default search action
ERCIM News, Volume 2016, 2016
Number 104, January 2016
- Roeland Merks, Marie-France Sagot:
Tackling Big Data in the Life Sciences - Introduction to the Special Theme. - Gunnar W. Klau:
Networks to the Rescue - From Big "Omics" Data to Targeted Hypotheses. - Christoph Quix, Thomas Berlage, Matthias Jarke:
Interactive Pay-As-You-Go-Integration of Life Science Data: The HUMIT Approach. - Alexander Schönhuth, Tobias Marschall:
Eliminating Blind Spots in Genetic Variant Discovery. - Claudia Caudai, Emanuele Salerno:
Computational Estimation of Chromosome Structure. - James T. Murphy, Mark P. Johnson, Frédérique Viard:
Modelling Approaches to Inform the Control and Management of Invasive Seaweeds. - Marie-Dominique Devignes, Malika Smaïl-Tabbone, David W. Ritchie:
Kbdock - Searching and Organising the Structural Space of Protein-Protein Interactions. - Alberto Magi, Nadia Pisanti, Lorenzo Tattini:
The Source of the Data Flood: Sequencing Technologies. - Haridimos Kondylakis, Lefteris Koumakis, Manolis Tsiknakis, Kostas Marias, Stephan Kiefer:
Big Data in Support of the Digital Cancer Patient. - Mohamed Boukhebouze, Stéphane Mouton, Jimmy Nsenga:
Towards an On-board Personal Data Mining Framework For P4 Medicine. - Kerstin Bach, Paul Jarle Mork, Agnar Aamodt:
Can Data-driven Self-Management Reduce Low Back Pain? - Mark Cieliebak, Dominic Egger, Fatih Uzdilli:
Twitter can Help to Find Adverse Drug Reactions. - Peter Kieseberg, Edgar R. Weippl, Andreas Holzinger:
Trust for the "Doctor in the Loop". - Erwan Zerhouni, Bogdan Prisacari, Qing Zhong, Peter Wild, Maria Gabrani:
Big Data Takes on Prostate Cancer. - Adrien Coulet, Malika Smaïl-Tabbone:
Mining Electronic Health Records to Validate Knowledge in Pharmacogenomics. - Elisabeth G. Rens, Sonja E. M. Boas, Roeland M. H. Merks:
Modelling the Growth of Blood Vessels in Health and Disease. - Brett G. Olivier, Bas Teusink:
Modelling? Using Standards Can Help You. - Paulo da Silva Carvalho, Patrik Hitzelberger, Gilles Venturini:
Understanding Metadata to Exploit Life Sciences Open Data Datasets. - Benedetto Rugani, Paulo Carvalho, Benoit Othoniel:
Management of Big and Open Data in the Life Cycle Assessment of Ecosystem Services. - Juan Ramón Troncoso-Pastoriza, Elsa Prieto Pérez:
WITDOM: Empowering Privacy and Security in Non-trusted Environments.
- Bernd Zwattendorfer, Stephan Krenn, Thomas Lorünser:
Secure and Privacy-Preserving Identity Management in the Cloud. - Daniel Slamanig, Agi Karyda, Thomas Lorünser:
PRISMACLOUD - Privacy and Security Maintaining Services in the Cloud. - Beatriz Gallego-Nicasio Crespo, Melek Önen, Ghassan Karame:
TREDISEC: Towards Realizing a Truly Secure and Trustworthy Cloud. - Daniele Spoladore, Gianfranco E. Modoni, Marco Sacco:
Smart Devices for the Home of the Future: A New Model for Collaboration. - Christoph Trattner, Tomasz Kusmierczyk, Kjetil Nørvåg:
FOODWEB - Studying Food Consumption and Production Patterns on the Web. - Maria Koskinopoulou, Panos E. Trahanias:
Robots Learn Actions and Cooperative Tasks by Imitation. - Costas Bekas:
Unlocking the Secrets of the Dynamics of Earth's Interior.
Number 105, April 2016
- Rob van der Mei, Ariona Shashaj:
Visions of the Future: Towards the Next Generation of Logistics and Planning Systems. - Pedro Amorim, Sara Martins, Eduardo Curcio, Bernardo Almada-Lobo:
Defining the Best Distribution Network for Grocery Retail Stores. - Andreas Halm:
Planning Production Efficiently. - Miguel A. Barcelona:
ICT for a Logistics Demonstration Centre. - Péter Egri, Dávid Gyulai, Botond Kádár, László Monostori:
Production Planning on Supply Network and Plant Levels: The RobustPlaNet Approach. - Giorgio Oronzo Spagnolo, Eda Marchetti, Alessandro Coco, Stefania Gnesi:
Modelling and Validating an Import/Export Shipping Process. - Leendert Kok, Joaquim A. S. Gromicho:
Where is the Money? - Optimizing Cash Supply Chain Networks. - Sara Gestrelius, Martin Aronsson:
An Industrial Take on Breast Cancer Treatment. - Sara Gestrelius:
Evaluating Operational Feasibility before Investing: Shunting Yards in Sweden. - Pieter L. van den Berg, Guido Legemaate, Rob van der Mei:
Boosting the Responsiveness of Firefighter Services with Mathematical Programming. - Merel Steenbrink, Elenna R. Dugundji, Rob van der Mei:
Predicting the Demand for Charging Stations for Electric Vehicles. - Björn Bjurling, Fehmi Ben Abdesslem:
Data-driven Optimization for Intelligent and Efficient Transport. - Davide Bacciu, Antonio Carta, Stefania Gnesi, Laura Semini:
Adopting a Machine Learning Approach in the Design of Smart Transportation Systems. - Björn Löfvendahl:
Remote Service Using Augmented Reality. - René Berndt, Alexander Sunk:
Value Stream Mapping with VASCO - From Reducing Lead Time to Sustainable Production Management. - Denise Holfeld, Axel Simroth:
Risk Analysis for a Synchro-modal Supply Chain Combined with Smart Steaming Concepts. - Niels A. H. Agatz, Leo G. Kroon, Remy Spliet, Albert P. M. Wagelmans:
Designing Sustainable Last-Mile Delivery Services in Online Retailing. - Joachim J. Arts:
Spare Parts Stocking and Expediting in a Fluctuating Demand Environment. - Abderrahmane Aggoun, Nicolas Beldiceanu, Gilles Chabert, François Fages:
Packing with Complex Shapes. - Victoria Svedberg:
Allocating Railway Tracks Using Market Mechanisms and Optimization. - Renaud De Landtsheer, Christophe Ponsard, Yoann Guyot:
OscaR, an Open Source Toolbox for Optimising Logistics and Supply Chain Systems. - Ahmad Al Hanbali, Sajjad Rahimi-Ghahroodi, W. Henk Zijm:
Integrated Resource Planning in Maintenance Logistics. - Sara Gestrelius:
Utilising the Uniqueness of Operation Days to better Fulfil Customer Requirements. - Ulrich Schimpel, Stefan Wörner:
Planning Complex Supply Networks Facing High Variability.
- Antonello Calabrò, Francesca Lonetti, Eda Marchetti:
Business Process Execution Analysis through Coverage-based Monitoring. - Doreid Ammar, Katrien De Moor, Poul E. Heegaard:
Quality of Experience-assessment of WebRTC Based Video Communication. - Kostas Stefanidis, Giorgos Flouris, Ioannis Chrysakis, Yannis Roussakis:
D2V - Understanding the Dynamics of Evolving Data: A Case Study in the Life Sciences. - Peter Kieseberg, Edgar R. Weippl, Sebastian Schrittwieser:
Detection of Data Leaks in Collaborative Data Driven Research. - Axel-Cyrille Ngonga Ngomo, Alejandra García-Rojas, Irini Fundulaki:
HOBBIT: Holistic Benchmarking of Big Linked Data. - Erina Ferro:
Smart Solutions for the CNR Campus in Pisa.
Number 106, July 2016
- Fabio Martinelli, Edgar R. Weippl:
Cybersecurity - Introduction to the Special Theme. - Ana Nieto, Rodrigo Roman, Javier López:
Digital Witness: Digital Evidence Management Framework for the Internet of Things. - Joppe W. Bos, Wil Michiels:
Security Assessment of Software Security: A Closer Look at White-Box Cryptographic Implementations. - Nicolás Notario, Stephan Krenn, Bernd Zwattendorfer, Felix Hörandner:
CREDENTIAL: Secure Cloud Identity Wallet. - Florian Dold, Christian Grothoff:
GNU Taler: Ethical Online Payments for the Internet Age. - José Bacelar Almeida, Manuel Barbosa, Hugo Pacheco, Vitor Pereira:
A Tool-Chain for High-Assurance Cryptographic Software. - Nicolas Sendrier, Jean-Pierre Tillich:
Code-Based Cryptography: New Security Solutions Against a Quantum Adversary. - Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani:
Using Cryptography to Control Your Data at a Distance. - Thomas Lorünser, Daniel Slamanig, Thomas Länger, Henrich C. Pöhls:
A New Architecture for Developing Cryptographic Cloud Services. - Marc Stevens:
Deprecating an Internet Security Standard with Cryptanalysis. - Marco Gramaglia, Marco Fiore:
Thwarting Uniqueness in Datasets of Spatiotemporal Trajectories. - Nataliia Bielova, Frédéric Besson, Thomas P. Jensen:
Using JavaScript Monitoring to Prevent Device Fingerprinting. - Robert N. M. Watson, Simon W. Moore, Peter G. Neumann:
CHERI: A Hardware-Software System to Support the Principle of Least Privilege. - Andreas Konstantinidis, Georgios Chatzimilioudis, Demetrios Zeinalipour-Yazti:
Privacy-Preserving Indoor Localisation and Navigation. - Stefano Cresci, Marinella Petrocchi, Maurizio Tesconi, Roberto Di Pietro, Angelo Spognardi:
Social Fingerprinting - or the Truth About You. - Arthur Melissen:
Flexible Decentralised Access Control using Invitation-Response Dialogue. - Carmela Gambardella, Ilaria Matteucci, Marinella Petrocchi:
Data Sharing Agreements: How to Glue Definition, Analysis and Mapping Together. - Paolo Mori, Andrea Saracino, Francesco Di Cerbo:
Data Usage Control: Introducing a New Framework for Cloud and Mobile Environments. - Marco Tiloca, Christian Gehrmann, Ludwig Seitz:
Robust and Scalable DTLS Session Establishment. - Thijs Veugen:
Client-Server Framework for Securely Outsourcing Computations. - Benjamin André, Nicolas Anciaux, Philippe Pucheral, Paul Tran-Van:
A Root of Trust for the Personal Cloud. - Ioannis G. Askoxylakis, Nikolaos E. Petroulakis, Vivek Kulkami, Florian Zeiger:
VirtuWind - Security in a Virtual and Programmable Industrial Network Prototype Deployed in an Operational Wind Park. - Fabrizio Biondi, Sébastien Josse, Axel Legay:
Bypassing Malware Obfuscation with Dynamic Synthesis. - Dimitris E. Simos:
SPLIT: Security Protocol Interaction Testing in Practice. - Philippe Antoine, Guillaume Bonfante, Jean-Yves Marion:
Gorille: Efficient and Relevant Software Comparisons. - Nisrine Jafri, Axel Legay, Jean-Louis Lanet:
Vulnerability Prediction Against Fault Attacks. - Valérie Viet Triem Tong, Jean-François Lalande, Mourad Leslous:
Challenges in Android Malware Analysis. - Vicente Matellán, Francisco J. Rodríguez-Lera, Jesús Balsa:
Cybersecurity in Robotic Systems. - Christophe Ponsard, Philippe Massonet, Gautier Dallons:
Co-engineering Security and Safety Requirements for Cyber-Physical Systems. - Marcel Caria:
Cyber-Physical Systems: Closing the Gap between Hardware and Software. - Evangelos P. Markatos, Egidija Versinskiene, Evaldas Bruze:
SENTER: A Network of the European Centres of Excellence in Cyber Crime Research, Training, and Education. - Erno Rigó, Mihály Héder:
A Network of Internet Probes for Fighting Cyber Attacks. - Anze Zitnik, Antonio Álvarez Romero, Stephanie Parker:
CyberWISER-Light: Supporting Cyber Risk Assessment with Automated Vulnerability Scanning. - Florian Skopik, Maria Leitner, Timea Pahi:
CISA: Establishing National Cyber Situational Awareness to Counter New Threats. - Martin Schmiedecker, Sebastian Neuner:
On Reducing Bottlenecks in Digital Forensics. - László Havasi, Tamás Szirányi:
Multi-View Security and Surveillance at MTA SZTAKI.
- Haralampos Pozidis, Nikolaos Papandreou, Thomas Mittelholzer, Evangelos Eleftheriou:
High-Density Data Storage in Phase-Change Memory. - Giulia Barbagelata, Marco Attene, Tor Dokken:
CAxMan: Design for Additive Manufacturing Made Easy and Cost-effective.
Number 107, October 2016
- Sander M. Bohté, Hung Son Nguyen:
Modern Machine Learning: More with Less, Cheaper and Better. - Jean-Baptiste Mouret:
Micro-Data Learning: The Other End of the Spectrum. - Peter Wittek:
Making Learning Physical - Machine Intelligence and Quantum Resources. - Max Welling:
Marrying Graphical Models with Deep Learning. - Bernd Malle, Peter Kieseberg, Sebastian Schrittwieser, Andreas Holzinger:
Privacy Aware Machine Learning and the "Right to be Forgotten". - Wouter M. Koolen:
Robust and Adaptive Methods for Sequential Decision Making. - Karol Kurach, Marcin Andrychowicz, Ilya Sutskever:
Neural Random Access Machines. - Olof Görnerup, Theodore Vasiloudis:
Mining Similarities and Concepts at Scale. - Claudio Lucchese, Franco Maria Nardini, Raffaele Perego, Nicola Tonellotto, Salvatore Orlando, Rossano Venturini:
Fast Traversal of Large Ensembles of Regression Trees. - Mark Cieliebak:
Optimising Deep Learning for Infinite Applications in Text Analytics. - András A. Benczúr, Róbert Pálovics, Márton Balassi, Volker Markl, Tilmann Rabl, Juan Soto, Björn Hovstadius, Jim Dowling, Seif Haridi:
Towards Streamlined Big Data Analytics. - Frédéric Alexandre:
Autonomous Machine Learning. - Pierre-Yves Oudeyer, Manuel Lopes, Celeste Kidd, Jacqueline Gottlieb:
Curiosity and Intrinsic Motivation for Autonomous Machine Learning. - Jan Stampfli, Kurt Stockinger:
Applied Data Science: Using Machine Learning for Alarm Verification. - George Potamias:
Towards Predictive Pharmacogenomics Models. - José Francisco García Cantos, Manuel Peinado, Miguel A. Salido, Federico Barber:
Optimisation System for Cutting Continuous Flat Glass. - Balázs Csanád Csáji, András Kovács, József Váncza:
Online Learning for Aggregating Forecasts in Renewable Energy Systems. - Bert Kappen, Wim Wiegerinck:
Bonaparte: Bayesian Networks to Give Victims back their Names.
- Patrizio Dazzi:
BASMATI - Cloud Brokerage Across Borders For Mobile Users And Applications. - Olivier Parisot, Benoît Otjacques:
Predictive Modelling from Data Streams. - Marios D. Dikaiakos, George Pallis, Evangelos P. Markatos:
Mandola: Monitoring and Detecting Online Hate Speech. - Markus Wurzenberger, Florian Skopik:
The BÆSE Testbed - Analytic Evaluation of IT Security Tools in Specified Network Environments. - Dimitrios N. Serpanos, Howard E. Shrobe, Muhammad Taimoor Khan:
Behaviour-Based Security for Cyber-Physical Systems. - Nicolas Mayer, Jocelyn Aubert, Hervé Cholez, Eric Grandry, Eric Dubois:
The TISRIM-Telco Toolset - An IT Regulatory Framework to Support Security Compliance in the Telecommunications Sector. - Darko Brodic, Dejan Tanikic, Alessia Amelio:
Predicting the Extremely Low Frequency Magnetic Field Radiation Emitted from Laptops: A New Approach to Laptop Design. - Erkuden Rios, Massimiliano Rak, Samuel Olaiya Afolaranmi:
Managing Security in Distributed Computing: Self-Protective Multi-Cloud Applications.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.