Abstract is missing.
- Semantic Neuron Networks Based Associative Memory ModelPeter Kimani Mungai, Runhe Huang, Zhong Chen, Xiaokang Zhou. 1-8 [doi]
- An Integrative and Precise Approach in Personality Computing Based on Ontic Personae ModelingAo Guo, Jianhua Ma. 9-15 [doi]
- Deep Convolution Neural Network Discriminator for Distinguishing Seborrheic Keratosis and Flat WartsKehua Guo, Ting Li, Runhe Huang, Jian Kang. 16-21 [doi]
- Identifying the Landscape and Trends in Cyberspace Research: From 1989 to 2016Zili Li 0005, Li Zeng, Zhigang Luo. 22-29 [doi]
- Pairwise Preference Over Mixed-Type Item-Sets Based Bayesian Personalized Ranking for Collaborative FilteringShan Gao, Guibing Guo, Yusong Lin, Xingjin Zhang, Yongpeng Liu, Zongmin Wang. 30-37 [doi]
- Design Considerations for Cyber Security Testbeds: A Case Study on a Cyber Security Testbed for EducationMaximilian Frank, Maria Leitner, Timea Pahi. 38-46 [doi]
- Detecting Android Malware Based on Extreme Learning MachineYuxia Sun, Yunlong Xie, Zhi Qiu, Yuchang Pan, Jian Weng, Song Guo. 47-53 [doi]
- On Extraction of Rules from Deep Learner: The Deeper, the Better?Tomoya Furukawa, Qianfgu Zhao. 54-60 [doi]
- Co_Hijacking Monitor: Collaborative Detecting and Locating Mechanism for HTTP Spectral HijackingPan Wang, Xuejiao Chen. 61-67 [doi]
- Learning to Diversify Recommendations Based on Matrix FactorizationShuang Li, Yuezhi Zhou, Di Zhang, Yaoxue Zhang, Xiang Lan. 68-74 [doi]
- Application of Adaptive Genetic Algorithm for Multimodal Transportation Logistics Distribution Routing ProblemZhe Sun, Zhixin Sun, Xuejian Zhao, Long Jin, Wei Zhang. 75-80 [doi]
- A Survey of Semantics-Aware Performance Optimization for Data-Intensive ComputingBingBing Rao, Liqang Wang. 81-88 [doi]
- Identifying Image Tags from Instagram Hashtags Using the HITS AlgorithmStamatios Giannoulakis, Nicolas Tsapatsoulis, Klimis S. Ntalianis. 89-94 [doi]
- Caching Scheme with Edge Nodes for Mobile Cyber Physical SystemsQichao Xu, Zhou Su, Yilong Hui, Qing Yang. 95-100 [doi]
- A Smart Visual Analysis Solution for MOOC DataXiu Li, Chang Men, Fan Zhang, Zhihui Du. 101-106 [doi]
- A Comparison of Hash-Based Methods for Trajectory ClusteringMaede Rayatidamavandi, Yu Zhuang, Mahshid Rahnamay-Naeini. 107-112 [doi]
- Analysis of the Impact of Driver Behavior Models on Performance of Forward Collision Warning SystemsAhmad Jamialahmadi, Yaser P. Fallah. 113-118 [doi]
- Feature-Based Temporal Statistical Modeling of Data Streams from Multiple Wearable DevicesTongtong Xu, Ao Guo, Jianhua Ma, Kevin I-Kai Wang. 119-126 [doi]
- A Study on Communication Network Reliability for Advanced Metering Infrastructure in Smart GridShengjie Xu, Yi Qian, Rose Qingyang Hu. 127-132 [doi]
- Interference Management for Physical Layer Security in Heterogeneous NetworksDongfeng Fang, Yi Qian, Rose Qingyang Hu. 133-138 [doi]
- Incentivization for Health CrowdsensingLuis G. Jaimes, Robert Steele. 139-146 [doi]
- A Real Example of Jong Nang and Tomb Gate of Cyber Biology Jeju Island: Its Fundamental Principle of DNA CodeMoon Ho Lee. 147-155 [doi]
- A Learning-Based Framework for Two-Dimensional Vehicle Maneuver Prediction over V2V NetworksHossein Nourkhiz Mahjoub, Amin Tahmasbi-Sarvestani, Hadi Kazemi, Yaser P. Fallah. 156-163 [doi]
- MMHG: Multi-modal Hypergraph Learning for Overall Survival After D2 Gastrectomy for Gastric CancerFei Lu 0013, Zhikui Chen, Xu Yuan, Qiu Li, Zedong Du, Li Luo 0001, Fengyi Zhang. 164-169 [doi]
- Respiratory Sounds Feature Learning with Deep Convolutional Neural NetworksYongpeng Liu, Yusong Lin, Shan Gao, Hongpo Zhang, Zongmin Wang, Yang Gao, Guanling Chen. 170-177 [doi]
- A Bus Arrival Time Prediction Method Based on GPS Position and Real-Time Traffic FlowJianmei Lei, DongMei Chen, Fengxi Li, Qingwen Han, Siru Chen, Lingqiu Zeng, Min Chen. 178-184 [doi]
- Locality-Driven Dynamic Flash Cache AllocationLiang Xu, Qianbin Xia, Weijun Xiao. 185-193 [doi]
- A Memory Capacity-Aware Algorithm for Fast Clustering of Disk-Resident Big DatasetsAhmad O. Aseeri, Yu Zhuang, Mohammed Saeed Alkatheiri. 194-201 [doi]
- Data-Based Analysis of Sampling and Estimation Methods for Vehicle Tracking Over Wireless NetworksMasoumeh Kalantari Khandani, Wasfy Mikhael, Yaser P. Fallah, Katerina Goseva-Popstojanova. 202-207 [doi]
- Exploiting Mobile Sensor Data for Media Caching in Mobile Edge NetworksZi Wang, Zifei Zhao, Zhiwei Zhao, Geyong Min, Xinyuan Huang, Hancong Duan, Jia Hu. 208-213 [doi]
- An Ontology-Based Framework for Organization Information ExtractionTengku Adil Tengku Izhar, Bernady O. Apduhan. 214-219 [doi]
- Exploring the Production of "The Belt and Road"-Driven Animations with Crowdsourcing ModelTing Wu, Fei Hao, Mijin Kim. 220-225 [doi]
- Re-thinking Online Offenders' SKRAM: Individual Traits and Situational Motivations as Additional Risk Factors for Predicting Cyber AttacksDavid Maimon, Olga Babko-Malaya, Rebecca Cathey, Steve Hinton. 232-238 [doi]
- Holographic Real Time 3D Heart Visualization from Coronary Tomography for Multi-place Medical DiagnosticsArthur A. B. Bucioli, Gabriel F. Cyrino, Gerson Flavio Mendes de Lima, Isabela Cristina dos Santos Peres, Alexandre Cardoso, Edgard Afonso Lamounier, Milton Miranda Neto, Roberto V. Botelho. 239-244 [doi]
- A Practical Cyber-Physical System for the Self-Capture of the Effect of Exercise on Blood Glucose LevelsAndre Goode, Robert J. Steele. 245-250 [doi]
- Authentication and Access Control for an IoT Green Roof Monitoring SystemFeng Ye, Yujun Sun, Andrew Rettig. 251-256 [doi]
- Use of Switching Controllers for Mitigation of Active Identification Attacks in Networked Control SystemsAlan Oliveira de Sá, Luiz Fernando Rust da Costa Carmo, Raphael Carlos Santos Machado. 257-262 [doi]
- Anomaly Detection for Streaming Data from Wearable Sensor NetworkPeipei Wang, Yutong Han, Jing Qin, Bin Wang, Xiaochun Yang 0001. 263-268 [doi]
- Data Center, a Cyber-Physical System: Improving Energy Efficiency Through the Power ManagementMarta Chinnici, Davide De Chiara, Andrea Quintiliani. 269-272 [doi]
- Development of a Platform-Independent Software Tool for Management of X.509 Certificates from Diverse Certificate StoresThomas Friedl, Henning Schneider, Miloslava Plachkinova. 273-275 [doi]
- Plausible Deniability for ISP Log and Browser Suggestion Obfuscation with a Phrase Extractor on Potentially Open TextRonald Loui. 276-279 [doi]
- Information Warfare Amplified by Cyberwarfare and Hacking the National Knowledge InfrastructureRonald Loui, Will Hope. 280-283 [doi]
- Enabling High-Resolution Video Support for the Next-Generation Internet-Connected DisplayYu-Pei Liang, Shuo-Han Chen, Yi-Han Lien, Tseng-Yi Chen, Heng-Yin Chen, Wei Kuan Shih. 284-286 [doi]
- Center of Mass Estimation Using Motion Capture SystemGabriel Ploof, Bassam Alqahtani, Farwan Alghamdi, Garret Flynn, Cai Xia Yang. 287-292 [doi]
- Buddy: A Virtual Life Coaching System for Children and Adolescents with High Functioning AutismXiongyi Liu, Wenbing Zhao 0001. 293-298 [doi]
- Towards a Technology-Enabled Environment of Care for Nursing HomesQing Wu, Wenbing Zhao 0001. 299-302 [doi]
- A Survey on Smart Wearables in the Application of FitnessHao Qiu, Xianping Wang, Fei Xie. 303-307 [doi]
- Towards User-Centered Assistance in Smart Environments Based on Device MetadataMarius Rashid Khan, Sabine Sachweh, Albert Zündorf. 308-311 [doi]
- AED: Adaptive Energy-Efficient Data Transmission Scheme for Heart Disease DetectionAlbert Budi Christian, Lokesh Sharma, Shih-Lin Wu. 312-317 [doi]
- Improving Wake-Up-Word and General Speech Recognition SystemsVeton Kepuska, Gamal Bohouta. 318-321 [doi]
- QoE Based Optimization for Cyber Vehicular NetworksHui Hui, Rui Xing. 322-325 [doi]
- Security Analysis of Simple Network Management Protocol Based IEEE P21451 Internet of ThingsXinzheng Feng, Jun Wu, Kuan Wang, Jianhua Li, Meng Wang. 326-330 [doi]
- Performance Comparison of Base Station On/Off and Base Station Cooperative Transmission in Ultra-Dense NetworkJunjie Pei, Zhuoxuan Ju, Hengdong Ye, Bibo Wu, Shu Fu. 331-335 [doi]
- Joint Base Station Cooperative Transmission and ON-OFF Mechanism in Internet of Things NetworksHengdong Ye, Zhuoxuan Ju, Bibo Wu, Junjie Pei, Shu Fu. 336-339 [doi]
- An Overview on Key Technologies of Secure and Efficient Data Transmission for Energy InternetSong Deng, Kun Wang 0005. 340-345 [doi]
- Flexible Analysis of Cross-Organizational Process Modeling Based on π CalculusNinglin Xu, Jiulei Jiang, Xiaofeng Wang. 346-350 [doi]
- Formalization of Business Process with Flexibility Based on Service InteractionYaya Liu, Jiulei Jiang, Lingyu Xu, Lishuang Zhao. 351-355 [doi]
- CF-Cluster: Clustering Bike Station Based on Common FlowsLiangxu Liu, Dayao Gong, Bo Guan, Junyan Xiao. 356-361 [doi]
- A Novel Cluster-Based Ultra-Dense Network Technique for 5G and its Security IssuesYuping Zhao, Geng Li, Wanyue Qu. 362-367 [doi]
- A Forensic Investigation of Robot Operating SystemIroshan Abeykoon, Xiaohua Feng, Renxi Qiu. 368-372 [doi]
- Cyberstalking IssuesXiaohua Feng, Audrey Asante, Emma Short, Iroshan Abeykoon. 373-376 [doi]
- Fault-Tolerant Network-Server Architecture for Time-Critical Web ApplicationsKutalmis Akpinar, Fereshteh Jafariakinabad, Kien A. Hua, Omar Nakhila, Jun Ye, Cliff C. Zou. 377-384 [doi]
- A 3D-Collaborative Wireless Network: Towards Resilient Communication for Rescuing Flood VictimsMd. Arafatur Rahman, Md. Munirul Hasan, A. Taufiq Asyhari, Md. Zakirul Alam Bhuiyan. 385-390 [doi]
- Validating the Correctness of Outsourced Computational Tasks Using Pseudorandom Number GeneratorsYaohang Li, Ravi Mukkamala, Michael Mascagni. 391-398 [doi]
- On Basis Variables for Efficient Error DetectionJake Fairbrother, Matthew Leeke. 399-406 [doi]
- Specifying Functional Requirements and QoS Parameters for IoT SystemsBruno Costa, Paulo F. Pires, Flávia Coimbra Delicato. 407-414 [doi]
- Adaptive Zone Replication for Structured Peer-to-Peer SystemsShigeki Yoneda, Naohiro Hayashibara. 415-422 [doi]
- Deadlock Detection in the Scheduling of Last-Mile Transportation Using Model CheckingKoji Hasebe, Mitsuaki Tsuji, Kazuhiko Kato. 423-430 [doi]
- A Comparative Study of Algorithm for Computing Strongly Connected ComponentsD. Frank Hsu, Xiaojie Lan, Gabriel Miller, David Baird. 431-437 [doi]
- SAFARI-Taxi: Secure, Autonomic, FAult-Resilient, and Intelligent Taxi Hailing SystemMohammad A. Hoque, Phil Pfeiffer, Sanford Gabrielle, Edward Hall, Elizabeth Turbyfill. 438-445 [doi]
- Preserving Data Integrity in IoT Networks Under Opportunistic Data ManipulationShameek Bhattacharjee, Mehrdad Salimitari, Mainak Chatterjee, Kevin A. Kwiat, Charles A. Kamhoua. 446-453 [doi]
- Securing Real-Time Cyber-Physical Systems Using WCET-Aware Artificial DiversityJoachim Fellmuth, Paula Herber, Tobias F. Pfeffer, Sabine Glesner. 454-461 [doi]
- Colluded Applications Vulnerabilities in Android DevicesIgor Khokhlov, Leon Reznik. 462-469 [doi]
- A Hierarchic Secure Cloud Storage Scheme Based on Fog ComputingJiyuan Zhou, Tian Wang, Md. Zakirul Alam Bhuiyan, Anfeng Liu. 470-477 [doi]
- On Sustaining Prolonged Interaction with AttackersRoberto M. Vergaray, Julian L. Rrushi. 478-485 [doi]
- Defending Electrical Substations Against 0-Day Malware Through Decoy I/O in Protective RelaysJulian L. Rrushi. 486-493 [doi]
- Discovering Hidden Relations Between Tor Marketplaces UsersGianluigi Me, Liberato Pesticcio, Paolo Spagnoletti. 494-501 [doi]
- Wireless Spoofing-Attack Prevention Using Radio-Propagation CharacteristicsMihiro Sonoyama, Takatsugu Ono, Osamu Muta, Haruichi Kanaya, Koji Inoue. 502-510 [doi]
- Spatial-Temporal Anomaly Detection Using Security Visual Analytics via Entropy Graph and Eigen MatrixMatthew Sinda, Qi Liao. 511-518 [doi]
- Towards a Storage-Efficient and Categorized Secure Log Structure Scheme for Embedded SystemsSergio de Medeiros Camara, Luiz Fernando Rust da Costa Carmo, Luci Pirmez. 519-526 [doi]
- Approximate Power Grid Protection Against False Data Injection AttacksKelvin Ly, Kevin A. Kwiat, Charles A. Kamhoua, Laurent Njilla, Yier Jin. 527-533 [doi]
- Software Security Testing via Misuse Case ModelingSamer Khamaiseh, Dianxiang Xu. 534-541 [doi]
- Target Discovery Differentials for 0-Knowledge Detection of ICS MalwareJames Halvorsen, Julian L. Rrushi. 542-549 [doi]
- Systematic Test Generation for Secure Hardware Supported VirtualizationSenwen Kan, Jennifer Dworak. 550-556 [doi]
- PhishBox: An Approach for Phishing Validation and DetectionJhen-Hao Li, Sheng-De Wang. 557-564 [doi]
- Bot Classification for Real-Life Highly Class-Imbalanced DatasetSarah Harun, Tanveer Hossain Bhuiyan, Song Zhang, Hugh R. Medal, Linkan Bian. 565-572 [doi]
- Revisiting Shamir's No-Key Protocol: Lightweight Key TransportAdnan Kiliç, Ertan Onur, Cansu Betin Onur. 573-580 [doi]
- Energy-Efficient Autonomic Offloading in Mobile Edge ComputingChangqing Luo, Sergio Salinas, Ming Li, Pan Li. 581-588 [doi]
- Asynchronous Agent Teams for Collaborative Tasks Based on Bottom-Up Alliance Formation and Adaptive Behavioral StrategiesMasashi Hayano, Naoki Iijima, Toshiharu Sugawara. 589-596 [doi]
- Towards an Attack Signature Generation Framework for Intrusion Detection SystemsHossain Shahriar, William Bond. 597-603 [doi]
- Graphical Animations of State MachinesTam Thi Thanh Nguyen, Kazuhiro Ogata 0001. 604-611 [doi]
- Classification of Hierarchical Fault-Tolerant Design PatternsKai Ding, Andrey Morozov, Klaus Janschek. 612-619 [doi]
- Holographic Memory Calculation FPGA Accelerator for Optically Reconfigurable Gate ArraysTakumi Fujimori, Minoru Watanabe. 620-625 [doi]
- Temporal Variation of Trust in Dependable SystemsSudip Chakraborty. 626-631 [doi]
- Active Malware Countermeasure Approach for Mission Critical SystemsZachary Thomas, Sherif Abdelwahed. 632-638 [doi]
- Combating Data Leakage Trojans in Sequential Circuits Through Randomized EncodingTravis E. Schulze, Daryl Beetner, Yiyu Shi, Kevin A. Kwiat, Charles A. Kamhoua, Laurent Njilla. 639-644 [doi]
- A Simulation Study to Detect Attacks on Internet of ThingsDavid Eastman, Sathish A. P. Kumar. 645-650 [doi]
- Web-Based Malware Mitigation with a Virtualized Web-Browser: A Comparison StudyNick Neely, Zachary Waldman, Mike Burns, Haklin Kimm. 651-656 [doi]
- Modular Norm Models: A Lightweight Approach for Modeling and Reasoning about Legal ComplianceSayonnha Mandal, Robin A. Gandhi, Harvey P. Siy. 657-662 [doi]
- A Framework for Zero Day Exploit Detection and ContainmentRichard Ciancioso, Danvers Budhwa, Thaier Hayajneh. 663-668 [doi]
- Electromagnetic Warfare and the Cybersecurity ThreatDamianos Pinou, Rien Chy, Thaier Hayajneh. 669-674 [doi]
- Secrecy Capacity and Energy Efficiency Evaluation of RLS-Kaiser Based Smart Antenna SystemHailu Belay Kassa, Kevin Kornegay, Yacob Astatke, Marcial Tienteu. 675-680 [doi]
- Detection and Avoidance Technique of Anomalous Congestion at the Network GatewaysAbdulghani Ali Ahmed. 681-686 [doi]
- Hardening the Client-Side: A Guide to Enterprise-Level Hardening of Web BrowsersAnanth A. Jillepalli, Daniel Conte de Leon, Stuart Steiner, Frederick T. Sheldon, Michael A. Haney. 687-692 [doi]
- A Probabilistic Study on the Relationship of Deceptions and Attacker SkillsSharif Hassan, Ratan Guha. 693-698 [doi]
- Towards a Real Time Framework for Monitoring IoT Devices for Attack Detection: Vision PaperRafael I. Bonilla, Cristina L. Abad. 699-703 [doi]
- A Metric for Measuring IoT Devices Security LevelsRafael I. Bonilla, Juan J. Crow, Luigi S. Basantes, Luis G. Cruz. 704-709 [doi]
- Electronic Lecture Time-Table Scheduler Using Genetic AlgorithmJumoke Soyemi, John Akinode, Samson Oloruntoba. 710-715 [doi]
- Structural Feature Engineering Approach for Detecting Polymorphic MalwareEmmanuel Masabo, Kyanda Swaib Kaawaase, Julianne Sansa-Otim, Damien Hanyurwimfura. 716-721 [doi]
- A Secure and Dependable Connected Smart Home System for ElderlyAbdulhameed Alelaiwi, Mohammad Mehedi Hassan, Md. Zakirul Alam Bhuiyan. 722-727 [doi]
- Real-Time Incident Clearance Time Prediction Using Traffic Data from Internet of Mobility SensorsHamzah Al Najada, Imad Mahgoub. 728-735 [doi]
- VANET Adaptive Beaconing Based on Fuzzy LogicMohammed Alhameed, Imad Mahgoub. 736-743 [doi]
- Investigating the Impact of Adaptive Beaconing on GEOADV PerformanceJoanne Skiles, Imad Mahgoub. 744-751 [doi]
- Deep Spectral-Spatial Feature Extraction Based on DCGAN for Hyperspectral Image RetrievalLu Chen, Jing Zhang, Xi Liang, Jiafeng Li, Li Zhuo 0001. 752-759 [doi]
- A Weighted MHOF and Sparse Representation Based Crowd Anomaly Detection AlgorithmYujie Chen, Suyu Wang. 760-765 [doi]
- Robust Radial Distortion Correction from a Single ImageLe Li, Weibin Liu, Weiwei Xing. 766-772 [doi]
- Image Enhancement Based on Spatial Multi-scale Homomorphic Filtering and Local Entropy Guided Image FilteringSisi Han, Weibin Liu, Weiwei Xing. 773-779 [doi]
- A Novel Method for Human Motion Capture Data SegmentationZiyi Wu, Weibin Liu, Weiwei Xing. 780-787 [doi]
- EVINCED: Integrity Verification Scheme for Embedded Systems Based on Time and Clock CyclesCristiano Gurgel de Castro, Sergio de Medeiros Camara, Luiz Fernando Rust da Costa Carmo, Davidson Rodrigo Boccardo. 788-795 [doi]
- Green Security Plugin for Pervasive Computing Using the HADAS ToolkitDaniel-Jesus Munoz, José A. Montenegro, Mónica Pinto, Lidia Fuentes. 796-803 [doi]
- A Multisensor Data Fusion Technique for Multiapplication Wireless Sensor Networks Based on Overlapping IntervalsClaudio Miceli de Farias, Luci Pirmez. 804-811 [doi]
- Optimizing MapReduce Partitioner Using Naive Bayes ClassifierLei Chen, Wei Lu, Liqiang Wang, Ergude Bao, Weiwei Xing, Yong Yang, Victor Yuan. 812-819 [doi]
- Intelligent Subevent Detection Based on Social Network DataDiogo Nolasco Ferreira Sousa, Jonice Oliveira Sampaio. 820-827 [doi]
- Self-Adaptive Energy-Efficent Applications: The HADAS Developing ApproachJose Miguel Horcas, Mónica Pinto, Lidia Fuentes, Nadia Gámez. 828-835 [doi]
- A Dimension Reduction Model and Classifier for Anomaly-Based Intrusion Detection in Internet of ThingsShengchu Zhao, Wei Li, Tanveer A. Zia, Albert Y. Zomaya. 836-843 [doi]
- A Multiscale Approach for a Distributed Event-Based Internet of ThingsDenis Conan, Léon Lim, Chantal Taconet, Sophie Chabridon, Claire Lecocq. 844-852 [doi]
- Quantifying Cloud Elasticity with Container-Based AutoscalingXuxin Tang, Fan Zhang 0003, Xiu Li, Samee U. Khan, Zhijiang Li. 853-860 [doi]
- An Empirical Study of Power Consumption of Web-Based Communications in Mobile PhonesInmaculada Ayala, Mercedes Amor, Lidia Fuentes, Daniel Munoz. 861-866 [doi]
- Online Deceptive Product Review Detection Leveraging Word EmbeddingXiu Li, Lulu Xie, Fan Zhang, Huimin Wang. 867-870 [doi]
- On Feature Selection for the Prediction of Phishing WebsitesWesam Fadheel, Mohamed Abusharkh, Ikhlas Abdel-Qader. 871-876 [doi]
- Ring: Should I Interrupt or Not? - A Mobile Interruption Management SystemMohammad Kayes Kaykobad, Praveen Madiraju, Sheikh Iqbal Ahamed. 877-882 [doi]
- A Deep-Learning-Based Floor Detection System for the Visually ImpairedYueng DeLaHoz, Miguel A. Labrador. 883-888 [doi]
- Curation of Physical Objects in Botany: Architecture and Development of a Linked Open Data-Based ApplicationMarcela Mayumi Mauricio Yagui, LuÃs Fernando Monsores Passos Maia, Jonice Oliveira, Adriana S. Vivacqua. 889-892 [doi]
- A Deep Convolutional Network Demodulator for Mixed Signals with Different Modulation TypesXuming Lin, Ruifang Liu, Wenmei Hu, Yameng Li, Xin Zhou, Xiao-Xin He. 893-896 [doi]
- Threat Evaluation of Aerial Targets in an Air Defense System Using Bayesian NetworksJosé Fernando Basso Brancalion, Karl Heinz Kienitz. 897-900 [doi]
- DeepCancer: Detecting Cancer via Deep Generative Learning Through Gene ExpressionsRajendra Rana Bhat, Vivek Viswanath, Xiaolin Li. 901-908 [doi]
- Using Deep Learning to Predict and Optimize Hadoop Data Analytic Service in a Cloud PlatformChen-Chun Chen, Yu-Tung Hasio, Chan-Yi Lin, Shihyu Lu, Hsin Tse Lu, Jerry Chou. 909-916 [doi]
- Understanding Travel Behavior of Private Cars via Trajectory Big Data Analysis in Urban EnvironmentsDong Wang, Qian Liu, Zhu Xiao, Jie Chen, Yourong Huang, Weiwei Chen. 917-924 [doi]
- Team Recognition in Big Scholarly Data: Exploring Collaboration IntensityShuo Yu, Feng Xia, Kaiyuan Zhang, Zhaolong Ning, Jiaofei Zhong, Chengfei Liu. 925-932 [doi]
- Perldoop2: A Big Data-Oriented Source-to-Source Perl-Java CompilerCesar Pineiro, José Manuel AbuÃn, Juan Carlos Pichel. 933-940 [doi]
- Convolutional Filtering for Accurate Signal Timing from Noisy Streaming DataJonathan Wang, Kesheng Wu, Alex Sim, Seongwook Hwangbo. 941-948 [doi]
- General Time-Dependent Sequenced Route Queries in Road NetworksMohammad H. Ahmadi, Vahid Haghighatdoost. 949-956 [doi]
- Analysis and Modeling of Resource Management Overhead in Hadoop YARN ClustersJanardhanan P. S. Nair, Philip Samuel. 957-964 [doi]
- Availability Modeling and Assurance of Map-Reduce ComputingZuqiang Ke, Nohpill Park. 965-970 [doi]
- A Data-Driven Resource Allocation Method for Personalized Container Based Desktop as a ServiceHyeon-Ji Baek, Eui-nam Huh. 971-978 [doi]
- Repair Duality with Locally Repairable and Locally Regenerating CodesDanilo Gligoroski, Katina Kralevska, Rune Erlend Jensen, Per Simonsen. 979-984 [doi]
- Efficient Parallel K-Means on MapReduce Using Triangle InequalitySami Al Ghamdi, Giuseppe Di Fatta. 985-992 [doi]
- Facilitating Reproducible Computing via Scientific Workflows for Modelling and Data IntegrationYuan Cao, Yao Liang. 993-1000 [doi]
- A High-Dimensional Outlier Detection Algorithm Base on Relevant SubspaceZhipeng Gao, Yang Zhao, Kun Niu, Yidan Fan. 1001-1008 [doi]
- Discriminatively Local Hashing for Preserving Semantic ManifoldXiaopeng Zhang, Hui Zhang, Rui Liu, Yong Chen, Zhiwen Ye. 1009-1016 [doi]
- Integrated Discovery of Location Prediction Rules in Mobile EnvironmentElahe Naserian, Xinheng Wang, Xiaolong Xu, Yuning Dong, Nektarios Georgalas, Kaizhu Huang. 1017-1024 [doi]
- Inferring Workflows with Job Dependencies from Distributed Processing Systems LogsGladys E. Carrillo, Cristina L. Abad. 1025-1030 [doi]
- Forecasting Stock Prices Using Social Media AnalysisScott Coyne, Praveen Madiraju, Joseph Coelho. 1031-1038 [doi]
- Automatically Finding Matches Between Social Media Posts and News ArticlesFilipe Fernandes Miranda, Alvaro Pedro de Barros Borges Reis Figueira. 1039-1046 [doi]
- Real-Time Event Search Corresponding to Place and Time Using Social StreamRuriko Kudo, Miki Enoki, Akihiro Nakao, Shu Yamamoto, Saneyasu Yamaguchi, Masato Oguchi. 1047-1053 [doi]
- Contextual Polarity and Influence Mining in Online Social NetworksHassan Alzahrani, Philippe Duverger, Nam P. Nguyen. 1054-1061 [doi]
- Analysis of Projected 2024 Employment Based on Current Computer Science Graduates in U.SDejang Liu. 1062-1067 [doi]
- On the Measurement and Analysis of Safety in a Large CityRami Ibrahim, M. Omair Shafiq. 1068-1075 [doi]
- Optimizing NBA Player Selection Strategies Based on Salary and Statistics AnalysisRamya Nagarajan, Lin Li. 1076-1083 [doi]
- Online Review Analysis by Visual Feature SelectionKeerthika Koka, Shiaofen Fang. 1084-1091 [doi]
- Exploring Dynamic Granules for Time-Varying Big DataZhengxin Chen. 1092-1097 [doi]
- Scalable Mining and Analysis of Protein-Protein Interaction NetworksShaikh Arifuzzaman, Bikesh Pandey. 1098-1105 [doi]
- A Time-Delayed Information-Theoretic Approach to the Reverse Engineering of Gene Regulatory Networks Using Apache SparkYasser Abduallah, Jason T. L. Wang. 1106-1113 [doi]
- A Dynamic Power Management Schema for Multi-tier Data CentersAryan Azimzadeh, Nasseh Tabrizi. 1114-1118 [doi]
- An Adaptive Initial Cluster Centers Selection Algorithm for High-Dimensional Partition ClusteringZhipeng Gao, Yidan Fan, Kun Niu, Ting Wang. 1119-1126 [doi]
- Super-Scalable Computation Framework for Automated Terrain IdentificationYupeng Yan, Manu Sethi, Anand Rangarajan 0001, Sanjay Ranka. 1127-1134 [doi]
- CENTAURUS: A Cloud Service for K-Means ClusteringNevena Golubovic, Angad Gill, Chandra Krintz, Rich Wolski. 1135-1142 [doi]
- Incremental Hybrid SDN Deployment for Enterprise NetworksMing-Hung Chen, Wei-min Wang, I-Hsin Chung, Cheng-Fu Chou. 1143-1149 [doi]
- DR-Update: A Dual-Level Relay Scheme in Erasure-Coded Storage Systems for Balanced UpdatesMingzhu Deng, Songping Yu, Nong Xiao, Fang Liu, Zhiguang Chen. 1150-1159 [doi]
- PTree: Direct Lookup with Page Table Tree for NVM File SystemsJianqiang Zeng, Nong Xiao, Fang Liu, Lingyu Zhu, Yang Li, Yuxuan Xing, Shuo Li. 1160-1167 [doi]
- Existing and Relevant Methodologies for Energy Efficient Cloud Data CentersSanjay Patel, Ramji M. Makwana. 1168-1173 [doi]
- A Scalable Fair Heterogeneous Resource Allocation Scheme in Distributed SystemsXiaoying Zheng, Ye Xia 0001. 1174-1179 [doi]
- Promoting MLC STT-RAM for the Future Persistent Memory SystemXunchao Chen, Jun Wang, Jian Zhou. 1180-1185 [doi]
- File System for Non-volatile Main Memories: Performance Testing and AnalysisYang Li, Fang Liu, Nong Xiao, Songping Yu, Shuo Li, Yuxuan Xing. 1186-1193 [doi]
- Predicting Hospital Length of Stay Using Neural Networks on MIMIC III DataThanos Gentimis, Ala' J. Alnaser, Alex Durante, Kyle Cook, Robert Steele. 1194-1201 [doi]
- Distributed Algorithm for Geographic Opportunistic Routing in VANETs at Road IntersectionDebasis Das. 1202-1209 [doi]
- Mixture Self-Paced Learning for Multi-view K-Means ClusteringHong Yu, Yahong Lian, Xiujuan Xu, Xiaowei Zhao. 1210-1215 [doi]
- Combining Weather Condition Data to Predict Traffic Flow: A GRU Based Deep Learning ApproachDa Zhang, Mansur R. Kabuka. 1216-1219 [doi]
- An Online-Offline Combined Big Data Mining PlatformWeishan Zhang, Hao Lv, Liang Xu, Yan Liu, Xin Liu, Qinghua Lu, Zhongwei Li, Jiehan Zhou. 1220-1225 [doi]
- Attribute-Based Partner Updating Boosts Cooperation in Social P2P SystemsLinlin Tian, MingChu Li, Hong Yu, Xing Jin. 1226-1231 [doi]
- A Modified Node2vec Method for Disappearing Link PredictionLu Li, Wei Wang, Shuo Yu, Liangtian Wan, Zhenzhen Xu, Xiangjie Kong. 1232-1235 [doi]
- Review on HDD-Based, SSD-Based and Hybrid Key-Value StoresJuan Li, Nong Xiao, Yutong Lu, Zhiguang Chen, Fang Liu, Yuxuan Xing, Shuo Li. 1236-1241 [doi]
- Application of Logistic Regression in Assessing Stock PerformancesUsha Ananthakumar, Ratul Sarkar. 1242-1247 [doi]
- DeepSim: Cluster Level Behavioral Simulation Model for Deep LearningYuankun Shi, Kevin Long, Kaushik Balasubramanian, Bianny Bian, Adam Procter, Ramesh Illikkal. 1248-1253 [doi]
- Intelligent Perioperative System: Towards Real-Time Big Data Analytics in Surgery Risk AssessmentZheng Feng, Rajendra Rana Bhat, Xiaoyong Yuan, Daniel Freeman, Tezcan Baslanti, Azra Bihorac, Xiaolin Li. 1254-1259 [doi]
- Seed Node Distribution for Influence Maximization in Multiple Online Social NetworksSoham Das. 1260-1264 [doi]
- Effective Mobile Notification Recommendation Using Social Nature of LocationsPrasanta Saikia, James She. 1265-1270 [doi]
- Building a Semi-Supervised Dataset to Train Journalistic Relevance Detection ModelsNuno Ricardo Pinheiro da Silva Guimaraes, Alvaro Pedro de Barros Borges Reis Figueira. 1271-1277 [doi]
- Developing Adaptive Islamic Law Business Processes Models for Islamic Finance and Banking by Text Mining the Holy Qur'an and HadithMunir Majdalawieh, Farhi Marir, Issam Tiemsani. 1278-1283 [doi]
- A Big Aurora Data Management Framework Toward Aurora ClassificationYuhang Wang, Hui Zhao, Xian Zhang, Jimin Liang. 1284-1287 [doi]
- Towards the Design of a System and a Workflow Model for Medical Big Data Processing in the Hybrid CloudYong-Hyun Kim, Eui-nam Huh. 1288-1291 [doi]
- Mining the Statistical Information of Confidential Data from Noise-Multiplied DataYan-Xia Lin. 1292-1297 [doi]
- Orientation in Conceptual Modeling FrameworksSabah Al-Fedaghi, Haya Alahmad. 1298-1303 [doi]
- BLE Tree Networks for Sensor Devices in Internet of ThingsSheng-De Wang, Kuan-Jung Chiang. 1304-1309 [doi]
- A Parallel Majority Learning Algorithm for Anomaly DetectionShin-Ying Huang, Ya-Yun Peng, Fang Yu. 1310-1313 [doi]
- Automation of Fact-Checking: State of the Art, Obstacles and PerspectivesEdouard Ngor Sarr, Ousmane Sall. 1314-1317 [doi]
- Deep Convolutional Neural Network for Facial Expression Recognition Using Facial PartsLucy Nwosu, Hui Wang, Jiang Lu, Ishaq Unwala, Xiaokun Yang, Ting Zhang. 1318-1321 [doi]
- Extension of Semantic Based Urdu Linguistic Resources Using Natural Language ProcessingKomal Khalid, Hammad Afzal, Faiza Moqaddas, Naima Iltaf, Ahmed Muqeem Sheri, Raheel Nawaz. 1322-1325 [doi]