dblp: BDCAT 2017 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches


4th BDCAT 2017: Austin, TX, USA

jump to

SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as

Ashiq Anjum, Alan Sill, Xinghui Zhao, Mohsen M. Farid, Shrideep Pallickara, Jiannong Cao:
Proceedings of the Fourth IEEE/ACM International Conference on Big Data Computing, Applications and Technologies, BDCAT 2017, Austin, TX, USA, December 05 - 08, 2017. ACM 2017, ISBN 978-1-4503-5549-0
Big Data Stream Processing

M. Haseeb Javed, Xiaoyi Lu, Dhabaleswar K. Panda:
Characterization of Big Data Stream Processing Pipeline: A Case Study using Flink and Kafka. 1-10

Felix Heine
, Marius Rohde:
PopUp-Cubing: An Algorithm to Efficiently Use Iceberg Cubes in Data Streams. 11-20

Rudraneel Chakraborty, Shikharesh Majumdar:
Priority Based Resource Scheduling Techniques for a Resource Constrained Stream Processing System. 21-31
Storage and Operating Systems

Mayur Punekar, Qutaibah M. Malluhi, Yongge Wang
, Yvo Desmedt:
Candidate MDS Array Codes for Tolerating Three Disk Failures in RAID-7 Architectures. 33-42

Mellitus Ezeme, Akramul Azim, Qusay H. Mahmoud:
An Imputation-based Augmented Anomaly Detection from Large Traces of Operating System Events. 43-52
Big Data Applications

Kenneth Johnson
, Shahper Richter:
Quantitative Verification of Social Media Networks: The Case Study of Twitter. 53-62

Muhammad Mahbubur Rahman, Tim Finin
:
Deep Understanding of a Document's Structure. 63-73

Rana Alnashwan, Humphrey Sorensen, Adrian O'Riordan
, Cathal Hoare:
Multiclass Sentiment Classification of Online Health Forums using Both Domain-independent and Domain-specific Features. 75-83

Riqing Chen, Hui Zhang:
Large-scale 3D Reconstruction with an R-based Analysis Workflow. 85-93
Machine Learning
Deep Learning
Social Networks

Jing Yuan
, Weili Wu, Yi Li, Ding-Zhu Du:
Active Friending in Online Social Networks. 139-148

Johnny Torres, Carmen Vaca, Cristina L. Abad
:
What Ignites a Reply?: Characterizing Conversations in Microblogs. 149-156

Amartya Hatua, Trung T. Nguyen
, Andrew H. Sung:
Information Diffusion on Twitter: Pattern Recognition and Prediction of Volume, Sentiment, and Influence. 157-167

Daniel Medina Sada, Susan A. Mengel, Lisaann S. Gittner
, Hafiz Khan, Mario A. Pitalua Rodriguez, Ravi Vadapalli:
A Preliminary Investigation with Twitter to Augment CVD Exposome Research. 169-178
Big Data Computing Frameworks

Jun Suzuki, Yuki Hayashi, Masaki Kan, Shinya Miyakawa, Takashi Takenaka, Takuya Araki, Masaru Kitsuregawa:
Victream: Computing Framework for Out-of-Core Processing on Multiple GPUs. 179-188

Tariq Abdullah, Ahmed Ahmet:
Genomics Analyser: A Big Data Framework for Analysing Genomics Data. 189-197

Shouwei Chen, Ivan Rodero
:
Understanding Behavior Trends of Big Data Frameworks in Ongoing Software-Defined Cyber-Infrastructure. 199-208
Big Data and Distributed Systems

Logan Hall, Bryan Harris
, Erica Tomes, Nihat Altiparmak
:
Big Data Aware Virtual Machine Placement in Cloud Data Centers. 209-218

Aikaterini Boufea
, Richard Finkers
, Martijn van Kaauwen, Mark R. Kramer
, Ioannis N. Athanasiadis
:
Managing Variant Calling Files the Big Data Way: Using HDFS and Apache Parquet. 219-226

Debessay Fesehaye, Lenin Singaravelu, Amitabha Banerjee, Ruijin Zhou, Xiaobo Huang, Chien-Chia Chen, Rajesh Somasundaran:
Performance Analysis of Large Scale Distributed Systems by Ranking Dominant Features. 227-236

André Petermann, Martin Junghanns, Erhard Rahm
:
DIMSpan: Transactional Frequent Subgraph Mining with Distributed In-Memory Dataflow Systems. 237-246
Data Mining

Siyuan Huang, Rui Zhang, Nuofei Li, Jiming Guo, Hongbo Jiang:
Automatic Mining of Multi-granularity Temporal Regularity from Trajectory Data. 247-254

Rongye Shi
, Peter Steenkiste
, Manuela M. Veloso:
Second-Order Destination Inference using Semi-Supervised Self-Training for Entry-Only Passenger Data. 255-264
Posters

Joojay Huyn:
A Scalable Real-Time Framework for DDoS Traffic Monitoring and Characterization. 265-266

Benjamin Bryant, Hamed Sari-Sarraf, L. Rodney Long, Sameer K. Antani
:
A Kernel Support Vector Machine Trained Using Approximate Global and Exhaustive Local Sampling. 267-268

Jonathan Wang, Kesheng Wu
, Alex Sim
, Seongwook Hwangbo:
Feature Engineering and Classification Models for Partial Discharge Events in Power Transformers. 269-270

Hasan Kurban
, Can Kockan, Mark Jenne, Mehmet M. Dalkilic:
Case Study: Clustering Big Stellar Data with EM. 271-272

Yan Tang, Mingzheng Li
, Wangsong Wang, Pengcheng Xuan, Kun Geng:
Quality-Aware Movie Recommendation System on Big Data. 273-274

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:






