Protecting Health Information. Ensuring Data Integrity.
Protecting Health Information. Ensuring Data Integrity.

Conference Papers

These are peer-reviewed full articles that appeared in technical conferences. You can find published conference abstracts under Other Publications.

  1. M. Li, M. Scaiano, K. El Emam, and B. Malin: “Efficient Active Learning for Electronic Medical Record De-identification”, AMIA Informatics Summit, 2019.
    Winner of the best data science paper award
  2. JM. Ferran, K. El Emam, S. Nolan: “Providing De-Identification Standards to CDISC Data Models.” In PhUSE 2015, 2015.
  3. L. Arbuckle and K. El Emam: “Practical Applications of Secure Multiparty Computation for Public Health and Post-Marketing Drug Surveillance.” In JSM Proceedings, Biometrics Section. Seattle, WA: American Statistical Association. 10pp, 2015.
  4. H. Farah, D. Amyot, K. El Emam: “Efficient Privacy-Preserving Identity Scheme for Electronic Validation of Phase 1 Clinical Trials” In M. Benyoucef, et. al (eds) Proceedings of MCETECH 2015, LNBIP 209: 183-196, 2015.
  5. F. Dankar, K. El Emam, S. Matwin: “Efficient Private Information Retrieval for Geographical Aggregation” (PSCare14) Procedia Computer Science 37: 497 – 502, 2014.
  6. F. K. Dankar, K. El Emam: “A theoretical model for obfuscating web navigation trails.” In EDBT ’13: Proceedings of the Joint EDBT/ICDT 2013 Workshops.
  7. K. Ghazinour, M. Sokolova, S. Matwin: “Detecting Health-Related Privacy Leaks in Social Networks Using Text Mining Tools.” Canadian Conference on AI, 2013.
  8. T. Ali, M. Sokolova, D. Schramm, D. Inkpen: “Opinion Learning from Medical Forums.” RANLP, 2013.
  9. M. Sokolova, S. Matwin, Y. Jafer, D. Schramm: “How Joe and Jane Tweet about Their Health: Mining for Personal Health Information on Twitter.” RANLP, 2013.
  10. M. Sokolova, V. Bobicev: “What Sentiments Can Be Found in Medical Forums?” RANLP, 2013.
  11. F. K. Dankar, K. El Emam: “The Application of Differential Privacy to Health Data.” In Proceedings of the EDBT/ICDT Workshops: The 5th International Workshop on Privacy and Anonymity in the Information Society (PAIS), 2012.
  12. V. Bobicev, M. Sokolova, Y. Jafer, and D/ Schramm: “Sentiments from Tweets with Personal Health Information.” In Proceedings of the Canadian Conference on Artificial Intelligence, 2012.
  13. Y. Jasser, S, Jafer, G. Wainer: “Data Mining with Cellular Discrete Event Modeling and Simulation.” In Proceedings of 2012 Spring Simulation Conference.
  14. M. Sokolova: “Evaluation Measures for Detection of Personal Health Information.” In Proceedings of the BioMedical Natural Language Processing (joined with the International Conference on Recent Advances in Natural Language Processing) and the ACL Anthology, 2011.
  15. M. Sokolova and D. Schramm: “Building a patient-based ontology for user-written Web messages.” In Proceedings of the International Conference on Recent Advances in Natural Language Processing and the ACL Anthology, 2011.
  16. M. Sokolova and V. Bobicev: “Sentiments and Opinions in Health-related Web Messages.” In Proceedings of the International Conference on Recent Advances in Natural Language Processing and the ACL Anthology, 2011.
  17. J. Hu, L. Peyton and K. El Emam: “A Systematic Approach to PHI Leak Prevention in Continuous Health Care Data Integration, Workshop on Intelligent Methods for Protecting Privacy and Confidentiality in Data.” In Proceedings of the Canadian Conference on AI, 2010.
  18. M. Sokolova, K. El Emam, S. Chowdhury, E. Neri, S. Rose, and E. Jonker: “Evaluation of rare event detection.” In Proceedings of the Canadian AI Conference, 2010.
  19. T. Wong, J. Mercer J, S. Mukhi Nizar, S. Totten, K. El Emam, G. Jayaraman, C. Babin, R. Saginur, R. Kropp, R. Rodin, G. Garber: “Rapid Real Time Surveillance and Monitoring of Pandemic Influenza Associated Pneumonia & Risk Factors Using Primary Care Electronic Medical Records (EMR).” In 14th International Congress on Infectious Diseases (ICID), 2010.
  20. Y. Fu, G. Koru, Z. Chen, and K. El Emam: “A tree-based approach to preserve the privacy of software engineering data and predictive models.” In Proceedings of the 5th International Conference on Predictor Models in Software Engineering, 2009.
  21. M. Sokolova and G. Lapalme: “Classification of Opinions with Non-affective Adverbs and Adjectives.” In Proceedings of the International Conference on Recent Advances in Natural Language Processing, 2009.
  1. M. Sokolova and V. Bobicev: “Machine Learning of Affective Words in Russian and Romanian Languages.” In Proceedings of the International Conference on Recent Advances in Natural Language Processing, 2009.
  2. M. Sokolova and G. Lapalme: “Learning Opinions without Using Emotional Words.” In Proceedings of the 22nd Canadian Conference on Artificial Intelligence, 2009.
  3. M. Sokolova and G. Lapalme: “Verbs Speak Loud: Verb Categories in Learning Polarity and Strength of Opinions.” In Proceedings of the 22nd Canadian Conference on Artificial Intelligence, 2008.
  4. V. Bobicev and M. Sokolova: “An Effective and Robust Method for Short Text Classification.” In Proceedings of the Association for the Advancement of Artificial Intelligence, 2008.
  5. V. Gupta, A. Patnaik, N. Goel, K. El Emam, C. Lung, and A. Nayak: “Bayesian model for controlling software inspections.” In Proceedings of the Canadian Reliability and Maintainability Symposium, 2003.
  6. K. El Emam: “Quality assurance for mobile applications: Experiences in eHealth.” In Proceedings of the International Quality Conference, 2003.
  7. V. Gupta, A. Patnaik, N. Goel, K. El Emam: “A system for controlling software inspections.” In Proceedings of Canadian Conference on Electrical and Computer Engineering, Vol. 2, 2003.
  8. J. Bernard, K. El Emam, and D. Zubrow: “Using capture-recapture models for the reinspection decision.” In Proceedings of the International Conference on Software Quality, American Society for Quality, 2002.
  9. R. de la Fuente, K. El Emam, and D. Zubrow: “Getting more out of your inspection data: Using capture-recapture models for the reinspection decision.” In Proceedings of the National Software Engineering Process Group Conference, 2002.
  10. D. Goldenson and K. El Emam: “What should you measure first? Lessons learned from the Software CMM.” In Proceedings of the SEI Software Engineering Symposium, 2000.
  11. O. Laitenberger, C. Atkinson, and K. El Emam: “Using inspection technology in object-oriented development projects.” In Proceedings of the 4th Annual IASTED International Conference on Software Engineering and Applications, 2000.
  12. S. Benlarbi, K. El Emam, N. Goel, and S. Rai: “Thresholds for object-oriented measures.” In Proceedings of the International Symposium on Software Reliability Engineering, 2000.
  13. K. El Emam: “A primer on object-oriented measurement.” In Proceedings of the Seventh Software Metrics Symposium, 2000.
  14. A. Beitz, K. El Emam, and J. Jarvinen: “A business focus to assessments.” In Proceedings of the European Conference on Software Process Improvement, 1999.
  15. O. Laitenberger, M. Leszak, D. Stoll, and K. El Emam: “Evaluating a model of review success factors in an industrial setting.” In Proceedings of the Sixth International Symposium on Software Metrics, 1999.
  16. L. Briand, K. El Emam, and I. Wieczorek: “Modeling the cost of European space and military projects.” In Proceedings of the International Conference on Software Engineering, IEEE CS Press, 1999.
  17. L. Briand, K. El Emam, D. Surmann, I. Wieczorek, and K. Maxwell: “An assessment and comparison of common software cost estimation modeling techniques.” In Proceedings of the International Conference on Software Engineering, IEEE CS Press, 1999.
  18. K. El Emam, J. M. Simon, S. Rousseau, and E. Jacquet: “Cost implications of interrater agreement for software process assessments.” In Proceedings of the 5th International Symposium on Software Metrics, IEEE CS Press, 1998.
  19. K. El Emam: “The internal consistency of the ISO/IEC 15504 software process capability scale.” In Proceedings of the 5th International Symposium on Software Metrics, IEEE CS Press, 1998.
  20. K. El Emam: “The predictive validity criterion for evaluating binary classifiers.” In Proceedings of the 5th International Symposium on Software Metrics, IEEE CS Press, 1998.
  1. K. El Emam and I. Wieczorek: “The repeatability of code defect classifications.” In Proceedings of the Ninth International Symposium on Software Reliability Engineering, IEEE CS Press, 1998.
  2. L. Briand, K. El Emam, and B. Freimut: “A comparison and integration of capture-recapture models and the detection profile method.” In Proceedings of the Ninth International Symposium on Software Reliability Engineering, IEEE CS Press, 1998.
  3. L. Briand, K. El Emam, and I. Wieczorek: “A case study in productivity benchmarking: Methods and lessons learned.” In Proceedings of the 9th European Software Control and Metrics Conference, Shaker Publishing B.V., The Netherlands, 1998.
  4. L. Briand, K. El Emam, and F. Bomarius: “COBRA: A hybrid method for software cost estimation, benchmarking, and risk assessment.” In Proceedings of the 20th International Conference on Software Engineering, 1998.
  5. L. Briand, K. El Emam, O. Laitenberger, and T. Fussbroich: “Using simulation to build inspection efficiency benchmarks for development projects.” In Proceedings of the 20th International Conference on Software Engineering, 1998.
  6. J. M. Simon, K. El Emam, S. Rousseau, E. Jacquet, and F. Babey: “The reliability of ISO/IEC PDTR 15504 assessments.” In Proceedings of the ESI/ISCN Conference, November 1997.
  7. L. Briand, K. El Emam, B. Freimut, and O. Laitenberger: “Quantitative evaluation of capture-recapture models to control software inspections.” In Proceedings of the 8th International Symposium on Software Reliability Engineering, IEEE CS Press, 1997.
    This also received the best paper award.
  8. P. Fusaro, K. El Emam, and B. Smith: “Evaluating the interrater agreement of process capability ratings.” In Proceedings of the 4th International Software Metrics Symposium, IEEE CS Press, 1997.
  9. K. El Emam, D. Hoeltje, and N. H. Madhavji: “Causal Analysis of the requirements change process for a large system.” In Proceedings of the International Conference on Software Maintenance, IEEE CS Press, 1997.
  10. K. El Emam, R. Smith. and P. Fusaro: “Modelling the reliability of SPICE based assessments.” In Proceedings of the International Symposium on Software Engineering Standards, IEEE CS Press, 1997.
  11. V. Basili, S. Condon, K. El Emam, B. Hendrick, and W. Melo: “Characterizing and modeling the cost of rework in a library of reusable software components.” In Proceedings of the 19th International Conference on Software Engineering, 1997.
  12. B. Smith and K. El Emam: “Transitioning to phase 2 of the SPICE trials.” In Proceedings of SPICE, 1996.
  13. K. El Emam and D. R. Goldenson: “Description and evaluation of the SPICE phase one trials assessments.” In Proceedings of the International Software Consulting Network Conference, 1996.
  14. G. Perez, K. El Emam, and N. H. Madhavji: “Evaluating the congruence of a software process model in a given environment.” In Proceedings of the Fourth International Conference on the Software Process, 1996.
  15. K. El Emam, B. Shostak, and N. H. Madhavji: “Implementing concepts from the Personal Software Process in an industrial setting.” In Proceedings of the Fourth International Conference on the Software Process, 1996.
  16. K. El Emam, D. R. Goldenson, L. Briand, and P. Marshall: “Interrater agreement in SPICE-based assessments: Some preliminary results.” In Proceedings of the Fourth International Conference on the Software Process, 1996.
  17. K. El Emam and D. R. Goldenson: “Some results from the SPICE phase one trials assessments.” In Proceedings of the VII Conferencia International de Technologia de Software: Qualidade de Software, Curitiba, Brazil, 1996.
  18. D. R. Goldenson and K. El Emam: “The international SPICE trials: Project description and initial results.” In Proceedings of the 8th Software Engineering Process Group Conference, May 1996.
  19. L. Briand, K. El Emam, and W. Melo: “An inductive method for process improvement: Concrete steps and guidelines.” In Proceedings of the ESI-ISCN Conference on Practical Improvement of Software Processes and Products, September 1995.
  20. K. El Emam and D. R. Goldenson: “SPICE: An empiricist’s perspective.” In Proceedings of the Second IEEE International Software Engineering Standards Symposium, August 1995.
  1. K. El Emam and N. H. Madhavji: “Measuring the success of requirements engineering processes”. In Proceedings of the Second IEEE International Symposium on Requirements Engineering, March 1995.
  2. K. El Emam and N. H. Madhavji: “A field study of requirements engineering practices in information systems development.” In Proceedings of the Second IEEE International Symposium on Requirements Engineering, March 1995.
  3. K. El Emam, N. Moukheiber, and N. H. Madhavji: “An empirical evaluation of the G/Q/M method.” In Proceedings of CASCON 93, Centre for Advanced Studies, IBM Canada Ltd., 1993.
  4. R. Keller, N. H. Madhavji, R. Lajoie, T. Bruckhaus, K. Toubache, W. Hong, and K. El Emam: “A comprehensive process model for studying software process papers.” In Proceedings of the 15th International Conference on Software Engineering, 1993.