Abstract is missing.
- Adversarial Anomaly Detection Using Centroid-Based ClusteringImrul Chowdhury Anindya, Murat Kantarcioglu. 1-8 [doi]
- A Survey of Medicare Data Processing and Integration for Fraud DetectionRichard A. Bauder, Taghi M. Khoshgoftaar. 9-14 [doi]
- Decentralized IoT Data Management Using BlockChain and Trusted Execution EnvironmentGbadebo Ayoade, Vishal Karande, Latifur Khan, Kevin W. Hamlen. 15-22 [doi]
- Large-Scale Realistic Network Data Generation on a BudgetBrian Ricks, Patrick Tague, Bhavani M. Thuraisingham. 23-30 [doi]
- Towards an Architecture Model for Dynamic Software Product Lines EngineeringEdilton Santos, Ivan do Carmo Machado. 31-38 [doi]
- Measuring the Growth in Complexity of Models from Industrial Control NetworksMustafa Amir Faisal, Alvaro Cardenas. 39-46 [doi]
- Movie Recommendations Using the Deep Learning ApproachJeffrey Lund, Yiu-Kai Ng. 47-54 [doi]
- Recommending Scientific Collaboration Based on Topical, Authors and Venues SimilaritiesAbdulrhman M. Alshareef, Mohammed F. Alhamid, Abdulmotaleb El-Saddik. 55-61 [doi]
- On the Use of URLs and Hashtags in Age Prediction of Twitter UsersAbhinay Pandya, Mourad Oussalah 0002, Paola Monachesi, Panos Kostakos, Lauri Lovén. 62-69 [doi]
- The Effects of Random Undersampling with Simulated Class Imbalance for Big DataTawfiq Hasanin, Taghi M. Khoshgoftaar. 70-79 [doi]
- Medicare Fraud Detection Using Random Forest with Class Imbalanced Big DataRichard A. Bauder, Taghi M. Khoshgoftaar. 80-87 [doi]
- New Techniques for Coding Political Events across LanguagesYan Liang, Khaled Jabr, Christan Grant, Jill Irvine, Andrew Halterman. 88-93 [doi]
- Topic Diffusion Discovery Based on Sparseness-Constrained Non-Negative Matrix FactorizationYihuang Kang, Keng-Pei Lin, I-Ling Cheng. 94-101 [doi]
- Activity Detection and Analysis Using Smartphone SensorsAmari Vaughn, Paul Biocco, Yang Liu, Mohd Anwar. 102-107 [doi]
- Utilizing Netflow Data to Detect Slow Read AttacksClifford Kemp, Chad Calvert, Taghi M. Khoshgoftaar. 108-116 [doi]
- On Wordsense Disambiguation through Morphological Transformation and Semantic Distance and Domain Link KnowledgeMourad Oussalah 0002, Mikko Vaisanen, Ekaterina Gilman. 117-121 [doi]
- Supervised Machine Learning Algorithms for Credit Card Fraudulent Transaction Detection: A Comparative StudySahil Dhankhad, Emad A. Mohammed, Behrouz Far. 122-125 [doi]
- How Perceptions of Web Resource Boundaries Differ for Institutional and Personal ArchivesFaryaneh Poursardar, Frank Shipman. 126-129 [doi]
- Oculomotor Plant Feature Extraction from Human Saccadic Eye MovementsSobiga Shanmugathasan, Sampath Jayarathna. 130-133 [doi]
- Prioritized Situation Awareness for Soccer Robots Using Timed Transition Petri NetsMax Weissman, Daniel Ponsini, Seung-yun Kim. 134-138 [doi]
- Handling Hyperknowledge Representations through an Interactive Visual ApproachMárcio Ferreira Moreno, Rodrigo C. M. Santos, Wallas H. S. dos Santos, Rafael Brandão, Patricia Carrion, Renato Cerqueira. 139-146 [doi]
- Knowledge-Based Randomization for AmplificationThouraya Bouabana-Tebibel, Stuart H. Rubin, Lydia Bouzar-Benlabiod, Miled Basma Bentaiba-Lagrid, Maria Roumaissa Hanini. 147-154 [doi]
- Knowledge Amplification Using Randomization in Case-Based Reasoning - Case Study: Severity of Mammography MassMiled Basma Bentaiba-Lagrid, Lydia Bouzar-Benlabiod, Stuart H. Rubin, Thouraya Bouabana-Tebibel, Maria Roumaissa Hanini. 155-162 [doi]
- Randomization-Based Knowledge Discovery with Application to Weather PredictionLydia Bouzar-Benlabiod, Stuart H. Rubin, Meziani Lila. 163-169 [doi]
- A Complex Task Scheduling Scheme for Big Data Platforms Based on Boolean Satisfiability ProblemHuang Hong, Latifur Khan, Ayoade Gbadebo, Zhou Shaohua, Wei Yong. 170-177 [doi]
- Deep Transfer Learning for Traffic Sign RecognitionGrant Rosario, Thomas Sonderman, Xingquan Zhu. 178-185 [doi]
- Partition-Aware Scalable Outlier Detection Using Unsupervised LearningPallabi Parveen, Melissa Lee, Austin Henslee, Matt Dugan, Brad Ford. 186-192 [doi]
- Web-Based Recommendation System Architecture for Knowledge Reuse in MOOCs EcosystemsRodrigo Campos, Rodrigo Pereira dos Santos, Jonice Oliveira. 193-200 [doi]
- Forecasting Weekly Crude Oil Using Twitter Sentiment of U.S. Foreign Policy and Oil Companies DataMourad Oussalah 0002, Ahmed Zaidi. 201-208 [doi]
- The Impact of Live Tweeting on Social MovementsBrandeis Marshall, Takeria Blunt, Tayloir Thompson. 209-216 [doi]
- Automated Playlist Generation from Personal Music LibrariesDiana Lin, Sampath Jayarathna. 217-224 [doi]
- Design-Computational Thinking, Transfer and Flavors of Reuse: Scaffolds to Information and Data Science for Sustainable Systems in Smart CitiesChien-Sing Lee, K. Daniel Wong. 225-228 [doi]
- Tackling Class Imbalance in Cyber Security DatasetsCharles Wheelus, Elias Bou-Harb, Xingquan Zhu. 229-232 [doi]
- Efficient All-and-One Support Vector Machines Based on One-versus-All Data InseparabilityPatoomsiri Songsiri, Boonserm Kijsirikul. 233-239 [doi]
- RevMap: A Visualized Framework for Holistic View of ReviewsShekoofeh Mokhtari, Tao Li 0001, Ning Xie 0002. 240-243 [doi]
- Visualization of Server Log Data for Detecting Abnormal BehaviourReeta Suman, Behrouz Far, Emad A. Mohammed, Ashok Nair, Sanaz Janbakhsh. 244-247 [doi]
- Modeling CDC Data for Real Time Feature EstimationTannaz Rezaei Damavandi, Sampath Jayarathna, Yu Sun. 248-251 [doi]
- Deep Learning Based vs. Markov Chain Based Text Generation for Cross Domain Adaptation for Sentiment ClassificationOmar Abdelwahab, Adel Elmaghraby. 252-255 [doi]
- Misclassification Cost-Sensitive Software Defect PredictionLing Xu, Bei Wang, Ling Liu, Mo Zhou, Shengping Liao, Meng Yan. 256-263 [doi]
- Correlating Refugee Border Crossings with Internet Search DataPanos Kostakos, Abhinay Pandya, Mourad Oussalah 0002, Simo Hosio, Christoph Breidbach, Vassilis Kostakos, Niels van Berkel, Olga Kyriakouli, Arash Sattari. 264-268 [doi]
- Classification for Authorship of Tweets by Comparing Logistic Regression and Naive Bayes ClassifiersOpeyemi Aborisade, Mohd Anwar. 269-276 [doi]
- A Graduate School Recommendation System Using the Multi-Class Support Vector Machine and KNN ApproachesAlisha Baskota, Yiu-Kai Ng. 277-284 [doi]
- Identifying Medicare Provider Fraud with Unsupervised Machine LearningRichard A. Bauder, Raquel da Rosa, Taghi M. Khoshgoftaar. 285-292 [doi]
- Context-Sensitive Neural Sentiment ClassificationShekoofeh Mokhtari, Tao Li 0001, Ning Xie 0002. 293-299 [doi]
- Speaker Verification Using Adapted Bounded Gaussian Mixture ModelMuhammad Azam, Nizar Bouguila. 300-307 [doi]
- Toward a Dynamic K in K-Nearest Neighbor Fingerprint Indoor PositioningJiusong Hu, Hongli Liu, Dawei Liu 0001. 308-314 [doi]
- Soccer Ball Recognition and Distance Prediction Using Fuzzy Petri NetsPatrick Hansen, Philip Franco, Seung-yun Kim. 315-322 [doi]
- RDF Data Storage Techniques for Efficient SPARQL Query Processing Using Distributed Computation EnginesMahmudul Hassan, Srividya K. Bansal. 323-330 [doi]
- Efficient Processing of Range Queries over Distributed Relational DatabasesRichard Price, Lakshmish Ramaswamy, Seyedamin Pouriyeh. 331-337 [doi]
- Compositional Data Analysis with PLS-DA and Security ApplicationsDivya Ankam, Nizar Bouguila. 338-345 [doi]
- Is Gene Selection Enough for Imbalanced Bioinformatics Data?Ahmad Abu Shanab, Taghi M. Khoshgoftaar. 346-355 [doi]
- An Approach for Schema Extraction of JSON and Extended JSON Document CollectionsAngelo Augusto Frozza, Ronaldo dos Santos Mello, Felipe de Souza da Costa. 356-363 [doi]
- Semantic Data Querying over NoSQL Databases with Apache SparkMahmudul Hassan, Srividya K. Bansal. 364-371 [doi]
- Filter-Based Subset Selection for Easy, Moderate, and Hard Bioinformatics DataAhmad Abu Shanab, Taghi M. Khoshgoftaar. 372-377 [doi]
- Extracting Entity-Specific Substructures for RDF Graph EmbeddingMuhammad Rizwan Saeed, Viktor K. Prasanna. 378-385 [doi]
- Deep Spatio-Temporal Representation Learning for Multi-Class Imbalanced Data ClassificationSamira Pouyanfar, Shu-Ching Chen, Mei-Ling Shyu. 386-393 [doi]
- TwoRavens for Event DataVito D'Orazio, Marcus Deng, Michael Shoemate. 394-401 [doi]
- Ontology-Based Supervised Concept Learning for the Biogeochemical LiteratureDeya Banisakher, Maria E. Presa Reyes, Joshua D. Eisenberg, Joshua Allen, Mark A. Finlayson, René Price, Shu-Ching Chen. 402-410 [doi]
- Trustworthy Computing in the Dynamic IoT CloudI-Ling Yen, Farokh B. Bastani, Nidhiben Solanki, Yongtao Huang. 411-418 [doi]
- A Multi-Model Based Approach for Driver Missense IdentificationAhmed T. Soliman, Mei-Ling Shyu. 419-425 [doi]
- Accelerating Analytics for Clinical Pathways to Drive Cost Reduction and Quality ImprovementJames P. McGlothlin. 426-435 [doi]
- Reduced Residual Nets (Red-Nets): Low Powered Adversarial Outlier DetectorsSaad Sadiq, Marina Zmieva, Mei-Ling Shyu, Shu-Ching Chen. 436-443 [doi]
- Automatic Convolutional Neural Network Selection for Image Classification Using Genetic AlgorithmsHaiman Tian, Samira Pouyanfar, Jonathan Chen, Shu-Ching Chen, S. Sitharama Iyengar. 444-451 [doi]
- Universal Metadata Repository: Integrating Data Profiles Across an OrganizationNeda Abolhassani, Colin Puri, Sonali Parthasarathy, Zhijie Wang, Matthew Kujawinski, Teresa Tung, Lakshmish Ramaswamy. 452-459 [doi]
- Identifying Tweets with Fake NewsSaranya Krishnan, Min Chen. 460-464 [doi]
- Diabetic Retinopathy Stage Classification Using Convolutional Neural NetworksXiaoliang Wang, Yongjin Lu, Yujuan Wang, Wei-bang Chen. 465-471 [doi]
- Preliminary Modeling of Gender Identification in the Social CommunityKuo-Chung Chu, Peng-Hua Jiang, Huan-Yu Syu, Yan-Ling Chen. 472-477 [doi]
- Artificial Intelligence for Automatic Text SummarizationMin-Yuh Day, Chao-Yu Chen. 478-484 [doi]
- Automatic Dialogue Template Synthesis for Chatbot by Story Information ExtractionShih-Hung Wu, Liang-Pu Chen, Ping-Che Yang, Tsun Ku. 485-490 [doi]
- Automatic Question Generation from Children's Stories for Companion ChatbotChe-Hao Lee, Tzu-Yu Chen, Liang-Pu Chen, Ping-Che Yang, Richard Tzong-Han Tsai. 491-494 [doi]
- Tally Keeping-LTL: An LTL Semantics for Quantitative Evaluation of LTL SpecificationsRaphaël Khoury, Sylvain Hallé. 495-502 [doi]
- From Petri Nets to UML Model: A New Transformation ApproachLila Méziani, Thouraya Bouabana-Tebibel, Lydia Bouzar-Benlabiod. 503-510 [doi]
- A Graph Transformation Approach to Generate Analysable Maude Specifications from UML Interaction Overview DiagramsChafika Djaoui, Elhillali Kerkouche, Allaoua Chaoui, Khaled Khalfaoui. 511-517 [doi]
- Context-Dependent Reachability Analysis for Hybrid SystemsStefan Schupp, Justin Winkens, Erika Ábrahám. 518-525 [doi]
- Trusted Environments for Volunteer ComputingMichele Ianni, Elio Masciari. 526-529 [doi]
- Using Semantic Tools to Represent Data Extracted from Mobile DevicesGiovanni Cozzolino. 530-536 [doi]
- How to Exploit Recommender Systems in Social MediaFabio Persia, Mouzhi Ge, Daniela D'Auria. 537-541 [doi]