


default search action
IEEE Transactions on Big Data, Volume 8
Volume 8, Number 1, February 2022
- Hu Xiong

, Kim-Kwang Raymond Choo
, Athanasios V. Vasilakos
:
Revocable Identity-Based Access Control for Big Data with Verifiable Outsourced Computing. 1-13 - Anmin Fu

, Shui Yu
, Yuqing Zhang
, Huaqun Wang
, Chanying Huang:
NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users. 14-24 - Qingchen Zhang

, Laurence T. Yang
, Zhikui Chen
, Peng Li
:
PPHOPCM: Privacy-Preserving High-Order Possibilistic c-Means Algorithm for Big Data Clustering with Cloud Computing. 25-34 - Ziyi Su, Frédérique Biennier, Zhihan Lv

, Yong Peng, Houbing Song
, Jingwei Miao:
Toward Architectural and Protocol-Level Foundation for End-to-End Trustworthiness in Cloud/Fog Computing. 35-47 - Jian Shen

, Chen Wang
, Aniello Castiglione
, Dengzhi Liu, Christian Esposito
:
Trustworthiness Evaluation-Based Routing Protocol for Incompletely Predictable Vehicular Ad Hoc Networks. 48-59 - Chengqiang Huang

, Geyong Min
, Yulei Wu
, Yiming Ying, Ke Pei
, Zuochang Xiang:
Time Series Anomaly Detection for Trustworthy Services in Cloud Computing Systems. 60-72 - Xue Yang

, Rongxing Lu
, Kim-Kwang Raymond Choo
, Fan Yin
, Xiaohu Tang
:
Achieving Efficient and Privacy-Preserving Cross-Domain Big Data Deduplication in Cloud. 73-84 - Bing Tang

, Gilles Fedak:
WukaStore: Scalable, Configurable and Reliable Data Storage on Hybrid Volunteered Cloud and Desktop Systems. 85-98 - Jiahui Yu, Kun Wang

, Peng Li
, Rui Xia, Song Guo
, Minyi Guo:
Efficient Trustworthiness Management for Malicious User Detection in Big Data Collection. 99-112 - Qichao Xu

, Zhou Su
, Shui Yu
, Ying Wang
:
Trust Based Incentive Scheme to Allocate Big Data Tasks with Mobile Social Cloud. 113-124 - Xuyun Zhang

, Lianyong Qi
, Wanchun Dou
, Qiang He
, Christopher Leckie, Ramamohanarao Kotagiri, Zoran Salcic
:
MRMondrian: Scalable Multidimensional Anonymisation for Big Data Privacy Preservation. 125-139 - Tian Wang

, Yang Li
, Weiwei Fang
, Wenzheng Xu
, Junbin Liang
, Yewang Chen
, Xuxun Liu
:
A Comprehensive Trustworthy Data Collection Approach in Sensor-Cloud Systems. 140-151 - Hourieh Khalajzadeh

, Mohamed Abdelrazek
, John C. Grundy
, John G. Hosking
, Qiang He
:
Survey and Analysis of Current End-User Data Analytics Tool Support. 152-165 - Chuishi Meng

, Yu Cui, Qing He
, Lu Su
, Jing Gao:
Towards the Inference of Travel Purpose with Heterogeneous Urban Data. 166-177 - Conor Fahy

, Shengxiang Yang
:
Finding and Tracking Multi-Density Clusters in Online Dynamic Data Streams. 178-192 - Ting Li, Yiming Zhang

, Hao Liu
, Guangtao Xue, Ling Liu
:
Fast Compressive Spectral Clustering for Large-Scale Sparse Graph. 193-202 - Hanieh Poostchi

, Massimo Piccardi
:
BiLSTM-SSVM: Training the BiLSTM with a Structured Hinge Loss for Named-Entity Recognition. 203-212 - Daniel Rammer

, Thilina Buddhika
, Matthew Malensek
, Shrideep Pallickara, Sangmi Lee Pallickara:
Enabling Fast Exploratory Analyses Over Voluminous Spatiotemporal Data Using Analytical Engines. 213-228 - Long Hoang Nguyen

, Zhou Yang
, Jia Li, Zhenhe Pan, Guofeng Cao
, Fang Jin
:
Forecasting People's Needs in Hurricane Events from Social Network. 229-240 - Haipeng Yao

, Chong Liu, Peiying Zhang
, Sheng Wu
, Chunxiao Jiang
, Shui Yu
:
Identification of Encrypted Traffic Through Attention Mechanism Based Long Short Term Memory. 241-252 - Sijie Wu

, Hanhua Chen
, Hai Jin
, Shadi Ibrahim
:
Shadow: Exploiting the Power of Choice for Efficient Shuffling in MapReduce. 253-267 - Sethuraman Jayaraman, Manikandan Ramachandran

, Rizwan Patan
, Mahmoud Daneshmand, Amir H. Gandomi
:
Fuzzy Deep Neural Learning Based on Goodman and Kruskal's Gamma for Search Engine Optimization. 268-277 - Qi Li

, Mingyu Cheng
, Junfeng Wang
, Bowen Sun:
LSTM Based Phishing Detection for Big Email Data. 278-288
Volume 8, Number 2, April 2022
- Xiaofei Liao

, Zhan Zhang
, Haikun Liu
, Hai Jin
:
Improving Bank-Level Parallelism for In-Memory Checkpointing in Hybrid Memory Systems. 289-301 - Sriram Srinivasan

, Samuel D. Pollard
, Boyana Norris
, Sajal K. Das
, Sanjukta Bhowmick:
A Shared-Memory Algorithm for Updating Tree-Based Properties of Large Dynamic Networks. 302-317 - Zhifei Pang

, Sai Wu
, Gang Chen, Lidan Shou
, Ke Chen, Bingsheng He:
A Stack-Centric Processing Model for Iterative Processing. 318-331 - Zhengyu Yang

, Manu Awasthi, Mrinmoy Ghosh, Janki Bhimani
, Ningfang Mi:
I/O Workload Management for All-Flash Datacenter Storage Systems Based on Total Cost of Ownership. 332-345 - Changqing Luo

, Jinlong Ji
, Xuhui Chen
, Ming Li
, Laurence T. Yang
, Pan Li
:
Parallel Secure Outsourcing of Large-Scale Nonlinearly Constrained Nonlinear Programming Problems. 346-355 - Anis Alazzawe, Amitangshu Pal

, Krishna Kant
:
Efficient Big-Data Access: Taxonomy and a Comprehensive Survey. 356-376 - Yang Shi

, Yuyin Liu, Hanghang Tong
, Jingrui He, Gang Yan
, Nan Cao
:
Visual Analytics of Anomalous User Behaviors: A Survey. 377-396 - Xuan Song

, Haoran Zhang
, Rajendra Akerkar
, Huawei Huang
, Song Guo
, Lei Zhong, Yusheng Ji
, Andreas L. Opdahl
, Hemant Purohit
, André Skupin, Akshay Pottathil, Aron Culotta
:
Big Data and Emergency Management: Concepts, Methodologies, and Applications. 397-419 - Xiaoyu Shi

, Qiang He
, Xin Luo
, Yanan Bai, Mingsheng Shang
:
Large-Scale and Scalable Latent Factor Analysis via Distributed Alternative Stochastic Gradient Descent for Recommender Systems. 420-431 - Panagiotis Liakos

, Alexandros Ntoulas, Alex Delis:
Uncovering Local Hierarchical Overlapping Communities at Scale. 432-445 - Dan Teng

, Xiaowei Zhang
, Li Cheng
, Delin Chu
:
Least Squares Approximation via Sparse Subsampled Randomized Hadamard Transform. 446-457 - Yuxing Chen

, Peter Goetsch, Mohammad Ashraful Hoque
, Jiaheng Lu
, Sasu Tarkoma
:
$d$d-Simplexed: Adaptive Delaunay Triangulation for Performance Modeling and Prediction on Big Data Analytics. 458-469 - Roohollah Etemadi

, Jianguo Lu:
PES: Priority Edge Sampling in Streaming Triangle Estimation. 470-481 - Shengnan Wang

, Chunguang Li
:
Discrete Double-Bit Hashing. 482-494 - Peng Sun

, Yonggang Wen
, Ruobing Han, Wansen Feng, Shengen Yan:
GradientFlow: Optimizing Network Performance for Large-Scale Distributed DNN Training. 495-507 - Zubair Shah

, Adam G. Dunn
:
Event Detection on Twitter by Mapping Unexpected Changes in Streaming Data into a Spatiotemporal Lattice. 508-522 - Lun Hu

, Shicheng Yang, Xin Luo
, MengChu Zhou
:
An Algorithm of Inductively Identifying Clusters From Attributed Graphs. 523-534 - Guangyi Lv

, Kun Zhang
, Le Wu, Enhong Chen
, Tong Xu
, Qi Liu
, Weidong He:
Understanding the Users and Videos by Mining a Novel Danmu Dataset. 535-551 - Xuanwu Liu, Guoxian Yu

, Carlotta Domeniconi, Jun Wang
, Guoqiang Xiao
, Maozu Guo:
Weakly Supervised Cross-Modal Hashing. 552-563 - Ye Liu

, Yuxuan Liang, Kun Ouyang, Shuming Liu
, David S. Rosenblum
, Yu Zheng
:
Predicting Urban Water Quality With Ubiquitous Data - A Data-Driven Approach. 564-578
Volume 8, Number 3, June 2022
- Weijie Fu

, Meng Wang
, Shijie Hao
, Tingting Mu
:
FLAG: Faster Learning on Anchor Graph with Label Predictor Optimization. 579-591 - Mayank Kejriwal

, Pedro A. Szekely:
Knowledge Graphs for Social Good: An Entity-Centric Search Engine for the Human Trafficking Domain. 592-606 - Liang He

, Bin Shao, Yanghua Xiao, Yatao Li, Tie-Yan Liu, Enhong Chen
, Huanhuan Xia:
Neurally-Guided Semantic Navigation in Knowledge Graph. 607-615 - Yuyan Zheng

, Chuan Shi
, Xiaohuan Cao, Xiaoli Li
, Bin Wu:
A Meta Path Based Method for Entity Set Expansion in Knowledge Graph. 616-629 - Manling Li

, Yuanzhuo Wang, Denghui Zhang, Yantao Jia
, Xueqi Cheng:
Link Prediction in Knowledge Graphs: A Hierarchy-Constrained Approach. 630-643 - Zongpu Zhang

, Tao Song
, Liwei Lin
, Yang Hua
, Xufeng He, Zhengui Xue, Ruhui Ma
, Haibing Guan:
Towards Ubiquitous Intelligent Computing: Heterogeneous Distributed Deep Neural Networks. 644-657 - Meng Ma

, Ping Wang
:
Efficient Event Inference and Context-Awareness in Internet of Things Edge Systems. 658-670 - Hongchao Qin

, Rong-Hua Li
, Guoren Wang
, Xin Huang
, Ye Yuan
, Jeffrey Xu Yu
:
Mining Stable Communities in Temporal Networks by Density-Based Clustering. 671-684 - Lianyong Qi, Qiang He, Feifei Chen

, Xuyun Zhang
, Wanchun Dou, Qiang Ni
:
Data-Driven Web APIs Recommendation for Building Web Applications. 685-698 - Chandan Misra

, Sourangshu Bhattacharya, Soumya K. Ghosh:
Stark: Fast and Scalable Strassen's Matrix Multiplication Using Apache Spark. 699-710 - Yangwen Yu

, Victor O. K. Li
, Jacqueline C. K. Lam
:
Missing Air Pollution Data Recovery Based on Long-Short Term Context Encoder. 711-722 - Nishaal J. Parmar

, Hazem H. Refai
, Thordur Runolfsson:
A Survey on the Methods and Results of Data-Driven Koopman Analysis in the Visualization of Dynamical Systems. 723-738 - Gao Liu, Huidong Dong, Zheng Yan

, Xiaokang Zhou
, Shohei Shimizu
:
B4SDC: A Blockchain System for Security Data Collection in MANETs. 739-752 - Rui Wang

, Xiaojun Wu
, Kai-Xuan Chen
, Josef Kittler
:
Multiple Riemannian Manifold-Valued Descriptors Based Image Set Classification With Multi-Kernel Metric Learning. 753-769 - Jia Wang

, Jiannong Cao
, Senzhang Wang, Zhongyu Yao
, Wengen Li
:
IRDA: Incremental Reinforcement Learning for Dynamic Resource Allocation. 770-783 - Ye Yuan

, Qiang He
, Xin Luo
, Mingsheng Shang
:
A Multilayered-and-Randomized Latent Factor Model for High-Dimensional and Sparse Matrices. 784-794 - Zhiqing Tang

, Wei Jia, Xiaojie Zhou
, Wenmian Yang
, Yongjian You:
Representation and Reinforcement Learning for Task Scheduling in Edge Computing. 795-808 - Mingyang Zhang

, Tong Li
, Yue Yu, Yong Li
, Pan Hui
, Yu Zheng
:
Urban Anomaly Analytics: Description, Detection, and Prediction. 809-826 - Chao Chen

, Sen Yang, Yasha Wang, Bin Guo
, Daqing Zhang:
CrowdExpress: A Probabilistic Framework for On-Time Crowdsourced Package Deliveries. 827-842 - Yang Liu

, Yingting Liu, Zhijie Liu, Yuxuan Liang, Chuishi Meng
, Junbo Zhang
, Yu Zheng
:
Federated Forest. 843-854 - Xiaofei Niu

, Guangchi Liu, Qing Yang
:
OpinionRank: Trustworthy Website Detection Using Three Valued Subjective Logic. 855-866
Volume 8, Number 4, August 2022
- Di Jin

, Wenjun Wang, Guojie Song, Philip S. Yu, Jiawei Han:
Guest Editorial: Special Issue on Network Structural Modeling and Learning in Big Data. 867-868 - Dongxiao He

, Yanli Wu
, Youyou Wang
, Zhizhi Yu
, Zhiyong Feng
, Xiaobao Wang
, Yuxiao Huang
:
Identification of Communities With Multi-Semantics via Bayesian Generative Model. 869-881 - Xiaowei Gao, Xiaoke Ma

, Wensheng Zhang, Jianbin Huang
, He Li
, Yanni Li, Jiangtao Cui
:
Multi-View Clustering With Self-Representation and Structural Constraint. 882-893 - Dong Liu

, Guoliang Yang, Yanwei Wang, Hu Jin
, Enhong Chen
:
How to Protect Ourselves From Overlapping Community Detection in Social Networks. 894-904 - Nan Jiang

, Fuxian Duan
, Honglong Chen
, Wei Huang
, Ximeng Liu
:
MAFI: GNN-Based Multiple Aggregators and Feature Interactions Network for Fraud Detection Over Heterogeneous Graph. 905-919 - Yu Xie

, Shengze Lv, Yuhua Qian
, Chao Wen
, Jiye Liang
:
Active and Semi-Supervised Graph Neural Networks for Graph Classification. 920-932 - Pengfei Jiao

, Xuan Guo
, Ting Pan, Wang Zhang
, Yulong Pei, Lin Pan
:
A Survey on Role-Oriented Network Embedding. 933-952 - Guojie Song

, Chuan Shi
, Yizhou Sun
, Zhiyuan Liu
:
Guest Editorial: Special Issue on Social Media Computing. 953-954 - Ruobing Xie

, Qi Liu
, Shukai Liu
, Ziwei Zhang
, Peng Cui
, Bo Zhang
, Leyu Lin
:
Improving Accuracy and Diversity in Matching of Recommendation With Diversified Preference Network. 955-967 - Chaobo He

, Yulong Zheng
, Xiang Fei
, Hanchao Li
, Zeng Hu
, Yong Tang
:
Boosting Nonnegative Matrix Factorization Based Community Detection With Graph Attention Auto-Encoder. 968-981 - Hai Jin

, Zhaobo Zhang
, Pingpeng Yuan:
Improving Chinese Word Representation Using Four Corners Features. 982-993 - Dongxiao He

, Huixin Liu
, Zhiyong Feng
, Xiaobao Wang
, Di Jin
, Wenze Song, Yuxiao Huang
:
A Joint Community Detection Model: Integrating Directed and Undirected Probabilistic Graphical Models via Factor Graph With Attention Mechanism. 994-1006 - Jianian Li, Peng Bao

, Huawei Shen
, Xuanya Li:
MiSTR: A Multiview Structural-Temporal Learning Framework for Rumor Detection. 1007-1019 - Prajwol Sangat

, David Taniar, Christopher H. Messom:
ATrie Group Join: A Parallel Star Group Join and Aggregation for In-Memory Column-Stores. 1020-1033 - Yang Han

, Jacqueline C. K. Lam
, Victor O. K. Li
, Qi Zhang
:
A Domain-Specific Bayesian Deep-Learning Approach for Air Pollution Forecast. 1034-1046 - Dongdong Hou

, Yang Cong
, Gan Sun
, Jiahua Dong
, Jun Li
, Kai Li:
Fast Multi-View Outlier Detection via Deep Encoder. 1047-1058 - Feng Zhao

, Xiangyu Gui, Yafan Huang
, Hai Jin
, Laurence T. Yang
:
Dynamic Entity-Based Named Entity Recognition Under Unconstrained Tagging Schemes. 1059-1072 - Li Wang

, Ren-Cang Li
:
A Scalable Algorithm for Large-Scale Unsupervised Multi-View Partial Least Squares. 1073-1083 - Yingxue Zhang

, Yanhua Li
, Xun Zhou
, Xiangnan Kong, Jun Luo
:
Off-Deployment Traffic Estimation - A Traffic Generative Adversarial Networks Approach. 1084-1095 - Yurong Zhong

, Long Jin
, Mingsheng Shang
, Xin Luo
:
Momentum-Incorporated Symmetric Non-Negative Latent Factor Models. 1096-1106 - Jiahao Ding, Sai Mounika Errapotu

, Yuanxiong Guo
, Haixia Zhang
, Dongfeng Yuan
, Miao Pan
:
Private Empirical Risk Minimization With Analytic Gaussian Mechanism for Healthcare System. 1107-1117 - Xiangxi Xu, Zhihui Lai

, Yudong Chen
:
Relaxed Locality Preserving Supervised Discrete Hashing. 1118-1128 - Aiping Huang

, Tiesong Zhao
:
Weak Supervision Learning for Object Co-Segmentation. 1129-1140 - Lei Zhang

, Xinpeng Wu, Hongke Zhao, Fan Cheng
, Qi Liu
:
Personalized Recommendation in P2P Lending Based on Risk-Return Management: A Multi-Objective Perspective. 1141-1154
Volume 8, Number 5, October 2022
- Jin Huang

, Ming Xiao
:
Mobile Network Traffic Prediction Based on Seasonal Adjacent Windows Sampling and Conditional Probability Estimation. 1155-1168 - Min Shi

, Yufei Tang
, Xingquan Zhu
, Jianxun Liu
:
Multi-Label Graph Convolutional Network Representation Learning. 1169-1181 - Beibei Si, Yuxuan Liang, Jin Zhao

, Yu Zhang
, Xiaofei Liao
, Hai Jin
, Haikun Liu
, Lin Gu
:
GGraph: An Efficient Structure-Aware Approach for Iterative Graph Processing. 1182-1194 - Guojie Song

, Qingqing Long, Yi Luo, Yiming Wang, Yilun Jin
:
Deep Convolutional Neural Network Based Medical Concept Normalization. 1195-1208 - Mengyu Ma

, Luo Chen
, Xue Ouyang
, Xiaoran Liu
, Jun Li, Ning Jing:
Efficient Interactive Global Cellular Signal Strength Visualization. 1209-1219 - Guojie Song

, Yizhou Zhang, Lingjun Xu
, Haibing Lu
:
Domain Adaptive Network Embedding. 1220-1232 - Wei Wang

, Tao Tang
, Feng Xia
, Zhiguo Gong
, Zhikui Chen
, Huan Liu
:
Collaborative Filtering With Network Representation Learning for Citation Recommendation. 1233-1246 - Fan Zhang, Long Zheng

, Xiaofei Liao
, Xinqiao Lv, Hai Jin
, Jiang Xiao
:
An Effective 2-Dimension Graph Partitioning for Work Stealing Assisted Graph Processing on Multi-FPGAs. 1247-1258 - Xinying Wang

, Cong Xu, Ke Wang, Feng Yan, Dongfang Zhao
:
Memory Scaling of Cloud-Based Big Data Systems: A Hybrid Approach. 1259-1272 - Sujit Biswas

, Kashif Sharif
, Fan Li
, Iqbal Alam, Saraju P. Mohanty
:
DAAC: Digital Asset Access Control in a Unified Blockchain Based E-Health System. 1273-1287 - Xin Zhang

, Yanhua Li
, Xun Zhou
, Jun Luo
:
cGAIL: Conditional Generative Adversarial Imitation Learning - An Application in Taxi Drivers' Strategy Learning. 1288-1300 - Menghai Pan

, Yanhua Li
, Zhi-Li Zhang
, Jun Luo
:
SCCS: Smart Cloud Commuting System With Shared Autonomous Vehicles. 1301-1311 - Zann Koh

, Yuren Zhou
, Billy Pik Lik Lau
, Chau Yuen
, Bige Tunçer
, Keng Hua Chong
:
Multiple-Perspective Clustering of Passive Wi-Fi Sensing Trajectory Data. 1312-1325 - Xiuwen Yi

, Zhewen Duan
, Ruiyuan Li, Junbo Zhang
, Tianrui Li
, Yu Zheng
:
Predicting Fine-Grained Air Quality Based on Deep Neural Networks. 1326-1339 - Ahmad Slo

, Sukanya Bhowmik
, Kurt Rothermel
:
State-Aware Load Shedding From Input Event Streams in Complex Event Processing. 1340-1357 - Nima Ebadi

, Mohsen M. Jozani
, Kim-Kwang Raymond Choo
, Paul Rad:
A Memory Network Information Retrieval Model for Identification of News Misinformation. 1358-1370 - Weiyi Huang

, Peng Li
, Bo Li
, Tao Zhang
:
DMP: Content Delivery With Dynamic Movement Pattern in Vehicular Networks. 1371-1386 - Ying Shen

, Yilin Zhang
, Kaiqi Yuan, Dagang Li
, Hai-Tao Zheng
:
A Knowledge-Enhanced Multi-View Framework for Drug-Target Interaction Prediction. 1387-1398 - Philip Derbeko

, Shlomi Dolev
, Ehud Gudes, Jeffrey D. Ullman:
Efficient and Privacy Preserving Approximation of Distributed Statistical Queries. 1399-1413 - Yaying Zhang

, Xinyuan Sui:
RCIVMM: A Route Choice-Based Interactive Voting Map Matching Approach for Complex Urban Road Networks. 1414-1427 - Angtai Li, Yu Chen, Zheng Yan

, Xiaokang Zhou
, Shohei Shimizu
:
A Survey on Integrity Auditing for Data Storage in the Cloud: From Single Copy to Multiple Replicas. 1428-1442
Volume 8, Number 6, December 2022
- Ali Jazayeri

, Christopher C. Yang:
Frequent Subgraph Mining Algorithms in Static and Temporal Graph-Transaction Settings: A Survey. 1443-1462 - Zhe Fei

, Yevgen Ryeznik
, Oleksandr Sverdlov
, Chee-Wei Tan
, Weng Kee Wong
:
An Overview of Healthcare Data Analytics With Applications to the COVID-19 Pandemic. 1463-1480 - Xiexin Zou

, Shiyao Zhang
, Chenhan Zhang
, James J. Q. Yu
, Edward Chung
:
Long-Term Origin-Destination Demand Prediction With Graph Deep Learning. 1481-1495 - Wan-Lei Zhao

, Hui Wang
, Peng-Cheng Lin, Chong-Wah Ngo:
On the Merge of k-NN Graph. 1496-1510 - Yanghua Zhang, Jice Wang, Hexiang Huang

, Yuqing Zhang
, Peng Liu
:
Understanding and Conquering the Difficulties in Identifying Third-Party Libraries From Millions of Android Apps. 1511-1523 - Jia Chen, Xin Luo

, MengChu Zhou
:
Hierarchical Particle Swarm Optimization-incorporated Latent Factor Analysis for Large-Scale Incomplete Matrices. 1524-1536 - Longlong Lin

, Pingpeng Yuan
, Rong-Hua Li
, Hai Jin
:
Mining Diversified Top-$r$r Lasting Cohesive Subgraphs on Temporal Networks. 1537-1549 - Chao Chen

, Qiang Liu, Xingchen Wang, Chengwu Liao
, Daqing Zhang:
semi-Traj2Graph Identifying Fine-Grained Driving Style With GPS Trajectory Data via Multi-Task Learning. 1550-1565 - Guodao Sun, Sujia Zhu

, Qi Jiang
, Wang Xia, Ronghua Liang
:
EvoSets: Tracking the Sensitivity of Dimensionality Reduction Results Across Subspaces. 1566-1579 - He Li

, Jianbin Huang
, Hang Yuan
, Jiangtao Cui
, Xiaoke Ma
, Shaojie Qiao, Xindong Wu:
A Two-Phase Method to Balance the Result of Distributed Graph Repartitioning. 1580-1591 - Shuai Yang

, Hao Wang
, Kui Yu
, Fuyuan Cao
, Xindong Wu
:
Towards Efficient Local Causal Structure Learning. 1592-1609 - Krishnan Raghavan

, Sarangapani Jagannathan
, V. A. Samaranayake
:
A Game Theoretic Approach for Addressing Domain-Shift in Big-Data. 1610-1621 - Prince Hamandawana

, Awais Khan
, Jongik Kim
, Tae-Sun Chung
:
Accelerating ML/DL Applications With Hierarchical Caching on Deduplication Storage Clusters. 1622-1636 - Yang Zhang

, Hanqi Guo
, Lanyu Shang
, Dong Wang
, Tom Peterka:
A Multi-Branch Decoder Network Approach to Adaptive Temporal Data Selection and Reconstruction for Big Scientific Simulation Data. 1637-1649 - Shih Yu Chang

, Hsiao-Chun Wu
:
Multi-Relational Data Characterization by Tensors: Tensor Inversion. 1650-1663 - Hok Shing Wong

, Li Wang
, Raymond H. Chan
, Tieyong Zeng
:
Deep Tensor CCA for Multi-View Learning. 1664-1677 - Ram Mohan

, Santanu Chaudhury, Brejesh Lall
:
Temporal Causal Modelling on Large Volume Enterprise Data. 1678-1689 - Yiding Zhang

, Xiao Wang
, Chuan Shi
, Xunqiang Jiang, Yanfang Ye
:
Hyperbolic Graph Attention Network. 1690-1701 - Songnian Zhang

, Suprio Ray
, Rongxing Lu
:
SOREL: Efficient and Secure ORE-Based Range Query Over Outsourced Data. 1702-1715 - Harry Cheng

, Lizi Liao
, Linmei Hu
, Liqiang Nie
:
Multi-Relation Extraction via A Global-Local Graph Convolutional Network. 1716-1728

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














