Abstract is missing.
- Evaluating Serverless Architecture for Big Data Enterprise ApplicationsAimer Bhat, Heeki Park, Madhumonti Roy. 1-8 [doi]
- 3D object recognition for Virtual Reality based Digital TwinsIlyas Ashkir, Ben Roullier, Frank McQuade, Ashiq Anjum. 9-17 [doi]
- Linking User Accounts across Social Media PlatformsRichard O. Sinnott, Zijian Wang. 18-27 [doi]
- Crowd Counting Using Deep Learning in Edge DevicesZuo Huang, Richard O. Sinnott, Qiuhong Ke. 28-37 [doi]
- PRRL: Path Rotation based Knowledge Graph Representation Learning methodChanghao Bai, Peng Wu. 38-45 [doi]
- Multiscale Clustering Based Diffusion Representation Learning MethodYuanhang Xu, Peng Wu. 46-51 [doi]
- TrustNet: Learning from Trusted Data Against (A)symmetric Label NoiseAmirmasoud Ghiassi, Robert Birke, Lydia Y. Chen. 52-62 [doi]
- Verification Based Scheme to Restrict IoT AttacksBarjinder Kaur, Sajjad Dadkhah, Pulei Xiong, Shahrear Iqbal, Suprio Ray, Ali A. Ghorbani 0001. 63-68 [doi]
- A Proactive Data-Parallel Framework for Machine LearningGuoyi Zhao, Tian Zhou, Lixin Gao. 69-79 [doi]
- Distributed Orchestration of Regression Models Over Administrative BoundariesMenuka Warushavithana, Caleb Carlson, Saptashwa Mitra, Daniel Rammer, Mazdak Arabi, F. Jay Breidt, Sangmi Lee Pallickara, Shrideep Pallickara. 80-90 [doi]
- Benchmarking and Performance Modelling of Dataflow with CyclesSheriffo Ceesay, Yuhui Lin, Adam Barker. 91-100 [doi]
- Individual Feral Cat Identification through Deep LearningZihan Yang, Richard O. Sinnott, Qiuhong Ke, James Bailey 0001. 101-110 [doi]
- Attribute Network Embedding Method based on Joint Clustering of Representation and NetworkWenhan Gao, Peng Wu, Li Pan. 111-119 [doi]
- Comparative Analysis of Pre-Trained Deep Neural Networks for Vision-Based Security Systems on a Novel DatasetKshitij Sinha, Muskan Lalit. 120-127 [doi]
- Real-Time Traffic Classification through Deep LearningMaxim Priymak, Richard O. Sinnott. 128-133 [doi]