• Asymmetric Heterogeneous Transfer Learning: A Survey
  • The Role of Big Data Analytics in Corporate Decision-making
  • Adaptive Resource Management for Distributed Data Analytics based on Container-level Cluster Monitoring
  • Storing and Processing Personal Narratives in the Context of Cultural Legacy Preservation
  • SPDC: Secure Proxied Database Connectivity
  • Churn Prediction for Mobile Prepaid Subscribers
  • A Multi-criteria Approach for Large-object Cloud Storage
  • ChronoGraph - Versioning Support for OLTP TinkerPop Graphs
  • Success of the Functionalities of a Learning Management System
  • Managing Distributed Queries under Personalized Anonymity Constraints
  • B-kNN to Improve the Efficiency of kNN
  • Data Scientist - Manager of the Discovery Lifecycle
  • Reducing Variant Diversity by Clustering - Data Pre-processing for Discrete Event Simulation Models
  • Using Visualisation Techniques to Acquire a Better Understanding of Storytelling for Cultural Heritage
  • Clink - A Novel Record Linkage Methodology based on Graph Interactions
  • Using Signifiers for Data Integration in Rail Automation
  • Supporting Pre-shared Keys in Closed Implementations of TLS
  • Validating ETL Patterns Feasability using Alloy
  • Governance and Privacy in a Provincial Data Repository - A Cross-sectional Analysis of Longitudinal Birth Cohort Parent Participants’ Perspectives on Sharing Adult Vs. Child Research Data
  • Demand Prediction using Machine Learning Methods and Stacked Generalization
  • Table Interpretation and Extraction of Semantic Relationships to Synthesize Digital Documents
  • Index Clustering: A Map-reduce Clustering Approach using Numba
  • Data Transformation Methodologies between Heterogeneous Data Stores - A Comparative Study
  • A Data-driven Framework on Mining Relationships between Air Quality and Cancer Diseases
  • Data Preprocessing of eSport Game Records - Counter-Strike: Global Offensive
  • Implementation and Empirical Evaluation of a Case-based, Interactive e-Learning Module with X-ray Tooth Prognosis
  • Identification of Opinion Leaders and Followers in Social Media
  • The Benefit of Thinking Small in Big Data
  • Mining and Linguistically Interpreting Data from Questionnaires - Influence of Financial Literacy to Behaviour
  • Towards a Scalable Architecture for Flight Data Management
  • Modeling and Qualitative Evaluation of a Management Canvas for Big Data Applications
  • A Collaborative Environment for Web Crawling and Web Data Analysis in ENEAGRID
  • Big Data Visualization Tools: A Survey - The New Paradigms, Methodologies and Tools for Large Data Sets Visualization
  • An Open Source System for Big Data Warehousing
  • A Novel Influence Diffusion Model based on User Generated Content in Online Social Networks
  • Reputation Analysis towards Discovery
  • The Challenge of using Map-reduce to Query Open Data
  • A Pipeline for Multimedia Twitter Analysis through Graph Databases: Preliminary Results
  • BotWheels: a Petri Net based Chatbot for Recommending Tires
  • Election Vote Share Prediction using a Sentiment-based Fusion of Twitter Data with Google Trends and Online Polls
  • Assessment of Private Cloud Infrastructure Monitoring Tools - A Comparison of Ceilometer and Monasca
  • Protecting Data in the Cloud: An Assessment of Practical Digital Envelopes from Attribute based Encryption
  • An Ontology for Representing Information over Social Service in an Educational Institution
  • Entity-based Opinion Mining from Spanish Tweets
  • Analysis of Brain Waves in Violent Images - Are Differences in Gender?
  • Determining a New Home Classification - A Data Mining Approach
  • Models for Predicting the Development of Insulin Resistance
  • A Data-Driven Methodology for Heating Optimization in Smart Buildings
  • A Solution for Prevention of Selective Dropping and Selfish Attacks in Opportunistic Networks
  • A Dataset and a Comparison of Out-of-Order Event Compensation Algorithms
  • IoDDoS — The Internet of Distributed Denial of Service Attacks - A Case Study of the Mirai Malware and IoT-Based Botnets
  • Outsourcing Access Control for a Dynamic Access Configuration of IoT Services
  • Perceptions of Digital Footprints and the Value of Privacy
  • A LAHC-based Job Scheduling Strategy to Improve Big Data Processing in Geo-distributed Contexts
  • Secure Edge Computing with ARM TrustZone
  • Internet of Things Architecture for Handling Stream Air Pollution Data
  • RSSI-based Device Free Localization for Elderly Care Application
  • Task Offloading for Scientific Workflow Application in Mobile Cloud
  • Live Migration for Service Function Chaining
  • A Low-cost Vehicle Tracking Platform using Secure SMS
  • Device Fingerprinting: Analysis of Chosen Fingerprinting Methods
  • Lag Correlation Discovery and Classification for Time Series
  • The XACML Standard - Addressing Architectural and Security Aspects
  • Yes, I know this IoT Device Might Invade my Privacy, but I Love it Anyway! A Study of Saudi Arabian Perceptions
  • Data Warehouse MFRJ Query Execution Model for MapReduce
  • Wireless Sensor Networks IKE Phase One Negotiation Approach based on Multivariate Quadratic Quasi-groups
  • New Computing Model for Securing Mobile Agents in IP Networks
  • IBSC System for Victims Management in Emergency Scenarios
  • A Proposed Best-practice Framework for Information Security Governance
  • A Cognitive-IoE Approach to Ambient-intelligent Smart Home
  • Performance Testing of an Internet of Things Platform
  • IoT Forensic: Bridging the Challenges in Digital Forensic and the Internet of Things
  • Evaluating the Efficiency of Blockchains in IoT with Simulations
  • The Day After Mirai: A Survey on MQTT Security Solutions After the Largest Cyber-attack Carried Out through an Army of IoT Devices
  • An Overview of Risk Estimation Techniques in Risk-based Access Control for the Internet of Things
  • Resolving the Misconceptions on Big Data Analytics Implementation through Government Research Institute in Malaysia
  • Internet of Things - The Power of the IoT Platform
  • From Group-by to Accumulation: Data Aggregation Revisited
  • A Holistic View of the IoT Process from Sensors to the Business Value
  • IoT based Proximity Marketing
  • Memory Optimization of a Distributed Middleware for Smart Grid Applications
  • Secure IoT: An Improbable Reality
  • Enhancing IoT Security and Privacy with Distributed Ledgers - A Position Paper
  • Process Guidance for the Successful Deployment of a Big Data Project: Lessons Learned from Industrial Cases
  • Minimizing the Risks of Data Protection Infringement - Data Lifecycle Risk Assessment
  • Shalala Cipher, a New Implementation of Vigenere Cipher for Wireless Sensor Node Security
  • Data Cleaning Technique for Security Big Data Ecosystem
  • A Frequency-domain-based Pattern Mining for Credit Card Fraud Detection
  • Situational Awareness based Risk-adaptable Access Control in Enterprise Networks
  • On the Prospect of using Cognitive Systems to Enforce Data Access Control
  • Extracting Knowledge from Stream Behavioural Patterns
  • Optimization for Sustainable Manufacturing - Application of Optimization Techniques to Foster Resource Efficiency
  • Decentralized Content Trust for Docker Images
  • An Image Data Learning Method by Discriminating Multiple ROIs Data Patterns for Extracting Weather Information
  • Big Data Analytics Framework for Natural Disaster Management in Malaysia
  • Analysis of Measures to Achieve Resilience during Virtual Machine Interruptions in IaaS Cloud Service
  • A Hands-on Approach on Botnets for Behavior Exploration
  • Towards Firmware Analysis of Industrial Internet of Things (IIoT) - Applying Symbolic Analysis to IIoT Firmware Vetting
  • An Integrated Model to Investigate an Individual’s Behavioural Towards using Cloud Computing
  • Privacy Agents for IoT Cloud Communication
  • Big Data & Analytics to Support the Renewable Energy Integration of Smart Grids - Case Study: Power Solar Generation
  • Secure Electronic Health Record System Based on Online/Offline KP-ABE in the Cloud
  • Factors Influencing Adoption of IoT for Data-driven Decision Making in Asset Management Organizations