• A Visual Analysis of Hazardous Events in Contract Risk Management
  • Look at the Horizon: Evaluation of a Software Solution Against Cyber Sickness in Virtual Reality Applications
  • Benchmarking Automated Machine Learning Methods for Price Forecasting Applications
  • Behavioral Recommender System for Process Automation Steps
  • Predicting How Much a Consumer Is Willing to Pay for a Bottle of Wine: Dealing With Data Imbalance
  • Exploring Functional Patterns of Driving Records by Interacting with Major Classes and Territory Using Generalized Additive Models
  • Building a Dataset for Trip Style Assessment Based on Real Trip Data
  • Automatic Classification of Quantitative Data from DNS Cache Servers into Stationary and Non-Stationary States Based on Clustering
  • Characterizing Speed Performance of Multi-Agent Reinforcement Learning
  • GUIDO: A Hybrid Approach to Guideline Discovery & Ordering from Natural Language Texts
  • Integrating Autoencoder-Based Hybrid Models into Cervical Carcinoma Prediction from Liquid-Based Cytology
  • Does Categorical Encoding Affect the Interpretability of a Multilayer Perceptron for Breast Cancer Classification?
  • Enriching Relation Extraction with OpenIE
  • Predicting Academic Performance of Low-Income Students in Public Ecuadorian Online Universities: An Educational Data Mining Approach
  • A Data Analysis Pipeline for Automating Apple Trait Analysis and Prediction
  • A Measure Data Catalog for Dashboard Management and Validation
  • A Semantic Web Approach for Military Operation Scenarios Development for Simulation
  • Identifying High-Quality Training Data for Misinformation Detection
  • Hawkes Processes on Social and Mass Media: A Causal Study of the #BlackLivesMatter Movement in the Summer of 2020
  • Detection of Drowsy Driving Using Wearable Sensors
  • QFLS: A Cloud-Based Framework for Supporting Big Healthcare Data Management and Analytics from Big Data Lakes: Definitions, Requirements, Models and Techniques
  • Heterogeneous Ensemble Learning for Modelling Species Distribution: A Case Study of Redstarts Habitat Suitability
  • Effects of Environmental Conditions on Historic Buildings: Interpretable Versus Accurate Exploratory Data Analysis
  • Rigor in Applied Data Science Research Based on DSR: A Literature Review
  • Clustering Object-Centric Event Logs
  • Design and Implementation of a Document Encryption Convergence Program Selecting Encryption Methods, and Integrating the Program into the Existing Office System
  • Prediction of QT Prolongation in Advanced Breast Cancer Patients Using Survival Modelling Algorithms
  • Optimization of Surgery Scheduling Problems Based on Prescriptive Analytics
  • An Ontology-Based Collaborative Business Intelligence Framework
  • Anomaly Detection of Medical IoT Traffic Using Machine Learning
  • Semantic, Technical and Legal Interoperability of European Company Open Data in Practice: The STIRData Approach
  • Creation and Evaluation of a Food Product Image Dataset for Product Property Extraction
  • Detecting Anomalies on Cryptocurrency Markets Using Graph Algorithms
  • Dense Information Retrieval on a Latin Digital Library via LaBSE and LatinBERT Embeddings
  • Performance Evaluation and Comparison of a New Regression Algorithm
  • A Multi-Factor Approach to Measure User Preference Similarity in Neighbor-Based Recommender Systems
  • Union k-Fold Feature Selection on Microarray Data
  • Analyzing Cyber-Physical Systems in Cars: A Case Study
  • Decision Support System for Corporate Reputation Based Social Media Listening Using a Cross-Source Sentiment Analysis Engine
  • Sharding and Master-Slave Replication of NoSQL Databases: Comparison of MongoDB and Redis
  • A Design Framework for a Blockchain-Based Open Market Platform of Enriched Card-Based Transactional Data for Big Data Analytics and Open Banking
  • AutoImpute: An Autonomous Web Tool for Data Imputation Based on Extremely Randomized Trees
  • Optimized Fusion Chain with Web3 Storage
  • GreenCC: A Hybrid Approach to Sustainably Validate Manufacturing Data in Industry 4.0 Environments
  • Structuring the End of the Data Life Cycle
  • Fundus Unimodal and Late Fusion Multimodal Diabetic Retinopathy Grading
  • Towards a Low-Code Tool for Developing Data Quality Rules
  • Pump and Dump Cryptocurrency Detection Using Social Media
  • Insights from Big Data Economy of Finnish Company Trust, Consumer Confidence and Data Exchange: An Empirical Evidence of Structural Equation Modelling
  • Embedding-Enhanced Similarity Metrics for Next POI Recommendation
  • Astronomical Images Quality Assessment with Automated Machine Learning
  • Decomposition Heuristic for the Aircraft Sequencing Problem: Impact on Mathematical and Constraint Programming
  • IntrusionHunter: Detection of Cyber Threats in Big Data
  • CryptonDL: Encrypted Image Classification Using Deep Learning Models
  • Distributed Edge Computing System for Vehicle Communication
  • Comparing Data Store Performance for Full-Text Search: To SQL or to NoSQL?
  • Conv-LSTM for Real Time Monitoring of the Mineral Grades in the Flotation Froth
  • Disease Prediction with Heterogeneous Graph of Electronic Health Records and Toxicogenomics Data
  • A Proactive Approach for the Sustainable Management of Water Distribution Systems
  • Detection and Prediction of Leakages in Water Distribution Networks
  • Extracting Frequent Gradual Patterns Based on SAT
  • The Imbalance Data Handling of XGBoost in Insurance Fraud Detection
  • BERT-Based Hybrid Deep Learning with Text Augmentation for Sentiment Analysis of Indonesian Hotel Reviews
  • An Advanced BERT LayerSum Model for Sentiment Classification of COVID-19 Tweets
  • A Comparison Study for Disaster Tweet Classification Using Deep Learning Models
  • Geo-Semantic Event-POI Matching of Large Mobility Datasets
  • Behavioral Modeling of Real Dynamic Processes in an Industry 4.0-Oriented Context
  • Towards Data Ecosystems in Smart Cities: Success Factors of Urban Data Spaces
  • EREO: An Effective Rule Evaluation Framework for Discovering Interesting Patterns in US Birth Data and Beyond
  • The Application of Affective Measures in Text-Based Emotion Aware Recommender Systems
  • On Data-Preprocessing for Effective Predictive Maintenance on Multi-Purpose Machines
  • A Successive Quadratic Approximation Approach for Tuning Parameters in a Previously Proposed Regression Algorithm
  • Temporal Multidimensional Model for Evolving Graph-Based Data Warehouses
  • QTrail-DB: A Query Processing Engine for Imperfect Databases with Evolving Qualities
  • University of Things: Opportunities and Challenges for a Smart Campus Environment based on IoT Sensors and Business Processes
  • Software Updates Monitoring & Anomaly Detection
  • The Implementation of an HSM-Based Smart Meter for Supporting DLMS/COSEM Security Suite 1
  • An Energy Management Unit for Predictive Solar Energy Harvesting IoT
  • Analysis of Security Events in Industrial Networks Using Self-Organizing Maps by the Example of Log4j
  • Castles Built on Sand: Observations from Classifying Academic Cybersecurity Datasets with Minimalist Methods
  • Simulation Based Performance Evaluation of FIWARE IoT Platform for Smart Agriculture
  • CopAS: A Big Data Forensic Analytics System
  • Attack Simulation on Data Distribution Service-based Infrastructure System
  • Green Intelligent Homes: A Perspective on the Future of Smart Homes and Their Implications
  • Deep Dive into Hunting for LotLs Using Machine Learning and Feature Engineering
  • Creating a Personalized Recommendation Framework in Smart Shopping by Using IoT Devices
  • RePAD2: Real-Time Lightweight Adaptive Anomaly Detection for Open-Ended Time Series
  • Function-as-a-Service for the Cloud-to-Thing Continuum: A Systematic Mapping Study
  • The Anatomy of an Infrastructure for Digital Underground Mining
  • Reducing IoT Big Data for Efficient Storage and Processing
  • Generative Deep Learning for Solutions to Data Deconflation Problems in Information and Operational Technology Networks
  • Process Automation and Monitoring Systems Based on IIoT Using Private LoRaWAN Networks: A Case Study of ArcelorMittal Vega Facilities
  • Bank Checks Fraud Detection Based on the Analysis of Event Trends in Data-Flow Systems
  • Quantum Clustering on Streaming Data: A Novel Method for Analyzing Big Data
  • Lightweight and Self Adaptive Model for Domain Invariant Bearing Fault Diagnosis
  • Analysis of Sensor Attacks Against Autonomous Vehicles
  • On-Premise Internet of Things (IoT) Data Storage: Comparison of Database Management Systems
  • AccA: A Decentralized and Accumulator-Based Authentication and Authorization Architecture for Autonomous IoT in Connected Infrastructures
  • Detection of DDoS Attacks on Urban IoT Devices Using Neural Networks
  • A Scalable Decentralized and Lightweight Access Control Framework Using IOTA Tangle for the Internet of Things