Abstract is missing.
- Twitter spam detection based on deep learningTingmin Wu, Shigang Liu, Jun Zhang 0010, Yang Xiang. [doi]
- Automated refactoring of rust programsGarming Sam, Nick Cameron, Alex Potanin. [doi]
- Towards measuring the adaptability of an AO4BPEL processKhavee Agustus Botangen, Jian Yu, Michael Sheng. [doi]
- Characterising relational view updates using relative information capacityNigel Stanger. [doi]
- Towards customised visualisation of ontologies: state of the art and future applications for online polls analysisFelix Burgstaller, Martin Stabauer, Rebecca Morgan, Georg Grossmann. [doi]
- Robust scheduling of truck arrivals at a cross-docking platformHouda Zouhaier, Lamjed Ben Said. [doi]
- Security analysis of modern mission critical android mobile applicationsXi Zheng, Lei Pan, Erdem Yilmaz. [doi]
- TRA: tandem repeat assembler for next generation sequencesYongqing Jiang, Jinhua Lu, Jingyu Hou, Wanlei Zhou. [doi]
- Issues faced by vision-impaired users of interactive TV search facilitiesMark Springett, Richard N. Griffiths, Martin Mihajlov. [doi]
- Practical adaptive search trees with performance boundsKevin Fray, Kerri Morgan, Anthony Wirth, Justin Zobel. [doi]
- Characterizing IT-based consumer health artefactsNathan Poultney, Anthony Maeder, Niranjan Bidargaddi. [doi]
- Privacy preserving in big data sets through multiple shuffleYouyang Qu, Jiyang Xu, Shui Yu. [doi]
- Intuitive understanding of a modeling languageJudith Michael, Heinrich C. Mayr. [doi]
- GROWN: a control and decision system for smart greenhouses using wireless sensor networksClaudio M. de Farias, Luci Pirmez, Flávia Coimbra Delicato, Paulo F. Pires, Wei Li 0058, Albert Y. Zomaya, Emanuele N. de L. F. Jorge, Reyes Juárez-Ramirez. [doi]
- Effect of coupling on change in open source Java systemsGarry Singh, M. Daud Ahmed. [doi]
- Are current resources in SDN allocated to maximum performance and minimize costs and maintaining QoS problems?Keshav Sood, Shui Yu, Yong Xiang. [doi]
- Static techniques for reducing memory usage in the C implementation of whiley programsMin-Hsien Weng, Bernhard Pfahringer, Mark Utting. [doi]
- A trust model based energy detection for cognitive radio networksFan Jin, Vijay Varadharajan, Udaya Kiran Tupakula. [doi]
- Orthogonal analysis of StarCraft II for game balanceOwen Makin, Shaun Bangay. [doi]
- Bullseye: structured passage retrieval and document highlighting for scholarly searchXi Zheng, Akanksha Bansal, Matthew Lease. [doi]
- Re-engineering simultaneous internet sessions process-separated browsersSriram Raghavan, Udaya Parampalli, S. V. Raghavan. [doi]
- An inverse collaborative filtering approach for cold-start problem in web service recommendationLianyong Qi, Wan-Chun Dou, Xuyun Zhang. [doi]
- A novel strategy for efficient temporal verification with intersectant situation in scientific workflowLei Wu, Longshu Li, Xuejun Li, Futian Wang, Yun Yang. [doi]
- Target: category-based android malware detection revisitedJiaping Lin, Xingwen Zhao, Hui Li. [doi]
- The cloud computing load forecasting algorithm based on wavelet support vector machineWei Zhong, Yi Zhuang, Jian Sun, Jingjing Gu. [doi]
- Visual representation of penetration testing actions and skills in a technical tree modelAhmed Falah, Lei Pan, Mohamed Abdelrazek. [doi]
- Scalable-DSP: a high scalable distributed storage and processing system for unstructured data in big data environmentsDawei Sun, Shang Gao. [doi]
- Effective pseudo-relevance for Microblog retrievalKhaled Albishre, Yuefeng Li, Yue Xu. [doi]
- Neural network model with Monte Carlo algorithm for electricity demand forecasting in QueenslandBinbin Yong, Zijian Xu, Jun Shen, Huaming Chen, Yan-Shan Tian, Qingguo Zhou. [doi]
- An ad hoc broadcasting application by way of mobile devicesHarrison She, Ofek Wittenberg, Ian Warren. [doi]
- Virtual weather systems: measuring impact within videogame environmentsScott Roberts, Dale Patterson. [doi]
- Use of a biologically adapted reaction-diffusion model to generate hair properties for synthetic creaturesSiew Mai Bong, Shaun Bangay. [doi]
- Iterative auction based service selection for multi-tenant service-based systemsYunxiang Zhong, Xuejun Li, Qiang He. [doi]
- Understanding chronic disease comorbidities from baseline networks: knowledge discovery utilising administrative healthcare dataArif Khan, Shahadat Uddin, Uma Srinivasan. [doi]
- Anomaly detection in agri warehouse constructionAndrew McCarren, Suzanne McCarthy, Conor O. Sullivan, Mark Roantree. [doi]
- A change management framework for service based business processPengbo Xiu, Jian Yang, Weiliang Zhao. [doi]
- A fuzzy decision tree approach based on data distribution constructionHui Zheng, Jing He, Yanchun Zhang, Yong Shi. [doi]
- Parametric statecharts: designing flexible IoT apps: deploying android m-health apps in dynamic smart-homesRoopak Sinha, Ayush Narula, John Grundy. [doi]
- Exploring the design space of metadata-focused file management systemsRichard Watson, Stijn Dekeyser, Nehad Albadri. [doi]
- A scalable header compression scheme to improve bandwidth utilization in 5G networksJianan Sun, Ping Dong, Yajuan Qin, Tong Xu. [doi]
- An efficient and provably secure RFID grouping proof protocolShu Cheng, Vijay Varadharajan, Yi Mu, Willy Susilo. [doi]
- A survey of intelligent digital ink tools use in STEM educationMd Athar Imtiaz, Rachel Blagojevic, Andrew Luxton-Reilly, Beryl Plimmer. [doi]
- Proportioning documents over categories based on word embeddingsJiahua Du, Jing He. [doi]
- Modeling social interestingness in conversational storiesMorteza Behrooz, Arnav Jhala. [doi]
- Rumor restraining based on propagation prediction with limited observations in large-scale social networksQun Wu, Tian Wang, Yiqiao Cai, Hui Tian, Yonghong Chen. [doi]
- Framework for SCADA cyber-attack dataset creationNicholas R. Rodofile, Kenneth Radke, Ernest Foo. [doi]
- A big data analytic framework for investigating streaming educational dataJie Yang, Jun Ma, Sarah K. Howard, Matthew Ciao, Rangan Srikhanta. [doi]
- An analysis of game environments as measured by fractal complexityDaniel Della-Bosca, Dale Patterson, Scott Roberts. [doi]
- An analysis of New South Wales electronic vote countingAndrew Conway, Michelle L. Blom, Lee Naish, Vanessa Teague. [doi]
- Game theory based privacy preserving analysis in correlated data publicationXiaotong Wu, Wan-Chun Dou, Qiang Ni. [doi]
- Formally verified invariants of vote counting schemesFlorrie Verity, Dirk Pattinson. [doi]
- Formulating graph covering problems for adiabatic quantum computersMichael J. Dinneen, Richard Hua. [doi]
- Exploring the feasibility of diegetic in-game store user interfacesHarley Ogier, Jim Buchan. [doi]
- Evaluating sensory feedback for immersion in exergamesLindsay Alexander Shaw, Burkhard Claus Wuensche, Christof Lutteroth, Jude Buckley, Paul M. Corballis. [doi]
- Behavioral types for component-based software systemsJan Olaf Blech. [doi]
- Entropy-based detection of botnet command and controlToby J. Richer. [doi]
- Data-driven patient segmentation using K-means clustering: the case of hip fracture care in IrelandMahmoud Elbattah, Owen Molloy. [doi]
- Deterministic procedural generation of mesh detail through gradient tilingShaun Bangay. [doi]
- Energy-efficient human activity recognition for self-powered wearable devicesSara Khalifa. [doi]
- Evolving concurrent systems: behavioural theory and logicKlaus-Dieter Schewe, Flavio Ferrarotti, Loredana Tec, Qing Wang, Wenya An. [doi]
- Resource and performance prediction at high utilization for N-Tier cloud-based service systemsWenbin Zhang, Yuliang Shi, Yongqing Zheng, Lei Liu, Li-zhen Cui. [doi]
- Evaluating WaveWatch: an ambient display of web trafficBen Shelton, Keith Nesbitt. [doi]
- Gender and the perception of emotions in avatarsJacqueline D. Bailey, Karen L. Blackmore. [doi]
- Evaluating sensor placement and modality for activity recognition in active gamesNatalie Jablonsky, Sophie McKenzie, Shaun Bangay, Tim Wilkin. [doi]
- Authenticated encryption for time-sensitive critical infrastructureDaniel Hunter, Jack Parry, Kenneth Radke, Colin J. Fidge. [doi]
- Crowd-annotation and LoD-based semantic indexing of content in multi-disciplinary web repositories to improve search resultsArshad Khan, Thanassis Tiropanis, David Martin. [doi]
- Security of ePrescriptions: data in transit comparison using existing and mobile device servicesKyaw Kyaw Htat, Patricia A. H. Williams, Vincent McCauley. [doi]
- Content-based emotion classification in online social networks for Chinese MicroblogsXiujuan Xu, Xiaowei Zhao, Fei Xiong, Shimin Shan, Yu Liu. [doi]
- Certificateless public verification scheme with privacy-preserving and message recovery for dynamic groupLongxia Huang, Gongxuan Zhang, Anmin Fu. [doi]
- Generating cubes from smart city web dataMichael Scriney, Martin F. O'Connor, Mark Roantree. [doi]
- Insights into visualizing trajectory recommendation rankingsIman Avazpour, John C. Grundy. [doi]
- The Bel array: asynchronous fine-grained reconfigurable co-processingAndrew Przybylski, Kashfia Haque, Paul Beckett. [doi]
- Dynamic temporal constraints in business processesJohn Wondoh, Georg Grossmann, Markus Stumptner. [doi]
- Improving tuple reconstruction for tiered column stores: a workload-aware ansatz based on table reorderingMartin Boissier, Alexander Spivak, Carsten Meyer. [doi]
- Towards merging collaborating processes for artifact lifecycle synthesisJyothi Kunchala, Jian Yu, Sira Yongchareon, Yanbo Han. [doi]
- Using web services to fuse remote sensing and multimedia data repositoriesAlan Woodley, Timothy Chappell, Shlomo Geva, Richi Nayak. [doi]
- Vulnerabilities associated with wi-fi protected setup in a medical environmentDaniel Costantin, Krishnun Sansurooah, Patricia A. H. Williams. [doi]
- FollowMe if you can: a study of mobile crowd sensing with Pokémon goMingzhong Wang. [doi]