Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3331076acmotherconferencesBook PagePublication PagesideasConference Proceedingsconference-collections
IDEAS '19: Proceedings of the 23rd International Database Applications & Engineering Symposium
ACM2019 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
IDEAS 2019: 23rd International Database Engineering & Applications Symposium Athens Greece June 10 - 12, 2019
ISBN:
978-1-4503-6249-8
Published:
10 June 2019
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN

Reflects downloads up to 18 Jan 2025Bibliometrics
invited-talk
Novel paradigms for engineering large-scale resilient IoT systems

This invited talk explores the research challenges in the domain of IoT from multiple angles and reflects on the urgently needed collective efforts from various research communities to collaborate on those. Our approach fundamentally challenges the ...

research-article
The homomorphism property in query containment and data integration
Article No.: 2, Pages 1–12https://doi.org/10.1145/3331076.3331127

We often add arithmetic to extend the expressiveness of query languages, tuple generating dependencies and data exchange mappings, and study the complexity of problems such as testing query containment and finding certain answers. When adding arithmetic ...

research-article
Weight assignment on edges towards improved community detection
Article No.: 3, Pages 1–5https://doi.org/10.1145/3331076.3331121

During the last few decades the problem of community detection in social networks has become an important and challenging computational task. Consequently, a number of algorithms have been proposed in the relevant literature, some of which seem to solve ...

research-article
Exploratory data analysis and crime prediction for smart cities
Article No.: 4, Pages 1–9https://doi.org/10.1145/3331076.3331114

Crime has been prevalent in our society for a very long time and it continues to be so even today. Currently, many cities have released crime-related data as part of an open data initiative. Using this as input, we can apply analytics to be able to ...

research-article
Classification of eye-state using EEG recordings: speed-up gains using signal epochs and mutual information measure
Article No.: 5, Pages 1–6https://doi.org/10.1145/3331076.3331095

The classification of electroencephalography (EEG) signals is useful in a wide range of applications such as seizure detection/prediction, motor imagery classification, emotion classification and drug effects diagnosis, amongst others. With the large ...

research-article
Ant-driven clustering for utility-aware disassociation of set-valued datasets
Article No.: 6, Pages 1–9https://doi.org/10.1145/3331076.3331084

Data publishing is a challenging task from the privacy point of view. Different anonymization techniques are proposed in the literature to preserve privacy in accordance with some mathematical constraints. Disassociation is one of the anonymization ...

research-article
EQL-CE: an event query language for connected environments
Article No.: 7, Pages 1–10https://doi.org/10.1145/3331076.3331103

Recent advances in sensor technology and information processing have allowed connected environments to impact various application domains. In order to detect events in these environments, existing works rely on the sensed data. However, these works are ...

research-article
HSSN: an ontology for hybrid semantic sensor networks
Article No.: 8, Pages 1–10https://doi.org/10.1145/3331076.3331102

Semantic web techniques (e.g., ontologies) have been recently adopted for sensor network modeling. However, existing works do not fully address these challenges: (i) representing different sensor types (e.g., mobile/static sensors) to enrich the network ...

research-article
Enabling propagation in web of trust by Ethereum
Article No.: 9, Pages 1–6https://doi.org/10.1145/3331076.3331108

Web of Trust offers a way to bind identities with the corresponding public keys. It relies on a distributed architecture, where each user could play the role of certificate signer. With the widespread diffusion of social networks, the trust propagation ...

research-article
Meta-data management and quality control for the medical informatics platform
Article No.: 10, Pages 1–9https://doi.org/10.1145/3331076.3331088

The Medical Informatics Platform (MIP) of the Human Brain Project (HBP) is tasked with providing its users diverse high quality clinical data and tools for medical analysis, while complying with the national legislation about privacy and security. Data, ...

research-article
Virtual private ledgers: embedding private distributed ledgers over a public blockchain by cryptography
Article No.: 11, Pages 1–9https://doi.org/10.1145/3331076.3331083

Distributed ledgers allow us to replicate databases of records across mutually untrusted parties. The best known example of distributed ledger is perhaps the Bitcoin blockchain, which maintains a consistent history of financial transactions organized as ...

research-article
On discovering relevant features for tongue colored image analysis
Article No.: 12, Pages 1–8https://doi.org/10.1145/3331076.3331124

Artificial Intelligent Systems are increasingly used to support early diagnosis of multiple relevant diseases. The spread of these systems is boosted by the application of machine learning techniques on datasets (also in the form of videos and images) ...

research-article
Differentially private sequential pattern mining considering time interval for electronic medical record systems
Article No.: 13, Pages 1–9https://doi.org/10.1145/3331076.3331098

Electronic medical record (EMR) systems have now been widely adopted to support medical workers. There also has been much interest in the machine-based generation of clinical pathways that can utilize sequential pattern mining (SPM) to extract them from ...

research-article
A data mining approach for predicting main-engine rotational speed from vessel-data measurements
Article No.: 14, Pages 1–10https://doi.org/10.1145/3331076.3331123

In this work we face the challenge of estimating a ship's main-engine rotational speed from vessel data series, in the context of sea vessel route optimization. To this end, we study the value of different vessel data types as predictors of the engine ...

research-article
Studying forward looking bubbles in Bitcoin/USD exchange rates
Article No.: 15, Pages 1–9https://doi.org/10.1145/3331076.3331106

Although Bitcoin is a relatively new subject in Economics, contributions in this topic are growing very fast. Several papers evidenced a bubble behaviour in exchange rates between Bitcoin and traditional currencies. In this paper we explore and give ...

research-article
Unsupervised context extraction via region embedding for context-aware recommendations
Article No.: 16, Pages 1–10https://doi.org/10.1145/3331076.3331120

Many context-aware recommendation methods extract contexts from reviews using supervised methods. However, this requires the optimal values for contexts to be predefined, which is not a trivial task. Although some approaches have avoided this by ...

research-article
Privacy in the age of information (and algorithms)
Article No.: 17, Pages 1–12https://doi.org/10.1145/3331076.3331089

This paper raises the privacy issues related to information that is accessible about individuals from their mobile devices and that which is collected when they interact with and use so called "free" services provided on the web. The importance of ...

research-article
Supervised learning methods application to sentiment analysis
Article No.: 18, Pages 1–6https://doi.org/10.1145/3331076.3331086

The field of artificial intelligence (AI) is constantly growing and finding new ways to solve real world problems. One of the AI knowledge and research fields is natural language processing (NLP) which attempts to categorise and process human language ...

research-article
Transfer learning for malware multi-classification
Article No.: 19, Pages 1–7https://doi.org/10.1145/3331076.3331111

In this paper, we build on top of the MalConv neural networks learning architecture which was initially designed for malware/benign classification. We evaluate the transfer learning of MalConv for malware multi-class classification by extending its ...

research-article
Blockchain-based risk mitigation for invoice financing
Article No.: 20, Pages 1–6https://doi.org/10.1145/3331076.3331093

The market for invoice financing has been steadily growing in the last few years and has been the third financing market in size in 2016. Most solutions in this field are based on private platforms and even the new proposals based on blockchain are ...

research-article
Database system comparison based on spatiotemporal functionality
Article No.: 21, Pages 1–7https://doi.org/10.1145/3331076.3331101

The amount of sources and sheer volumes of spatiotemporal data have met an unprecedented growth during the last decade. As a consequence, a rapidly increasing number of applications are seeking to generate value by crunching those data. The development ...

research-article
A spatial index for hybrid storage
Article No.: 22, Pages 1–8https://doi.org/10.1145/3331076.3331091

The introduction of flash SSDs has accelerated the performance of DBMSes. However, the intrinsic characteristics of flash motivated many researchers to investigate new efficient data structures. The emergence of 3DXPoint, a new non-volatile memory, sets ...

research-article
Mining complex temporal dependencies from heterogeneous sensor data streams
Article No.: 23, Pages 1–10https://doi.org/10.1145/3331076.3331112

In addition to sensor heterogeneity, monitoring applications must handle different temporal data models (e.g time series, event sequences). In this paper, we address the problem of discovering directly actionable high level knowledge from such data. We ...

research-article
An effective algorithm for learning single occurrence regular expressions with interleaving
Article No.: 24, Pages 1–10https://doi.org/10.1145/3331076.3331100

The advantages offered by the presence of a schema are numerous. However, many XML documents in practice are not accompanied by a (valid) schema, making schema inference an attractive research problem. The fundamental task in XML schema learning is ...

research-article
VISEN: a video interactive retrieval engine based on semantic network in large video collections
Article No.: 25, Pages 1–10https://doi.org/10.1145/3331076.3331094

Following technological advances carried out recently, there has been an explosion in the quantity of videos available and their accessibility. This is largely justified by the fall of the prices of acquisition and the increase of the capacity of the ...

research-article
Open Access
Data mining ancient scripts to investigate their relationships and origins
Article No.: 26, Pages 1–10https://doi.org/10.1145/3331076.3331116

This paper describes a data mining study of a set of ancient scripts in order to discover their relationships, including their possible common origin from a single root script. The data mining uses convolutional neural networks and support vector ...

research-article
A fast solution for bi-objective traffic minimization in geo-distributed data flows
Article No.: 27, Pages 1–10https://doi.org/10.1145/3331076.3331107

Geo-distributed analytics is becoming an increasingly common-place as IoT, fog computing and big data processing platforms are nowadays integrating with each other. In this work, we deal with a problem encountered when complex Spark workflows run on top ...

research-article
Open government data usage: a brief overview
Article No.: 28, Pages 1–8https://doi.org/10.1145/3331076.3331115

The increasingly massive spreading of Open Government Data (OGD) is hailed as a driving force for economic and social growth, as well as an essential factor in promoting public awareness of the work of institutional decision-makers. However, this high ...

research-article
Simplified data posting in practice
Article No.: 29, Pages 1–7https://doi.org/10.1145/3331076.3331104

The data posting framework introduced in [8] adapts the well-known Data Exchange techniques to the new Big Data management and analysis challenges that can be found in real world scenarios. Although it is expressive enough, it requires the ability of ...

research-article
Anonymously forecasting the number and nature of firefighting operations
Article No.: 30, Pages 1–8https://doi.org/10.1145/3331076.3331085

Predicting the number and the type of operations by civil protection services is essential, both to optimize on-call firefighters in size and competence, to pre-position material and human resources... To accomplish this task, it is required to possess ...

Contributors
  • Harokopio University of Athens
  • University of Cyprus
  • Harokopio University of Athens
  1. Proceedings of the 23rd International Database Applications & Engineering Symposium

      Recommendations

      Acceptance Rates

      Overall Acceptance Rate 74 of 210 submissions, 35%
      YearSubmittedAcceptedRate
      IDEAS '20572747%
      IDEAS '171023837%
      IDEAS '1351918%
      Overall2107435%