Abstract is missing.
- A Mining and Visualizing System for Large-Scale Chinese Technical StandardsChenwei Lu, Deqing Wang, Xin Liu, Keqin Gan. 1-8 [doi]
- Potential Malicious Insiders Detection Based on a Comprehensive Security Psychological ModelGuang Yang, Lijun Cai, Aimin Yu, Jiangang Ma, Dan Meng, Yu Wu. 9-16 [doi]
- Key-Value Pairs Allocation Strategy for Kinetic DrivesHebatalla Eldakiky, David H. C. Du. 17-24 [doi]
- A Generalized Service Infrastructure for Data AnalyticsJan Frenzel, Yedhu Sastri, Christoph Lehmann, Taras Lazariv, René Jäkel, Wolfgang E. Nagel. 25-32 [doi]
- Scheduling Big Data Workflows in the Cloud under Deadline ConstraintsMahdi Ebrahimi, Aravind Mohan, Shiyong Lu. 33-40 [doi]
- Performance Characterization of Spark Workloads on Shared NUMA SystemsShuja-ur-Rehman Baig, Marcelo Amaral, Jorda Polo, David Carrera. 41-48 [doi]
- Performance Comparison of a SDN Network between Cloud-Based and Locally Hosted SDN ControllersKashinath Basu, Muhammad Younas 0001, Andy Wan Wan Tow, Frank Ball. 49-55 [doi]
- Seismic Data Classification Using Machine LearningWenrui Li, Nishita Narvekar, Nakshatra Nakshatra, Nitisha Raut, Birsen Sirkeci, Jerry Gao. 56-63 [doi]
- Twitter Usage Across Industry: A Spatiotemporal AnalysisNeha Gupta, Henry Crosby, David Purser, Stephen A. Jarvis, Weisi Guo. 64-71 [doi]
- Scientific Users' Interest Detection and Collaborators RecommendationGuanyao Du, Yuchun Liu, Jianjun Yu. 72-79 [doi]
- A Framework for Analyzing Big Social Data and Modelling Emotions in Social MediaIsidoros Perikos, Ioannis Hatzilygeroudis. 80-84 [doi]
- From Photos to Travel Itinerary: A Tourism Recommender System for Smart Tourism DestinationMickael Figueredo, José Lucas Ribeiro, Nélio Cacho, Antonio Thome, Andréa Cacho, Frederico Lopes, Valeria Araujo. 85-92 [doi]
- HTARF: A Hybrid Tourist Attraction Recommendation Framework for Trip SchedulingYuanfeng Gong, Yushun Fan, Bing Bai, Junqi Zhang, Zhenfeng Gao, Xing Wu. 93-98 [doi]
- ASSR: An Adjustable Scenic Spot Rating System Based on Travel Note MiningXiaowen Mei, Yushun Fan, Junqi Zhang, Bing Bai, Zhenfeng Gao. 99-104 [doi]
- Visual Analysis of Sensor Logs in Smart Spaces: Activities vs. SituationsFrancesco Leotta, Massimo Mecella, Daniele Sora. 105-114 [doi]
- A Relationship Between Fines and Violent CrimesSamuel Smith, Kedar Gangopadhyay, Simranjyot Singh Gill, Suzanne McIntosh. 115-120 [doi]
- An Evacuation Management Framework Based on Urban Data and Personalized Mobility InformationAlexandros Zamichos, Traianos-Ioannis Theodorou, Anastasios Drosou, Dimitrios Tzovaras. 121-128 [doi]
- Macroscopic Patterns in Sparse Location Data: Identifying Mobility PrototypesBianca Katharina Luders, Peter Ruppel. 129-136 [doi]
- Smart City Architecture for Data Ingestion and Analytics: Processes and SolutionsPierfrancesco Bellini, Paolo Nesi, Michela Paolucci, Imad Zaza. 137-144 [doi]
- Back to the Bazaar: Destructuring the Data MallMassimo Marchiori. 145-152 [doi]
- Smart City Data Storage Optimization in the CloudAseel Alkhelaiwi, Dan Grigoras. 153-160 [doi]
- A Home Rehabilitation Comprehensive Care System for Patients with COPD Based on Comprehensive Care PathwayGuangzhong Yang, Chuifeng Kong, Qinpeng Xu. 161-168 [doi]
- NDN Log Analysis Using Big Data Techniques: NFD Performance AssessmentJunior Dongo, Charif Mahmoudi, Fabrice Mourlin. 169-175 [doi]
- Micro-Blog Friend-Recommendation Based on Topic Analysis and Circle FoundJidi Wang, Shengxiang Gao, LiRen Wang, Zhengtao Yu 0001. 176-180 [doi]
- A Fast and Accurate Retina Image Verification Method Based on Structure SimilarityXiaohui Yuan, Lichuan Gu, Tian Chen, Mohamed Elhoseny, Wencheng Wang. 181-185 [doi]
- The Secure Vehicle-to-Vehicle and Vehicle-to-Group Communication Mechanisms in Smart CityHua-Yi Lin, Meng-Yen Hsieh, Kuan-Ching Li. 186-192 [doi]
- Single Neuron PID Control of Agricultural Robot Steering System Based on Online IdentificationJun Jiao, Jing Chen, Yan Qiao, Wenzhou Wang, Chao Wang, Lichuan Gu. 193-199 [doi]
- From Data Points to Ampacity Forecasting: Gated Recurrent Unit NetworksGabriela Molinar, Nicholas Popovic, Wilhelm Stork. 200-207 [doi]
- Authoritative Prediction of Website Based on Deep LearningHaihua Yang, Yangde Feng. 208-212 [doi]
- A Novel Method of Overrun Risk Measurement and Assessment Using Large Scale QAR DataHao Lv, Jianjun Yu, Tongyu Zhu. 213-220 [doi]
- Reducing Data Stream Complexity by Applying Count-Min Algorithm and Discretization ProcedureSabina Sisovic, Marija Brkic Bakaric, Maja Matetic. 221-228 [doi]
- A Novel Split-Merge-Evolve k Clustering AlgorithmMingXue Wang, Vincent Huang, Anne-Marie Cristina Bosneag. 229-236 [doi]
- Knee/Elbow Estimation Based on First Derivative ThresholdMário Antunes 0001, Diogo Gomes 0001, Rui L. Aguiar. 237-240 [doi]
- Word Network Topic Model Based on Word2VectorMingyi Jiang, Rui Liu, Fei Wang. 241-247 [doi]
- Parallelizing Deep Packet Inspection on GPUMeera Ramesh, Hyeran Jeon. 248-253 [doi]
- A Lightweight and Transparent Compensation Mechanism for Fog-Cloud Storage FrameworkDonghyun Kim, Euiseong Ko, Junggab Son, Yeojin Kim, Jungtaek Seo. 254-259 [doi]
- Efficiently Validating Aggregated IoT Data IntegrityNesrine Kaaniche, Eunjin Jung, Ashish Gehani. 260-265 [doi]
- Securing GPR Data for Use in Smart CitiesHector Suarez, Li Yang, Dalei Wu. 266-269 [doi]
- Analyzing Opinion Spammers' Network Behavior in Online Review SystemsEuijin Choo. 270-275 [doi]
- Log-Based Cloud Monitoring System for OpenStackVaibhav Agrawal, Devanjal Kotia, Kamelia Moshirian, Mihui Kim. 276-281 [doi]
- Classification of Attack Types for Intrusion Detection Systems Using a Machine Learning AlgorithmKinam Park, Youngrok Song, Yun-Gyung Cheong. 282-286 [doi]
- Applying Artificial Immune System for Intrusion DetectionDaniel Hooks, Xiaohong Yuan, Kaushik Roy, Albert C. Esterline, Joaquin Hernandez. 287-292 [doi]
- Picture PassDoodle: Usability StudyDavid Schwab, Lama ALharbi, Oliver Nichols, Li Yang. 293-298 [doi]