Abstract is missing.
- SeDaSOMA: A Framework for Supporting Serendipitous, Data-As-A-Service-Oriented, Open Big Data Management and AnalyticsAlfredo Cuzzocrea, Paolo Ciancarini. 1-7 [doi]
- A Comparative Study of MongoDB, ArangoDB and CouchDB for Big Data StorageKonstantinos Mavrogiorgos, Athanasios Kiourtis, Argyro Mavrogiorgou, Dimosthenis Kyriazis. 8-14 [doi]
- Benchmarking Apache Spark and Hadoop MapReduce on Big Data ClassificationTaha Tekdogan, Ali Cakmak 0001. 15-20 [doi]
- Secure Big Data Management based on Secret Sharing and Verifiable ComputingMomoko Shiraishi. 21-25 [doi]
- An Approach to Objective Optimization of High-dimensional DataChenhan Zhai, Wanghu Chen, Meilin Zhou, Pengbo Lv, Yan Sun, Ali Arshad. 26-33 [doi]
- Lyapunov Central Limit Theorem: Theoretical Properties and Applications in Big-Data-Populated Smart City SettingsAlfredo Cuzzocrea, Edoardo Fadda, Alessandro Baldo 0001. 34-38 [doi]
- NetEase Cloud Dataset: Active User Identification and Deep Neural Network Based CTRYue Quan, Kaiwei Wang, Sichen Guan. 39-45 [doi]
- Secure Remote Monitoring and Cipher Data Sharing for IoT Healthcare System with Privacy PreservationYong Jin, Masahiko Tomoishi, Nariyoshi Yamai. 46-51 [doi]
- Generating Synthetic Data for Deep Learning using VR Digital TwinAbhishek Mukhopadhyay, G. S. Rajshekar Reddy, Imon Mukherjee, Gokul Kumar Gopa, Anasol Peña-Ríos, Pradipta Biswas. 52-56 [doi]
- A Method Based on Correlation Analysis of the Assembly Process and Neural Network for Precision Prediction of the Inertial PlatformLangfu Cui, Lin Wang, Gang Xiang, Qingzhen Zhang, Chenggang Bai, Jianbing Yang. 57-62 [doi]
- A Greedy Load Balancing Algorithm for FaaS PlatformsYoungsoo Lee, Sunghee Choi. 63-69 [doi]
- Adaptive Weighted Cat Group Algorithm Based On Logistic FunctionZhe Wang, Lingyun Yuan. 70-76 [doi]
- A Hybrid Two-Level Support Vector Machine-Based Method for Churn AnalysisFerdi Sarac, Huseyin Seker, Marcin Lisowski, Alan Timothy. 77-81 [doi]
- Analogy of thinking process from gaze information in drawing programming taskTomoharu Kobayashi, Hiromitsu Shimakawa. 82-87 [doi]
- Component Profiling and Prediction Models for QoS-Aware Self-Adapting DSMS FrameworkTarjana Yagnik, Feng Chen, Laleh Kasraian. 88-94 [doi]
- An Evaluation of Container Security Vulnerability Detection ToolsOmar Javed, Salman Toor. 95-101 [doi]
- Link reciprocity in directed multiplex networksCangfeng Ding, Jun Wang. 102-108 [doi]
- An IoT Based Fruit and Vegetable Sales System: A whole system including IoT based integrated intelligent scale and online shopBingyuan Wang, Yuxiao Xie, Xiaohui Duan. 109-115 [doi]
- Detection and Classification of Stress for Task Recommendation Using Wearable SensorsNaoya Wakabayashi, Hiromitsu Shimakawa, Fumiko Harada. 116-122 [doi]