


default search action
ERCIM News, Volume 2016, 2016
Number 104, January 2016
- Roeland Merks, Marie-France Sagot:

Tackling Big Data in the Life Sciences - Introduction to the Special Theme. - Gunnar W. Klau:

Networks to the Rescue - From Big "Omics" Data to Targeted Hypotheses. - Christoph Quix, Thomas Berlage, Matthias Jarke:

Interactive Pay-As-You-Go-Integration of Life Science Data: The HUMIT Approach. - Alexander Schönhuth, Tobias Marschall:

Eliminating Blind Spots in Genetic Variant Discovery. - Claudia Caudai, Emanuele Salerno:

Computational Estimation of Chromosome Structure. - James T. Murphy, Mark P. Johnson, Frédérique Viard:

Modelling Approaches to Inform the Control and Management of Invasive Seaweeds. - Marie-Dominique Devignes, Malika Smaïl-Tabbone, David W. Ritchie:

Kbdock - Searching and Organising the Structural Space of Protein-Protein Interactions. - Alberto Magi, Nadia Pisanti, Lorenzo Tattini:

The Source of the Data Flood: Sequencing Technologies. - Haridimos Kondylakis, Lefteris Koumakis, Manolis Tsiknakis, Kostas Marias, Stephan Kiefer:

Big Data in Support of the Digital Cancer Patient. - Mohamed Boukhebouze, Stéphane Mouton, Jimmy Nsenga:

Towards an On-board Personal Data Mining Framework For P4 Medicine. - Kerstin Bach, Paul Jarle Mork, Agnar Aamodt:

Can Data-driven Self-Management Reduce Low Back Pain? - Mark Cieliebak, Dominic Egger, Fatih Uzdilli:

Twitter can Help to Find Adverse Drug Reactions. - Peter Kieseberg, Edgar R. Weippl, Andreas Holzinger:

Trust for the "Doctor in the Loop". - Erwan Zerhouni, Bogdan Prisacari, Qing Zhong, Peter Wild, Maria Gabrani:

Big Data Takes on Prostate Cancer. - Adrien Coulet, Malika Smaïl-Tabbone:

Mining Electronic Health Records to Validate Knowledge in Pharmacogenomics. - Elisabeth G. Rens, Sonja E. M. Boas, Roeland M. H. Merks:

Modelling the Growth of Blood Vessels in Health and Disease. - Brett G. Olivier, Bas Teusink:

Modelling? Using Standards Can Help You. - Paulo da Silva Carvalho, Patrik Hitzelberger

, Gilles Venturini:
Understanding Metadata to Exploit Life Sciences Open Data Datasets. - Benedetto Rugani, Paulo Carvalho, Benoit Othoniel:

Management of Big and Open Data in the Life Cycle Assessment of Ecosystem Services. - Juan Ramón Troncoso-Pastoriza, Elsa Prieto Pérez:

WITDOM: Empowering Privacy and Security in Non-trusted Environments.
- Bernd Zwattendorfer, Stephan Krenn, Thomas Lorünser

:
Secure and Privacy-Preserving Identity Management in the Cloud. - Daniel Slamanig, Agi Karyda, Thomas Lorünser

:
PRISMACLOUD - Privacy and Security Maintaining Services in the Cloud. - Beatriz Gallego-Nicasio Crespo, Melek Önen, Ghassan Karame:

TREDISEC: Towards Realizing a Truly Secure and Trustworthy Cloud. - Daniele Spoladore, Gianfranco E. Modoni, Marco Sacco:

Smart Devices for the Home of the Future: A New Model for Collaboration. - Christoph Trattner, Tomasz Kusmierczyk, Kjetil Nørvåg:

FOODWEB - Studying Food Consumption and Production Patterns on the Web. - Maria Koskinopoulou, Panos E. Trahanias:

Robots Learn Actions and Cooperative Tasks by Imitation. - Costas Bekas:

Unlocking the Secrets of the Dynamics of Earth's Interior.
Number 105, April 2016
- Rob van der Mei, Ariona Shashaj:

Visions of the Future: Towards the Next Generation of Logistics and Planning Systems. - Pedro Amorim, Sara Martins, Eduardo Curcio, Bernardo Almada-Lobo:

Defining the Best Distribution Network for Grocery Retail Stores. - Andreas Halm:

Planning Production Efficiently. - Miguel A. Barcelona:

ICT for a Logistics Demonstration Centre. - Péter Egri, Dávid Gyulai, Botond Kádár, László Monostori:

Production Planning on Supply Network and Plant Levels: The RobustPlaNet Approach. - Giorgio Oronzo Spagnolo, Eda Marchetti, Alessandro Coco, Stefania Gnesi:

Modelling and Validating an Import/Export Shipping Process. - Leendert Kok, Joaquim A. S. Gromicho:

Where is the Money? - Optimizing Cash Supply Chain Networks. - Sara Gestrelius, Martin Aronsson:

An Industrial Take on Breast Cancer Treatment. - Sara Gestrelius:

Evaluating Operational Feasibility before Investing: Shunting Yards in Sweden. - Pieter L. van den Berg, Guido Legemaate, Rob van der Mei:

Boosting the Responsiveness of Firefighter Services with Mathematical Programming. - Merel Steenbrink, Elenna R. Dugundji, Rob van der Mei:

Predicting the Demand for Charging Stations for Electric Vehicles. - Björn Bjurling, Fehmi Ben Abdesslem:

Data-driven Optimization for Intelligent and Efficient Transport. - Davide Bacciu, Antonio Carta, Stefania Gnesi, Laura Semini:

Adopting a Machine Learning Approach in the Design of Smart Transportation Systems. - Björn Löfvendahl:

Remote Service Using Augmented Reality. - René Berndt

, Alexander Sunk:
Value Stream Mapping with VASCO - From Reducing Lead Time to Sustainable Production Management. - Denise Holfeld, Axel Simroth:

Risk Analysis for a Synchro-modal Supply Chain Combined with Smart Steaming Concepts. - Niels A. H. Agatz, Leo G. Kroon, Remy Spliet, Albert P. M. Wagelmans:

Designing Sustainable Last-Mile Delivery Services in Online Retailing. - Joachim J. Arts:

Spare Parts Stocking and Expediting in a Fluctuating Demand Environment. - Abderrahmane Aggoun, Nicolas Beldiceanu, Gilles Chabert, François Fages:

Packing with Complex Shapes. - Victoria Svedberg:

Allocating Railway Tracks Using Market Mechanisms and Optimization. - Renaud De Landtsheer, Christophe Ponsard, Yoann Guyot:

OscaR, an Open Source Toolbox for Optimising Logistics and Supply Chain Systems. - Ahmad Al Hanbali, Sajjad Rahimi-Ghahroodi, W. Henk Zijm:

Integrated Resource Planning in Maintenance Logistics. - Sara Gestrelius:

Utilising the Uniqueness of Operation Days to better Fulfil Customer Requirements. - Ulrich Schimpel, Stefan Wörner:

Planning Complex Supply Networks Facing High Variability.
- Antonello Calabrò

, Francesca Lonetti, Eda Marchetti:
Business Process Execution Analysis through Coverage-based Monitoring. - Doreid Ammar, Katrien De Moor, Poul E. Heegaard:

Quality of Experience-assessment of WebRTC Based Video Communication. - Kostas Stefanidis, Giorgos Flouris, Ioannis Chrysakis, Yannis Roussakis:

D2V - Understanding the Dynamics of Evolving Data: A Case Study in the Life Sciences. - Peter Kieseberg, Edgar R. Weippl, Sebastian Schrittwieser:

Detection of Data Leaks in Collaborative Data Driven Research. - Axel-Cyrille Ngonga Ngomo

, Alejandra García-Rojas, Irini Fundulaki:
HOBBIT: Holistic Benchmarking of Big Linked Data. - Erina Ferro:

Smart Solutions for the CNR Campus in Pisa.
Number 106, July 2016
- Fabio Martinelli, Edgar R. Weippl:

Cybersecurity - Introduction to the Special Theme. - Ana Nieto, Rodrigo Roman, Javier López:

Digital Witness: Digital Evidence Management Framework for the Internet of Things. - Joppe W. Bos, Wil Michiels:

Security Assessment of Software Security: A Closer Look at White-Box Cryptographic Implementations. - Nicolás Notario, Stephan Krenn, Bernd Zwattendorfer, Felix Hörandner:

CREDENTIAL: Secure Cloud Identity Wallet. - Florian Dold, Christian Grothoff:

GNU Taler: Ethical Online Payments for the Internet Age. - José Bacelar Almeida, Manuel Barbosa, Hugo Pacheco, Vitor Pereira:

A Tool-Chain for High-Assurance Cryptographic Software. - Nicolas Sendrier, Jean-Pierre Tillich:

Code-Based Cryptography: New Security Solutions Against a Quantum Adversary. - Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani:

Using Cryptography to Control Your Data at a Distance. - Thomas Lorünser

, Daniel Slamanig, Thomas Länger, Henrich C. Pöhls:
A New Architecture for Developing Cryptographic Cloud Services. - Marc Stevens:

Deprecating an Internet Security Standard with Cryptanalysis. - Marco Gramaglia, Marco Fiore:

Thwarting Uniqueness in Datasets of Spatiotemporal Trajectories. - Nataliia Bielova, Frédéric Besson, Thomas P. Jensen:

Using JavaScript Monitoring to Prevent Device Fingerprinting. - Robert N. M. Watson, Simon W. Moore, Peter G. Neumann:

CHERI: A Hardware-Software System to Support the Principle of Least Privilege. - Andreas Konstantinidis, Georgios Chatzimilioudis, Demetrios Zeinalipour-Yazti:

Privacy-Preserving Indoor Localisation and Navigation. - Stefano Cresci, Marinella Petrocchi, Maurizio Tesconi, Roberto Di Pietro, Angelo Spognardi:

Social Fingerprinting - or the Truth About You. - Arthur Melissen:

Flexible Decentralised Access Control using Invitation-Response Dialogue. - Carmela Gambardella, Ilaria Matteucci, Marinella Petrocchi:

Data Sharing Agreements: How to Glue Definition, Analysis and Mapping Together. - Paolo Mori, Andrea Saracino

, Francesco Di Cerbo:
Data Usage Control: Introducing a New Framework for Cloud and Mobile Environments. - Marco Tiloca, Christian Gehrmann, Ludwig Seitz:

Robust and Scalable DTLS Session Establishment. - Thijs Veugen:

Client-Server Framework for Securely Outsourcing Computations. - Benjamin André, Nicolas Anciaux, Philippe Pucheral, Paul Tran-Van:

A Root of Trust for the Personal Cloud. - Ioannis G. Askoxylakis, Nikolaos E. Petroulakis

, Vivek Kulkami, Florian Zeiger:
VirtuWind - Security in a Virtual and Programmable Industrial Network Prototype Deployed in an Operational Wind Park. - Fabrizio Biondi, Sébastien Josse, Axel Legay:

Bypassing Malware Obfuscation with Dynamic Synthesis. - Dimitris E. Simos:

SPLIT: Security Protocol Interaction Testing in Practice. - Philippe Antoine, Guillaume Bonfante, Jean-Yves Marion:

Gorille: Efficient and Relevant Software Comparisons. - Nisrine Jafri, Axel Legay, Jean-Louis Lanet:

Vulnerability Prediction Against Fault Attacks. - Valérie Viet Triem Tong, Jean-François Lalande, Mourad Leslous:

Challenges in Android Malware Analysis. - Vicente Matellán, Francisco J. Rodríguez-Lera, Jesús Balsa:

Cybersecurity in Robotic Systems. - Christophe Ponsard, Philippe Massonet, Gautier Dallons:

Co-engineering Security and Safety Requirements for Cyber-Physical Systems. - Marcel Caria:

Cyber-Physical Systems: Closing the Gap between Hardware and Software. - Evangelos P. Markatos, Egidija Versinskiene, Evaldas Bruze:

SENTER: A Network of the European Centres of Excellence in Cyber Crime Research, Training, and Education. - Erno Rigó, Mihály Héder:

A Network of Internet Probes for Fighting Cyber Attacks. - Anze Zitnik, Antonio Álvarez Romero, Stephanie Parker:

CyberWISER-Light: Supporting Cyber Risk Assessment with Automated Vulnerability Scanning. - Florian Skopik, Maria Leitner, Timea Pahi:

CISA: Establishing National Cyber Situational Awareness to Counter New Threats. - Martin Schmiedecker, Sebastian Neuner:

On Reducing Bottlenecks in Digital Forensics. - László Havasi, Tamás Szirányi:

Multi-View Security and Surveillance at MTA SZTAKI.
- Haralampos Pozidis, Nikolaos Papandreou, Thomas Mittelholzer, Evangelos Eleftheriou:

High-Density Data Storage in Phase-Change Memory. - Giulia Barbagelata, Marco Attene, Tor Dokken:

CAxMan: Design for Additive Manufacturing Made Easy and Cost-effective.
Number 107, October 2016
- Laurent Romary:

Open Science: Taking Our Destiny into Our Own Hands. - Jos C. M. Baeten, Claude Kirchner:

ERCIM Goes to Open Access. - Peter Murray-Rust:

Will Europe Liberate Knowledge through Content Mining? - Karim Ramdani:

Roads to Open Access: The Good, the Bad and the Ugly. - Leonardo Candela, Paolo Manghi, Donatella Castelli:

Open-Access Repositories and the Open Science Challenge. - Marc Herbstritt, Wolfgang Thomas:

LIPIcs - an Open-Access Series for International Conference Proceedings. - Vera Sarkol:

Scientific Data and Preservation - Policy Issues for the Long-term Record.
- Sander M. Bohté, Hung Son Nguyen:

Modern Machine Learning: More with Less, Cheaper and Better. - Jean-Baptiste Mouret:

Micro-Data Learning: The Other End of the Spectrum. - Peter Wittek:

Making Learning Physical - Machine Intelligence and Quantum Resources. - Max Welling:

Marrying Graphical Models with Deep Learning. - Bernd Malle, Peter Kieseberg, Sebastian Schrittwieser, Andreas Holzinger:

Privacy Aware Machine Learning and the "Right to be Forgotten". - Wouter M. Koolen:

Robust and Adaptive Methods for Sequential Decision Making. - Karol Kurach, Marcin Andrychowicz, Ilya Sutskever:

Neural Random Access Machines. - Olof Görnerup, Theodore Vasiloudis:

Mining Similarities and Concepts at Scale. - Claudio Lucchese, Franco Maria Nardini, Raffaele Perego, Nicola Tonellotto, Salvatore Orlando, Rossano Venturini:

Fast Traversal of Large Ensembles of Regression Trees. - Mark Cieliebak:

Optimising Deep Learning for Infinite Applications in Text Analytics. - András A. Benczúr, Róbert Pálovics, Márton Balassi, Volker Markl, Tilmann Rabl, Juan Soto, Björn Hovstadius, Jim Dowling, Seif Haridi:

Towards Streamlined Big Data Analytics. - Frédéric Alexandre:

Autonomous Machine Learning. - Pierre-Yves Oudeyer, Manuel Lopes, Celeste Kidd, Jacqueline Gottlieb:

Curiosity and Intrinsic Motivation for Autonomous Machine Learning. - Jan Stampfli, Kurt Stockinger:

Applied Data Science: Using Machine Learning for Alarm Verification. - George Potamias:

Towards Predictive Pharmacogenomics Models. - José Francisco García Cantos, Manuel Peinado, Miguel A. Salido, Federico Barber:

Optimisation System for Cutting Continuous Flat Glass. - Balázs Csanád Csáji, András Kovács, József Váncza:

Online Learning for Aggregating Forecasts in Renewable Energy Systems. - Bert Kappen, Wim Wiegerinck:

Bonaparte: Bayesian Networks to Give Victims back their Names.
- Patrizio Dazzi:

BASMATI - Cloud Brokerage Across Borders For Mobile Users And Applications. - Olivier Parisot, Benoît Otjacques:

Predictive Modelling from Data Streams. - Marios D. Dikaiakos, George Pallis, Evangelos P. Markatos:

Mandola: Monitoring and Detecting Online Hate Speech. - Markus Wurzenberger, Florian Skopik:

The BÆSE Testbed - Analytic Evaluation of IT Security Tools in Specified Network Environments. - Dimitrios N. Serpanos, Howard E. Shrobe, Muhammad Taimoor Khan:

Behaviour-Based Security for Cyber-Physical Systems. - Nicolas Mayer, Jocelyn Aubert, Hervé Cholez, Eric Grandry, Eric Dubois:

The TISRIM-Telco Toolset - An IT Regulatory Framework to Support Security Compliance in the Telecommunications Sector. - Darko Brodic, Dejan Tanikic, Alessia Amelio:

Predicting the Extremely Low Frequency Magnetic Field Radiation Emitted from Laptops: A New Approach to Laptop Design. - Erkuden Rios, Massimiliano Rak, Samuel Olaiya Afolaranmi:

Managing Security in Distributed Computing: Self-Protective Multi-Cloud Applications.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














