Chen, and J. F. Nunamaker, “A Graphical, Self-Organizing Approach to Classifying Electronic Meeting Output,” Journal of the American Society for Information Science, Volume 48, Number 2, Pages 157-170, February, 1997. 27. H. Chow, K. Tolle, D. Roe, V. Elsberry, and H. Chen, “Application of Neural Networks to Population Pharmacokinetics Data Analysis,” Journal of Pharmaceutical Sciences, Volume 86, Number 7, Pages 840-845, July, 1997. 28. H. Chen, T. R. Smith, M. L. Larsgaard, L. L. Hill, and M. Ramsey, “A Geographic Knowledge Representation System (GKRS) for Multimedia Geospatial Retrieval and Analysis,” International Journal of Digital Libraries, Volume 1, Number 2, Pages 132-152, September, 1997. 29. H. Chen, G. Shankaranarayanan, A. Iyer, and L. She “A Machine Learning Approach to Inductive Query by Examples: An Experiment Using Relevance Feedback, ID3, Genetic Algorithms, and Simulated Annealing,” Journal of the American Society for Information Science, Volume 49, Number 8, Pages 693-705, June 1998. 30. H. Chen, J. Martinez, A. Kirchhoff, T. D. Ng, and B. R. Schatz, “Alleviating Search Uncertainty Through Concept Associations: Automatic Indexing, Co-occurrence Analysis, and Parallel Computing,” Journal of the American Society for Information Science, Special Issue on “Management of Imprecision and Uncertainty in Information Retrieval and Database Management Systems,” Volume 49, Number 3, Pages 206-216, 1998. 31. H. Chen, “Artificial Intelligence Techniques for Emerging Information Systems Applications: Trailblazing Path to Semantic Interoperability,” Journal of the American Society for Information Science, Volume 49, Number 7, Pages 579-581, 1998. 32. H. Chen, A. L. Houston, R. R. Sewell, and B. R. Schatz, “Internet Browsing and Searching: User Evaluation of Category Map and Concept Space Techniques,” Journal of the American Society for Information Science, Special Issue on AI Techniques for Emerging Information Systems Applications, Volume 49, Number 7, Pages 582-603, 1998. 33. H. Chen, Y. Chung, M. Ramsey, and C. Yang, “A Smart Itsy Bitsy Spider for the Web,” Journal of the American Society for Information Science, Special Issue on AI Techniques for Emerging Information Systems Applications, Volume 49, Number 7, Pages 604-618, 1998. 34. D. Roussinov and H. Chen, “A Scalable Self-Organizing Map Algorithm for Textual Classification: A Neural Network Approach to Automatic Thesaurus Generation,” Communication and Cognition in Artificial Intelligence Journal (CC-AI), Volume 15, Number 1-2, Pages 81-111, 1998. 35. H. Chen, O. Titkova, R. Orwig, and J. F. Nunamaker, “Information Visualization for Collaborative Computing,” IEEE Computer, Volume 31, Number 8, Pages 75-82, August, 1998. 36. H. Chen, Y. Chung, M. Ramsey, and C. Yang, “An Intelligent Personal Spider (Agent) for Dynamic Internet/Intranet Searching,” Decision Support Systems, Volume 23, Pages 41-58, 1998. 37. H. Chen, Y. Zhang, and A. Houston, “Semantic Indexing and Searching Using a Hopfield Net,” Journal of Information Science, Volume 24, Number 1, Pages 3-18, 1998. 38. B. R. Schatz, W. Mischo, T. Cole, A. Bishop, S. Harum, E. Johnson, L. Neumann, H. Chen, D. T. Ng, “Federated Search of Scientific Literature,” IEEE Computer, Special Issue on Digital Libraries, Volume 32, Number 2, Pages 51-59, February, 1999. 39. B. R. Schatz and H. Chen, “Digital Libraries: Technological Advances and Social Impacts,” IEEE Computer, Special Issue on Digital Libraries, Volume 32, Number 2, Pages 45-50, February, 1999. 40. H. Chen, “Digital Library Research in Asia,” IEEE Computer, Special Issue on Digital Libraries, Volume 32, Number 2, Pages 48-49, February, 1999. 27
  • 28. 41. B. Zhu, M. Ramsey, T. D. Ng, H. Chen, and B. R. Schatz, “Creating a Large-Scale Digital Library for Georeferenced Information,” D-Lib Magazine, Volume 5, Number 7/8, July/August, 1999. 42. H. Chen, “Semantic Research for Digital Libraries,” D-Lib Magazine, Volume 5, Number 10/11, October/November, 1999. 43. H. Chen and A. Houston, “Digital Libraries: Social Issues and Technological Advances,” in Advances in Computers, Edited by M. Zelkowitz, Volume 48, Pages 257-314, 1999. 44. M. Ramsey, H. Chen, B. Zhu, and B. R. Schatz, “A Collection of Visual Thesauri for Browsing Large Collections of Geographic Images,” Journal of the American Society for Information Science, Volume 50, Number 9, pages 826-834, 1999. 45. H. Chen, “From Information Retrieval to Knowledge Management: Enabling Technologies and Best Practices,” Decision Support Systems, Volume 27, Number 1-2, Pages 1-4, November 1999. 46. D. Roussinov and H. Chen, “Document Clustering for Electronic Meetings: An Experimental Comparison of Two Techniques,” Decision Support Systems, Volume 27, Number 1, Pages 67-80, November 1999. 47. M. McQuaid, T. Ong, H. Chen, and J. F. Nunamaker, “Multidimensional Scaling for Group Memory Visualization,” Decision Support Systems, Volume 27, Number 1-2, Pages 163-176, November 1999. 48. L. Houston, H. Chen, S. M. Hubbard, B. R. Schatz, T. D., Ng, R. R. Sewell, and K. M. Tolle, “Medical Data Mining on the Internet: Research on a Cancer Information System,” Artificial Intelligence Review, Volume 13, Pages 437-466, 1999. 49. B. Zhu, M. Ramsey, and H. Chen, “Creating a Large-scale Content-based Airphoto Image Digital Library,” IEEE Transactions on Image Processing, Special Issue on Image and Video Processing for Digital Libraries, Volume 9, Number 1, Pages 163-167, January, 2000. 50. K. Tolle and H. Chen, “Comparing Noun Phrasing Techniques for Use with Medical Digital Library Tools,” Journal of the American Society for Information Science, Special Issue on Digital Libraries, Volume 51, Number 4, Pages 352-370, 2000. 51. H. Chen, “Introduction to the Special Topic Issue: Part 1, Digital Libraries, The Field,” Journal of the American Society for Information Science, Special Issue on Digital Libraries, Volume 51, Number 3, Pages 213-215, 2000. 52. C. C. Yang, J. Yen, and H. Chen, “Intelligent Internet Searching Engine based on Hybrid Simulated Annealing,” Decision Support Systems, Volume 28, Number 3, Pages 269-277, 2000. 53. H. Chen, “Introduction to the Special Topic Issue: Part 2, Towards Building a Global Digital Library,” Journal of the American Society for Information Science, Special Issue on Digital Libraries, Volume 51, Number 4, Pages 311-312, 2000. 54. B. Zhu and H. Chen, “Validating a Geographic Image Retrieval System,” Journal of the American Society for Information Science, Volume 51, Number 7, Pages 625-634, 2000. 55. C. Lin, H. Chen and J. F. Nunamaker, “Verifying the Proximity Hypothesis for Self-Organizing Maps,” Journal of Management Information Systems, Volume 16, Number 3, Pages 57-70, 2000. 56. L. Houston, H. Chen, B. R. Schatz, R. R. Sewell, K. M. Tolle, T. E. Doszkocs, S. M. Hubbard, and D. T. Ng, “Exploring the Use of Concept Spaces to Improve Medical Information Retrieval.” Decision Support Systems, Special Issue on Decision Support for Health Care in a New Information Age, Volume 30, Number 2, Pages 171-186, 2000. 57. K. M. Tolle, H. Chen, and H. Chow, “Estimating Drug/plasma Concentration Levels by Applying Neural Networks to Pharmacokinetic Data Sets,” Decision Support Systems, Special Issue on Decision Support for Health Care in a New Information Age, Volume 30, Number 2, Pages 139-152, 2000. 28
  • 29. 58. R. V. Hauck, R. Sewell, T. D. Ng, and H. Chen, “Concept Based Searching and Browsing: A Geoscience Experiment,” Journal of Information Science, Volume 27, Number 4, Pages 199-210, 2001. 59. H. Chen, H. Fan, M. Chau, and D. Zeng, “MetaSpider: Meta-Searching and Categorization on the Web,” Journal of the American Society for Information Science, Volume 52, Number 13, Pages 1134-1147, 2001. 60. G. Leroy and H. Chen, “Meeting Medical Terminology Needs: The Ontology-Enhanced Medical Concept Mapper,” IEEE Transactions on Information Technology in Biomedicine, Volume 5, Number 4, Pages 261-270, 2001. 61. R. V. Hauck, H. Atabakhsh, P. Ongvasith, H. Gupta, and H. Chen, “Using Coplink to Analyze Criminal-Justice Data,” IEEE Computer, Volume 35, Number 3, Pages 30-37, 2002. 62. D. G. Roussinov and H. Chen, “Information Navigation on the Web by Clustering and Summarizing Query Results,” Information Processing and Management, Volume 37, Number 6, Pages 789-816, 2002. 63. H. Chen, M. C. Chau, and D. Zeng, “CI Spider: A Tool for Competitive Intelligence on the Web,” Decision Support Systems, Volume 34, Number 1, Pages 1-17, December, 2002. 64. H. Chen, D. Zeng, H. Atabakhsh, W. Wyzga, J. Schroeder, “COPLINK: Managing Law Enforcement Data and Knowledge,” Communications of the ACM, Volume 46, Number 1, Pages 28-34, January 2003. 65. H. Chen, “Digital Government: Technologies and Practices,” Decision Support Systems, Volume 34, Number 3, Pages 223-227, February 2003. 66. H. Chen, J. Schroeder, R. V. Hauck, L. Ridgeway, H. Atabakhsh, H. Gupta, C. Boarman, K. Rasmussen, and A. W. Clements, “COPLINK Connect: Information and Knowledge Management for Law Enforcement,” Decision Support Systems, Special Issue on Digital Government, Volume 34, Number 3, Pages 271-286, February 2003. 67. H. Chen, “Web Retrieval and Mining,” Decision Support Systems, Special Issue on Web Retrieval and Mining, Volume 35, Number 1, Pages 1-5, April 2003. 68. M. Chau, D, Zeng, H. Chen, N. Huang, and D. Hendriawan, “Design and Evaluation of a Multi-Agent Collaborative Web Mining Systems,” Decision Support Systems, Special Issue on Web Retrieval and Mining, Volume 35, Number 1, Pages 167-183, April 2003. 69. C. C. Yang, H. Chen, and K. Hong, “Visualization of Large Category Map for Internet Browsing,” Decision Support Systems, Special Issue on Web Retrieval and Mining, Volume 35, Number 1, Pages 89-102, April 2003. 70. N. C. Romano, C. B. Bauer-Donovan, H. Chen, and J. F. Nunamaker, “A Methodology for Analyzing Web-Based Qualitative Data,” Journal of Management Information Systems, Volume 19, Number 4, Pages 213-246, Spring, 2003. 71. M. Chau and H. Chen, “Comparison of Three Vertical Search Spiders,” IEEE Computer, Volume 36, Number 5, Pages 56-62, 2003. 72. H. Chen, “Web Retrieval and Mining: a Machine Learning Perspective,” Journal of the American Society for Information Science and Technology, Volume 54, Number 7, Pages 621-624, 2003. 73. H. Chen, A. M. Lally, and M. Chau, “HelpfulMed: Intelligent Searching for Medical Information over the Internet,” Journal of the American Society for Information Science and Technology, Volume 54, Number 7, Pages 683-694, 2003. 29
  • 30. 74. G. Leroy and H. Chen, “The Use of Dynamic Contexts to Improve Casual Internet Searching,” ACM Transactions on Information Systems, Volume 21, Number 3, Pages 229-253, July 2003. 75. H. Chen, H. Fan, M. Chau, and D. Zeng, “Testing A Cancer Meta Spider,” International Journal of Human-Computer Studies, Volume 59, Number 5, Pages 755-776, 2003. 76. Z. Huang, H. Chen, A. Yip, G. Ng, F. Guo, Z. Chen, and M. C. Roco, “Longitudinal Patent Analysis for Nanoscale Science and Engineering: Country, Institution and Technology Field,” Journal of Nanoparticle Research, Volume 5, Pages 333-363, 2003. 77. G. Leroy, H. Chen, and J. D. Martinez, “A Shallow Parser Based on Closed-Class Words to Capture Semantic Relations in Biomedical Text,” Journal of Biomedical Informatics (JBI), Volume 36, Pages 145-158, June 2003. 78. M. Chau, Z. Huang, and H. Chen, “Teaching Key Topics in Computer Science and Information Systems through a Web Search Engine Project,” ACM Journal of Educational Resources in Computing, Volume 3, Number 3, Pages 1-14, 2003. 79. H. Chen and M. Chau, “Web Mining: Machine Learning for Web Applications,” Annual Review of Information Science and Technology (ARIST), Volume 38, Pages 289-329, 2004. 80. Z. Huang, W. Chung, and H. Chen, “A Graph Model for E-Commerce Recommender Systems,” Journal of the American Society for Information Science and Technology, Volume 55, Number 3, Pages 259-274, 2004. 81. G. Wang, H. Chen, and H. Atabakhsh, “Automatically Detecting Deceptive Criminal Identities,” Communications of the ACM, Volume 47, Number 3, Pages 71-76, 2004. 82. G. Wang, H. Chen, and H. Atabakhsh, “Criminal Identity Deception and Deception Detection in Law Enforcement,” Group Decision and Negotiation, Volume 13, Number 2, Pages 111-127, 2004. 83. H. Chen, W. Chung, J. Xu, G. Wang, Y. Qin, and M. Chau, “Crime Data Mining: A General Framework and Some Examples,” IEEE Computer, Volume 37, Number 4, Pages 50-56, 2004. 84. Z. Huang, H. Chen, and D. Zeng, “Applying Associative Retrieval Techniques to Alleviate the Sparsity Problem in Collaborative Filtering,” ACM Transactions on Information Systems, Volume 22, Number 1, Pages 116-142, 2004. 85. Z. Huang, H. Chen, C. J. Hsu, W. H. Chen, and S. Wu, “Credit Rating Analysis with Support Vector Machines and Neural Networks: A Market Comparative Study,” Decision Support Systems, Volume 37, Number 4, Pages 543-558, 2004. 86. W. Chung, Y. Zhang, Z. Huang, G. Wang, T. Ong, and H. Chen, “Internet Searching and Browsing in a Multilingual World: An Experiment on the Chinese Business Intelligence Portal (CBizPort),” Journal of the American Society for Information Science and Technology, special issue on Information Seeking Research, Volume 55, Number 9, Pages 818-831, 2004. 87. C. Lin, P. J. Hu, and H. Chen, “Technology Implementation Management in Law Enforcement: COPLINK System Usability and User Acceptance Evaluations,” Social Science Computer Review (SSCR) special issue on Digital Government, Volume 22, Number 1, Pages 24-36, 2004. 88. B. Marshall, D. McDonald, H. Chen, and W. Chung, “EBizPort: Collecting and Analyzing Business Intelligence Information,” Journal of the American Society for Information Science and Technology, special issue on Document Search Interface for Large-scale Collections and Intelligent Access, Volume 55, Number 10, Pages 873-891, August, 2004. 89. H. Chen, “Digital library research in the US: an overview with a knowledge management perspective,” Program: Electronic Library and Information Systems, Volume 38, Number 3, Pages 157-167, 2004. 30
  • 31. 90. J. Xu and H. Chen, “Fighting Organized Crimes: Using Shortest-Path Algorithms to Identify Associations in Criminal Networks,” Decision Support Systems, Volume 38, Number 3, Pages 473-488, 2004. 91. H. Chen, F. Y. Wang, and D. Zeng, “Intelligence and Security Informatics for Homeland Security: Information, Communication, and Transportation,” IEEE Transactions on Intelligent Transportation Systems, Volume 5, Number 4, Pages 329-341, 2004. 92. Z. Huang, H. Chen, Z. Chen, and M. C. Roco, “International Nanotechnology Development in 2003: Country, Institution and Technology Field Analysis Based on USPTO Database,” Journal of Nanoparticle Research, Volume 6, Number 4, Pages 325-354, 2004. 93. D. M. McDonald, H. Chen, H. Su, and B. B. Marshall, “Extracting Gene Pathway Relations Using a Hybrid Grammar: The Arizona Relation Parser,” Bioinformatics, Volume 20, Number 18, Pages 3370-3378, 2004. 94. E. Lim, H. Chen, E. J. Neuhold, S. Sugimoto, and J. Li, “Introduction to the Journal on Digital Libraries special issue on Asian digital libraries,” International Journal on Digital Libraries, Volume 4, Number 4, 245-246, 2004. 95. B. Zhu and H. Chen, “Information Visualization,” Annual Review of Information Science and Technology (ARIST), Volume 39, Pages 139-178, 2005. 96. W. Chung, H. Chen, L. G. Chaboya, C. O’Toole, and H. Atabakhsh, “Evaluating Event Visualization: A Usability Study of COPLINK Spatio-Temporal Visualizer,” International Journal of Human- Computer Studies, Volume 62, Number 1, Pages 127-157, 2005. 97. H. Chen, “Intelligence and Security Informatics,” Journal of the American Society for Information Science and Technology, special issue on Intelligence and Security Informatics, Volume 56, Number 3, Pages 217-220, 2005. 98. P. J. Hu, C. Lin, and H. Chen, “User Acceptance of Intelligence and Security Informatics Technology: A Study of COPLINK,” Journal of the American Society for Information Science and Technology, special issue on Intelligence and Security Informatics, Volume 56, Number 3, Pages 235-244, 2005. 99. G. Leroy and H. Chen, “GeneScene: An Ontology-enhanced Integration of Linguistic and Co- occurrence based Relations in Biomedical Texts,” Journal of the American Society for Information Science and Technology, Volume 56, Number 5, Pages 457-468, 2005. 100.W. Chung, H. Chen and J. F. Nunamaker, “A Visual Knowledge Map Framework for the Discovery of Business Intelligence on the Web,” Journal of Management Information Systems, Volume 21, Number 4, Pages 57-84, 2005. 101.T. Ong, H. Chen, W. Sung, and B. Zhu, “NewsMap: A Knowledge Map for Online News,” Decision Support Systems, Volume 39, Number 4, Pages 583-598, June, 2005. 102.P. Zhang, J. Sun, and H. Chen, “Frame-based Argumentation for Group Decision Task Generation and Identification,” Decision Support Systems, Volume 39, Number 4, Pages 643-660, June, 2005. 103.J. Xu and H. Chen, “CrimeNet Explorer: A Framework for Criminal Network Knowledge Discovery,” ACM Transactions on Information Systems, Volume 23, Number 2, Pages 201-226, April, 2005. 104.J. Xu and H. Chen, “Criminal Network Analysis and Visualization,” Communications of the ACM, Volume 48, Number 6, Pages 101-107, 2005. 105.B. Zhu and H. Chen, “Using 3D Interfaces to Deliver Knowledge from a Multimedia Knowledge Repository,” Decision Support Systems, Volume 40, Number 2, Pages 167-182, August 2005 106.H. Chen and F. Wang, “Artificial Intelligence for Homeland Security,” IEEE Intelligent Systems, special issue on AI for Homeland Security, Volume 20, Number 5, Pages 12-16, 2005. 31
  • 32. 107.Y. Zhou, E. Reid, J. Qin, H. Chen, and G. Lai, “U.S. Domestic Extremist Groups on the Web: Link and Content Analysis,” IEEE Intelligent Systems, special issue on AI for Homeland Security, Volume 20, Number 5, Pages 44-51, 2005. 108.A. Abbasi and H. Chen, “Applying Authorship Analysis to Extremist-Group Web Forum Messages,” IEEE Intelligent Systems, special issue on AI for Homeland Security, Volume 20, Number 5, Pages 67-75, 2005. 109.Y. Xiang, M. Chau, H. Atabakhsh, and H. Chen, “Visualizing Criminal Relationships: Comparison of a Hyperbolic Tree and a Hierarchical List,” Decision Support Systems, Volume 41, Number 1, Pages 69-83, 2005. 110.Z. Huang, H. Chen, L. Yan, and M. C. Roco, “Longitudinal Nanotechnology Development (1991-2002): National Science Foundation Funding and Its Impact on Patients,” Journal of Nanoparticle Research, Volume 7, Pages 343-376, 2005. 111.B. Marshall, H. Su, D. McDonald, S. Eggers, and H. Chen, “Aggregating Automatically Extracted Regulatory Pathway Relations,” IEEE Transactions on Information Technology in Biomedicine, Volume 10, Number 1, Pages 100-108, 2006. 112.H. Chen and J. Xu, “Intelligence and Security Informatics for National Security: A Knowledge Discovery Perspective,” Annual Review of Information Science and Technology (ARIST), Volume 40, Pages 229-289, 2006. 113.H. Chen, “Intelligence and Security Informatics: Information Systems Perspective,” Decision Support Systems, special issue on Intelligence and Security Informatics, Volume 41, Number 3, Pages 555-559, March 2006. 114.J. L. Zhao, H. H. Bi, H. Chen, D. Zeng, C. Lin, and M. Chau “Process-Driven Collaboration Support for Intra-Agency Crime Analysis,” Decision Support Systems, special issue on Intelligence and Security Informatics, Volume 41, Number 3, Pages 616-633, March 2006. 115.W. Chung, H. Chen, W. Chang, and S. Chou, “Fighting Cybercrime: A Review and the Taiwan Experience,” Decision Support Systems, special issue on Intelligence and Security Informatics, forthcoming, Volume 41, Number 3, Pages 669-682, March 2006. 116.R. Zheng,, J. Li, H. Chen, and Z. Huang, “A Framework for Authorship Identification of Online Messages: Writing-Style Features and Classification Techniques,” Journal of the American Society for Information Science and Technology, Volume 57, Number 3, Pages 378-393, 2006. 117.J. Qin, Y. Zhou, M. Chau, and H. Chen, “Multilingual Web Retrieval: An Experiment in English- Chinese Business Intelligence,” Journal of the American Society for Information Science and Technology, special issue on Multilingual Information Systems, Volume 57, Number 5, Pages 671-683, 2006. 118.B. Marshall, H. Chen, R. Shen, and E. Fox, “Moving Digital Libraries into the Student Learning Space: the GetSmart Experience,” ACM Journal of Educational Resources in Computing (JERIC), Volume 6, Number 1, March 2006. 119.J. Li, R. Zheng, and H. Chen, “From Fingerprint to Writeprint,” Communications of the ACM, Volume 49, Number 4, Pages 76-82, April 2006. 120.D. M. McDonald and H. Chen, “Summarization in Context: Searching vs. Browsing,” ACM Transactions on Information Systems, Volume 24, Number 1, Pages 111-141, 2006. 121.E. Reid and H. Chen, “Extremist Social Movement Groups and Their Online Digital Libraries,” Information Outlook, Volume 10, Number 6, Pages 57-65, June 2006. 32
  • 33. 122.J. Li, X. Li, H. Su, H. Chen, and D. Galbraith, “A Framework of Integrating Gene Relations from Heterogeneous Data Sources: An Experiment on Arabidopsis thaliana,” Bioinformatics, Volume 22, Number 16, Pages 2037-2043, 2006. 123.D. Zeng, M. Dror, and H. Chen, “Efficient Scheduling of Periodic Information Monitoring Requests,” European Journal of Operation Research, Volume 173, Pages 583-599, 2006. 124.G. Wang, J. Xu,, H. Chen, and H. Atabakhsh, “Automatically Detecting Criminal Identity Deception: An Adaptive Detection Algorithm,” IEEE Transactions on Systems, Man, and Cybernetics, Part A, Volume 36, Number 5, Pages 988-999, 2006. 125.M. Chau, Z. Huang, J. Qin, Y. Zhou, and H. Chen, “Building a Scientific Knowledge Web Portal: The NanoPort Experience,” Decision Support Systems, Volume 42, Number 2, Pages 1216-1238, 2006. 126.B. Marshall, H. Chen, and T. Madhusudan, “Matching Knowledge Elements in Concept Maps Using a Similarity Flooding Algorithm,” Decision Support Systems, Volume 42, Number 3, Pages 1290-1306, December 2006. 127.Z. Huang, H. Chen, F. Guo, J. Xu, S. Wu, and W. Chen, “Expertise Visualization: An Implementation and Study based on Cognitive Fit Theory,” Decision Support Systems, Volume 42, Number 3, Pages 1539-1558, December 2006. 128.Y. Zhou, J. Qin and H. Chen, “CMedPort: An Integrated Approach to Facilitating Chinese Medical Information Seeking,” Decision Support Systems, Volume 42, Number 3, Pages 1431-1448, 2006. 129.W. Chung, A. Bonillas, G. Lai, W. Xi, and H. Chen, “Supporting Non-English Web Searching: An Experiment on the Spanish Business and the Arabic Medical Intelligence Portals,” Decision Support Systems, Volume 42, Number 3, Pages 1697-1714, 2006. 130.Z. Huang, H. Chen, X. Li, and M. C. Roco, “Connecting NSF Funding to Patent Innovation in Nanotechnology (2001-2004),” Journal of Nanoparticle Research, Volume 8, Number 6, Pages 859-879, 2006. 131.R. Schumaker, M. Ginsburg, H. Chen, and Y. Liu, “An Evaluation of the Chat and Knowledge Discovery Components of a Low-Level Dialog System: The AZ-ALICE Experiment,” Decision Support Systems, Volume 42, Number 4, Pages 2236-2246, 2006. 132.R. Schumaker, Y. Liu, M. Ginsburg, and H. Chen, “Evaluating Mass Knowledge Acquisition using the ALICE Chatterbot: The AZ-ALICE Dialog System,” International Journal of Human-Computer Studies, Volume 64, Number 11, Pages 1132-1140, 2007. 133.E. Reid and H. Chen, “Mapping the Contemporary Terrorism Research Domain,” International Journal of Human-Computer Studies, special issue on Information Security in the Knowledge Economy, Volume 65, Pages 42-56, 2007. 134.J. Qin, Y. Zhou, E. Reid, G. Lai, and H. Chen, “Analyzing Terror Campaign on the Internet: Technical Sophistication, Content Richness, and Web Interactivity,” International Journal of Human- Computer Studies, special issue on Information Security in the Knowledge Economy, Volume 65, Pages 71-84, 2007. 135.M. Chau, B. Shiu, I. Chan and H. Chen, “Redips: Backlink Search and Analysis on the Web for Business Intelligence Analysis,” Journal of the American Society for Information Science and Technology, Volume 58, Number 3, Pages 351-365, 2007. 136.J. Schroeder, J. Xu, M. Chau and H. Chen, “Automated Criminal Link Analysis Based on Domain Knowledge,” Journal of the American Society for Information Science and Technology, Volume 58, Number 6, Pages 842-855, 2007. 33
  • 34. 137.M. Chau and H. Chen, “Incorporating Web Analysis into Neural Networks: An Example in Hopfield Net Searching,” IEEE Transactions on Systems, Man, and Cybernetics, Volume 37, Number 3, Pages 352-358, 2007. 138.R. Schumaker, Y Liu, M. Ginsberg, and H. Chen, “Evaluating the Efficacy of a Terrorism Question Answer System,” Communications of the ACM, Volume 50, Number 7, Pages 74-80, July 2007. 139.P. J-H. Hu, D. Zeng, H. Chen, C. Larson, W. Chang, C. Tseng, and J. Ma, “A System for Infectious Disease Information Sharing and Analysis: Design and Evaluation,” IEEE Transactions on Information Technology in Biomedicine, Volume 11, Number 4, Pages 483-492, 2007. 140.J. Li, H. Su, H. Chen, and B. W. Futscher, “Optimal Search-Based Gene Subset Selection for Gene Array Cancer Classification,” IEEE Transactions on Information Technology in Biomedicine, Volume 11, Number 4, Pages 398-405, 2007. 141.Z. Huang, D. Zeng, and H. Chen, “Analyzing Consumer-Product Graphs: Empirical Findings and Applications in Recommendation Systems,” Management Science, Volume 53, Number 7, Pages 1146-1164, July 2007. 142.E. Reid and H. Chen, “Internet-savvy U.S. and Middle Eastern Extremist Groups,” Mobilization: An International Quarterly Review, Volume 12, Number 2, Pages 177-192, 2007. 143.S. Kaza, Y. Wang, and H. Chen, “Enhancing Border Security: Mutual Information Analysis to Identify Suspect Vehicles,” Decision Support Systems, Volume 43, Number 1, Pages 199-210, 2007. 144.K. Quinones, H. Su, B. Marshall, S. Eggers, and H. Chen, “User-Centered Evaluation of Arizona BioPathway: An Information Extraction, Integration, and Visualization System,” IEEE Transactions on Information Technology in Biomedicine, Volume 11, Issue 5, Pages 527-536, 2007. 145.D. Hu, H. Chen, and M. C. Roco, “Longitudinal Study on Patent Citations to Academic Research Articles in Nanotechnology,” Journal of Nanoparticle Research, Volume 9, Pages 529-542, 2007. 146.Z. Huang, D. Zeng, and H. Chen, “A Comparative Study of Collaborative-Filtering Recommendation Algorithms for E-Commerce,” IEEE Intelligent Systems, Volume 22, Number 5, Pages 68-78, 2007. 147.G. Leroy and H. Chen, “Decision Support in Medicine,” Decision Support Systems, Volume 43, Number 4, Pages 1203-1206, 2007. 148.Z. Huang, J. Li, H. Su, G. S. Watts, and H. Chen, “Large-scale Regulatory Network Analysis from Microarray Data: Modified Bayesian Network Learning and Association Rule Mining,” Decision Support Systems, Volume 43, Number 4, Pages 1207-1225, 2007. 149.T. S. Raghu and H. Chen, “Cyberinfrastructure for Homeland Security: Advances in Information Sharing, Data Mining, and Collaboration Systems,” Decision Support Systems, Volume 43, Number 4, Pages 1321-1323, 2007. 150.R. Schumaker and H. Chen, “Leveraging Question Answer Technology to Address Terrorism Inquiry,” Decision Support Systems, Volume 43, Number 4, Pages 1419-1430, 2007. 151.X. Li, H. Chen, Z. Huang, and M. C. Roco, “Patent Citation Network in Nanotechnology (1976-2004),” Journal of Nanoparticle Research, Volume 9, Number 3, Pages 337-352, 2007. 152.X. Li, Y. Lin, H. Chen, Z. Huang, and M. C. Roco, “Worldwide Nanotechnology Development: A Comparative Study of USPTO, EPO, and JPO Patents (1976-2004),” Journal of Nanoparticle Research, Volume 9, Number 6, Pages 977-1002, 2007. 153.P. Yan, H. Chen and D. Zeng, “Syndromic Surveillance Systems,” Annual Review of Information Science and Technology (ARIST), Volume 41, Pages 425-495, 2007. 34
  • 35. 154.X. Li, H. Chen, Z. Huang, H. Su, and J. Martinez, “Global Mapping of Gene/Protein Interactions in PubMed Abstracts: A Framework and an Experiment with P53 Interactions,” Journal of Biomedical Informatics (JBI), Volume 40, Number 5, Pages 453-464, 2007. 155.G. Leroy, J. Xu, W. Chung, S. Eggers, and H. Chen, “An End User Evaluation of Query Formulation and Results Tools in Three Meta-search Engines,” International Journal of Medical Informatics, Volume 76, Number 11-12, Pages 780-789, November-December 2007. 156.M. Chau and H. Chen, “A Machine Learning Approach to Web Page Filtering using Web Content and Web Structure Analysis,” Decision Support Systems, Volume 44, Number 2, Pages 482-494, 2008. 157.W. Chung, G. Lai, A. Bonillas, W. Xi, and H. Chen, “Organizing Domain-specific information on the Web: An Experiment on the Spanish Business Web Directory,” International Journal of Human- Computer Studies, Volume 66, Number 2, Pages 51-66, 2008. 158.R. Schumaker and H. Chen, “Evaluating a News-Aware Quantitative Trader: The Effect of Momentum and Contrarian Stock Selection Strategies,” Journal of the American Society for Information Science and Technology, Volume 59, Number 2, Pages 247-255, 2008. 159.J. Li, X. Li, Z, Zhang, and H. Chen, “Kernel-based Learning for Biomedical Relation Extraction,” Journal of the American Society for Information Science and Technology, Volume 59, Number 5, Pages 756-769, 2008. 160.H.-M. Lu, D. Zeng, L. Trujillo, K. Komatsu, and H. Chen, "Ontology-enhanced Automatic Chief Complaint Classification for Syndromic Surveillance," Journal of Biomedical Informatics, Volume 4, Issue 2, Pages 340-356, April 2008. 161.H. Chen, M. Roco, X. Li, and Y. Lin, “Trends in Nanotechnology Patents,” Nature Nanotechnology, Volume 3, Pages 123-125, March, 2008. 162.A. Abbasi and H. Chen, “Writeprints: A Stylometric Approach to Identify-Level Identification and Similarity Detection in Cyberspace,” ACM Transactions on Information Systems, Volume 26, Number 2, Pages 7:1-7:29, 2008. 163.A. Abbasi, H. Chen, and A. Salem, “Sentiment Analysis in Multiple Languages: Feature Selection for Opinion Classification in Web Forums,” ACM Transactions on Information Systems, Volume 26, Number 3, Pages 12:1-12:34, 2008. 164.T. J. Fu, A. Abbasi, and H. Chen, “A Hybrid Approach to Web Forum Interactional Coherence Analysis,” Journal of the American Society for Information Science and Technology, Volume 59, Number 8, Pages 1195-1209, 2008. 165.H. Chen, W. Chung, J. Qin, E. Reid, M. Sageman, and G. Weinmann, “Uncovering the Dark Web: A Case Study of Jihad on the Web,” Journal of the American Society for Information Science and Technology, Volume 59, Number 8, Pages 1347-1359, 2008. 166.Y. Zhou, F. Huang, and H. Chen, “Combining Probability Models and Web Mining Models: A Framework for Proper Name Transliteration,” Information Technology and Management, Volume 9, Issue 2, Pages 91-103, 2008. 167.A. Abbasi, H. Chen and J. F. Nunamaker, “Stylometric Identification in Electronic Markets: Scalability and Robustness,” Journal of Management Information Systems, Volume 25, Number 1, Pages 49-78, 2008. 168.D. Zeng, H. Chen, F. Wang, and H. Kargupta, “Special Section on Intelligence and Security Informatics,” IEEE Transactions on Knowledge and Data Engineering, Volume 20, Number 8, Pages 1009-1012, 2008. 169.X. Yang, C. Wei, and H. Chen, “Introduction Special Issue on Multilingual Knowledge Management,” Decision Support Systems, Volume 45, Number 3, Pages 551-553, June 2008. 35
  • 36. 170.M. Chau, J. Qin, Y. Zhou, C. Tseng, and H. Chen, “SpiderRUs: Creating Specialized Search Engines in Multiple Languages,” Decision Support Systems, Volume 45, Number 3, Pages 621-640, June 2008. 171.C. Chung, D. Zeng, and H. Chen, “A Stack-based Prospective Spatio-temporal Data Analysis Approach,” Decision Support Systems, Volume 45, Number 4, Pages 697-713, 2008. 172.S. Kaza and H. Chen, “Evaluating Ontology Mapping Technologies: An Experiment in Public Safety Information Sharing,” Decision Support Systems, Volume 45, Number 4, Pages 714-728, 2008. 173.B. Zhu and H. Chen, “Communication Garden Systems: Visualizing a Computer-Mediated Communication Process,” Decision Support Systems, Volume 45, Number 4, Pages 778-794, 2008. 174.A. Salem, E. Reid, and H. Chen, “Multimedia Content Coding and Analysis: Unraveling the Content of Jihadi Extremist Groups’ Videos,” Studies in Conflict & Terrorism, Volume 31, Number 7, Pages 605-626, July 2008. 175.A. Abbasi, H. Chen, S. Thoms, and T. J. Fu, “Affect Analysis of Web Forums and Blogs using Correlation Ensembles,” IEEE Transactions on Knowledge and Data Engineering, Volume 20, Number 9, Pages 1168-1180, September 2008. 176.J. Xu and H. Chen, “The Topology of Dark Networks,” Communications of the ACM, Volume 51, Number 10, Pages 58-65, 2008. 177.X. Li, H. Chen, Y. Dang, Y. Lin, C. A. Larson, and M. C. Roco, “A Longitudinal Analysis of Nanotechnology Literature: 1976-2004,” Journal of Nanoparticle Research, Volume 10, Pages 3-22, 2008. 178.B. Marshall, S. Kaza, and H. Chen, “Using Importance Flooding to Identify Interesting Networks of Criminal Activity,” Journal of the American Society for Information Science and Technology, Volume 59, Number 13, Pages 2099-2114, 2008. 179.A. Abbasi and H. Chen, “CyberGate: A System and Design for Text Analysis of Computer Mediated Communications,” MIS Quarterly, Volume 32, Number 4, Pages 811-837, December 2008. 180.X. Li, D. Hu, Y. Dang, H. Chen, M. C. Roco, C. A. Larson, and J. Chan, “Nano Mapper: An Internet Knowledge Mapping System for Nanotechnology Development,” Journal of Nanoparticle Research, Volume 10, 2008. 181.W. Chang, D. Zeng, and H. Chen, “A Stack-based Spatio-Temporal Data Analysis Approach based on Prospective Support Vector Clustering,” Decision Support Systems, Volume 45, Number 4, Pages 697-713, 2008. 182.W. Chung, H. Chen, and E. Reid, “Business Stakeholder Analyzer: An Experiment of Classifying Stakeholders on the Web,” Journal of the American Society for Information Science and Technology, Volume 60, Number 1, Pages 59-74, 2009. 183.W. Chung and H. Chen, “Browsing the Underdeveloped Web: An Experiment on the Arabic Medical Web Directory,” Journal of the American Society for Information Science and Technology, Volume 60, Number 3, Pages 595-607, 2009. 184.R. Schumaker and H. Chen, “Textual Analysis of Stock Market Prediction Using Breaking Financial News: The AZFinText System,” ACM Transactions on Information Systems, Volume 27, Number 2, April 2009. 185.S. Kaza, J. Xu, B. Marshall, and H. Chen, “Topological Analysis of Criminal Activity Networks: Enhancing Transportation Security,” IEEE Transactions on Intelligent Transportation Systems, Volume 10, Number 1, Pages 83-91, 2009. 36
  • 37. 186.D. Hu, S. Kaza, and H. Chen, “Identifying Significant Facilitators of Dark Network Evolution,” Journal of the American Society for Information Science and Technology, Volume 60, Number 4, Pages 655-665, 2009. 187.Y. Dang, Y. Zhang, H. Chen, P. J. Hu, S. Brown, and C. Larson, “Arizona Literature Mapper: An Integrated Approach to Monitor and Analyze Global Bioterrorism Research Literature,” Journal of the American Society for Information Science and Technology, Volume 60, Number 7, Pages 1466-1485, 2009. 188.H. Chen, “AI and Global Science and Technology Assessment,” IEEE Intelligent Systems, Volume 24, Number 4, Pages 68-71, July/August, 2009. 189.H. Chen, “AI, E-Government, and Politics 2.0,” IEEE Intelligent Systems, Volume 24, Number 5, Pages 64-67, September/October, 2009. 190.X. Li, H. Chen, Z. Zhang, J. Li, and J. F. Nunamaker, “Managing Knowledge in Light of its Evolution Process: An Experimental Study on Citation Network-based Patent Classification,” Journal of Management Information Systems, Volume 26, Number 1, Pages 129-153, 2009. 191.A. M. Perez, D. Zeng, C. Tseng, H. Chen, Z. Whedbee, D. Paton, and M. C. Thurmond, “A Web- based System for Near Real-time Surveillance and Space-time Cluster Analysis of Foot-and-mouth Disease and Other Animal Diseases,” Preventive Veterinary Medicine, Volume 91, Number 1, Pages 39-45, 2009. 192.R. Schumaker and H. Chen, “A Quantitative Stock Prediction System based on Financial News,” Information Processing and Management, Volume 45, Number 5, Pages 571-583, 2009. 193.R. Schumaker, O. Solieman, and H. Chen, “Sports Knowledge Management and Data Mining,” Annual Review of Information Science and Technology (ARIST), Volume 44, 2009. 194.Y. Dang, H. Chen, Y. Zhang, and M. Roco, “Knowledge Sharing and Diffusion Patterns: International Patent and Patent Family Analysis,” IEEE Nanotechnology, Volume 3, Number 3, Pages 16-21, 2009. 195.H.-M. Lu, D. Zeng, and H. Chen, "Multilingual Chief Complaint Classification for Syndromic Surveillance: An Experiment with Chinese Chief Complaints," International Journal of Medical Informatics, Volume 78, Number 5, Pages 308-320, 2009. 196.A. Abbasi and H. Chen, “A Comparison of Tools for Detecting Fake Websites,” IEEE Computer, Volume 42, Number 10, Pages 78-86, October 2009. 197.X. Liu, P. Zhang, X. Li, H. Chen, Y. Dang, Y. Lin, C. A. Larson, M. C. Roco, and X. Wang “Trends for Nanotechnology Development in China, Russia, and India,” Journal of Nanoparticle Research, Volume 11, Number 8, Pages 1845-1866, November, 2009. 198.H. Chen, X. Li, M. Chau, Y. Ho, and C. Tseng “Using Open Web APIs in Teaching Web Mining,” IEEE Transactions on Education, Volume 52, Number 4, Pages 482-490, 2009. 199.H. Chen and D. Zeng, “AI for Global Disease Surveillance,” IEEE Intelligent Systems, Volume 24, Number 6, Pages 66-69, November/December, 2009. 200.D. Zeng, H. Chen, Z. Cao, F. Wang, X. Zheng, and Q. Wang, “Disease Surveillance Based on Spatial Contact Networks: A Case Study of Beijing 2003 SARS Epidemic,” IEEE Intelligent Systems, Volume 24, Number 6, Pages 77-82, November/December, 2009. 201.Y. Chen, A. Abbasi, and H. Chen, “Framing Social Movement Identity with Cyber-Artifacts: A Case Study of the International Falun Gong Movement,” Annals of Information Systems, Volume 9, Pages 1-24, 2009. 202.R. Schumaker and H. Chen, “A Discrete Stock Prediction Engine based on Financial News,” IEEE Computer, Volume 43, Number 1, Pages 51-56, January 2009. 37
  • 38. 203.R. Schumaker and H. Chen, “Interaction Analysis of the ALICE Chatterbot: A Two-Study Investigation of Dialog and Domain Questioning,” IEEE Transactions on Systems, Man, and Cybernetics, Volume 40, Number 1, Pages 40-51, 2010. 204.M. Chau, C. Wong, Y. Zhou, J. Qin, and H. Chen, “Evaluating the Use of Search Engine Development Tools in IT Education,” Journal of the American Society for Information Science and Technology, Volume 61, Number 2, Pages 288-299, 2010. 205.H. Chen, “Business and Market Intelligence 2.0,” IEEE Intelligent Systems, Volume 25, Number 1, Pages 68-71, January/February, 2010. 206.Y. Liu, Y. Chen, R. F. Lusch, H. Chen, D. Zimbra, and S. Zeng “User-Generated Content on Social Media: Predicting Market Success with Online Word-of-Mouth,” IEEE Intelligent Systems, Volume 25, Number 1, Pages 75-78, January/February, 2010. 207.H. Lu, D. Zeng, and H. Chen, “Prospective Infectious Disease Outbreak Detection Using Markov Switching Models,” IEEE Transactions on Knowledge and Data Engineering, Volume 22, Number 4, Pages 565-577, 2010. 208.B. Zhu, S. Watts, and H. Chen, “Visualizing Social Network Concepts,” Decision Support Systems, forthcoming, 2010. 209.A. Abbasi, Z. Zhang, D. Zimbra, H. Chen, and J. F. Nunamaker, “Applying Statistical Learning Methods to Fake Website Detection,” MIS Quarterly, forthcoming, 2010. 210.A. Abbasi, H. Chen, and Z. Zhang, “Selecting Attributes for Sentiment Classification using Feature Relation Networks,” IEEE Transactions on Knowledge and Data Engineering, forthcoming, 2010. 211.Y. Dang, Y. Zhang, L. Fan, H. Chen, and M. C. Roco, “Trends in Worldwide Nanotechnology Patent Applications: 1991 to 2008,” Journal of Nanoparticle Research, forthcoming, 2010. 212.Y. Dang, Y, Zhang, and H. Chen, “A Lexicon Enhanced Method for Sentiment Classification: An Experiment on Online Product Reviews,” IEEE Intelligent Systems, forthcoming, 2010. 213.H. Chen, Y Zhang, and Y. Dang, “Intelligence and Security Informatics,” Encyclopedia of Library and Information Sciences, forthcoming, 2010. 214.T. J. Fu, A. Abbasi, and H. Chen, “A Focused Crawler for Dark Web Forums,” Journal of the American Society for Information Science and Technology, forthcoming, 2010. 215.Y. Dang, Y, Zhang, and H. Chen, “Knowledge Mapping for Rapidly Evolving Domains,” Decision Support Systems, forthcoming, 2010. 216.E. Reid and H. Chen, “Contemporary Terrorism Researchers’ Patterns of Collaboration and Influence,” Journal of the American Society for Information Science and Technology, forthcoming, 2010. 217.D. Zeng, H. Chen, and C. Lynch, “BioPortal: Sharing, Analyzing, and Visualizing Infectious Disease Information,” Communications of the ACM, forthcoming, 2010. 218.S. Kaza and H. Chen, “Mapping Ontologies using WordNet and Mutual Information: An Experiment in Public Safety Information Sharing,” Decision Support Systems, forthcoming, 2010. 219.J. Xu, D. Hu, and H. Chen, “Dynamics of Terrorist Networks,” Journal of Homeland Security and Emergency Management, forthcoming, 2010. 220.G. Wang and H. Chen, “A Hierarchical Naïve Bayes Model for Approximate Identity Matching,” Decision Support Systems, forthcoming, 2010. 221.Y. Zhang, Y. Dang, H. Chen, M. Thurmond, and C. Larson, “Automatic Online News Monitoring and Classification for Syndromic Surveillance,” Decision Support Systems, forthcoming, 2010. 38
  • 39. 222.D. Zimbra, A. Abbasi, and H. Chen, “A Cyber-archeology Approach to Social Movement Research: Framework and Case Study,” Journal of Computer-Mediated Communication, forthcoming, 2010. 223.A. Sun, D. Zeng, and H. Chen, “Burst Detection from Multiple Data Streams,” IEEE Transactions on Systems, Man, and Cybernetics, Part C, forthcoming, 2010. Books (Monograph and Edited Volume) 1. R. Schumaker, O. Solieman, and H. Chen, “Sports Data Mining,” Springer, forthcoming, 2010. 2. N. Memon, J. Xu, D. Hicks, and H. Chen, (Eds.), “Data Mining for Social Network Data,” Springer, forthcoming, 2010. 3. D. Zeng and H. Chen, (Eds.), “Infectious Disease Informatics,” Springer, forthcoming, 2010. 4. H. Chen, D. Zeng, and P. Yan, “Infectious Disease Informatics Syndromic Surveillance for Public Health and Biodefense,” Springer, 2010. 5. C. Yang, M. Chau, J. Wang, and H. Chen (Eds.), “Security Informatics,” Annals of Information Systems, Springer, 2010. 6. H. Chen and M. Roco, “Mapping Nanotechnology Innovations and Knowledge: Global and Longitudinal Patent and Literature Analysis,” Springer, 2009. 7. H. Chen and C. Yang (Eds.), “Intelligence and Security Informatics: Techniques and Applications,” Springer, 2008. 8. H. Chen, E. Reid, J. Sinai, A. Silke, and B. Ganor (Eds.), “Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security,” Springer, 2008. 9. H. Chen, L. Brandt, V. Gregg, R. Traunmuller, A. McIntosh, S. Dawes, E. Hovy, and C. A. Larson (Eds.), “Digital Government: E-Government Research, Case Studies, and Implementation,” Springer, 2007. 10. H. Chen, T. S. Raghu, R. Ramesh, A. Vinze, and D. Zeng (Eds.), “Handbooks in Information Systems -- National Security,” Elsevier Scientific, 2007. 11. H. Chen, “Intelligence and Security Informatics for International Security: Information Sharing and Data Mining,” Springer, 2006. 12. H. Chen, S. F. Fuller, C. Friedman, and W. Hersh (Eds.), “Medical Informatics: Knowledge Management and Data Mining in Biomedicine,” Springer, 2005. 13. H. Chen, Trailblazing a Path Towards Knowledge and Transformation: E-Library, E-Government, and E-Commerce, The University of Arizona, Tucson, Arizona, January, 2003. 14. H. Chen, Knowledge Management Systems: A Text Mining Perspective, University of Arizona, Tucson, Arizona, November, 2001. Conference and Workshop Proceedings 1. H. Chen, M. Dacier, et al., (Eds.), Proceedings the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, Paris, France, June 2009. 2. D. Zeng, L. Khan, L. Zhou, M. Day, C. Yang, B. Thuraisingham, and H. Chen (Eds.), Proceedings the 2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009, Dallas, Texas, June 2009. 3. H. Chen, C. Yang, M. Chau, and S. Li (Eds.), Intelligence and Security Informatics, Proceedings the Pacific-Asia Workshop, PAISI 2009, Bangkok, Thailand, Lecture Notes in Computer Science (LNCS 5477), Springer-Verlag, 2009. 39
  • 40. 4. C. Yang, H. Chen, et al., “Intelligence and Security Informatics,” IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO, Taipei, Taiwan, June 2008, Proceedings, Lecture Notes in Computer Science (LNCS 5075), Springer-Verlag, 2008. 5. D. Zeng, H. Chen, H. Rolka, and B. Lober, (Eds.), Biosurveillance and BioSecurity, International Workshop, BioSecure 2008, Springer-Verlag, December 2008. 6. D. Zeng, I. Gotham, K. Komatsu, C. Lynch, M. Thurmond, D. Madigan, B. Lober, J. Kvach, and H. Chen, (Eds.), Intelligence and Security Informatics: Biosurveillance, Proceedings the Second NSF Workshop, BioSurveillance 2007, Lecture Notes in Computer Science (LNCS 4506), Springer-Verlag, 2007. 7. C. Yang, D. Zeng, M. Chau, K. Chang, Q. Yang, X. Cheng, J. Wang, F. Wang, and H. Chen. (Eds.), Intelligence and Security Informatics, Proceedings the Pacific-Asia Workshop, PAISI 2007, Chengdu, China, Lecture Notes in Computer Science (LNCS 4430), Springer-Verlag, 2007. 8. S. Mehrotra, D. Zeng, H. Chen, B. Thursaisingham, and F. Wang (Eds.), Intelligence and Security Informatics, Proceedings the IEEE International Conference on Intelligence and Security Informatics, ISI 2006, Lecture Notes in Computer Science (LNCS 3975), Springer-Verlag, 2006. 9. H. Chen, F. Wang, C. Yang, D. Zeng, M. Chau, and K. Chang (Eds.), Intelligence and Security Informatics, Proceedings the Workshop on Intelligence and Security Informatics, WISI 2006, Singapore, Lecture Notes in Computer Science (LNCS 3917), Springer-Verlag, 2006. 10. P. Kantor, G. Muresan, F. Roberts, D. Zeng, F. Wang, H. Chen, and R. Merkle (Eds.), Intelligence and Security Informatics, Proceedings the IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Lecture Notes in Computer Science (LNCS 3495), Springer-Verlag, 2005. 11. Z. Chen, H. Chen, Q. Miao, Y. Fu, E. Fox, and E. Lim (Eds.), Digital Libraries: International Collaboration and Cross-Fertilization, Proceedings of the 7th International Conference on Asian Digital Libraries, ICADL 2004, Lecture Notes in Computer Science (LNCS 3334), Springer-Verlag, 2004. 12. H. Chen, M. Christel, and E. Lim (Eds.), Proceedings of the Fourth ACM/IEEE Joint Conference on Digital Libraries, JCDL 2004, Tucson, Arizona, June 2004, ACM Press, 2004. 13. H. Chen, R. Moore, D. Zeng, and J. Leavitt (Eds.), Intelligence and Security Informatics, Proceedings of the Second Symposium on Intelligence and Security Informatics, ISI 2004, Lecture Notes in Computer Science (LNCS 3073), Springer-Verlag, 2004. 14. H. Chen, R. Miranda, D. Zeng, T. Madhusudan, C. Demchak, and J. Schroeder (Eds.), Intelligence and Security Informatics, Proceedings of the First NSF/NIJ Symposium on Intelligence and Security Informatics, ISI 2003, Lecture Notes in Computer Science (LNCS 2665), Springer-Verlag, 2003. 15. M. Tengku, B. Halimah, H. Chen, S. Urs, and S. H. Myaeng (Eds.), Digital Libraries: Technology and Management of Indigenous Knowledge and Global Access, Proceedings of the 6th International Conference on Asian Digital Libraries, ICADL 2003, Lecture Notes in Computer Science (LNCS 2911), Springer-Verlag, 2003. 16. E. Lim, S. Foo, C. Khoo, H. Chen, E. Fox, S. Urs, and C. Thanos (Eds.), Digital Libraries: People, Knowledge, and Technology, Proceedings of the 5th International Conference on Asian Digital Libraries, ICADL 2002, Lecture Notes in Computer Science (LNCS 2555), Springer-Verlag, 2002. Refereed Book Chapters 1. Y. Zhou, J. Qin, and H. Chen, “Developing an Intelligent Multi-Regional Chinese Medical Portal,” Editor: Y. Zhang, in Computational Web Intelligence: Intelligence Technology for Web Applications, 2009, forthcoming. 40
  • 41. 2. J. Xu and H. Chen, “Understanding the Nexus of Terrorist Web Sites,” Editors: H. Chen and C. Yang, in Intelligence and Security Informatics: Techniques and Applications, 65-78, 2008. 3. D. Zeng, J. Ma, W. Chang, and H. Chen, “Spatial-Temporal Data Analysis and Its Applications in Infectious Disease Informatics,” Editors: G. Adomavicius and A. Gupta, in Emerald Handbooks of Information Systems Series – Business Computing, Pages 207-236, 2009. 4. W. Chung and H. Chen, “Web-based Business Intelligence Systems: A Review and Case Studies,” Editors: G. Adomavicius and A. Gupta, in Emerald Handbooks of Information Systems Series – Business Computing, 373-400, 2009. 5. J. Wang, T. Fu, H. Lin, and H. Chen, “Exploring Gray Web Forums: Analysis and Investigation of Forum-based Communities in Taiwan,” Editors: H. Chen and C. Yang, in Intelligence and Security Informatics: Techniques and Applications, 121-134, 2008. 6. S. Kaza and H. Chen, “Suspect Vehicle Identification for Border Safety,” Editors: H. Chen and C. Yang, in Intelligence and Security Informatics: Techniques and Applications, 305-318, 2008. 7. S. Kaza and H. Chen, “Public Safety Information Sharing: An Ontological Perspective,” Editors: H. Chen, et al., in Digital Government: E-Government Research, Case Studies, and Implementation, Pages 273-282, 2007. 8. D. Zeng, H. Chen, and P. Yan, “Infectious Disease Informatics and Syndromic Surveillance,” Editors: H. Chen, et al., in Digital Government: E-Government Research, Case Studies, and Implementation, Pages 531-560, 2007. 9. F. Hsu, P. Hu, and H. Chen, “Business-Technology Alighments in e-Government: A Large-scale Taiwan Government Electronic Record Management Systems Study,” Editors: H. Chen, et al., in Digital Government: E-Government Research, Case Studies, and Implementation, Pages 585-614, 2007. 10. J. Li, H. Su, and H. Chen, “Identification of Marker Genes from High-Dimensional Microarray Data for Cancer Classification,” Editors: X. Hu and Y. Pan, in Knowledge Discovery in Bioinformatics: Techniques, Methods, and Applications, Pages 169-196, 2007. 11. E. Reid, H. Chen, and J. Xu, “Social Network Analysis for Terrorism Informatics,” Editors: H. Chen, T. S. Raghu, R. Ramesh, A. Vinze, and D. Zeng, in Handbooks in Information Systems: National Security, Elsevier Scientific, Pages 243-272, 2007. 12. D. Zeng, H. Chen, and W. Chang, “Spatio-Temporal Data Analysis in Security Informatics,” Editors: H. Chen, T. S. Raghu, R. Ramesh, A. Vinze, and D. Zeng, in Handbooks in Information Systems: National Security, Elsevier Scientific, Pages 165-186, 2007. 13. H. Chen, S. F. Fuller, C. Friedman, and W. Hersh, “Knowledge Management, Data Mining, and Text Mining in Medical Informatics,” Editors: H. Chen, S. F. Fuller, C. Friedman, and W. Hersh, in Medical Informatics: Knowledge Management and Data Mining in Biomedicine, Springer, Pages 3-33, 2005. 14. S. Eggers, Z. Huang, H. Chen, L. Yan, C. Larson, A. Rashid, M. Chau, and C. Lin, “Mapping Medical Informatics Research,” Editors: H. Chen, S. F. Fuller, C. Friedman, and W. Hersh, in Medical Informatics: Knowledge Management and Data Mining in Biomedicine, Springer, Pages 35-62, 2005. 15. D. Zeng, H. Chen, C. Lynch, M. Eidson, and I. Gotham, “Infectious Disease Informatics and Outbreak Detection,” Editors: H. Chen, S. F. Fuller, C. Friedman, and W. Hersh, in Medical Informatics: Knowledge Management and Data Mining in Biomedicine, Springer, Pages 359-395, 2005. 16. D. M. McDonald, H. Su, J. Xu, C. Tseng, H. Chen, and G. Leroy, “Gene Pathway Text Mining and Visualization,” Editors: H. Chen, S. F. Fuller, C. Friedman, and W. Hersh, in Medical Informatics: Knowledge Management and Data Mining in Biomedicine, Springer, Pages 519-545, 2005. 41
  • 42. 17. Z. Huang, H. Su, and H. Chen, “Joint Learning Using Multiple Types of Data and Knowledge,” Editors: H. Chen, S. F. Fuller, C. Friedman, and W. Hersh, in Medical Informatics: Knowledge Management and Data Mining in Biomedicine, Springer, Pages 593-624, 2005. 18. H. Chen and Y. Zhou “Survey and History of Digital Library Development in Asia Pacific,” Editors: Y. Theng and S. Foo, in Design and Usability of Digital Libraries: Case Studies in the Asia Pacific, Editors: Y. Theng and S. Foo, Information Science Publishing, Pages 1-20, 2005. 19. H. Chen, “Knowledge Management and Text Mining: Overview and Case Study,” Editors: K. Srikantaiah and M. Koenig, in Knowledge Management Lessons Learned, ASIST Monograph Series, Pages 239-268, 2004. 20. M. Chau and H. Chen , “Personalized and Focused Web Spiders,” ,” Editors: N. Zhang, J. Liu, and Y. Yao, in Web Intelligence, Springer, Berlin, Germany, Pages 197-217, 2003. 21. R. V. Hauck, M. Chau, and H. Chen, “COPLINK: Arming Law Enforcement with New Knowledge Management Technologies,” Editors: B. McIver and A. Elmagarmid, in Advances in Digital Government, Kluwer Academics, Pages 163-179, 2002. 22. H. Chen and B. R. Schatz, “A Path to Concept-based Information Access: From National Collaboratories to Digital Libraries,” Editors: G. M. Olson, T. W. Malone, and J. B. Smith, in Coordination Theory and Collaboration Technology, Lawrence Erlbaum Associates, Mahwah, NJ, Pages 739-760, 2001. 23. A. Houston and H. Chen, “Electronic Commerce and Digital Libraries,” Editors: M. Shaw, B. Blanning, T. Strader, and A. Whinston, in Handbook on Electronic Commerce, Springer, Berlin, Germany, Pages 339-363, 2000. 24. K. Tolle and H. Chen , “Intelligent Software Agents for Electronic Commerce,” ,” Editors: M. Shaw, B. Blanning, T. Strader, and A. Whinston, in Handbook on Electronic Commerce, Springer, Berlin, Germany, Pages 365-382, 2000. 25. H. Chen, “Semantic Issues for Digital Libraries,” in Annual Clinic on Library Applications of Data Processing, GSLIS, UIUC, Pages 51-60, 2000. 26. B. R. Schatz, W. Mischo, T. Cole, A. Bishop, S. Harum, E. Johnson, L. Neumann, H. Chen, and D. Ng, “Federated Search of Scientific Literatures: A Retrospective On the Illinois Digital Library Project,” in Successes and Failures of Digital Libraries, 35th Annual Clinic on Library Applications of Data Processing, Editors: S. Harum and M. Twindale, GSLIS, UIUC, Pages 41-57, 2000. 27. H. Chen, “Semantic Issues for Digital Libraries,” in Successes and Failures of Digital Libraries, 35th Annual Clinic on Library Applications of Data Processing, Editors: S. Harum and M. Twindale, GSLIS, UIUC, Pages 70-79, 2000. 28. H. Chen, M. Ramsey, and P. Li, “The Java Search Agent Workshop,” Editors: P. Gabriella and F. Crestani, in Soft Computing in Information Retrieval, Physica-Verlag, Pages 122-140, 2000. Refereed Conference Publications 1. H. Chen, “IEDs in the Dark Web: Lexicon Expansion and Genre Classification,” Proceedings of 2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009, Dallas, Texas, June 2009. 2. T. Fu, C. Huang, and H. Chen, “Identification of Extremist Vidoes in Online Video Sharing Sites,” Proceedings of 2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009, Dallas, Texas, June 2009. 3. Y. Zhang, Y. Dang, and H. Chen, “Gender Difference Analysis of Political Web Forums: An Experiment on an International Islamic Women’s Forum,” Proceedings of 2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009, Dallas, Texas, June 2009. 42
  • 43. 4. Y. Zhang, S. Zeng, L. Fan, Y. Dang, C. Larson, and H. Chen, “Dark Web Forums Portal: Searching and Analyzing Jihadist Forums,” Proceedings of 2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009, Dallas, Texas, June 2009. 5. S. Kaza and H. Chen, “Effect of Inventor Status on Intra-Organizational Innovation Evolution,” HICSS 2009, Hawaii. 6. X. Li and H. Chen, “Recommendation as Link Prediction: A Graph Kernel-based Machine Learning Approach,” ACM/IEEE JCDL 2009. 7. P. Hu, H. Chen, and H. Hu, “Examining Law Enforcement Officers’ Acceptance of Advanced E- Government Technology: A Survey Study of COPLINK Mobile,” International Conference on Electronic Commerce (ICEC), Taipei, Taiwan, August 2009. 8. H. Chen, “Nuclear Threat Detection via the Nuclear Web and Dark Web: Framework and Preliminary Study,” Proceedings of the First European Conference on Intelligence and Security Informatics, EuroISI 2008, Esbjerg, Denmark, December 2008. 9. C. Mielke and H. Chen, “Mapping Dark Web Geolocation,” Proceedings of the First European Conference on Intelligence and Security Informatics, EuroISI 2008, Esbjerg, Denmark, December 2008. 10. C. Mielke and H. Chen, “Botnets, and the CyberCriminal Underground,” Proceedings of 2008 IEEE International Conference on Intelligence and Security Informatics, ISI 2008, Taipei, Taiwan, June 2008. 11. T. Fu and H. Chen, “Analysis of Cyberactivism: A Case Study of Online Free Tibet Activities,” Proceedings of 2008 IEEE International Conference on Intelligence and Security Informatics, ISI 2008, Taipei, Taiwan, June 2008. 12. Y. Chen, A. Abbasi, and H. Chen, “Developing Ideological Networks Using Social Network Analysis and Writeprints: A Case Study of the International Falun Gong Movement,” Proceedings of 2008 IEEE International Conference on Intelligence and Security Informatics, ISI 2008, Taipei, Taiwan, June 2008. 13. H. Lu, D. Zeng, and H. Chen, “Bioterrorism Event Detection Based on the Markov Switching Model: A Simulated Anthrax Outbreak Study,” Proceedings of 2008 IEEE International Conference on Intelligence and Security Informatics, ISI 2008, Taipei, Taiwan, June 2008. 14. H. Chen, “Discovery of Improvised Explosive Device Content in the Dark Web,” Proceedings of 2008 IEEE International Conference on Intelligence and Security Informatics, ISI 2008, Taipei, Taiwan, June 2008. 15. H. Chen, “IEDs in the Dark Web: Genre Classification of Improvised Explosive Device Web Pages,” Proceedings of 2008 IEEE International Conference on Intelligence and Security Informatics, ISI 2008, Taipei, Taiwan, June 2008. 16. H. Chen, “Cyber Terrorism in Web 2.0: An Exploratory Study of International Jihadist Groups,” Proceedings of 2008 IEEE International Conference on Intelligence and Security Informatics, ISI 2008, Taipei, Taiwan, June 2008. 17. H. Chen, “Sentiment and Affect Analysis of Dark Web Forums: Measuring Radicalization on the Internet,” Proceedings of 2008 IEEE International Conference on Intelligence and Security Informatics, ISI 2008, Taipei, Taiwan, June 2008. 18. J. Li, A. Wang, and H. Chen, “PRM-Based Identity Matching using Social Context,” Proceedings of 2008 IEEE International Conference on Intelligence and Security Informatics, ISI 2008, Taipei, Taiwan, June 2008. 43
  • 44. 19. Y. Dang, Y. Zhang, N. Suyakkaphong, C. Larson, and H. Chen, “An Integrated Approach to Mapping Worldwide Bioterrorism Research Capabilities,” Proceedings of 2008 IEEE International Conference on Intelligence and Security Informatics, ISI 2008, Taipei, Taiwan, June 2008. 20. Y. Zhou, J. Qin, G. Lai, and H. Chen, “Collection of U.S. Extremist Online Forums,” HICSS 2007, Hawaii. 21. A. Abbasi and H. Chen, “Categorization and Analysis of Text in Computer-Mediated Communication Archives using Visualization,” Proceedings of the 7th ACM/IEEE Joint Conference on Digital Libraries, JCDL 2007, Vancouver, British Columbia, Canada, June 18-23, 2007, IEEE Press. 22. X. Li, H. Chen, Z. Zhang, and J. Li, “Automatic Patent Classification using Citation Network Information: An Experimental Study in Nanotechnology,” Proceedings of the 7 th ACM/IEEE Joint Conference on Digital Libraries, JCDL 2007, Vancouver, British Columbia, Canada, June 18-23, 2007, IEEE Press. 23. M. Thurmond, A. Perez, C. Tseng, H. Chen, and D. Zeng, “Global Foot-and-Mouth Disease Surveillance Using BioPortal,” Intelligence and Security Informatics: Biosurveillance, Proceedings of the Second Workshop, BioSurveillance 2007, New Brunswick, NJ, May 2007, Lecture Notes in Computer Science (LNCS 4506), Springer-Verlag. 24. P. Hu, D. Zeng, H. Chen, C. Larson, and C. Tseng, “A Web-based System for Infectious Disease Data Integration and Sharing: Evaluating Outcome, Task Performance Efficiency, User Information Satisfaction, and Usability,” Intelligence and Security Informatics: Biosurveillance, Proceedings of the Second Workshop, BioSurveillance 2007, New Brunswick, NJ, May 2007, Lecture Notes in Computer Science (LNCS 4506), Springer-Verlag. 25. H. Lu, C. C. King, T. Wu, F. Shih, J. Hsiao, D. Zeng, and H. Chen, “Chinese Chief Complaint Classification for Syndromic Surveillance,” Intelligence and Security Informatics: Biosurveillance, Proceedings of the Second Workshop, BioSurveillance 2007, New Brunswick, NJ, May 2007, Lecture Notes in Computer Science (LNCS 4506), Springer-Verlag. 26. Y. Chen, C. Tseng, C. C. King, T. Wu, and H. Chen, “Incorporating Geographical Contacts into Social Network Analysis for Contact Tracing in Epidemiology: A Study on Taiwan SARS Data,” Intelligence and Security Informatics: Biosurveillance, Proceedings of the Second Workshop, BioSurveillance 2007, New Brunswick, NJ, May 2007, Lecture Notes in Computer Science (LNCS 4506), Springer- Verlag. 27. H. Lu, D. Zeng, and H. Chen, “Medical Ontology-enhanced Text Processing for Infectious Disease Informatics,” Proceedings of 2007 IEEE Intelligence and Security Informatics, ISI 2007, New Brunswick, NJ, May 2007. 28. T. Fu, A. Abbasi and H. Chen, “Interaction Coherence for Dark Web Forums,” Proceedings of 2007 IEEE Intelligence and Security Informatics, ISI 2007, New Brunswick, NJ, May 2007. 29. A. Abbasi and H. Chen, “Affect Intensity Analysis of Dark Web Forums,” Proceedings of 2007 IEEE Intelligence and Security Informatics, ISI 2007, New Brunswick, NJ, May 2007. 30. S. Kaza, D. Hu, and H. Chen, “Dynamic Social Network Analysis of a Dark Network: Identifying Significant Facilitators,” Proceedings of 2007 IEEE Intelligence and Security Informatics, ISI 2007, New Brunswick, NJ, May 2007. 31. G. Wang, S. Kaza, S. Joshi, K. Chang, C. Tseng, H. Atabakhsh, and H. Chen, “The Arizona IDMatcher: A Probabilistic Identity Matching System,” Proceedings of 2007 IEEE Intelligence and Security Informatics, ISI 2007, New Brunswick, NJ, May 2007. 32. S. Kaza, D. Hu, H. Atabakhsh, and H. Chen, “Predicting Criminal Relationships using Multivariate Survival Analysis,” Proceedings of the 8TH Annual International Digital Government Research Conference, DG.O 2007, Philadelphia, Pennsylvania, May 2007. 44
  • 45. 33. G. Wang, S. Kaza, S. Joshi, K. Chang, C. Tseng, H. Atabakhsh, and H. Chen, “The Arizona IDMatcher: Developing an Identity Matching Tool for Law Enforcement,” Proceedings of the 8 TH Annual International Digital Government Research Conference, DG.O 2007, Philadelphia, Pennsylvania, May 2007. 34. H. Chen, “Exploring Extremism and Terrorism on the Web: The Dark Web Project,” Intelligence and Security Informatics, Proceedings the Pacific-Asia Workshop, PAISI 2007, Chengdu, China, April 2007, Lecture Notes in Computer Science (LNCS 4430), Springer-Verlag. 35. C. Yang, T. Ng, J. Wang, C. Wei, and H. Chen, “Analyzing and Visualizing Gray Web Forum Structure,” Intelligence and Security Informatics, Proceedings the Pacific-Asia Workshop, PAISI 2007, Chengdu, China, April 2007, Lecture Notes in Computer Science (LNCS 4430), Springer- Verlag. 36. B. Marshall and H. Chen, “Using Importance Flooding to Identify Interesting Networks of Criminal Activity,” Intelligence and Security Informatics, Proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, May 2006, Lecture Notes in Computer Science (LNCS 3975), Springer-Verlag. 37. A. Abbasi and H. Chen, “Visualizing Authorship for Identification,” Intelligence and Security Informatics, Proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, May 2006, Lecture Notes in Computer Science (LNCS 3975), Springer-Verlag. 38. P. Yan, D. Zeng, and H. Chen, “A Review of Public Health Syndromic Surveillance Systems,” Intelligence and Security Informatics, Proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, May 2006, Lecture Notes in Computer Science (LNCS 3975), Springer-Verlag. 39. S. Kaza, Y. Wang, and H. Chen, “Suspect Vehicle Identification for Border Safety with Modified Mutual Information,” Intelligence and Security Informatics, Proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, May 2006, Lecture Notes in Computer Science (LNCS 3975), Springer-Verlag. 40. J. Xu, H. Chen, Y. Zhou, and J. Qin, “On the Topology of the Dark Web of Terrorist groups,” Intelligence and Security Informatics, Proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, May 2006, Lecture Notes in Computer Science (LNCS 3975), Springer-Verlag. 41. G. Wang, H. Chen, and H. Atabakhsh, “A Multi-layer Naïve Bayes Model for Approximate Identity Matching,” Intelligence and Security Informatics, Proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, May 2006, Lecture Notes in Computer Science (LNCS 3975), Springer-Verlag. 42. J. Wang, T. Fu, H. Lin, and H. Chen, “A Framework for Exploring Gray Web Forums: Analysis of Forum-based Communications in Taiwan,” Intelligence and Security Informatics, Proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, May 2006, Lecture Notes in Computer Science (LNCS 3975), Springer-Verlag. 43. J. Ma, D. Zeng, and H. Chen, “Spatial-temporal Cross-Correlation Analysis: A New Measure and a Case Study in Infectious Disease Informatics,” Intelligence and Security Informatics, Proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, May 2006, Lecture Notes in Computer Science (LNCS 3975), Springer-Verlag. 44. A. Salem, E. Reid, and H. Chen, “Content Analysis of Jihadi Extremist Groups’ Videos,” Intelligence and Security Informatics, Proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, May 2006, Lecture Notes in Computer Science (LNCS 3975), Springer-Verlag. 45
  • 46. 45. Y. Zhou, J. Qin, G. Lai, E. Reid, and H. Chen, “Exploring the Dark Side of the Web: Collection and Analysis of U.S. Extremist Online Forums,” Intelligence and Security Informatics, Proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, May 2006, Lecture Notes in Computer Science (LNCS 3975), Springer-Verlag. 46. Y. Zhou, J. Qin, G. Lai, E. Reid, and H. Chen, “Unraveling International Terrorist Groups’ Exploitation of the Web: Technical Sophistication, Media Richness, and Web Interactivity,” Intelligence and Security Informatics, Proceedings of the International Worksop on Intelligence and Security Informatics, WISI 2006, Singapore, April 2006, Lecture Notes in Computer Science (LNCS 3917), Springer-Verlag. 47. H. Chen, “Digital Library Development in the Asia Pacific,” Digital Libraries: Implementing Strategies and Sharing Experiences, Proceedings of the 8th International Conference on Asian Digital Libraries, ICADL 2005, Bangkok, Thailand, December 2005, Lecture Notes in Computer Science (LNCS 3815), Springer-Verlag. 48. K. Siddharth, T. Wang, H. Gowda,, and H. Chen, “Target Vehicle Identification for Border Safety Using Mutual Information,” Proceedings of the 8th IEEE International Conference on Intelligent Transportation Systems (ITSC 2005), Vienna, Austria, September 5-8, 2005. 49. W. Chang, D. Zeng,, and H. Chen, “Prospective Spatio-Temporal Data Analysis for Security Informatics,” Proceedings of the 8th IEEE International Conference on Intelligent Transportation Systems (ITSC 2005), Vienna, Austria, September 5-8, 2005. 50. A. Abbasi and H. Chen, “Applying Authorship Analysis to Arabic Web Content,” Intelligence and Security Informatics, Proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, Georgia, May 2005, Lecture Notes in Computer Science (LNCS 3495), Springer-Verlag. 51. P. Hu, D. Zeng, H. Chen, C. Larson, W. Chang, and C. Tseng, “Evaluating an Infectious Disease Information Sharing and Analysis System,” Intelligence and Security Informatics, Proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, Georgia, May 2005, Lecture Notes in Computer Science (LNCS 3495), Springer-Verlag. 52. J. Qin, J. Xu, D. Hu, M. Sageman, and H. Chen, “Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network,” Intelligence and Security Informatics, Proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, Georgia, May 2005, Lecture Notes in Computer Science (LNCS 3495), Springer-Verlag. 53. E. Reid and H. Chen, “Mapping the Contemporary Terrorism Research Domain: Researchers, Publications, and Institutional Analysis,” Intelligence and Security Informatics, Proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, Georgia, May 2005, Lecture Notes in Computer Science (LNCS 3495), Springer-Verlag. 54. A. G. Wang, H. Atabakhsh, T. Petersen, and H. Chen, “Discovering Identity Problems: A Case Study,” Intelligence and Security Informatics, Proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, Georgia, May 2005, Lecture Notes in Computer Science (LNCS 3495), Springer-Verlag. 55. E. Reid, J. Qin, Y. Zhou, G. Lai, M. Sageman, G. Weimann, and H. Chen, “Collecting and Analyzing the Presence of Terrorists on the Web: A Case Study of Jihad Websites,” Intelligence and Security Informatics, Proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, Georgia, May 2005, Lecture Notes in Computer Science (LNCS 3495), Springer-Verlag. 56. H. Chen, H. Atabakhsh, J. Xu, A. Gang, B. Marshall, S. Kaza, C. Tseng, S. Eggers, H. Gowda, T. Petersen, and C. Violette, “Intelligence and Security Informatics: A Crime Data Mining Approach to Developing BroderSafe Research,” Proceedings of the 6th National Conference on Digital Government Research, DG.O 2005, Atlanta, Georgia, May 2005. 46
  • 47. 57. H. Chen, H. Atabakhsh, S. Kaza, B. Marshall, J. Xu, A. Gang, T. Petersen, and C. Violette, “BorderSafe: Cross-Jurisdictional Information Sharing, Analysis, and Visualization,” Proceedings of the 6th National Conference on Digital Government Research, DG.O 2005, Atlanta, Georgia, May 2005. 58. S. Kaza, J. Xu, B. Marshall, and H. Chen, “Topological Analysis of Criminal Activity Networks in Multiple Jurisdictions,” Proceedings of the 6th National Conference on Digital Government Research, DG.O 2005, Atlanta, Georgia, May 2005. 59. H. Chen, D. Zeng, C. Tseng, C. Larson, M. Eidson, I. Gotham, C. Lynch, and P. Hu, “A National Center of Excellence for Infectious Disease Informatics,” Proceedings of the 6th National Conference on Digital Government Research, DG.O 2005, Atlanta, Georgia, May 2005. 60. D. Zeng, H. Chen, C. Tseng, C. Larson, M. Eidson, I. Gotham, C. Lynch, and M. Ascher, “BioPortal: An Integrated Infectious Disease Information Sharing and Analysis Environment,” Proceedings of the 6th National Conference on Digital Government Research, DG.O 2005, Atlanta, Georgia, May 2005. 61. H. Chen, D, H. Atabakhsh, C. Tseng, B. Marshall, S. Kaza, S. Eggers, H. Gowda, A. Shah, T. Petersen, and C. Violette “Visualization in Law Enforcement,” Proceedings of the 6th National Conference on Digital Government Research, DG.O 2005, Atlanta, Georgia, May 2005. 62. W. Chung, T. Elhourani, A. Bonilla, G. Lai, W. Xi, and H. Chen, “Supporting Information Seeking in Multinational Organizations: A Knowledge Portal Approach,” Proceedings of the 38th Annual Hawaii International Conference on System Sciences (HICSS-38), Big Island, Hawaii, January 3-6, 2005. 63. H. Chen, “Biomedical Informatics and Security Informatics Research in Digital Library,” Proceedings of the 7th International Conference on Asian Digital Libraries, ICADL 2004, Shanghai, China, December 2004, Lecture Notes in Computer Science (LNCS 3334), Springer-Verlag. 64. M. Chau and H. Chen, “CMedPort: Using Content-Based and Link-Based Analysis in Building Vertical Search Engines,” Proceedings of the 7th International Conference on Asian Digital Libraries, ICADL 2004, Shanghai, China, December 2004, Lecture Notes in Computer Science (LNCS 3334), Springer-Verlag. 65. Z. Huang, D. Zeng, and H. Chen, “A Unified Recommendation Framework Based on Probablistic Relational Models,” Proceedings of the 14th Annual Workshop on Information Technologies and Systems (WITS’04), Washington, DC, December, 2004. 66. B. Marshall, K. Siddharth, J. Xu, H. Atabakhsh, T. Peterson, C. Violette, and H. Chen, “Cross- jurisdictional Criminal Activity Networks to Support Border and Transportation Security,” Proceedings of the 7th IEEE International Conference on Intelligent Transportation Systems (ITSC 2004), Washington, DC, October 3-6, 2004. 67. H. Chen, J. Qin, E. Reid, W. Chung, Y. Zhou, W. Xi, G. Lai, A. Bonillas, F. Wang, and M. Sageman “The Dark Web Portal: Collecting and Analyzing the Presence of Domestic and International Terrorist Groups in the Web,” Proceedings of the 7th IEEE International Conference on Intelligent Transportation Systems (ITSC 2004), Washington, DC, October 3-6, 2004. 68. D. Zeng, W. Chang, and H. Chen, “A Comparative Analysis of Spatio-Temporal Hotspot Analysis Techniques in Security Informatics,” Proceedings of the 7th IEEE International Conference on Intelligent Transportation Systems (ITSC 2004), Washington, DC, October 3-6, 2004. 69. Z. Huang, H. Chen, F. Guo, J. Xu, S. Wu, and W. H. Chen, “Visualizing the Expertise Space,” Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS-37), Big Island, Hawaii, January 3-6, 2004. 70. D. Zeng, H. Chen, C. Tseng, C. Larson, M. Eidson, I, Gotham, C. Lynch, and M. Ascher, “West Nile Virus and Botulism Portal: A Case Study in Infectious Disease Informatics,” Intelligence and Security 47
  • 48. Informatics, Proceedings of the Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, Arizona, June 2004, Lecture Notes in Computer Science (LNCS 3073), Springer-Verlag. 71. E. Reid, J. Qin, W. Chung, J. Xu, Y. Zhou, R. Schumaker, M. Sageman, and H. Chen, “Terrorism Knowledge Portal:: A Knowledge Discovery Approach to Addressing the Threat of Terrorism,” Intelligence and Security Informatics, Proceedings of the Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, Arizona, June 2004, Lecture Notes in Computer Science (LNCS 3073), Springer-Verlag. 72. J. Xu, B. Marshall, S. Kaza, and H. Chen, “Analyzing and Visualizing Criminal Network Dynamics: A Case Study,” Intelligence and Security Informatics, Proceedings of the Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, Arizona, June 2004, Lecture Notes in Computer Science (LNCS 3073), Springer-Verlag. 73. H. Atabakhsh, C. Larson, T. Petersen, C. Violette, and H. Chen, “Information Sharing and Collaboration Policies within Government Agencies,” Intelligence and Security Informatics, Proceedings of the Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, Arizona, June 2004, Lecture Notes in Computer Science (LNCS 3073), Springer-Verlag. 74. Y. Zhou, J. Qin, and H. Chen, “CMedPort: Intelligent Searching for Chinese Medical Information,” Proceedings of the 6th International Conference on Asian Digital Libraries, ICADL 2003, Kuala Lumpur, Malaysia, December 2003, Lecture Notes in Computer Science (LNCS 2911), Springer- Verlag. 75. D. Zeng, H. Chen, C. Tseng, C. Larson, M. Eidson, I, Gotham, C. Lynch, and M. Ascher, “Towards a National Infectious Disease Information Infrastructure: A Case Study in West Nile Virus and Botulism,” Proceedings of the National Conference on Digital Government Research, DG.O 2004, Seattle, Washington, May 2004, Digital Government Research Center. 76. H. Chen, H. Atabakhsh, T. Petersen, and C. Violette, “COPLINK Center: Information and Knowledge Management for Law Enforcement,” Proceedings of the National Conference on Digital Government Research, DG.O 2004, Seattle, Washington, May 2004, Digital Government Research Center. 77. H. Chen, Y. Zhou, J. Qin, and C. Larson, “Digital Government Portal: A Tool for Digital Government Research,” Proceedings of the National Conference on Digital Government Research, DG.O 2004, Seattle, Washington, May 2004, Digital Government Research Center. 78. J. Qin, Y. Zhou and H. Chen, “Supporting Multilingual Information Retrieval in Web Applications: An English-Chinese Web Portal Experiment,” Proceedings of the 6th International Conference on Asian Digital Libraries, ICADL 2003, Kuala Lumpur, Malaysia, December 2003, Lecture Notes in Computer Science (LNCS 2911), Springer-Verlag. 79. R. Zheng, Y. Qin, Z. Huang, and H. Chen, “Authorship Analysis in Cybercrime Investigation,” Proceedings of the 1st NSF/NIJ Symposium on Intelligence and Security Informatics, ISI 2003, Tucson, Arizona, June 2003, Lecture Notes in Computer Science (LNCS 2665), Springer-Verlag. 80. J. Schroeder, J. Xu, and H. Chen, “CrimeLink Explorer: Using Domain Knowledge to Facilitate Automated Crime Association Analysis,” Proceedings of the 1st NSF/NIJ Symposium on Intelligence and Security Informatics, ISI 2003, Tucson, Arizona, June 2003, Lecture Notes in Computer Science (LNCS 2665), Springer-Verlag. 81. T. Buetow, L. Chaboya, C. O’Tolle, T. Cushna, D. Daspit, T. Peterson, H. Atabakhsh, and H. Chen, “A Spatial Temporal Visualizer for Law Enforcement,” Proceedings of the 1 st NSF/NIJ Symposium on Intelligence and Security Informatics, ISI 2003, Tucson, Arizona, June 2003, Lecture Notes in Computer Science (LNCS 2665), Springer-Verlag. 82. P. J. Hu, C. Lin, and H. Chen, “Examining Technology Acceptance by Individual Law Enforcement Officers: An Exploratory Study,” Proceedings of the 1st NSF/NIJ Symposium on Intelligence and 48
  • 49. Security Informatics, ISI 2003, Tucson, Arizona, June 2003, Lecture Notes in Computer Science (LNCS 2665), Springer-Verlag. 83. R. Chang, W. Chung and H. Chen, “An International Perspective on Fighting Cybercrime,” Proceedings of the 1st NSF/NIJ Symposium on Intelligence and Security Informatics, ISI 2003, Tucson, Arizona, June 2003, Lecture Notes in Computer Science (LNCS 2665), Springer-Verlag. 84. D. Zeng, H. Chen, D. Daspit, F. Shan, S. Nandiraju, M. Chau, and C. Lin, “COPLINK Agent: An Architecture for Information Monitoring and Sharing in Law Enforcement,” Proceedings of the 1st NSF/NIJ Symposium on Intelligence and Security Informatics, ISI 2003, Tucson, Arizona, June 2003, Lecture Notes in Computer Science (LNCS 2665), Springer-Verlag. 85. L. L. Zhao, H. H. Bi, and H. Chen, “Collaborative Workflow Management for Interagency Crime Analysis,” Proceedings of the 1st NSF/NIJ Symposium on Intelligence and Security Informatics, ISI 2003, Tucson, Arizona, June 2003, Lecture Notes in Computer Science (LNCS 2665), Springer- Verlag. 86. J. Xu and H. Chen, “Untangling Criminal Networks: A Case Study,” Proceedings of the 1st NSF/NIJ Symposium on Intelligence and Security Informatics, ISI 2003, Tucson, Arizona, June 2003, Lecture Notes in Computer Science (LNCS 2665), Springer-Verlag. 87. G. Leroy, H. Chen, J. D. Martinez, S. Eggers, R. Falsey, K. Kislin, Z. Huang, J. Li, J. Xu, D. McDonald, and G. Ng, “Genescene: Biomedical Text and Data Mining,” Proceedings of the Third ACM/IEEE-CS Joint Conference on Digital Libraries, JCDL 2003, Houston, Texas, May 27-31, 2003. 88. B. Marshall, Y. Zhang, H. Chen, A. Lally, R. Shen, E. Fox, and L. N. Cassel, “Convergence of Knowledge Management and E-Learning: The GetSmart Experience,” Proceedings of the Third ACM/ IEEE-CS Joint Conference on Digital Libraries, JCDL 2003, Houston, Texas, May 27-31, 2003. 89. H. Chen, H. Atabakhsh, and M. Chau, “COPLINK: Visualization for Crime Analysis,” Proceedings of the Third National Conference on Digital Government Research, Los Angeles, CA, May 18-21, 2003. 90. H. Chen, W. Chung, Y. Qin, M. Chau, J. Xu, G. Wang, R. Zheng, and H. Atabakhsh “Crime Data Mining: An Overview and Case Studies,” Proceedings of the Third National Conference on Digital Government Research, Los Angeles, CA, May 18-21, 2003. 91. C. Lin, P. J. Hu, and H. Chen, “Technology Implementation in Law Enforcement: COPLINK System Usability and User Acceptance Evaluations,” Proceedings of the Third National Conference on Digital Government Research, Los Angeles, CA, May 18-21, 2003. 92. C. Q. Yin, D. Nickels, T. G. Ng, and H. Chen, “DGPort: A Web Portal for Digital Government,” Proceedings of the Third National Conference on Digital Government Research, Los Angeles, CA, May 18-21, 2003. 93. W. Chung, H. Chen, and J. F. Nunamaker, “Business Intelligence Explorer: A Knowledge Map Framework for Discovering Business Intelligence on the Web,” Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS-27), Big Island, Hawaii, January 6-7, 2003. 94. M. A. Grayson, D. P. Biros, M. Ward, and H. Chen, “Air Force Organizational Memory Information System: A Computer-Mediated Communication Perspective,” IASTED International Conference on Information and Knowledge Sharing (IKS’02), St. Thomas, Virgin Islands, November 18-20, 2002. 95. G. Leroy and H. Chen, “MedTextus: An Ontology-enhanced Medical Portal,” Proceedings of Workshop on Information Technology and Systems (WITS 2001) Conference, Barcelona, Spain, December 14-15, 2002. 96. H. Chen, “From Digital Library to Digital Government: A Case Study in Crime Data Mapping and Mining,” Proceedings of The 5th International Conference of Asian Digital Libraries, ICADL 2002, Singapore, December 11-14, 2002, Lecture Notes in Computer Science, Springer-Verlag. 49
  • 50. 97. D. McDonald and H. Chen, “Using Sentence-Selection Heuristics to Rank Text Segments in TXTRACTOR,” Proceedings of the Second ACM/IEEE-CS Joint Conference on Digital Libraries, JCDL 2002, Portland, Oregon, July 14-18, 2002. 98. Z. Huang, W. Chung, T. Ong, and H. Chen, “A Graph-based Recommender System for Digital Library,” Proceedings of the Second ACM/IEEE-CS Joint Conference on Digital Libraries, JCDL 2002, Portland, Oregon, July 14-18, 2002. 99. M. Chau, H. Chen, J. Qin, Y. Zhou, Y. Qin, W. Sung, and D. McDonald, “Comparison of Two Approaches to Building a Vertical Search Tool: A Case Study in the Nanotechnology Domain,” Proceedings of the Second ACM/IEEE-CS Joint Conference on Digital Libraries, JCDL 2002, Portland, Oregon, July 14-18, 2002. 100.H. Chen, “E-Library, E-Government, and E-Commerce: Common Threads and New Opportunities,” Proceedings of the First China Digital Library Conference, Beijing, China, July 9-11, 2002. 101.J. Xu and H. Chen, “Using Shortest Path Algorithms to Identify Criminal Associations,” Proceedings of the Second National Conference on Digital Government Research, Los Angeles, CA, May 20-22, 2002. 102.M. Chau, J. Xu, and H. Chen, “Extracting Meaningful Entities from Police Narrative Reports,” Proceedings of the Second National Conference on Digital Government Research, Los Angeles, CA, May 20-22, 2002. 103.H. Chen, H. Atabakhsh, D. Zeng, J. Schroeder, T. Peterson, D. Casey, M. Chen, Y. Xiang, D. Daspit, S. Nandiraju, and S. Fu, “COPLINK: Visualization and Collaboration for Law Enforcement,” Proceedings of the Second National Conference on Digital Government Research, Los Angeles, CA, May 20-22, 2002. 104.G. Leroy and H. Chen, “Filling Preposition-based Template to Capture Information from Medical Abstracts,” Proceedings of Pacific Symposium on Biocomputing (PSB 2002), Kauai, Hawaii, January, 2002, Pages 350-361. 105.H. Chen, “Medical Text Mining: A DLI-2 Status Report,” Proceedings of The 4th International Conference of Asian Digital Libraries (ICADL 2001), Bangalore, India, December 10-12, 2001. 106.H. Chen, “Knowledge Management Systems: A Text Mining Perspective,” Invited Tutorial for The 4th International Conference of Asian Digital Libraries (ICADL 2001), Bangalore, India, December 10-12, 2001. 107.B. Zhu and H. Chen, “Social Visualization for Computer-Mediated Communication: A Knowledge Management Perspective,” Proceedings of Workshop on Information Technology and Systems (WITS 2001) Conference, New Orleans, Louisiana, December 15-16, 2001. 108.H. Chen, “COPLINK: Knowledge Management for Law Enforcement,” Proceedings of the National Conference on Digital Government Research, Los Angeles, CA, May 21-23, 2001. 109.H. Chen, “A Case of Information Categorization in NSF DLI Research,” Proceedings of The Second International Roundtable on Terminology, Seoul, Korea, December 10, 2000. 110.H. Chen, “High-Performance Digital Library Classification Systems: An Experiment in Medical Informatics,” Proceedings of the Third International Asian Digital Library Conference, Seoul, Korea, December 6-9, 2000. 111.H. Chen, “UMLS and Linguistics Enhanced Medical Information Retrieval,” Proceedings of NHRI (National Health Research Institute) Research Resources 2000, Taipei, Taiwan, April 27, 2000. 112.N. C. Romano, C. Baur, H. Chen, and J. F. Nunamaker, “The MindMine Comment Analysis Tool for Collaborative Attitude Solicitation, Analysis, Sense-making and Visualization,” Proceedings of the 50
  • 51. 33th Annual Hawaii International Conference on System Sciences (HICSS-33), Maui, Hawaii, January 7-10, 2000. 113.T. Ong and H. Chen, “Updateable PAT-Tree Approach to Chinese Key Phrase Extraction Using Mutual Information: A Linguistic Foundation for Knowledge Management,” Proceedings of the Second Asian Digital Library Conference, Taipei, Taiwan , November 8-9, 1999. 114.G. Leroy, K. Tolle, and H. Chen, “Customizable and Ontology-Enhanced Medical Information Retrieval Interfaces,” Proceedings of International Medical Informatics Association Working Group 6 on Medical Concept Representation, Phoenix, Arizona, December 16-19, 1999. 115.B. Zhu, M. Ramsey, H. Chen, R. V. Hauck, T. D. Ng, and B. R. Schatz, “Support Concept-based Multimedia Information Retrieval: A Knowledge Management Approach,” Proceedings of the ICIS Conference, Charlotte, North Carolina, December 12-15, 1999. 116.R. V. Hauck and H. Chen, “COPLINK: A Case of Intelligent Analysis and Knowledge Management,” Proceedings of the ICIS Conference, Charlotte, North Carolina, December 12-15, 1999. 117.N. C. Romano, D. Roussonov, J. F. Nunamaker, and H. Chen, “Collaborative information Retrieval Environment: Integration of Information Retrieval with Group Support Systems,” Proceedings of the 32th Annual Hawaii International Conference on System Sciences (HICSS-32), Maui, Hawaii, January 7-10, 1999. 118.H. Chen, “The Illinois Digital Library Initiative Project: Federating Repositories and Semantic Research,” Proceedings of The First Asia Digital Library Workshop '98, Hong Kong, August 6-7, 1998. 119.M. Ramsey, T. Ong, and H. Chen, “Multilingual Input System for the Web - an Open Multimedia Approach of Keyboard and Handwritten Recognition for Chinese and Japanese,” Proceedings of IEEE Advances in Digital Libraries Conference (ADL '98), Santa Barbara, CA, April 22-24, 1998, Pages 188-195. 120.H. Chen, Y. Chung, M. Ramsey, C. Yang, P. Ma, and J. Yen, “Intelligent Agents on the Internet,” Proceedings of the 30th Annual Hawaii International Conference on System Sciences (HICSS-30), Maui, Hawaii, January 7-10, 1997. 121.B. Schatz, E. Johnson, P. Cochrane, and H. Chen, “Interactive Term Suggestion for Users of Digital Libraries: Using Subject Thesauri and Co-occurrence Lists for Information Retrieval,” ACM Digital Library Conference, 1996, Pages 126-133. 122.H. Chen, B. R. Schatz, C. Lin, “Concept Classification and Search on Internet Using Machine Learning and Parallel Computing Techniques,” World Wide Web 4 Conference, Boston, MA, December 11-14, 1995, Pages 58-59, Poster Proceedings. 123.J. Yen, H. Chen, P. Ma, and T. Bui, “An Issues Identifier for Online Financial Databases,” Proceedings of the International Society for Decision Support Systems Third International Conference, ISDSS'95, Hong Kong, June 22-23, 1995. 124.H. Chen and B. Schatz, “Semantic Retrieval for the NCSA Mosaic,” Proceedings of the Second International World Wide Web Conference '94, Chicago, Illinois, October 17-20, 1994. 125.J. Martinez and H. Chen, “Cognitive Studies on the Use of Automatic Thesauri for Information Retrieval in Biological Domains,” AzLA Annual Conference, November, 1994. 126.H. Chen and L. She, “Inductive Query by Examples (IQBE): A Machine Learning Approach,” Proceedings of the 27th Annual Hawaii International Conference on System Sciences (HICSS-27), Maui, Hawaii, January 4-7, 1994. 51
  • 52. 127.H. Chen, “An Algorithmic Approach to Building Organizational Memory for a Scientific Community,” Proceedings of the 27th Annual Hawaii International Conference on System Sciences (HICSS-27), Maui, Hawaii, January 4-7, 1994. 128.H. Chen, “A Machine Learning Approach to Document Retrieval: An Overview and an Experiment,” Proceedings of the 27th Annual Hawaii International Conference on System Sciences (HICSS-27), Maui, Hawaii, January 4-7, 1994. 129.H. Chen, “Approaching the Vocabulary Problem in Collaboration,” Proceedings of the National Science Foundation Coordination Theory and Collaboration Technology Workshop (NSF CTCT), July 8-10, 1993, Arlington, VA. 130.B. Schatz, E. Grossman, T. Friedman, K. Powell, J. Calley, H. Chen, L. Star, S. Hudson, and S. Ward, “The Worm Community System, Release 2,” 1993 Meeting on C. elegans, University of Wisconsin, Madison, Wisconsin, June 2-6, 1993. 131.K. J. Lynch and H. Chen, “Knowledge Discovery from Historical Data: An Algorithmic Approach,” Proceedings of the 25th Annual Hawaii International Conference on System Sciences (HICSS-25), Kaui, Hawaii, January 7-10, 1992, Pages 70-79. 132.H. Chen and V. Dhar, “Online Query Refinement on Information Retrieval Systems: A Process Model of Searcher/System Interactions,” Proceedings of the 13th International Conference on Research and Development in Information Retrieval (SIGIR-90), Brussels, Belgium, 1990. 133.H. Chen and V. Dhar, “A Knowledge-Based Approach to the Design of Document-Based Retrieval Systems,” Proceedings of the 5th Conference on Office Information Systems (COIS-90), Boston, Massachusetts, 1990. 134.H. Chen, “A Knowledge-Based Design for Hypertext-Based Document Retrieval Systems,” Proceedings of the International Conference on Data Base and Expert Systems Applications (DEXA-90), Vienna, Austria, 1990. 135.H. Chen and V. Dhar, “Reducing Indeterminism in Consultation: A Cognitive Model of User/Librarian Interactions,” Proceedings of the 6th National Conference on Artificial Intelligence (AAAI-87), Seattle, Washington, 1987. 52