Filters








1,893 Hits in 6.0 sec

Discovering Social Networks Instantly: Moving Process Mining Computations to the Database and Data Entry Time [chapter]

Alifah Syamsiyah, Boudewijn F. van Dongen, Wil M. P. van der Aalst
2017 Lecture Notes in Business Information Processing  
is moved to the database and things are precomputed at data entry time.  ...  By moving computation both in location (to database) and time (to recording time), the discovery of social networks in a process context becomes truly scalable.  ...  discover social networks instantly.  ... 
doi:10.1007/978-3-319-59466-8_4 fatcat:b543kfqikvcmfeb4wzmfi7ikmi

AI and Deep Learning for Urban Computing [chapter]

Senzhang Wang, Jiannong Cao
2021 The Urban Book Series  
Finally, we discuss the applications of urban computing including urban planning, urban transportation, location-based social networks (LBSNs), urban safety and security, and urban-environment monitoring  ...  AbstractIn the big data era, with the large volume of available data collected by various sensors deployed in urban areas and the recent advances in AI techniques, urban computing has become increasingly  ...  Therefore, it is challenging for existing AI techniques to process this large volume of data continuously and almost instantly.  ... 
doi:10.1007/978-981-15-8983-6_43 fatcat:uq7j3hvsvzfl5lq33omx64un3i

From Big Data to Big Data Mining: Challenges, Issues, and Opportunities [chapter]

Dunren Che, Mejdl Safran, Zhiyong Peng
2013 Lecture Notes in Computer Science  
This paper provides an overview of big data mining and discusses the related challenges and the new opportunities.  ...  While "big data" has become a highlighted buzzword since last year, "big data mining", i.e., mining from big data, has almost immediately followed up as an emerging, interrelated research area.  ...  parallel ETL process (extract, transform, and load), data mining, social network analysis, and text mining.  ... 
doi:10.1007/978-3-642-40270-8_1 fatcat:e535j3rzszeb3lr4v4qi2duwsy

The Citizen Science Landscape: From Volunteers to Citizen Sensors and Beyond

Christina L. Catlin-Groves
2012 International Journal of Zoology  
, and (3) the blurring of the line between citizen science and citizen sensors and the need to further explore online social networks for data collection.  ...  The paper highlights (1) lack of trust in the scientific community about the reliability of citizen science data, (2) the move from standardised data collection methods to data mining available datasets  ...  Acknowledgment Many thanks to the University of Gloucestershire for the studentship which is supporting the author in this work.  ... 
doi:10.1155/2012/349630 fatcat:p5nru5ibcnc4pav3mhudut4wgu

Urban Computing

Yu Zheng, Licia Capra, Ouri Wolfson, Hai Yang
2014 ACM Transactions on Intelligent Systems and Technology  
Additionally, we usually need to harness a diversity of data sources in a single task. For instance, the aforementioned anomaly detection uses human mobility data, road networks, and social media.  ...  After the data is processed with other data sources in the cloud, the knowledge learned from the data will be used to serve users from the physical world via mobile clients (e.g., driving direction suggestions  ...  In the meantime, we can describe the anomaly by mining representative terms from the social media that is related to the locations and time span.  ... 
doi:10.1145/2629592 fatcat:no5gcshbmrdfphv6ewm6wdoewq

Business Intelligence for Big Data Analytics

Tomas Ruzgas, Jurgita Dabulytė- Bagdonavičienė
2017 International Journal of Computer Applications Technology and Research  
The article also presents the technologies of fast calculation processing, including architecture of in-memory and grid computing.  ...  In the present research, the most popular software tool opportunities have been compared and the differences and advantages have been identified for Business Intelligence (BI) analytics according to the  ...  Data mining is used for knowledge discovery in databases.  ... 
doi:10.7753/ijcatr0601.1001 fatcat:xb2kaigxhjb53jj62kzgiwte7u

Program book

2010 2010 IEEE 26th International Conference on Data Engineering Workshops (ICDEW 2010)  
mining, multi-media, image processing, and monitoring moving objects.  ...  We define the problem of mutation chain pattern mining and design algorithms to discover valid mutation chains.  ...  Online Social networking services of all flavors have grown remarkably in a short span of time, with millions of users creating and sharing a vast amount of data ranging from blog entries, bookmarks, pictures  ... 
doi:10.1109/icdew.2010.5452773 fatcat:oyq2tujbvjfpxjlyixux5q57vu

Big Data in IoT Systems [article]

Fayeem Aziz, Stephan K. Chalup, James Juniper
2019 arXiv   pre-print
Its approach towards Big Data and IoT is predicated on a distinction between the digital economy and the characteristics of what Robin Milner has described as the Ubiquitous Computing System.  ...  This overview therefore tries to be broad and highlevel without claiming to be comprehensive.  ...  FA contributed to the engineering and computing aspects of this review and would like to acknowledge support through an Australian Government Research Training Program scholarship.  ... 
arXiv:1905.00490v1 fatcat:24xkj2vw5jamjj3wgv6hdfar3a

Blockchain technology enabling sustainable development verification and approval

Ben D. Radhakrishnan, Bhaskar R. Sinha, Ronald P. Uhlig
2019 Journal of Advances in Humanities and Social Sciences  
The goal of a corporation's CSRs is to demonstrate how its operations are moving towards balancing environment, economics, and equity (or social justice)-commonly referred to as the 3 Es.  ...  GRI can be one of the partners in the process and thus enhancing the trustworthiness of the reports submitted.  ...  Computers within this network work together to de ine and also agree on the shared state of data which they all individually hold.  ... 
doi:10.20474/jahss-5.3.4 fatcat:xuchjay3brchpoefqvtjxni6ya

An Introduction to Sensor Data Analytics [chapter]

Charu C. Aggarwal
2012 Managing and Mining Sensor Data  
The collection and processing of such data leads to unprecedented challenges in mining and processing such data.  ...  Such data needs to be processed in real-time and the processing may be highly distributed in nature.  ...  Access to computing facilities was provided by the University of Minnesota Supercomputing Institute.  ... 
doi:10.1007/978-1-4614-6309-2_1 fatcat:pfbx566yfzgqpnjcuzonmxr23q

Interoperability, XML Schema [chapter]

2017 Encyclopedia of GIS  
The computer vision and image processing techniques are applied to understand and/or extract specific features from a single image where the objective of image mining is to discover image patterns in a  ...  A new set of algorithms is needed to cater to discover useful patterns from images (Zhang et al. 2001) . Image Mining Techniques Image mining may use data from a image databases (Fig. 1) .  ...  Further, define E.s/ as the subset of E that includes all the shapes listed above, up to and including s. For example, the shapes s in E could be restricted to 1, 2, 4, and 6.  ... 
doi:10.1007/978-3-319-17885-1_100625 fatcat:bgxdhdxa4bewzcggrogz56rdpi

List of Contributors [chapter]

Shibakali Gupta, Indradip Banerjee, Siddhartha Bhattacharyya
2019 Big Data Security  
Today we move to computation on real-time data where big data faces most challenges. Here, real-time updating or keeping an eye on the websites and web pages is completed.  ...  The blockchains' prevalent improvement is its decentralization and thus no one owns the data entry or the integrity as it is established constantly by each computer on the network.  ...  The layer of data may afford an unusual solution at times as authentication or authorization of data may be different.  ... 
doi:10.1515/9783110606058-202 fatcat:3jtqdtgsavas7n3vxrtbrkdbdy

Is Bitcoin a Decentralized Currency?

Arthur Gervais, Ghassan O. Karame, Vedran Capkun, Srdjan Capkun
2014 IEEE Security and Privacy  
More specifically, we show that a limited set of entities currently control the services, decision making, mining, and the incident resolution processes in Bitcoin.  ...  Finally, we explore possible avenues to enhance the decentralization in the Bitcoin system.  ...  to social activism.  ... 
doi:10.1109/msp.2014.49 fatcat:r7voxpkejvbgnochjv5mysdk7u

The potential for using volunteered geographic information in pervasive health computing applications

Peter Mooney, Padraig Corcoran, Blazej Ciepluch
2012 Journal of Ambient Intelligence and Humanized Computing  
Pervasive health computing strives to provide healthcare (services or information) to anyone, at anytime, and anywhere by removing constraints of time and location.  ...  We analyse the strengths of OSM, its current applicability to pervasive health computing, and if it is a sustainable option for use as a source of spatial information for pervasive computing technologies  ...  Padraig Corcoran is a postdoctoral researcher at the School of Computer Science and Informatics, University College Dublin.  ... 
doi:10.1007/s12652-012-0149-4 fatcat:zg7ba7usm5hsjitmxsqhzl5sdm

Actionable Knowledge As A Service (AKAAS): Leveraging big data analytics in cloud computing environments

Audrey Depeige, Dimitri Doyencourt
2015 Journal of Big Data  
Second, and in relation to this view, the current state of data analysis (business intelligence, big data analytics) is assessed in light of cloud computing environments and the simultaneous emergence  ...  However, only few studies have explored how traditional knowledge management processes and practices are challenged and evolve in relation to social and technological transformation stemming from the new  ...  Acknowledgements The authors are indebted to the faculty members of Telecom Ecole de Management / UEVE, as well as professors at the Institute for Knowledge and Innovation South-East Asia (IKIE-SEA) for  ... 
doi:10.1186/s40537-015-0023-2 fatcat:okzhtd2zzrd4jlj6762oxl7yqy
« Previous Showing results 1 — 15 out of 1,893 results