


default search action
4th BigDataService 2018: Bamberg, Germany
- Fourth IEEE International Conference on Big Data Computing Service and Applications, BigDataService 2018, Bamberg, Germany, March 26-29, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-5119-3

Fourth IEEE International Conference on Big Data Computing Service and Applications
Big Data Session I
- Chenwei Lu, Deqing Wang, Xin Liu, Keqin Gan:

A Mining and Visualizing System for Large-Scale Chinese Technical Standards. 1-8 - Guang Yang, Lijun Cai, Aimin Yu, Jiangang Ma, Dan Meng, Yu Wu:

Potential Malicious Insiders Detection Based on a Comprehensive Security Psychological Model. 9-16 - Hebatalla Eldakiky, David H. C. Du:

Key-Value Pairs Allocation Strategy for Kinetic Drives. 17-24
Big Data Session II
- Jan Frenzel

, Yedhu Sastri, Christoph Lehmann
, Taras Lazariv
, René Jäkel
, Wolfgang E. Nagel:
A Generalized Service Infrastructure for Data Analytics. 25-32 - Mahdi Ebrahimi, Aravind Mohan, Shiyong Lu:

Scheduling Big Data Workflows in the Cloud under Deadline Constraints. 33-40 - Shuja-ur-Rehman Baig

, Marcelo Amaral, Jorda Polo
, David Carrera:
Performance Characterization of Spark Workloads on Shared NUMA Systems. 41-48 - Kashinath Basu, Muhammad Younas, Andy Wan Wan Tow, Frank Ball:

Performance Comparison of a SDN Network between Cloud-Based and Locally Hosted SDN Controllers. 49-55
Big Data Session III
- Wenrui Li, Nishita Narvekar, Nakshatra Nakshatra, Nitisha Raut, Birsen Sirkeci, Jerry Gao:

Seismic Data Classification Using Machine Learning. 56-63 - Neha Gupta

, Henry Crosby, David Purser, Stephen A. Jarvis
, Weisi Guo
:
Twitter Usage Across Industry: A Spatiotemporal Analysis. 64-71 - Guanyao Du, Yuchun Liu, Jianjun Yu:

Scientific Users' Interest Detection and Collaborators Recommendation. 72-79 - Isidoros Perikos

, Ioannis Hatzilygeroudis
:
A Framework for Analyzing Big Social Data and Modelling Emotions in Social Media. 80-84
Big Data Session IV
- Mickael Figueredo, José Lucas Ribeiro, Nélio Cacho, Antonio Thome, Andréa Cacho, Frederico Lopes

, Valeria Araujo:
From Photos to Travel Itinerary: A Tourism Recommender System for Smart Tourism Destination. 85-92 - Yuanfeng Gong, Yushun Fan, Bing Bai, Junqi Zhang, Zhenfeng Gao, Xing Wu:

HTARF: A Hybrid Tourist Attraction Recommendation Framework for Trip Scheduling. 93-98 - Xiaowen Mei, Yushun Fan, Junqi Zhang, Bing Bai, Zhenfeng Gao:

ASSR: An Adjustable Scenic Spot Rating System Based on Travel Note Mining. 99-104 - Francesco Leotta

, Massimo Mecella
, Daniele Sora:
Visual Analysis of Sensor Logs in Smart Spaces: Activities vs. Situations. 105-114
Big Data Session V
- Samuel Smith, Kedar Gangopadhyay, Simranjyot Singh Gill, Suzanne McIntosh:

A Relationship Between Fines and Violent Crimes. 115-120 - Alexandros Zamichos, Traianos-Ioannis Theodorou, Anastasios Drosou, Dimitrios Tzovaras

:
An Evacuation Management Framework Based on Urban Data and Personalized Mobility Information. 121-128 - Bianca Katharina Lüders, Peter Ruppel:

Macroscopic Patterns in Sparse Location Data: Identifying Mobility Prototypes. 129-136 - Pierfrancesco Bellini, Paolo Nesi, Michela Paolucci

, Imad Zaza:
Smart City Architecture for Data Ingestion and Analytics: Processes and Solutions. 137-144
Big Data Session VI
- Massimo Marchiori:

Back to the Bazaar: Destructuring the Data Mall. 145-152 - Aseel Alkhelaiwi, Dan Grigoras:

Smart City Data Storage Optimization in the Cloud. 153-160 - Guangzhong Yang, Chuifeng Kong, Qinpeng Xu:

A Home Rehabilitation Comprehensive Care System for Patients with COPD Based on Comprehensive Care Pathway. 161-168 - Junior Dongo

, Charif Mahmoudi
, Fabrice Mourlin:
NDN Log Analysis Using Big Data Techniques: NFD Performance Assessment. 169-175
Big Data Session VII
- Jidi Wang, Shengxiang Gao, Liren Wang, Zhengtao Yu:

Micro-Blog Friend-Recommendation Based on Topic Analysis and Circle Found. 176-180 - Xiaohui Yuan

, Lichuan Gu, Tian Chen, Mohamed Elhoseny
, Wencheng Wang:
A Fast and Accurate Retina Image Verification Method Based on Structure Similarity. 181-185 - Hua-Yi Lin, Meng-Yen Hsieh, Kuan-Ching Li

:
The Secure Vehicle-to-Vehicle and Vehicle-to-Group Communication Mechanisms in Smart City. 186-192 - Jun Jiao, Jing Chen, Yan Qiao, Wenzhou Wang, Chao Wang, Lichuan Gu:

Single Neuron PID Control of Agricultural Robot Steering System Based on Online Identification. 193-199
Big Data Session VIII
- Gabriela Molinar

, Nicholas Popovic
, Wilhelm Stork:
From Data Points to Ampacity Forecasting: Gated Recurrent Unit Networks. 200-207 - Haihua Yang, Yangde Feng:

Authoritative Prediction of Website Based on Deep Learning. 208-212 - Hao Lv, Jianjun Yu, Tongyu Zhu:

A Novel Method of Overrun Risk Measurement and Assessment Using Large Scale QAR Data. 213-220
Big Data Session IX
- Sabina Sisovic

, Marija Brkic Bakaric
, Maja Matetic
:
Reducing Data Stream Complexity by Applying Count-Min Algorithm and Discretization Procedure. 221-228 - MingXue Wang, Vincent Huang, Anne-Marie Cristina Bosneag:

A Novel Split-Merge-Evolve k Clustering Algorithm. 229-236 - Mário Antunes

, Diogo Gomes
, Rui L. Aguiar
:
Knee/Elbow Estimation Based on First Derivative Threshold. 237-240 - Mingyi Jiang, Rui Liu, Fei Wang:

Word Network Topic Model Based on Word2Vector. 241-247
IEEE International Workshop on Big Data Security and Services
Big Data Security Workshop I
- Meera Ramesh, Hyeran Jeon:

Parallelizing Deep Packet Inspection on GPU. 248-253 - Donghyun Kim, Euiseong Ko, Junggab Son, Yeojin Kim, Jungtaek Seo

:
A Lightweight and Transparent Compensation Mechanism for Fog-Cloud Storage Framework. 254-259 - Nesrine Kaaniche

, Eunjin Jung, Ashish Gehani:
Efficiently Validating Aggregated IoT Data Integrity. 260-265
Big Data Security Workshop II
- Hector Suarez, Li Yang, Dalei Wu

:
Securing GPR Data for Use in Smart Cities. 266-269 - Euijin Choo:

Analyzing Opinion Spammers' Network Behavior in Online Review Systems. 270-275 - Vaibhav Agrawal

, Devanjal Kotia, Kamelia Moshirian, Mihui Kim:
Log-Based Cloud Monitoring System for OpenStack. 276-281 - Kinam Park, Youngrok Song, Yun-Gyung Cheong:

Classification of Attack Types for Intrusion Detection Systems Using a Machine Learning Algorithm. 282-286
Big Data Security Workshop III
- Daniel Hooks, Xiaohong Yuan, Kaushik Roy, Albert C. Esterline, Joaquin Hernandez:

Applying Artificial Immune System for Intrusion Detection. 287-292 - David Schwab, Lama ALharbi, Oliver Nichols, Li Yang:

Picture PassDoodle: Usability Study. 293-298

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














