Filters








46,099 Hits in 8.3 sec

Mapping Big Data into Knowledge Space with Cognitive Cyber-Infrastructure [article]

Hai Zhuge
2015 arXiv   pre-print
What kind of infrastructure is required to support not only big data management and analysis but also knowledge discovery, sharing and management?  ...  This paper explores and answers the following questions: What is big data? What are the basic methods for representing, managing and analyzing big data?  ...  The author was invited to present ACM Distinguished Lectures on this topic at several international conferences, Chinese Academy of Sciences, British Computer Society, and a number of universities in China  ... 
arXiv:1507.06500v1 fatcat:qpxjdezd45byrci5hbhtmg5pja

Data science

Longbing Cao
2017 Communications of the ACM  
In reviewing hundreds of pieces of literature which include data science in their titles, we find that the majority of the discussions essentially concern statistics, data mining, machine learning, big  ...  We focus on the research and innovation challenges inspired by the nature of data science problems as complex systems, and the methodologies for handling such systems.  ...  for the analysis, design and evaluation of complex data science problems.  ... 
doi:10.1145/3015456 fatcat:67rgituyxzehfc5yvcmukhvbqa

Data-Driven Innovation: What Is It [article]

Jianxi Luo
2022 arXiv   pre-print
The future of innovation processes is anticipated to be more data-driven and empowered by the ubiquitous digitalization, increasing data accessibility and rapid advances in machine learning, artificial  ...  On this basis, I recommend the strategies and actions for innovators, companies, R&D organizations, and governments to enact data-driven innovation.  ...  , Coursera, Google Maps, Siri, and those related to the data-based features of IoT (Internet-of-Things) and other physical devices, equipment, machines, or infrastructure [3, 4] .  ... 
arXiv:2201.08184v2 fatcat:ul2o3gdfhzgybjnfynx6vzhtvm

Analytic Black Holes

Giliam de Valk
2022 National security and the future  
Furthermore, hybrid threats and real time intelligence for the protection of the critical infrastructure demand a new approach towards analysis.  ...  Human Analysis is likely to develop more towards to limit the number of data taken into account, but those data will have a high causal significance.  ...  Organizations collect data from a variety of sources, including social media and information from sensor or machine-to-machine data.  ... 
doi:10.37458/nstf.23.1.1 fatcat:ct5ppfdcgfd4pltrplhwyp3p44

Facing the New Technology Landscape in the Maritime Domain: Knowledge Mobilisation, Networks and Management in Human-Machine Collaboration [chapter]

Yemao Man, Monica Lundh, Scott N. MacKinnon
2018 Advances in Intelligent Systems and Computing  
This paper shapes a discussion intended to derive design and management implications of the system infrastructure contributing to a safe, efficient and sustainable shipping business model and provide insights  ...  on knowledge adaption in the emerging human-machine collaboration context.  ...  Although the ETA-pilot seemed to display a plethora of useful data, it was discovered that the tool failed to facilitate the crews' understanding of the impact of their actions on EE [8] .  ... 
doi:10.1007/978-3-319-93885-1_21 fatcat:j6vdflekjraqxbiaf4mwbzj2ai

The Emerging Web of Social Machines

Silvio R. L. Meira, Vanilson A. A. Buregio, Leandro M. Nascimento, Elaine Figueiredo, Misael Neto, Bruno Encarnacao, Vinicius Cardoso Garcia
2011 2011 IEEE 35th Annual Computer Software and Applications Conference  
We define a notion of social machine and envisage an algebra that can describe networks of such.  ...  To start with, social machines are defined as tuples of input, output, processes, constraints, state, requests and responses; apart from defining the machines themselves, the algebra defines a set of connectors  ...  for Software National Institute of Science and Technology for Software  ... 
doi:10.1109/compsac.2011.12 dblp:conf/compsac/MeiraBNFNEG11 fatcat:5kaiuryyqzgyhkrcvqmhkitywi

Influence of social determinants of health and county vaccination rates on machine learning models to predict COVID-19 case growth in Tennessee

Lukasz S Wylezinski, Coleman R Harris, Cody N Heiser, Jamieson D Gray, Charles F Spurlock
2021 BMJ Health & Care Informatics  
As a result, there is a need for data-driven approaches to pinpoint the unique constellation of clinical and social determinants of health (SDOH) risk factors that give rise to poor patient outcomes following  ...  , including access to healthcare and transportation, increased.ConclusionIncorporating a data framework to track the evolving patterns of community-level SDOH risk factors could provide policy-makers with  ...  As a result, there is a need for data-driven approaches to pinpoint the unique constellation of clinical and social determinants of health (SDOH) risk factors that give rise to poor patient outcomes following  ... 
doi:10.1136/bmjhci-2021-100439 pmid:34580088 pmcid:PMC8478575 fatcat:s7wcr5hstfhh3p7biazp5vigea

Tensor Computing for Internet of Things (Dagstuhl Perspectives Workshop 16152)

Evrim Acar, Animashree Anandkumar, Lenore Mullin, Sebnem Rusitschka, Volker Tresp, Michael Wagner
2018 Dagstuhl Manifestos  
In a not so distant future, basic infrastructures for living will be mainly data-driven, automated by digitally enhanced devices and machines.  ...  This Manifesto summarizes the immediate action fields for advancement: IoT Tensor Data Benchmarks, Tensor Tools for IoT, and the evolution of a Knowledge Hub.  ...  Applying for an international research grant that allows us to work together on curating the data and to create and host a benchmarking infrastructure, to extract and share best practices discovered through  ... 
doi:10.4230/dagman.7.1.52 dblp:journals/dagstuhl-manifestos/AcarAMRT18 fatcat:5ngo2fzsefbh7e5a4odx4ttgne

Discover Internet of Things editorial, inaugural issue

Ishfaq Ahmad
2021 Discover Internet of Things  
The issue of data privacy and security, of course, must be an integral component these infrastructures.  ...  The goal is to take advantage of new ideas about online data sharing and efficient publication tools designed to promptly present to its readers the state-of-the-art, addressing all parts of the value  ... 
doi:10.1007/s43926-021-00007-6 fatcat:oqzduebjdnhk3abfgh4lyvxnva

Exploring the Intersection of the Digital Divide and Artificial Intelligence: A Hermeneutic Literature Review

Lemuria Carter, University of New South Wales, Dapeng Liu, Caley Cantrell, University of New South Wales, Virginia Commonwealth University
2020 AIS Transactions on Human-Computer Interaction  
These framings synthesize the digital divide's essence in relation to AI and provide the foundation for a socio-technical research agenda for the digital divide in light of the evolving phenomena of AI  ...  on existing social and economic challenges.  ...  For example, if one trained a machine learning algorithm for clinical decision support with data in one country, the system may not perform with the same level of accuracy when applied to citizens in a  ... 
doi:10.17705/1thci.00138 fatcat:yxm2rkkctzdcvcb3pxtzg46rx4

Design of a Machine Learning Based Predictive Analytics System for Spam Problem

A.S. Yüksel, Ş.F. Çankaya, İ.S. Üncü
2017 Acta Physica Polonica. A  
messaging behavior of spamming and legitimate servers has been designed.  ...  email infrastructure.  ...  The test data that resulted was used to score the trained models. The results of the models were then compared to discover which performed better.  ... 
doi:10.12693/aphyspola.132.500 fatcat:7khmgzwburgkbl6lzhiu7appp4

Data Mining in Cyber Operations [chapter]

Misty Blowers, Stefan Fernandez, Brandon Froberg, Jonathan Williams, George Corbin, Kevin Nelson
2014 Advances in Information Security  
The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and  ...  Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently  ...  The scope of data mining for cyber operations is large enough to be its own book, so for purposes of this chapter the scope will be limited to intrusion and malware detection, social networking for cyber  ... 
doi:10.1007/978-3-319-10374-7_4 fatcat:yyvgh67ejzfjfdnujx3lyk3j5i

From the Semantic Web to social machines: A research challenge for AI on the World Wide Web

Jim Hendler, Tim Berners-Lee
2010 Artificial Intelligence  
From the very beginning, however, the Web was designed to create a network of humans changing society empowered using this shared infrastructure.  ...  The stage is set for an evolutionary growth of new social engines. The ability to create new forms of social process would be given to the world at large, and development would be rapid. (pp. 172-175)  ...  Acknowledgements We are highly indebted to a number of people who have worked with us in developing the ideas outlined in this paper.  ... 
doi:10.1016/j.artint.2009.11.010 fatcat:crnwnxguenbahk2zg4rez5jlxa

Causality discovery technology

M. Chen, T. Ertl, M. Jirotka, A. Trefethen, A. Schmidt, B. Coecke, R. Bañares-Alcántara
2012 The European Physical Journal Special Topics  
., Newton found the cause for an apple to fall, and Darwin discovered natural selection).  ...  Whereas there are exciting opportunities to discover new causation relationships, there are also unparalleled challenges to benefit from such data mountains.  ...  The publication of this work was partially supported by the European Union's Seventh Framework Programme (FP7/2007-2013) under grant agreement No. 284709, a Coordination and Support Action in the Information  ... 
doi:10.1140/epjst/e2012-01702-4 fatcat:pemjbzokw5ds5n4u7itpc5be54

Big Data Analytics for Sustainable Computing

H . Anandakumar, R. Arulmurugan, Chow Chee Onn
2019 Journal on spesial topics in mobile networks and applications  
He is editor of Inderscience IJISC and served as a reviewer for IEEE, IET, Springer, Inderscience and Elsevier journals.  ...  Publisher's Note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. Protocols.  ...  Machine learning focuses on the development of computer programs that can access data and use it learn for themselves.  ... 
doi:10.1007/s11036-019-01393-6 fatcat:ejtnfvgoxjbafakxo25sbue7ye
« Previous Showing results 1 — 15 out of 46,099 results