• Synthetic Optimisation Techniques for Epidemic Disease Prediction Modelling
  • Indexing Patterns in Graph Databases
  • Seamless Database Evolution for Cloud Applications
  • Detecting and Analyzing Privacy Leaks in Tweets
  • Nonlinear Feature Extraction using Multilayer Perceptron based Alternating Regression for Classification and Multiple-output Regression Problems
  • Knowledge at First Glance: A Model for a Data Visualization Recommender System Suited for Non-expert Users
  • Architectural Considerations for a Data Access Marketplace
  • Clustering Big Data
  • Combining Prediction Methods for Hardware Asset Management
  • Analysis of Data Structures Involved in RPQ Evaluation
  • Framework for the Recognition of Activities of Daily Living and Their Environments in the Development of a Personal Digital Life Coach
  • Algorithms for Computing Inequality Joins
  • Anomaly Detection for Industrial Big Data
  • No Target Function Classifier - Fast Unsupervised Text Categorization using Semantic Spaces
  • An Efficient Decentralized Multidimensional Data Index: A Proposal
  • Towards Enabling Emerging Named Entity Recognition as a Clinical Information and Argumentation Support
  • BRAID - A Hybrid Processing Architecture for Big Data
  • Enhancing Open Data Knowledge by Extracting Tabular Data from Text Images
  • Variable Importance Analysis in Default Prediction using Machine Learning Techniques
  • Distributed Optimization of Classifier Committee Hyperparameters
  • Automatic Document Summarization based on Statistical Information
  • Development of an Online-System for Assessing the Progress of Knowledge Acquisition in Psychology Students
  • An Approach for Adaptive Parameter Setting in Manufacturing Processes
  • Column Scan Optimization by Increasing Intra-Instruction Parallelism
  • Concept Extraction with Convolutional Neural Networks
  • Identifying Electromyography Sensor Placement using Dense Neural Networks
  • Beyond Data Quality: Data Excellence Challenges from an Enterprise, Research and City Perspective
  • Dow Jones Trading with Deep Learning: The Unreasonable Effectiveness of Recurrent Neural Networks
  • An Approach to Use Deep Learning to Automatically Recognize Team Tactics in Team Ball Games
  • Reliable In-Memory Data Management on Unreliable Hardware
  • Towards a Data Warehouse Architecture for Managing Big Data Evolution
  • Exploring Urban Mobility from Taxi Trajectories: A Case Study of Nanjing, China
  • Fuzzy Metadata Strategies for Enhanced Data Integration
  • Sensor-based Database with SensLog: A Case Study of SQL to NoSQL Migration
  • Graph Databases Comparison: AllegroGraph, ArangoDB, InfiniteGraph, Neo4J, and OrientDB
  • Benchmarking Auto-WEKA on a Commodity Machine
  • Traversal-aware Encryption Adjustment for Graph Databases
  • Predicting Flare Probability in Rheumatoid Arthritis using Machine Learning Methods
  • Cracking KD-Tree: The First Multidimensional Adaptive Indexing (Position Paper)
  • Design of a Portable Programming Abstraction for Data Transformations
  • Self-adaptive Synchronous Localization and Mapping using Runtime Feature Models
  • Micro-Segmenting 5G
  • Unbalanced Data Classification in Fraud Detection by Introducing a Multidimensional Space Analysis
  • A Multi-Channel Software Decoder for the LoRa Modulation Scheme
  • Detecting Anomalies in Device Event Data in the IoT
  • How Little is Enough? Implementation and Evaluation of a Lightweight Secure Firmware Update Process for the Internet of Things
  • A Performance Exploration of Architectural Options for a Middleware for Decentralised Lightweight Edge Cloud Architectures
  • Hidden within a Group of People - Mental Models of Privacy Protection
  • Fault-Tolerant Scheduling for Scientific Workflow with Task Replication Method in Cloud
  • A Decision Framework for Blockchain Platforms for IoT and Edge Computing
  • An Evaluation Framework for Fastest Oblivious RAM
  • IoT Privacy in 5G Networks
  • Trustworthy Privacy Policy Translation in Untrusted IoT Environments
  • Energy-Efficient Service Function Chain Provisioning in Multi-Domain Networks
  • Of Guardians, Cynics, and Pragmatists - A Typology of Privacy Concerns and Behavior
  • Intrusion Detection and Prevention with Internet-integrated CoAP Sensing Applications
  • Applicability and Resilience of a Linear Encoding Scheme for Computing Consensus
  • Parallel Privacy-preserving Record Linkage using LSH-based Blocking
  • Access Rules Enhanced by Dynamic IIoT Context
  • Data Analytics for Low Voltage Electrical Grids
  • Discovery of Newsworthy Events in Twitter
  • Exploring Big Data Clustering Algorithms for Internet of Things Applications
  • Internet of Things Middleware: How Suitable are Service-oriented Architecture and Resource-oriented Architecture
  • XACML for Building Access Control Policies in Internet of Things
  • Towards Combining Reactive and Proactive Cloud Elasticity on Running HPC Applications
  • NoSQL Database Performance Tuning for IoT Data - Cassandra Case Study
  • SPIRI: Low Power IoT Solution for Monitoring Indoor Air Quality
  • Searchitect - A Developer Framework for Hybrid Searchable Encryption (Position Paper)
  • Towards a Platform for Urban Data Management, Integration and Processing
  • Towards a Fully Automated Bracelet for Health Emergency Solution
  • Rainfall Prediction Model based on Radar Image Analysis Processing
  • The Impact of Clustering for Learning Semantic Categories
  • A Reference Architecture for the IoT Services’ Adaptability - Using Agents to Make IoT Services Dynamically Reconfigurable
  • Misalignment between Business and IT Strategic Objectives in Saudi Arabia Public Sector Organisations
  • System Protection Agent Against Unauthorized Activities via USB Devices
  • Context-aware and Attribute-based Access Control Applying Proactive Computing to IoT System
  • Homomorphic Encryption for Secure Computation on Big Data
  • A Discussion Paper on the Grey Area – The Ethical Problems Related to Big Data Credit Reporting