Asymmetric Heterogeneous Transfer Learning: A Survey
The Role of Big Data Analytics in Corporate Decision-making
Adaptive Resource Management for Distributed Data Analytics based on Container-level Cluster Monitoring
Storing and Processing Personal Narratives in the Context of Cultural Legacy Preservation
SPDC: Secure Proxied Database Connectivity
Churn Prediction for Mobile Prepaid Subscribers
A Multi-criteria Approach for Large-object Cloud Storage
ChronoGraph - Versioning Support for OLTP TinkerPop Graphs
Success of the Functionalities of a Learning Management System
Managing Distributed Queries under Personalized Anonymity Constraints
B-kNN to Improve the Efficiency of kNN
Data Scientist - Manager of the Discovery Lifecycle
Reducing Variant Diversity by Clustering - Data Pre-processing for Discrete Event Simulation Models
Using Visualisation Techniques to Acquire a Better Understanding of Storytelling for Cultural Heritage
Clink - A Novel Record Linkage Methodology based on Graph Interactions
Using Signifiers for Data Integration in Rail Automation
Supporting Pre-shared Keys in Closed Implementations of TLS
Validating ETL Patterns Feasability using Alloy
Governance and Privacy in a Provincial Data Repository - A Cross-sectional Analysis of Longitudinal Birth Cohort Parent Participants’ Perspectives on Sharing Adult Vs. Child Research Data
Demand Prediction using Machine Learning Methods and Stacked Generalization
Table Interpretation and Extraction of Semantic Relationships to Synthesize Digital Documents
Index Clustering: A Map-reduce Clustering Approach using Numba
Data Transformation Methodologies between Heterogeneous Data Stores - A Comparative Study
A Data-driven Framework on Mining Relationships between Air Quality and Cancer Diseases
Data Preprocessing of eSport Game Records - Counter-Strike: Global Offensive
Implementation and Empirical Evaluation of a Case-based, Interactive e-Learning Module with X-ray Tooth Prognosis
Identification of Opinion Leaders and Followers in Social Media
The Benefit of Thinking Small in Big Data
Mining and Linguistically Interpreting Data from Questionnaires - Influence of Financial Literacy to Behaviour
Towards a Scalable Architecture for Flight Data Management
Modeling and Qualitative Evaluation of a Management Canvas for Big Data Applications
A Collaborative Environment for Web Crawling and Web Data Analysis in ENEAGRID
Big Data Visualization Tools: A Survey - The New Paradigms, Methodologies and Tools for Large Data Sets Visualization
An Open Source System for Big Data Warehousing
A Novel Influence Diffusion Model based on User Generated Content in Online Social Networks
Reputation Analysis towards Discovery
The Challenge of using Map-reduce to Query Open Data
A Pipeline for Multimedia Twitter Analysis through Graph Databases: Preliminary Results
BotWheels: a Petri Net based Chatbot for Recommending Tires
Election Vote Share Prediction using a Sentiment-based Fusion of Twitter Data with Google Trends and Online Polls
Assessment of Private Cloud Infrastructure Monitoring Tools - A Comparison of Ceilometer and Monasca
Protecting Data in the Cloud: An Assessment of Practical Digital Envelopes from Attribute based Encryption
An Ontology for Representing Information over Social Service in an Educational Institution
Entity-based Opinion Mining from Spanish Tweets
Analysis of Brain Waves in Violent Images - Are Differences in Gender?
Determining a New Home Classification - A Data Mining Approach
Models for Predicting the Development of Insulin Resistance
A Data-Driven Methodology for Heating Optimization in Smart Buildings
A Solution for Prevention of Selective Dropping and Selfish Attacks in Opportunistic Networks
A Dataset and a Comparison of Out-of-Order Event Compensation Algorithms
IoDDoS — The Internet of Distributed Denial of Service Attacks - A Case Study of the Mirai Malware and IoT-Based Botnets
Outsourcing Access Control for a Dynamic Access Configuration of IoT Services
Perceptions of Digital Footprints and the Value of Privacy
A LAHC-based Job Scheduling Strategy to Improve Big Data Processing in Geo-distributed Contexts
Secure Edge Computing with ARM TrustZone
Internet of Things Architecture for Handling Stream Air Pollution Data
RSSI-based Device Free Localization for Elderly Care Application
Task Offloading for Scientific Workflow Application in Mobile Cloud
Live Migration for Service Function Chaining
A Low-cost Vehicle Tracking Platform using Secure SMS
Device Fingerprinting: Analysis of Chosen Fingerprinting Methods
Lag Correlation Discovery and Classification for Time Series
The XACML Standard - Addressing Architectural and Security Aspects
Yes, I know this IoT Device Might Invade my Privacy, but I Love it Anyway! A Study of Saudi Arabian Perceptions
Data Warehouse MFRJ Query Execution Model for MapReduce
Wireless Sensor Networks IKE Phase One Negotiation Approach based on Multivariate Quadratic Quasi-groups
New Computing Model for Securing Mobile Agents in IP Networks
IBSC System for Victims Management in Emergency Scenarios
A Proposed Best-practice Framework for Information Security Governance
A Cognitive-IoE Approach to Ambient-intelligent Smart Home
Performance Testing of an Internet of Things Platform
IoT Forensic: Bridging the Challenges in Digital Forensic and the Internet of Things
Evaluating the Efficiency of Blockchains in IoT with Simulations
The Day After Mirai: A Survey on MQTT Security Solutions After the Largest Cyber-attack Carried Out through an Army of IoT Devices
An Overview of Risk Estimation Techniques in Risk-based Access Control for the Internet of Things
Resolving the Misconceptions on Big Data Analytics Implementation through Government Research Institute in Malaysia
Internet of Things - The Power of the IoT Platform
From Group-by to Accumulation: Data Aggregation Revisited
A Holistic View of the IoT Process from Sensors to the Business Value
IoT based Proximity Marketing
Memory Optimization of a Distributed Middleware for Smart Grid Applications
Secure IoT: An Improbable Reality
Enhancing IoT Security and Privacy with Distributed Ledgers - A Position Paper
Process Guidance for the Successful Deployment of a Big Data Project: Lessons Learned from Industrial Cases
Minimizing the Risks of Data Protection Infringement - Data Lifecycle Risk Assessment
Shalala Cipher, a New Implementation of Vigenere Cipher for Wireless Sensor Node Security
Data Cleaning Technique for Security Big Data Ecosystem
A Frequency-domain-based Pattern Mining for Credit Card Fraud Detection
Situational Awareness based Risk-adaptable Access Control in Enterprise Networks
On the Prospect of using Cognitive Systems to Enforce Data Access Control
Extracting Knowledge from Stream Behavioural Patterns
Optimization for Sustainable Manufacturing - Application of Optimization Techniques to Foster Resource Efficiency
Decentralized Content Trust for Docker Images
An Image Data Learning Method by Discriminating Multiple ROIs Data Patterns for Extracting Weather Information
Big Data Analytics Framework for Natural Disaster Management in Malaysia
Analysis of Measures to Achieve Resilience during Virtual Machine Interruptions in IaaS Cloud Service
A Hands-on Approach on Botnets for Behavior Exploration
Towards Firmware Analysis of Industrial Internet of Things (IIoT) - Applying Symbolic Analysis to IIoT Firmware Vetting
An Integrated Model to Investigate an Individual’s Behavioural Towards using Cloud Computing
Privacy Agents for IoT Cloud Communication
Big Data & Analytics to Support the Renewable Energy Integration of Smart Grids - Case Study: Power Solar Generation
Secure Electronic Health Record System Based on Online/Offline KP-ABE in the Cloud
Factors Influencing Adoption of IoT for Data-driven Decision Making in Asset Management Organizations