


default search action
Data Science and Engineering, Volume 1
Volume 1, Number 1, March 2016
- Elisa Bertino:

Introduction to Data Science and Engineering. 1-3 - Lizhu Zhou:

Welcome Message from DSE Managing Editor. 4-5 - Donatella Firmani

, Massimo Mecella
, Monica Scannapieco, Carlo Batini:
On the Meaningfulness of "Big Data Quality" (Invited Paper). 6-20 - Jordi Soria-Comas

, Josep Domingo-Ferrer
:
Big Data Privacy: Challenges to Privacy Principles and Models. 21-28 - Qingbo Hu, Sihong Xie, Shuyang Lin, Senzhang Wang, Philip S. Yu:

Clustering Embedded Approaches for Efficient Information Network Inference. 29-40 - Bin Cui

, Jie Jiang, Quanlong Huang, Ying Xu, Yanjun Gui, Wenyu Zhang:
POS: A High-Level System to Simplify Real-Time Stream Application Development on Storm. 41-50
Volume 1, Number 2, June 2016
- Jianzhong Li:

Introduction to the Special Issue. 51-53 - Siuly Siuly

, Yanchun Zhang:
Medical Big Data: Neurological Diseases Diagnosis Through Medical Data Analysis. 54-64 - Wonjun Lee, Sanjiv Kumar:

Software-Defined Storage-Based Data Infrastructure Supportive of Hydroclimatology Simulation Containers: A Survey. 65-72 - Yuqing Sun

, Haoran Xu
, Elisa Bertino, Chao Sun:
A Data-Driven Evaluation for Insider Threats. 73-85 - Bolong Zheng, Han Su, Kai Zheng, Xiaofang Zhou

:
Landmark-Based Route Recommendation with Crowd Intelligence. 86-100 - Ruihua Song

, Kazutoshi Umemoto, Jian-Yun Nie
, Xing Xie
, Katsumi Tanaka, Yong Rui:
UniClip: Leveraging Web Search for Universal Clipping of Articles on Mobile. 101-113 - Stefano Valtolina

:
A Storytelling-Driven Framework for Cultural Heritage Dissemination. 114-123
Volume 1, Number 3, September 2016
- Elisa Bertino:

Editorial: Introduction to Data Security and Privacy. 125-126 - Pietro Colombo

, Elena Ferrari:
Fine-Grained Access Control Within NoSQL Document-Oriented Datastores. 127-138 - Fatimah Y. Akeel, Asieh Salehi Fathabadi

, Federica Paci, Andrew M. Gravell, Gary B. Wills
:
Formal Modelling of Data Integration Systems Security Policies. 139-148 - Jongkil Kim

, Surya Nepal
:
A Cryptographically Enforced Access Control with a Flexible User Revocation on Untrusted Cloud Storage. 149-160 - Shahriar Badsha

, Xun Yi
, Ibrahim Khalil
:
A Practical Privacy-Preserving Recommender System. 161-177 - Jianfeng Wang

, Xiaofeng Chen:
Efficient and Secure Storage for Outsourced Data: A Survey. 178-188 - Changda Wang

, Wenyi Zheng, Elisa Bertino:
Provenance for Wireless Sensor Networks: A Survey. 189-200
Volume 1, Number 4, December 2016
- X. Sean Wang, Xiaoyong Du, Hui Xiong:

Special Issue Editorial. 201-202 - Xiaoying Wu, Dimitri Theodoratos:

Homomorphic Pattern Mining from a Single Large Data Tree. 203-218 - Boyi Hou, Zhuo Wang

, Qun Chen, Bo Suo, Chao Fang, Zhanhuai Li, Zachary G. Ives
:
Efficient Maximal Clique Enumeration Over Graph Data. 219-230 - Ningnan Zhou, Xuan Zhou, Xiao Zhang, Shan Wang:

An I/O-Efficient Buffer Batch Replacement Policy for Update-Intensive Graph Databases. 231-241 - Wei Song

, Jianbin Qin, Muhammad Aamir Cheema, Wei Wang:
Pre-computed Region Guardian Sets Based Reverse kNN Queries. 242-251 - Keqiang Wang, Hongwei Peng, Yuanyuan Jin, Chaofeng Sha, Xiaoling Wang:

Local Weighted Matrix Factorization for Top-n Recommendation with Implicit Feedback. 252-264 - Muhammad Habib Ur Rehman

, Chee Sun Liew
, Assad Abbas
, Prem Prakash Jayaraman
, Teh Ying Wah
, Samee U. Khan
:
Big Data Reduction Methods: A Survey. 265-284

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














