default search action
IDEAS 2019: Athens, Greece
- Bipin C. Desai, Dimosthenis Anagnostopoulos, Yannis Manolopoulos, Mara Nikolaidou:
Proceedings of the 23rd International Database Applications & Engineering Symposium, IDEAS 2019, Athens, Greece, June 10-12, 2019. ACM 2019, ISBN 978-1-4503-6249-8 - Schahram Dustdar:
Novel paradigms for engineering large-scale resilient IoT systems. 1:1 - Foto N. Afrati:
The homomorphism property in query containment and data integration. 2:1-2:12 - Dora Souliou, Petros Potikas, Katerina Potika, Aris Pagourtzis:
Weight assignment on edges towards improved community detection. 3:1-3:5 - Isha Pradhan, Katerina Potika, Magdalini Eirinaki, Petros Potikas:
Exploratory data analysis and crime prediction for smart cities. 4:1-4:9 - Phoebe M. Asquith, Hisham Ihshaish:
Classification of eye-state using EEG recordings: speed-up gains using signal epochs and mutual information measure. 5:1-5:6 - Nancy Awad, Jean-François Couchot, Bechara al Bouna, Laurent Philippe:
Ant-driven clustering for utility-aware disassociation of set-valued datasets. 6:1-6:9 - Elio Mansour, Richard Chbeir, Philippe Arnould:
EQL-CE: an event query language for connected environments. 7:1-7:10 - Elio Mansour, Richard Chbeir, Philippe Arnould:
HSSN: an ontology for hybrid semantic sensor networks. 8:1-8:10 - Francesco Buccafurri, Lorenzo Musarella, Roberto Nardone:
Enabling propagation in web of trust by Ethereum. 9:1-9:6 - Admir Demiraj, Kostis Karozos, Iosif Spartalis, Vasilis Vassalos:
Meta-data management and quality control for the medical informatics platform. 10:1-10:9 - Antonio Arena, Pericle Perazzo, Gianluca Dini:
Virtual private ledgers: embedding private distributed ledgers over a public blockchain by cryptography. 11:1-11:9 - Eugenio Vocaturo, Ester Zumpano, Pierangelo Veltri:
On discovering relevant features for tongue colored image analysis. 12:1-12:8 - Hieu Hanh Le, Muneo Kushima, Kenji Araki, Haruo Yokota:
Differentially private sequential pattern mining considering time interval for electronic medical record systems. 13:1-13:9 - Dimitrios Kaklis, George Giannakopoulos, Iraklis Varlamis, Constantine D. Spyropoulos, Takis J. Varelas:
A data mining approach for predicting main-engine rotational speed from vessel-data measurements. 14:1-14:10 - Stefano Bistarelli, Gianna Figà-Talamanca, Francesco Lucarini, Ivan Mercanti:
Studying forward looking bubbles in Bitcoin/USD exchange rates. 15:1-15:9 - Padipat Sitkrongwong, Atsuhiro Takasu:
Unsupervised context extraction via region embedding for context-aware recommendations. 16:1-16:10 - Bipin C. Desai:
Privacy in the age of information (and algorithms). 17:1-17:12 - Sergio Altares López, Juan Jose Cuadrado-Gallego:
Supervised learning methods application to sentiment analysis. 18:1-18:6 - Mohamad Al Kadri, Mohamed Nassar, Haïdar Safa:
Transfer learning for malware multi-classification. 19:1-19:7 - Meriem Guerar, Luca Verderame, Alessio Merlo, Mauro Migliardi:
Blockchain-based risk mitigation for invoice financing. 20:1-20:6 - Antonios Makris, Konstantinos Tserpes, Dimosthenis Anagnostopoulos, Mara Nikolaidou, José Antônio Fernandes de Macêdo:
Database system comparison based on spatiotemporal functionality. 21:1-21:7 - Athanasios Fevgas, Panayiotis Bozanis:
A spatial index for hybrid storage. 22:1-22:8 - Amine El Ouassouli, Lionel Robinault, Vasile-Marian Scuturici:
Mining complex temporal dependencies from heterogeneous sensor data streams. 23:1-23:10 - Yeting Li, Haiming Chen, Xiaolan Zhang, Lingqi Zhang:
An effective algorithm for learning single occurrence regular expressions with interleaving. 24:1-24:10 - Mohamed Hamroun, Sonia Lajmi, Henri Nicolas, Ikram Amous:
VISEN: a video interactive retrieval engine based on semantic network in large video collections. 25:1-25:10 - Shruti Daggumati, Peter Z. Revesz:
Data mining ancient scripts to investigate their relationships and origins. 26:1-26:10 - Anna-Valentini Michailidou, Anastasios Gounaris:
A fast solution for bi-objective traffic minimization in geo-distributed data flows. 27:1-27:10 - Alfonso Quarati, Monica De Martino:
Open government data usage: a brief overview. 28:1-28:8 - Elio Masciari, Irina Trubitsyna, Domenico Saccà:
Simplified data posting in practice. 29:1-29:7 - Jean-François Couchot, Christophe Guyeux, Guillaume Royer:
Anonymously forecasting the number and nature of firefighting operations. 30:1-30:8 - Rezvan Joshaghani, Stacy Black, Elena Sherman, Hoda Mehrpouyan:
Formal specification and verification of user-centric privacy policies for ubiquitous systems. 31:1-31:10 - Tongyuan Wang, Bipin C. Desai:
On the appropriate pattern frequentness measure and pattern generation mode: a critical review. 32:1-32:15 - Shahab Shamshirband, Anthony T. Chronopoulos:
A new malware detection system using a high performance-ELM method. 33:1-33:10 - Carson K. Leung:
Pattern mining for knowledge discovery. 34:1-34:5 - Peter Z. Revesz, M. Parvez Rashid, Yves Tuyishime:
The design and implementation of AIDA: ancient inscription database and analytics system. 35:1-35:6 - Christian Riegger, Tobias Vinçon, Ilia Petrov:
Indexing large updatable datasets in multi-version database management systems. 36:1-36:5 - Bruno Ponsoni Costa, Luís M. del Val Cura:
An Neo4j implementation for designing fuzzy graph databases. 37:1-37:6 - Nathan Jadoul, Erick Stattner:
Climate change data analysis: case study of banana in the French West Indies. 38:1-38:5 - Asma Zgolli, Christine Collet, Christophe Bobineau:
DWS: a data placement approach for smart grid ecosystems. 39:1-39:5 - Giacomo Bergami, Flavio Bertini, Danilo Montesi:
On approximate nesting of multiple social network graphs: a preliminary study. 40:1-40:5 - Mohamed Nassar, Haïdar Safa, Alaa Al Mutawa, Ahmed Helal, Iskander Gaba:
Chi squared feature selection over Apache Spark. 41:1-41:5 - Christodoulos Asiminidis, Ioannis Georgiadis, Dimitrios Syndoukas, George Kokkonis, Sotirios Kontogiannis:
Performance evaluation on encrypted - non encrypted database fields containing IoT data. 42:1-42:2 - Alfredo Cuzzocrea, Fabio Martinelli, Francesco Mercaldo:
A machine-learning framework for supporting intelligent web-phishing detection and analysis. 43:1-43:3 - Mohamed Nassar, Bassel Rawda, Mohamed Mardini:
sElect: secure election as a service. 44:1-44:2 - Nida Khan, Tabrez Ahmad, Radu State:
Blockchain-based micropayment systems: economic impact. 45:1-45:3 - Karel Vaculík, Lubos Popelínský:
A genetic algorithm for discriminative graph pattern mining. 46:1-46:2
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.