default search action
Data Science and Engineering, Volume 1
Volume 1, Number 1, March 2016
- Elisa Bertino:
Introduction to Data Science and Engineering. 1-3 - Lizhu Zhou:
Welcome Message from DSE Managing Editor. 4-5 - Donatella Firmani, Massimo Mecella, Monica Scannapieco, Carlo Batini:
On the Meaningfulness of "Big Data Quality" (Invited Paper). 6-20 - Jordi Soria-Comas, Josep Domingo-Ferrer:
Big Data Privacy: Challenges to Privacy Principles and Models. 21-28 - Qingbo Hu, Sihong Xie, Shuyang Lin, Senzhang Wang, Philip S. Yu:
Clustering Embedded Approaches for Efficient Information Network Inference. 29-40 - Bin Cui, Jie Jiang, Quanlong Huang, Ying Xu, Yanjun Gui, Wenyu Zhang:
POS: A High-Level System to Simplify Real-Time Stream Application Development on Storm. 41-50
Volume 1, Number 2, June 2016
- Jianzhong Li:
Introduction to the Special Issue. 51-53 - Siuly Siuly, Yanchun Zhang:
Medical Big Data: Neurological Diseases Diagnosis Through Medical Data Analysis. 54-64 - Wonjun Lee, Sanjiv Kumar:
Software-Defined Storage-Based Data Infrastructure Supportive of Hydroclimatology Simulation Containers: A Survey. 65-72 - Yuqing Sun, Haoran Xu, Elisa Bertino, Chao Sun:
A Data-Driven Evaluation for Insider Threats. 73-85 - Bolong Zheng, Han Su, Kai Zheng, Xiaofang Zhou:
Landmark-Based Route Recommendation with Crowd Intelligence. 86-100 - Ruihua Song, Kazutoshi Umemoto, Jian-Yun Nie, Xing Xie, Katsumi Tanaka, Yong Rui:
UniClip: Leveraging Web Search for Universal Clipping of Articles on Mobile. 101-113 - Stefano Valtolina:
A Storytelling-Driven Framework for Cultural Heritage Dissemination. 114-123
Volume 1, Number 3, September 2016
- Elisa Bertino:
Editorial: Introduction to Data Security and Privacy. 125-126 - Pietro Colombo, Elena Ferrari:
Fine-Grained Access Control Within NoSQL Document-Oriented Datastores. 127-138 - Fatimah Y. Akeel, Asieh Salehi Fathabadi, Federica Paci, Andrew M. Gravell, Gary B. Wills:
Formal Modelling of Data Integration Systems Security Policies. 139-148 - Jongkil Kim, Surya Nepal:
A Cryptographically Enforced Access Control with a Flexible User Revocation on Untrusted Cloud Storage. 149-160 - Shahriar Badsha, Xun Yi, Ibrahim Khalil:
A Practical Privacy-Preserving Recommender System. 161-177 - Jianfeng Wang, Xiaofeng Chen:
Efficient and Secure Storage for Outsourced Data: A Survey. 178-188 - Changda Wang, Wen-yi Zheng, Elisa Bertino:
Provenance for Wireless Sensor Networks: A Survey. 189-200
Volume 1, Number 4, December 2016
- X. Sean Wang, Xiaoyong Du, Hui Xiong:
Special Issue Editorial. 201-202 - Xiaoying Wu, Dimitri Theodoratos:
Homomorphic Pattern Mining from a Single Large Data Tree. 203-218 - Boyi Hou, Zhuo Wang, Qun Chen, Bo Suo, Chao Fang, Zhanhuai Li, Zachary G. Ives:
Efficient Maximal Clique Enumeration Over Graph Data. 219-230 - Ningnan Zhou, Xuan Zhou, Xiao Zhang, Shan Wang:
An I/O-Efficient Buffer Batch Replacement Policy for Update-Intensive Graph Databases. 231-241 - Wei Song, Jianbin Qin, Muhammad Aamir Cheema, Wei Wang:
Pre-computed Region Guardian Sets Based Reverse kNN Queries. 242-251 - Keqiang Wang, Hongwei Peng, Yuanyuan Jin, Chaofeng Sha, Xiaoling Wang:
Local Weighted Matrix Factorization for Top-n Recommendation with Implicit Feedback. 252-264 - Muhammad Habib Ur Rehman, Chee Sun Liew, Assad Abbas, Prem Prakash Jayaraman, Teh Ying Wah, Samee U. Khan:
Big Data Reduction Methods: A Survey. 265-284
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.