Abstract is missing.
- Distributed Fog Computing Architecture for Real-Time Anomaly Detection in Smart Meter DataRituka Jaiswal, Antorweep Chakravorty, Chunming Rong. 1-8 [doi]
- Classifying Cognitive Load for a Proactive In-car Voice AssistantMaria Schmidt, Ojashree Bhandare, Ajinkya Prabhune, Wolfgang Minker, Steffen Werner. 9-16 [doi]
- An Ensemble of Multiple Boosting Methods Based on Classifier-Specific Soft Voting for Intelligent Vehicle Crash Injury Severity PredictionLei Liu, Xi Zhang, Ye Liu, Wangwang Zhu, Baixuan Zhao. 17-24 [doi]
- The Delta Big Data Architecture for Mobility AnalyticsGeorge A. Vouros, Apostolos Glenis, Christos Doulkeridis. 25-32 [doi]
- Content-Based Analytics: Moving beyond Data SizeDimitrios Tsoumakos, Ioannis Giannakopoulos. 33-40 [doi]
- A Theoretical Study on Advances in Streaming AnalyticsSai Chaitanya Tolem, Chaithanya Reddy Bogadi, Naga Sindhu Korlapati, Sindu Ravichandran, Rajasree Rajendran, Chandrasekar Vuppalapati. 41-45 [doi]
- Find me if You Can: Aligning Users in Different Social NetworksPriyanka Kasbekar, Katerina Potika, Chris Pollett. 46-53 [doi]
- The Tipping Point In Social Networks: Investigating the Mechanism Behind Viral Information SpreadingAbhishek Singh, Niraj Dharamshi, Preethi Thimma Govarthanarajan, Premal Dattatray Samale, Magdalini Eirinaki. 54-61 [doi]
- Overlapping Community Detection via Minimum Spanning Tree ComputationsAris Pagourtzis, Dora Souliou, Petros Potikas, Katerina Potika. 62-65 [doi]
- The Impact of Trust in Consumer Protection on Internet Shopping Behavior: An Empirical Study using a Large Official Dataset from the European UnionRicardo Buettner. 66-69 [doi]
- Distant Supervision for Keyphrase Extraction using Search QueriesOren Sar Shalom, Hezi Resheff, Alex Zhicharevich, Rami Cohen. 70-77 [doi]
- DWreck: A Data Wrecker Framework for Generating Unclean DatasetsAshish Chouhan, Ajinkya Prabhune, Paneesh Prabhuraj, Hitesh Chaudhari. 78-87 [doi]
- ScholarFinder: Knowledge Embedding Based Recommendations using a Deep Generative ModelYuanxun Zhang, Sai Swathi Sivarathri, Prasad Calyam. 88-95 [doi]
- Data Analytics, Automations, and Micro-Moment Based Recommendations for Energy EfficiencyChristos Sardianos, Iraklis Varlamis, Christos Chronis, George Dimitrakopoulos, Yassine Himeur, Abdullah Alsalemi, Faycal Bensaali, Abbes Amira. 96-103 [doi]
- A Predictive Analytics Framework to Anomaly DetectionJunzhang Wang, Rafael Martins de Moraes, Anasse Bari. 104-108 [doi]
- BoboCEP: Distributed Complex Event Processing for Resilient Fault-Tolerance Support in IoTAlexander Power, Gerald Kotonya. 109-112 [doi]
- Big Data Platform for Analysing Crime EvidencesJoão Marcos do Valle, Gabriel Souza, Samuel Fidelis, Adelson Araujo, Nélio Cacho, Iaslan Silva, Jaine Budke, Henrique Sales, Max William Filgueira, Frederico Lopes, Daniel Araújo, Rivaldo Silva Junior. 113-119 [doi]
- Mammography Image BI-RADS Classification Using OHPLallRobert Vanderheyden, Ying Xie. 120-127 [doi]
- Multi-Tissue Cancer Classification of Gene Expressions using Deep LearningTarek Khorshed, Mohamed N. Moustafa 0001, Ahmed A. Rafea. 128-135 [doi]
- Deep Neural Networks for Future Low Carbon Energy Technologies: Potential, Challenges and Economic DevelopmentRameez Asif. 136-141 [doi]
- Real-Time Ship Management through the Lens of Big DataTakis Varelas, Stathis Plitsos. 142-147 [doi]
- Explainability and Adversarial Robustness for RNNsAlexander Hartl, Maximilian Bachl, Joachim Fabini, Tanja Zseby. 148-156 [doi]
- AutoDLCon: An Approach for Controlling the Automated Tuning for Deep Learning NetworksHazem Kotb, Mohamed ElHelw, Sherif Sakr. 157-164 [doi]
- Unsupervised Learning for Network Flow Based Anomaly Detection in the Era of Deep LearningMd. Ahsanul Kabir, Xiao Luo. 165-168 [doi]
- Intracranial Hemorrhage Detection in CT Scans using Deep LearningTomasz Lewick, Meera Kumar, Raymond Hong, Wencen Wu. 169-172 [doi]
- ZenDen - A Personalized House Searching ApplicationKristina Milkovich, Saurabh Shirur, Pratap Kishore Desai, Likhith Manjunath, Wencen Wu. 173-178 [doi]
- Predicting the Performance of Tunnel Boring Machines using Big Operational DataQianli Zhang, Zhenyu Liu 0005, Jianrong Tan. 179-182 [doi]
- Data Structure for Packet De-Duplication in Distributed EnvironmentsIstván Finta, Lóránt Farkas, Sándor Szénási. 183-188 [doi]
- Internet Gaming more than 3 Hours a Day is Indicative and more than 5 Hours is Diagnostic: Proposal of Playing Time Cutoffs for WHO-11 and DSM-5 Internet Gaming Disorder Based on a Large Steam Platform DatasetRicardo Buettner, Martin Blattner, Willi Reinhardt. 189-192 [doi]
- Crack Detection with Multi-task Enhanced Faster R-CNN ModelYingchi Mao, Jing Chen, Ping Ping, Hao Chen. 193-197 [doi]
- A Deep Learning Approach for Street Pothole DetectionPing Ping, Xiaohui Yang, Zeyu Gao. 198-204 [doi]
- A Dam Deformation Prediction Model Based on ARIMA-LSTMGuoyan Xu, Zixu Jing, Yingchi Mao, Xinyue Su. 205-211 [doi]
- A New Interval Preference Model and Corresponding Fuzzy Similarity Measure for Collaborative FilteringYong Wang, Pengyu Wang, Xuhui Zhao, Zhuo Liu, Leo Zhang. 212-215 [doi]
- Parallel Image Encryption Technology Based on Cellular AutomatonPing Ping, Xiaojuan Zhang, Xiaohui Yang, Yingchi Mao, Zeyu Gao. 216-223 [doi]
- Priority Combinatorial Double Auction Based Resource Allocation in the CloudYingchi Mao, Xuesong Xu, Longbao Wang, Ping Ping. 224-228 [doi]
- Crack Detection with Multi-task Enhanced Faster R-CNN ModelYingchi Mao, Ping Ping, Jing Chen, Hao Chen. 229-233 [doi]