Journal: ERCIM News

Volume 2016, Issue 107

0 -- 0Mark Cieliebak. Optimising Deep Learning for Infinite Applications in Text Analytics
0 -- 0Jean-Baptiste Mouret. Micro-Data Learning: The Other End of the Spectrum
0 -- 0Peter Wittek. Making Learning Physical - Machine Intelligence and Quantum Resources
0 -- 0András A. Benczúr, Róbert Pálovics, Márton Balassi, Volker Markl, Tilmann Rabl, Juan Soto, Björn Hovstadius, Jim Dowling, Seif Haridi. Towards Streamlined Big Data Analytics
0 -- 0Frédéric Alexandre. Autonomous Machine Learning
0 -- 0George Potamias. Towards Predictive Pharmacogenomics Models
0 -- 0Jan Stampfli, Kurt Stockinger. Applied Data Science: Using Machine Learning for Alarm Verification
0 -- 0Karol Kurach, Marcin Andrychowicz, Ilya Sutskever. Neural Random Access Machines
0 -- 0Wouter M. Koolen. Robust and Adaptive Methods for Sequential Decision Making
0 -- 0Claudio Lucchese, Franco Maria Nardini, Raffaele Perego, Nicola Tonellotto, Salvatore Orlando, Rossano Venturini. Fast Traversal of Large Ensembles of Regression Trees
0 -- 0Nicolas Mayer, Jocelyn Aubert, Hervé Cholez, Eric Grandry, Eric Dubois 0001. The TISRIM-Telco Toolset - An IT Regulatory Framework to Support Security Compliance in the Telecommunications Sector
0 -- 0José Francisco García Cantos, Manuel Peinado, Miguel A. Salido, Federico Barber. Optimisation System for Cutting Continuous Flat Glass
0 -- 0Patrizio Dazzi. BASMATI - Cloud Brokerage Across Borders For Mobile Users And Applications
0 -- 0Pierre-Yves Oudeyer, Manuel Lopes, Celeste Kidd, Jacqueline Gottlieb. Curiosity and Intrinsic Motivation for Autonomous Machine Learning
0 -- 0Balázs Csanád Csáji, András Kovács, József Váncza. Online Learning for Aggregating Forecasts in Renewable Energy Systems
0 -- 0Marios D. Dikaiakos, George Pallis, Evangelos P. Markatos. Mandola: Monitoring and Detecting Online Hate Speech
0 -- 0Darko Brodic, Dejan Tanikic, Alessia Amelio. Predicting the Extremely Low Frequency Magnetic Field Radiation Emitted from Laptops: A New Approach to Laptop Design
0 -- 0Erkuden Rios, Massimiliano Rak, Samuel Olaiya Afolaranmi. Managing Security in Distributed Computing: Self-Protective Multi-Cloud Applications
0 -- 0Dimitrios N. Serpanos, Howard E. Shrobe, Muhammad Taimoor Khan. Behaviour-Based Security for Cyber-Physical Systems
0 -- 0Olivier Parisot, Benoît Otjacques. Predictive Modelling from Data Streams
0 -- 0Max Welling. Marrying Graphical Models with Deep Learning
0 -- 0Bernd Malle, Peter Kieseberg, Sebastian Schrittwieser, Andreas Holzinger. Privacy Aware Machine Learning and the "Right to be Forgotten"
0 -- 0Sander M. Bohte, Hung Son Nguyen. Modern Machine Learning: More with Less, Cheaper and Better
0 -- 0Olof Görnerup, Theodore Vasiloudis. Mining Similarities and Concepts at Scale
0 -- 0Markus Wurzenberger, Florian Skopik. The BÆSE Testbed - Analytic Evaluation of IT Security Tools in Specified Network Environments
0 -- 0Bert Kappen, Wim Wiegerinck. Bonaparte: Bayesian Networks to Give Victims back their Names

Volume 2016, Issue 106

0 -- 0Andreas Konstantinidis 0002, Georgios Chatzimilioudis, Demetrios Zeinalipour-Yazti. Privacy-Preserving Indoor Localisation and Navigation
0 -- 0Nicolás Notario, Stephan Krenn, Bernd Zwattendorfer, Felix Hörandner. CREDENTIAL: Secure Cloud Identity Wallet
0 -- 0Anze Zitnik, Antonio Álvarez Romero, Stephanie Parker. CyberWISER-Light: Supporting Cyber Risk Assessment with Automated Vulnerability Scanning
0 -- 0Paolo Mori, Andrea Saracino, Francesco Di Cerbo. Data Usage Control: Introducing a New Framework for Cloud and Mobile Environments
0 -- 0Evangelos Markatos, Egidija Versinskiene, Evaldas Bruze. SENTER: A Network of the European Centres of Excellence in Cyber Crime Research, Training, and Education
0 -- 0Thijs Veugen. Client-Server Framework for Securely Outsourcing Computations
0 -- 0Nisrine Jafri, Axel Legay, Jean-Louis Lanet. Vulnerability Prediction Against Fault Attacks
0 -- 0Ioannis G. Askoxylakis, Nikolaos E. Petroulakis, Vivek Kulkami, Florian Zeiger. VirtuWind - Security in a Virtual and Programmable Industrial Network Prototype Deployed in an Operational Wind Park
0 -- 0Christophe Ponsard, Philippe Massonet, Gautier Dallons. Co-engineering Security and Safety Requirements for Cyber-Physical Systems
0 -- 0László Havasi, Tamás Szirányi. Multi-View Security and Surveillance at MTA SZTAKI
0 -- 0Vicente Matellán, Francisco J. Rodríguez Lera, Jesús Balsa. Cybersecurity in Robotic Systems
0 -- 0Marcel Caria. Cyber-Physical Systems: Closing the Gap between Hardware and Software
0 -- 0Nicolas Sendrier, Jean-Pierre Tillich. Code-Based Cryptography: New Security Solutions Against a Quantum Adversary
0 -- 0Arthur Melissen. Flexible Decentralised Access Control using Invitation-Response Dialogue
0 -- 0Marc Stevens. Deprecating an Internet Security Standard with Cryptanalysis
0 -- 0Giulia Barbagelata, Marco Attene, Tor Dokken. CAxMan: Design for Additive Manufacturing Made Easy and Cost-effective
0 -- 0Fabio Martinelli, Edgar R. Weippl. Cybersecurity - Introduction to the Special Theme
0 -- 0Martin Schmiedecker, Sebastian Neuner. On Reducing Bottlenecks in Digital Forensics
0 -- 0Dimitris E. Simos. SPLIT: Security Protocol Interaction Testing in Practice
0 -- 0Stefano Cresci, Marinella Petrocchi, Maurizio Tesconi, Roberto Di Pietro, Angelo Spognardi. Social Fingerprinting - or the Truth About You
0 -- 0Ana Nieto, Rodrigo Roman, Javier Lopez. Digital Witness: Digital Evidence Management Framework for the Internet of Things
0 -- 0Benjamin André, Nicolas Anciaux, Philippe Pucheral, Paul Tran-Van. A Root of Trust for the Personal Cloud
0 -- 0Marco Tiloca, Christian Gehrmann, Ludwig Seitz. Robust and Scalable DTLS Session Establishment
0 -- 0José Bacelar Almeida, Manuel Barbosa, Hugo Pacheco, Vitor Pereira. A Tool-Chain for High-Assurance Cryptographic Software
0 -- 0Florian Dold, Christian Grothoff. GNU Taler: Ethical Online Payments for the Internet Age
0 -- 0Philippe Antoine, Guillaume Bonfante, Jean-Yves Marion. Gorille: Efficient and Relevant Software Comparisons
0 -- 0Joppe W. Bos, Wil Michiels. Security Assessment of Software Security: A Closer Look at White-Box Cryptographic Implementations
0 -- 0Thomas Lorünser, Daniel Slamanig, Thomas Länger, Henrich C. Pöhls. A New Architecture for Developing Cryptographic Cloud Services
0 -- 0Carmela Gambardella, Ilaria Matteucci, Marinella Petrocchi. Data Sharing Agreements: How to Glue Definition, Analysis and Mapping Together
0 -- 0Marco Gramaglia, Marco Fiore. Thwarting Uniqueness in Datasets of Spatiotemporal Trajectories
0 -- 0Valérie Viet Triem Tong, Jean-François Lalande, Mourad Leslous. Challenges in Android Malware Analysis
0 -- 0Robert N. M. Watson, Simon W. Moore, Peter G. Neumann. CHERI: A Hardware-Software System to Support the Principle of Least Privilege
0 -- 0Florian Skopik, Maria Leitner, Timea Pahi. CISA: Establishing National Cyber Situational Awareness to Counter New Threats
0 -- 0Fabrizio Biondi, Sébastien Josse, Axel Legay. Bypassing Malware Obfuscation with Dynamic Synthesis
0 -- 0Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani. Using Cryptography to Control Your Data at a Distance
0 -- 0Erno Rigó, Mihály Héder. A Network of Internet Probes for Fighting Cyber Attacks
0 -- 0Nataliia Bielova, Frédéric Besson, Thomas P. Jensen. Using JavaScript Monitoring to Prevent Device Fingerprinting
0 -- 0Haralampos Pozidis, Nikolaos Papandreou, Thomas Mittelholzer, Evangelos Eleftheriou. High-Density Data Storage in Phase-Change Memory

Volume 2016, Issue 105

0 -- 0Andreas Halm. Planning Production Efficiently
0 -- 0Pieter L. van den Berg, Guido Legemaate, Rob van der Mei. Boosting the Responsiveness of Firefighter Services with Mathematical Programming
0 -- 0Davide Bacciu, Antonio Carta, Stefania Gnesi, Laura Semini. Adopting a Machine Learning Approach in the Design of Smart Transportation Systems
0 -- 0Pedro Amorim, Sara Martins, Eduardo Curcio, Bernardo Almada-Lobo. Defining the Best Distribution Network for Grocery Retail Stores
0 -- 0Denise Holfeld, Axel Simroth. Risk Analysis for a Synchro-modal Supply Chain Combined with Smart Steaming Concepts
0 -- 0Sara Gestrelius. Evaluating Operational Feasibility before Investing: Shunting Yards in Sweden
0 -- 0Rob van der Mei, Ariona Shashaj. Visions of the Future: Towards the Next Generation of Logistics and Planning Systems
0 -- 0Joachim Arts. Spare Parts Stocking and Expediting in a Fluctuating Demand Environment
0 -- 0Axel-Cyrille Ngonga Ngomo, Alejandra García-Rojas, Irini Fundulaki. HOBBIT: Holistic Benchmarking of Big Linked Data
0 -- 0Leendert Kok, Joaquim A. S. Gromicho. Where is the Money? - Optimizing Cash Supply Chain Networks
0 -- 0Victoria Svedberg. Allocating Railway Tracks Using Market Mechanisms and Optimization
0 -- 0Sara Gestrelius, Martin Aronsson. An Industrial Take on Breast Cancer Treatment
0 -- 0Ahmad Al Hanbali, Sajjad Rahimi-Ghahroodi, W. Henk Zijm. Integrated Resource Planning in Maintenance Logistics
0 -- 0Björn Löfvendahl. Remote Service Using Augmented Reality
0 -- 0Kostas Stefanidis, Giorgos Flouris, Ioannis Chrysakis, Yannis Roussakis. D2V – Understanding the Dynamics of Evolving Data: A Case Study in the Life Sciences
0 -- 0Miguel A. Barcelona. ICT for a Logistics Demonstration Centre
0 -- 0Abderrahmane Aggoun, Nicolas Beldiceanu, Gilles Chabert, François Fages. Packing with Complex Shapes
0 -- 0Peter Kieseberg, Edgar R. Weippl, Sebastian Schrittwieser. Detection of Data Leaks in Collaborative Data Driven Research
0 -- 0Ulrich Schimpel, Stefan Wörner. Planning Complex Supply Networks Facing High Variability
0 -- 0Merel Steenbrink, Elenna Dugundji, Rob van der Mei. Predicting the Demand for Charging Stations for Electric Vehicles
0 -- 0René Berndt, Alexander Sunk. Value Stream Mapping with VASCO - From Reducing Lead Time to Sustainable Production Management
0 -- 0Renaud De Landtsheer, Christophe Ponsard, Yoann Guyot. OscaR, an Open Source Toolbox for Optimising Logistics and Supply Chain Systems
0 -- 0Doreid Ammar, Katrien De Moor, Poul E. Heegaard. Quality of Experience-assessment of WebRTC Based Video Communication
0 -- 0Sara Gestrelius. Utilising the Uniqueness of Operation Days to better Fulfil Customer Requirements
0 -- 0Péter Egri, Dávid Gyulai, Botond Kádár, László Monostori. Production Planning on Supply Network and Plant Levels: The RobustPlaNet Approach
0 -- 0Björn Bjurling, Fehmi Ben Abdesslem. Data-driven Optimization for Intelligent and Efficient Transport
0 -- 0Giorgio Oronzo Spagnolo, Eda Marchetti, Alessandro Coco, Stefania Gnesi. Modelling and Validating an Import/Export Shipping Process
0 -- 0Niels A. H. Agatz, Leo G. Kroon, Remy Spliet, Albert P. M. Wagelmans. Designing Sustainable Last-Mile Delivery Services in Online Retailing
0 -- 0Antonello Calabrò, Francesca Lonetti, Eda Marchetti. Business Process Execution Analysis through Coverage-based Monitoring
0 -- 0Erina Ferro. Smart Solutions for the CNR Campus in Pisa

Volume 2016, Issue 104

0 -- 0Costas Bekas. Unlocking the Secrets of the Dynamics of Earth's Interior
0 -- 0Maria Koskinopoulou, Panos E. Trahanias. Robots Learn Actions and Cooperative Tasks by Imitation
0 -- 0Paulo da Silva Carvalho, Patrik Hitzelberger, Gilles Venturini. Understanding Metadata to Exploit Life Sciences Open Data Datasets
0 -- 0Benedetto Rugani, Paulo Carvalho, Benoit Othoniel. Management of Big and Open Data in the Life Cycle Assessment of Ecosystem Services
0 -- 0Kerstin Bach, Paul Jarle Mork, Agnar Aamodt. Can Data-driven Self-Management Reduce Low Back Pain?
0 -- 0Mohamed Boukhebouze, Stéphane Mouton, Jimmy Nsenga. Towards an On-board Personal Data Mining Framework For P4 Medicine
0 -- 0Alberto Magi, Nadia Pisanti, Lorenzo Tattini. The Source of the Data Flood: Sequencing Technologies
0 -- 0Christoph Trattner, Tomasz Kusmierczyk, Kjetil Nørvåg. FOODWEB - Studying Food Consumption and Production Patterns on the Web
0 -- 0Alexander Schönhuth, Tobias Marschall. Eliminating Blind Spots in Genetic Variant Discovery
0 -- 0Juan Ramón Troncoso-Pastoriza, Elsa Prieto Pérez. WITDOM: Empowering Privacy and Security in Non-trusted Environments
0 -- 0Bernd Zwattendorfer, Stephan Krenn, Thomas Lorünser. Secure and Privacy-Preserving Identity Management in the Cloud
0 -- 0Elisabeth G. Rens, Sonja E. M. Boas, Roeland M. H. Merks. Modelling the Growth of Blood Vessels in Health and Disease
0 -- 0Beatriz Gallego-Nicasio Crespo, Melek Önen, Ghassan Karame. TREDISEC: Towards Realizing a Truly Secure and Trustworthy Cloud
0 -- 0Erwan Zerhouni, Bogdan Prisacari, Qing Zhong, Peter Wild, Maria Gabrani. Big Data Takes on Prostate Cancer
0 -- 0Haridimos Kondylakis, Lefteris Koumakis, Manolis Tsiknakis, Kostas Marias, Stephan Kiefer. Big Data in Support of the Digital Cancer Patient
0 -- 0Adrien Coulet, Malika Smaïl-Tabbone. Mining Electronic Health Records to Validate Knowledge in Pharmacogenomics
0 -- 0Roeland Merks, Marie-France Sagot. Tackling Big Data in the Life Sciences - Introduction to the Special Theme
0 -- 0James T. Murphy, Mark Johnson, Frédérique Viard. Modelling Approaches to Inform the Control and Management of Invasive Seaweeds
0 -- 0Gunnar W. Klau. Networks to the Rescue - From Big "Omics" Data to Targeted Hypotheses
0 -- 0Daniele Spoladore, Gianfranco Modoni, Marco Sacco. Smart Devices for the Home of the Future: A New Model for Collaboration
0 -- 0Daniel Slamanig, Agi Karyda, Thomas Lorünser. PRISMACLOUD - Privacy and Security Maintaining Services in the Cloud
0 -- 0Claudia Caudai, Emanuele Salerno. Computational Estimation of Chromosome Structure
0 -- 0Mark Cieliebak, Dominic Egger, Fatih Uzdilli. Twitter can Help to Find Adverse Drug Reactions
0 -- 0Marie-Dominique Devignes, Malika Smaïl-Tabbone, David W. Ritchie. Kbdock - Searching and Organising the Structural Space of Protein-Protein Interactions
0 -- 0Peter Kieseberg, Edgar R. Weippl, Andreas Holzinger. Trust for the "Doctor in the Loop"
0 -- 0Christoph Quix, Thomas Berlage, Matthias Jarke. Interactive Pay-As-You-Go-Integration of Life Science Data: The HUMIT Approach
0 -- 0Brett G. Olivier, Bas Teusink. Modelling? Using Standards Can Help You