Default Cover Image

2019 IEEE 5th International Conference on Big Data Intelligence and Computing (DATACOM)

Nov. 18 2019 to Nov. 21 2019

Kaohsiung, Taiwan

ISBN: 978-1-7281-4117-6

Table of Contents

Title Page IFreely available from IEEE.pp. 1-1
Title Page IIIFreely available from IEEE.pp. 3-3
Copyright PageFreely available from IEEE.pp. 4-4
Table of ContentsFreely available from IEEE.pp. 5-10
Message from the DataCom 2019 ChairsFreely available from IEEE.pp. 11-11
Message from the SC2 2019 ChairsFreely available from IEEE.pp. 12-12
DataCom 2019 CommitteeFreely available from IEEE.pp. 13-14
SC2 2019 CommitteeFreely available from IEEE.pp. 15-16
KDBD 2019 CommitteeFreely available from IEEE.pp. 17-17
SSN: A Spatial Semantic Network for High-accuracy, Stable and Generalized Intent DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
A Data-Driven Knowledge-Enriched Framework for Dialogue ModelingFull-text access may be available. Sign in or learn about subscription options.pp. 25-32
Data Analysis of Portfolio Optimization using Artificial Neural Network in China’s Stock Market*Full-text access may be available. Sign in or learn about subscription options.pp. 33-38
SCNNSC: Spelling Check based Neural Network for Sentiment ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 39-46
TF-RNN: A Method of Rumor Detection on Social MediaFull-text access may be available. Sign in or learn about subscription options.pp. 47-53
Predicting Performance of Social Media Postings using Data Mining MethodsFull-text access may be available. Sign in or learn about subscription options.pp. 54-53
Blockchain Synchronisation Performance Enhancement Using Forwarder Assignment in an Overlay NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 64-69
Data-Pattern Driven Cache-Collision Timing Attacks Against AES-GCMFull-text access may be available. Sign in or learn about subscription options.pp. 77-84
Using Inaccurate Job Prediction for Detecting Machine Failures in Parallel Computing ClusterFull-text access may be available. Sign in or learn about subscription options.pp. 85-92
Robust Classification of Step Data of ExerciseFull-text access may be available. Sign in or learn about subscription options.pp. 93-101
Dangerous Goods Detection System of X-ray Images Based on Mask R-CNNFull-text access may be available. Sign in or learn about subscription options.pp. 102-106
Face Swapping Neural Networks Based on Improved AutoencodersFull-text access may be available. Sign in or learn about subscription options.pp. 107-112
Interpretable Distance Metric Learning for Handwritten Chinese Character RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 113-118
Automating Literature Reviews: Searching for Behavioral Big Data in Operations ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 119-122
Combining Multiple Ranking Systems on the Generalized Permutation Rank SpaceFull-text access may be available. Sign in or learn about subscription options.pp. 123-129
Where are the optimization potential of machine learning kernels?Full-text access may be available. Sign in or learn about subscription options.pp. 130-136
Distributed-Memory Vertex-Centric Network Embedding for Large-Scale GraphsFull-text access may be available. Sign in or learn about subscription options.pp. 137-143
Recommendation System for Online Programming Judge PlatformsFull-text access may be available. Sign in or learn about subscription options.pp. 158-165
Fuzzy–based approach for identifying epistasis in large-scale dataFull-text access may be available. Sign in or learn about subscription options.pp. 166-169
Rethinking Software Defined Cloud Storage for DisaggregationFull-text access may be available. Sign in or learn about subscription options.pp. 170-177
A SaaS-Native Wildcard Searchable Encryption Scheme for Protecting Privacy in Cloud ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 178-184
Serverless Skeletons for Elastic Parallel ProcessingFull-text access may be available. Sign in or learn about subscription options.pp. 185-192
A Realtime Crypto Computing and Block-DependabilityFull-text access may be available. Sign in or learn about subscription options.pp. 193-199
Architecture to Speed up Redundant Data Processing in a MapReduce CloudFull-text access may be available. Sign in or learn about subscription options.pp. 200-207
Offloading Optimization with Delay Distribution in the 3-tier Federated Cloud, Edge, and Fog SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 208-213
Representing cloud security and privacy policies and detecting potential problemsFull-text access may be available. Sign in or learn about subscription options.pp. 214-221
Improve User-Experience of E-Commerce Website by Graph Analysis with Deep LearningFull-text access may be available. Sign in or learn about subscription options.pp. 230-233
A Data-Driven Approach to Monitoring Colocation Data CentersFull-text access may be available. Sign in or learn about subscription options.pp. 234-241
An Empirical Study on Methods for Abnormal Trajectory DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 242-245
Forecasting hotel accommodation demand: the study in KaohsiungFull-text access may be available. Sign in or learn about subscription options.pp. 246-249
Coronary heart diseases prediction based on cardiology clinical featuresFull-text access may be available. Sign in or learn about subscription options.pp. 250-253
A Transparent Big Data Storage Facility (Demo Abstract)Full-text access may be available. Sign in or learn about subscription options.pp. 266-268
Dysphasia’s Voice Extraction and Period Selection in Deep Learning FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 269-272
Enumerating-Based Apriori Algorithms for Mining Frequent Patterns on MapReduceFull-text access may be available. Sign in or learn about subscription options.pp. 277-281
Overall mortality risk identification in breast cancer registry databaseFull-text access may be available. Sign in or learn about subscription options.pp. 282-285
Instantaneous Availability Model for Systems Considering Multi-factor Logistic DelayFull-text access may be available. Sign in or learn about subscription options.pp. 286-290
Multiple Kernel K-means Clustering : A Self-weighted Learning ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 296-301
Bilinear CNN for Low-shot Footprint ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 302-307
Analysis and Design of Network Public Opinion Early Warning System for EmergenciesFull-text access may be available. Sign in or learn about subscription options.pp. 314-318
Source Apportionment of Heavy Metals in Soils Based on Hierarchical ClusteringFull-text access may be available. Sign in or learn about subscription options.pp. 319-324
Author IndexFreely available from IEEE.pp. 331-333
Showing 58 out of 58