Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
DATACOM
DATACOM 2019
Generate Citations
2019 IEEE 5th International Conference on Big Data Intelligence and Computing (DATACOM)
Nov. 18 2019 to Nov. 21 2019
Kaohsiung, Taiwan
ISBN: 978-1-7281-4117-6
Table of Contents
Title Page I
Freely available from IEEE.
pp. 1-1
Title Page III
Freely available from IEEE.
pp. 3-3
Copyright Page
Freely available from IEEE.
pp. 4-4
Table of Contents
Freely available from IEEE.
pp. 5-10
Message from the DataCom 2019 Chairs
Freely available from IEEE.
pp. 11-11
Message from the SC2 2019 Chairs
Freely available from IEEE.
pp. 12-12
DataCom 2019 Committee
Freely available from IEEE.
pp. 13-14
SC2 2019 Committee
Freely available from IEEE.
pp. 15-16
KDBD 2019 Committee
Freely available from IEEE.
pp. 17-17
SSN: A Spatial Semantic Network for High-accuracy, Stable and Generalized Intent Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Zeng Zhi
,
Chi-Yin Chow
,
Jia-Dong Zhang
Cyber Intrusion Detection by Using Deep Neural Networks with Attack-sharing Loss
Full-text access may be available. Sign in or learn about subscription options.
pp. 9-16
by
Boxiang Dong
,
Hui Wendy Wang
,
Aparna S. Varde
,
Dawei Li
,
Bharath K. Samanthula
,
Weifeng Sun
,
Liang Zhao
A Data-Driven Knowledge-Enriched Framework for Dialogue Modeling
Full-text access may be available. Sign in or learn about subscription options.
pp. 25-32
by
Jhih-Yuan Huang
,
Wei-Po Lee
,
Hsin-Wu Tsai
,
King-Teh Lee
Data Analysis of Portfolio Optimization using Artificial Neural Network in China’s Stock Market*
Full-text access may be available. Sign in or learn about subscription options.
pp. 33-38
by
Chia-Hung Wang
,
Chia-Jung Lee
SCNNSC: Spelling Check based Neural Network for Sentiment Classification
Full-text access may be available. Sign in or learn about subscription options.
pp. 39-46
by
Yiwen Li
,
Yi Song
,
Kai Shuang
TF-RNN: A Method of Rumor Detection on Social Media
Full-text access may be available. Sign in or learn about subscription options.
pp. 47-53
by
Peng Xu
,
Yonghao Zhu
,
Kai Shuang
,
Yulu Cao
,
Yiming Liu
,
Shu Wang
Predicting Performance of Social Media Postings using Data Mining Methods
Full-text access may be available. Sign in or learn about subscription options.
pp. 54-53
by
Li Szu-Chuang
,
Chen Yi-wen
,
Huang Yennun
Blockchain Synchronisation Performance Enhancement Using Forwarder Assignment in an Overlay Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 64-69
by
Yean-Fu Wen
,
Ping-Ju Wu
Leveraging Reinforcement Learning to Allocate Bandwidth in the Agent-based Resource Management System
Full-text access may be available. Sign in or learn about subscription options.
pp. 70-76
by
Mu-Cheng Wang
,
Paul C. Hershey
,
Theodore E Ioakimidis
Data-Pattern Driven Cache-Collision Timing Attacks Against AES-GCM
Full-text access may be available. Sign in or learn about subscription options.
pp. 77-84
by
James Huang
,
Xiaoming Li
Using Inaccurate Job Prediction for Detecting Machine Failures in Parallel Computing Cluster
Full-text access may be available. Sign in or learn about subscription options.
pp. 85-92
by
Lin Ting-Yu
,
Jerry Chou
Robust Classification of Step Data of Exercise
Full-text access may be available. Sign in or learn about subscription options.
pp. 93-101
by
Haoqi Fu
,
Keqin Shi
,
Weiqiang Sun
Dangerous Goods Detection System of X-ray Images Based on Mask R-CNN
Full-text access may be available. Sign in or learn about subscription options.
pp. 102-106
by
Yen-Hua Lin
,
Yu-Chien Chen
,
Kuang-Cheng Lo
,
Ji-He Kim
,
Yen-Wen Chen
Face Swapping Neural Networks Based on Improved Autoencoders
Full-text access may be available. Sign in or learn about subscription options.
pp. 107-112
by
Wei-Jong Yang
,
Bao-Nan Lin
,
Pau-Choo Chung
,
Jar-Ferr Yang
Interpretable Distance Metric Learning for Handwritten Chinese Character Recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 113-118
by
Boxiang Dong
,
Aparna S. Varde
,
Danilo Stevanovic
,
Jiayin Wang
,
Liang Zhao
Automating Literature Reviews: Searching for Behavioral Big Data in Operations Management
Full-text access may be available. Sign in or learn about subscription options.
pp. 119-122
by
Hsiao-Hui Lee
,
Patrizia Mach
,
Galit Shmueli
,
Inbal Yahav
Combining Multiple Ranking Systems on the Generalized Permutation Rank Space
Full-text access may be available. Sign in or learn about subscription options.
pp. 123-129
by
X. Zhong
,
L. Hurley
,
S. Sirimulla
,
C. Schweikert
,
D. F. Hsu
Where are the optimization potential of machine learning kernels?
Full-text access may be available. Sign in or learn about subscription options.
pp. 130-136
by
Christophe Cérin
,
Walid Saad
,
Congfeng Jiang
,
Emna Mekni
Distributed-Memory Vertex-Centric Network Embedding for Large-Scale Graphs
Full-text access may be available. Sign in or learn about subscription options.
pp. 137-143
by
Sara Riazi
,
Boyana Norris
Forecasting Daily Accommodation Occupancy for Supply Preparation by a Sharing Economy Platform
Full-text access may be available. Sign in or learn about subscription options.
pp. 144-151
by
Ta-Chun Kuan
,
Sz-Wei Wu
,
Cheng-Che Liao
,
Mahsa Ashouri
,
Galit Shmueli
,
Che Lin
Computational modelling of speech data integration to assess interactions in B2B sales calls
Full-text access may be available. Sign in or learn about subscription options.
pp. 152-157
by
Vered Silber-Varod
,
Anat Lerner
,
Nehoray Carmi
,
Daphna Amit
,
Yonathan Guttel
,
Chris Orlob
,
Omri Allouche
Recommendation System for Online Programming Judge Platforms
Full-text access may be available. Sign in or learn about subscription options.
pp. 158-165
by
Che-Rung Lee
,
Heimei Lao
Fuzzy–based approach for identifying epistasis in large-scale data
Full-text access may be available. Sign in or learn about subscription options.
pp. 166-169
by
Cheng-Hong Yang
,
Sin-Hua Moi
,
Li-Yeh Chuang
,
Yu-Da Lin
Rethinking Software Defined Cloud Storage for Disaggregation
Full-text access may be available. Sign in or learn about subscription options.
pp. 170-177
by
Yi Zou
,
Arun Raghunath
,
Anjaneya Chagam
,
Sujoy Sen
,
Tushar Gohad
A SaaS-Native Wildcard Searchable Encryption Scheme for Protecting Privacy in Cloud Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 178-184
by
Shen-Ming Chung
,
Ming-Der Shieh
,
Tzi-Cker Chiueh
Serverless Skeletons for Elastic Parallel Processing
Full-text access may be available. Sign in or learn about subscription options.
pp. 185-192
by
Stefan Kehrer
,
Jochen Scheffold
,
Wolfgang Blochinger
A Realtime Crypto Computing and Block-Dependability
Full-text access may be available. Sign in or learn about subscription options.
pp. 193-199
by
Kancharla Abhilash
,
Nohpill Park
Architecture to Speed up Redundant Data Processing in a MapReduce Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 200-207
by
Tzu-Chi Huang
,
Kuo-Chih Chu
,
Xue-Yan Zeng
,
Fu-Lin Jou
,
Ming-Fong Tsai
,
Ce-Kuen Shieh
Offloading Optimization with Delay Distribution in the 3-tier Federated Cloud, Edge, and Fog Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 208-213
by
Ren-Hung Hwang
,
Yuan-Cheng Lai
,
Ying-Dar Lin
Representing cloud security and privacy policies and detecting potential problems
Full-text access may be available. Sign in or learn about subscription options.
pp. 214-221
by
Anthony Opara
,
Youngsang Song
,
Seong-Je Cho
,
Lawrence Chung
Improve User-Experience of E-Commerce Website by Graph Analysis with Deep Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 230-233
by
Po-Yen Wu
,
Yu-Rong Lai
,
Ray-I Chang
,
Shin-Yat Liu
A Data-Driven Approach to Monitoring Colocation Data Centers
Full-text access may be available. Sign in or learn about subscription options.
pp. 234-241
by
Brian Setz
,
Subrahmanya VRK Rao
,
Alexander Lazovik
,
Marco Aiello
An Empirical Study on Methods for Abnormal Trajectory Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 242-245
by
Umair Sabir
,
Che-Rung Lee
Forecasting hotel accommodation demand: the study in Kaohsiung
Full-text access may be available. Sign in or learn about subscription options.
pp. 246-249
by
Cheng-Hong Yang
,
Borcy Lee
,
Hsiang-Yu Yin
,
Chun-Hung Lien
,
Yu-Da Lin
,
Cheng-Feng Lee
Coronary heart diseases prediction based on cardiology clinical features
Full-text access may be available. Sign in or learn about subscription options.
pp. 250-253
by
Cheng-Hong Yang
,
Li-Yeh Chuang
,
Po-Yin Chang
Tiered Financial Fraud Detection Utilizing Precision Stratified Random Forest Assembly
Full-text access may be available. Sign in or learn about subscription options.
pp. 254-257
by
Charles Gardner
,
Dan Chia-Tien Lo
,
Johng-Chern Chern
,
Pascal Paschos
,
Chung Ng
An Analysis of the Number of Passengers Collected with A Practical Management Support System for Regional Public Transportation Service
Full-text access may be available. Sign in or learn about subscription options.
pp. 258-261
by
Chinasa Sueyoshi
,
Hideya Takagi
,
Kentaro Inenaga
Stream Processing of Software-Defined Video Analytics on a Smart Campus
Full-text access may be available. Sign in or learn about subscription options.
pp. 262-265
by
Chia-Ying Hsieh
,
Yen-Chun Li
,
Chia-Hsin Hsu
,
Yung-Ching Kuo
,
Chung-Chiu Chen
,
Cheng-Hsin Hsu
,
Jang-Ping Sheu
A Transparent Big Data Storage Facility (Demo Abstract)
Full-text access may be available. Sign in or learn about subscription options.
pp. 266-268
by
Hung-Chang Hsiao
,
Chia-Wei Lin
,
Chia-Ping Tsai
Dysphasia’s Voice Extraction and Period Selection in Deep Learning Framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 269-272
by
Hung-Shing Huang
,
Yue-Shan Chang
,
Bo-Yu Lin
Enumerating-Based Apriori Algorithms for Mining Frequent Patterns on MapReduce
Full-text access may be available. Sign in or learn about subscription options.
pp. 277-281
by
Hsing-Lung Chen
,
Hao-Yu Wang
Overall mortality risk identification in breast cancer registry database
Full-text access may be available. Sign in or learn about subscription options.
pp. 282-285
by
Cheng-Hong Yang
,
Sin-Hua Moi
,
Li-Yeh Chuang
,
Fu Ou-Yang
,
Ming-Feng Hou
,
Yu-Da Lin
Instantaneous Availability Model for Systems Considering Multi-factor Logistic Delay
Full-text access may be available. Sign in or learn about subscription options.
pp. 286-290
by
Yi Yang
,
Kunlun Wei
,
Haoran Chen
Multiple Kernel K-means Clustering : A Self-weighted Learning Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 296-301
by
Hong Yu
,
Tiantian Zhang
,
Beilei Cui
,
Linlin Zong
Bilinear CNN for Low-shot Footprint Classification
Full-text access may be available. Sign in or learn about subscription options.
pp. 302-307
by
Min Fang
,
Luotian Wu
,
Xilong Lu
,
Jin Liu
,
Yan Zhang
Analysis and Design of Network Public Opinion Early Warning System for Emergencies
Full-text access may be available. Sign in or learn about subscription options.
pp. 314-318
by
Weihong Xin
,
Yueai Zhao
,
Mingxing Hou
Source Apportionment of Heavy Metals in Soils Based on Hierarchical Clustering
Full-text access may be available. Sign in or learn about subscription options.
pp. 319-324
by
Lu Wang
,
Zhikui Chen
,
Yujie Zhao
,
Qiucen Li
,
Huiyue Su
,
Zongling Ren
Correlated and Uncorrelated Feature Co-Learning with Dual Graph Regularization for Multi-View Data Clustering
Full-text access may be available. Sign in or learn about subscription options.
pp. 325-330
by
Tingting Sun
,
Chunyang Mo
,
Liang Zhao
,
Zhikui Chen
Author Index
Freely available from IEEE.
pp. 331-333
Showing 58 out of 58