Abstract is missing.
- Explanations on the Web: A Provenance-based ApproachLuc Moreau 0001. 5
- Persistent Identification for Interoperable Data Management and PreservationStefan Decker. 7
- Hybrid Intelligence: AI Systems that Collaborate with People Instead of Replacing ThemFrank van Harmelen. 9
- Transfer Learning to Extract Features for Personalized User ModelingAymen Ben Hassen, Sonia Ben Ticha. 15-25 [doi]
- Selective Auctioning using Publish/Subscribe for Real-Time BiddingSonia Slimani, Kaiwen Zhang 0001. 26-37 [doi]
- Using IoT Platform for 360-Degree Video User Logging and AnalysisAntti Luoto, Kari Systä, Otto Hylli, Ville Heikkilä. 41-50 [doi]
- Comparing Reliability Mechanisms for Secure Web Servers: Comparing Actors, Exceptions and Futures in ScalaDanail Penev, Phil Trinder. 51-58 [doi]
- A Management Model of Real-time Integrated Semantic Annotations to the Sensor Stream Data for the IoTBesmir Sejdiu, Florije Ismaili, Lule Ahmedi. 59-66 [doi]
- Analysis of Selected Characteristics of Open Data Inception Portals in the Context of Smart Cities IoT Data AccessibilityPawel Dymora, Miroslaw Mazurek, Bartosz Kowal. 67-74 [doi]
- Multifactorial Evolutionary Prediction of Phenology and Pests: Can Machine Learning Help?Francisco José Lacueva-Pérez, Sergio Ilarri, Juan José Barriuso Vargas, Gorka Labata Lezaun, Rafael del-Hoyo-Alonso. 75-82
- Accommodating Negation in an Efficient Event-based Natural Language Query Interface to the Semantic WebShane M. Peelar, Richard A. Frost. 83-92 [doi]
- Alternative Approaches for Supporting Lattice-based Access Control (LBAC) in the Fast Healthcare Interoperability Resources (FHIR) StandardSteven A. Demurjian, Thomas Agresta, Eugene Sanzi, John DeStefano. 93-104 [doi]
- Comparative Analysis between the k-means and Fuzzy c-means Algorithms to Detect UDP Flood DDoS Attack on a SDN/NFV EnvironmentJoão Ribeiro de Almeida Neto, Layse Santos Souza, Admilson de Ribamar Lima Ribeiro. 105-112 [doi]
- Traffic Flow Modelling for Pollution Awareness: The TRAFAIR Experience in the City of ZaragozaSergio Ilarri, David Sáez, Raquel Trillo Lado. 117-128 [doi]
- Completeness Issues in Mobile Crowd-sensing EnvironmentsSouheir Mehanna, Zoubida Kedad, Mohamed Chachoua. 129-138 [doi]
- Mobile Devices and Systems in ADHD TreatmentRenato Montaleão Brum Alves, Mônica Ferreira da Silva, Eber Assis Schmitz, Antonio Juarez Alencar. 141-146 [doi]
- Exploring Voice Assistant Risks and Potential with Technology-based UsersAndreas M. Klein, Andreas Hinderks, Maria Rauschenberger, Jörg Thomaschewski. 147-154
- Life Cycle of Software Development Design in European Structured Economic ReportsIgnacio Santos, Elena Castro, Dolores Cuadra, Harith Aljumaily. 159-169 [doi]
- MISTRuST: accoMmodatIon Short Term Rental Scanning ToolIván Ruiz-Rube, Inmaculada Arnedillo Sánchez, Antonio Balderas. 170-177 [doi]
- Automated Tag Enrichment by Semantically Related TrendsAntonella Arca, Salvatore Carta, Alessandro Giuliani, Madalina Stanciu, Diego Reforgiato Recupero. 183-193 [doi]
- Text Mining of Medical Documents in Spanish: Semantic Annotation and Detection of RecommendationsCarlos Tellería, Sergio Ilarri, Carlos Sánchez. 197-208 [doi]
- Efficient Thumbnail Identification through Object RecognitionSalvatore Carta, Eugenio Gaeta, Alessandro Giuliani, Leonardo Piano, Diego Reforgiato Recupero. 209-216 [doi]
- Converting Web Pages Mockups to HTML using Machine LearningTiago Bouças, António Esteves. 217-224 [doi]
- What's in a Definition? An Investigation of Semantic Features in Lexical DictionariesLuigi Di Caro. 225-232 [doi]
- Automatic Detection of Terms and Conditions in German and English Online ShopsDaniel Braun 0003, Florian Matthes. 233-237 [doi]
- On the Fly SPARQL Execution for Structured Non-RDF Web APIsTorsten Spieldenner. 243-252 [doi]
- Soft Querying GeoJSON Documents within the J-CO FrameworkGiuseppe Psaila, Stefania Marrara, Paolo Fosci. 253-265 [doi]
- Semantic Web Applications for Danish News MediaAstrid Ildor. 269-276 [doi]
- Ontology-quality Evaluation Methodology for Enhancing Semantic Searches and Recommendations: A Case StudyPaula Peña, Raquel Trillo Lado, Rafael Del Hoyo, María del Carmen Rodríguez-Hernández, David Abadía-Gallego. 277-284 [doi]
- Detecting Unsatisfiable Pattern Queries under Shape Expression SchemaShiori Matsuoka, Nobutaka Suzuki. 285-291 [doi]
- Transforming Property Path Query According to Shape Expression Schema UpdateGoki Akazawa, Naoto Matsubara, Nobutaka Suzuki. 292-298 [doi]
- What Web Users Copy to the Clipboard on a Website: A Case StudyIlan Kirsh. 303-312 [doi]
- Rapid Development of a Low-cost Web-based 360 Virtual TourMaria Insa Iglesias, Mark David Jenkins, Gordon Morison. 315-322 [doi]
- A Curious Case of Meme Detection: An Investigative StudyChhavi Sharma, Viswanath Pulabaigari. 327-338 [doi]
- Knowledge-based Reliability Metrics for Social Media AccountsNuno Guimarães, Álvaro Figueira, Luís Torgo. 339-350 [doi]
- Meme vs. Non-meme Classification using Visuo-linguistic AssociationChhavi Sharma, Viswanath Pulabaigari, Amitava Das. 353-360 [doi]
- Prototypes as Starting Point in MDE: Proof of ConceptAlejandro Sánchez-Villarín, Alejandro Santos-Montaño, Nora Koch, David Lizcano Casas. 365-372 [doi]
- The Current Limitations of Blockchain Traceability: Challenges from IndustryNicolás Sánchez-Gómez, Manuel Mejías Risoto, J. M. Ramos-Cueli, Tomasz Wojdynski, David Lizcano, Jesús Torres Valderrama. 373-380 [doi]
- A Software Product Line for Digital LibrariesDelfina Ramos-Vidal, Alejandro Cortiñas, Miguel R. Luaces, Oscar Pedreira, Ángeles Saavedra Places. 381-389 [doi]
- Detecting IoT Botnet Formation using Data Stream Clustering AlgorithmsGabriel de Carvalho Arimatéa, Admilson de Ribamar Lima Ribeiro. 395-402 [doi]
- Computing Massive Trust Analytics for Twitter using Apache Spark with Account Self-assessmentGeorgios Drakopoulos, Andreas Kanavos, Konstantinos Paximadis, Aristidis Ilias, Christos Makris, Phivos Mylonas. 403-414 [doi]
- SMS Spam Identification and Risk Assessment EvaluationsAlaa Mohasseb, Benjamin Aziz, Andreas Kanavos. 417-424 [doi]