default search action
DEXA Workshops 2019: Linz, Austria
- Gabriele Anderst-Kotsis, A Min Tjoa
, Ismail Khalil, Mourad Elloumi, Atif Mashkoor, Johannes Sametinger
, Xabier Larrucea, Anna Fensel, Jorge Martínez Gil, Bernhard Moser, Christin Seifert, Benno Stein, Michael Granitzer:
Database and Expert Systems Applications - DEXA 2019 International Workshops BIOKDD, IWCFS, MLKgraphs and TIR, Linz, Austria, August 26-29, 2019, Proceedings. Communications in Computer and Information Science 1062, Springer 2019, ISBN 978-3-030-27683-6
Biological Knowledge Discovery from Data
- Supaporn Chairungsee, Thana Charuphanthuset:
An Approach for LPF Table Computation. 3-7 - Eleonora Cappelli
, Emanuel Weitschek
, Fabio Cumbo
:
Smart Persistence and Accessibility of Genomic and Clinical Data. 8-14 - Malik Yousef, Jens Allmer
:
Classification of Pre-cursor microRNAs from Different Species Using a New Set of Features. 15-20 - Mirto Musci
, Gioele Maruccia
, Marco Ferretti
:
A Review of Quasi-perfect Secondary Structure Prediction Servers. 21-26 - Hend Amraoui, Mourad Elloumi, Francesco Marcelloni, Faouzi Mhamdi, Davide Verzotto
:
Theoretical and Practical Analyses in Metagenomic Sequence Classification. 27-37 - Ahmet Paker, Hasan Ogul:
mirLSTM: A Deep Sequential Approach to MicroRNA Target Binding Site Prediction. 38-44 - Loai AbedAllah, Murad Badarna, Waleed Khalifa, Malik Yousef:
K - Means Based One-Class SVM Classifier. 45-53 - Ronald D. Hagan, Michael A. Langston:
Molecular Subtyping in Human Disease Using the Paraclique Algorithm. 54-58 - Giuseppe Lancia
, Marcello Dalpasso:
Speeding-Up the Dynamic Programming Procedure for the Edit Distance of Two Strings. 59-66 - Roman Zoun, Kay Schallert, David Broneske, Ivayla Trifonova, Xiao Chen, Robert Heyer, Dirk Benndorf, Gunter Saake:
Efficient Transformation of Protein Sequence Databases to Columnar Index Schema. 67-72
Cyber-Security and Functional Safety in Cyber-Physical Systems
- Tope Omitola, Abdolbaghi Rezazadeh
, Michael J. Butler:
Making (Implicit) Security Requirements Explicit for Cyber-Physical Systems: A Maritime Use Case Security Analysis. 75-84 - Fabian Berner, Johannes Sametinger
:
Information Disclosure Detection in Cyber-Physical Systems. 85-94 - Aakarsh Rao, Nadir Carreón, Roman Lysecky, Jerzy W. Rozenblit, Johannes Sametinger
:
Resilient Security of Medical Cyber-Physical Systems. 95-100 - Johannes Sametinger
:
Securing Smart Homes. 101-107 - Mohit Kumar, Michael Rossbory, Bernhard Alois Moser
, Bernhard Freudenthaler:
Deriving an Optimal Noise Adding Mechanism for Privacy-Preserving Machine Learning. 108-118 - Dagmar Auer, Markus Jäger
, Josef Küng:
Linking Trust to Cyber-Physical Systems. 119-128 - Maryam Zahid, Irum Inayat, Atif Mashkoor, Zahid Mehmood:
Security Risk Mitigation of Cyber Physical Systems: A Case Study of a Flight Simulator. 129-138
Machine Learning and Knowledge Graphs
- Mustafa Sofean, Hidir Aras
, Ahmad Alrifai:
Analyzing Trending Technological Areas of Patents. 141-146 - Luis Alberto Barradas Chacon, Artem Fedoskin, Ekaterina Shcheglakova, Sutthida Neamsup, Ahmed Rashed:
Emotion Analysis Using Heart Rate Data. 147-154 - Vitor A. C. Horta, Alessandra Mileo
:
Towards Explaining Deep Neural Networks Through Graph Analysis. 155-165 - Maria Khvalchik, Christian Blaschke, Artem Revenko
:
Question Formulation and Question Answering for Knowledge Graph Completion. 166-171 - Artem Revenko
, Víctor Mireles:
The Use of Class Assertions and Hypernyms to Induce and Disambiguate Word Senses. 172-181 - Hamid Eghbal-zadeh
, Lukas Fischer
, Thomas Hoch
:
On Conditioning GANs to Hierarchical Ontologies. 182-186
TIR
- Marina Santini, Benjamin Danielsson, Arne Jönsson:
Introducing the Notion of 'Contrast' Features for Language Technology. 189-198 - Ladislav Peska
, Hana Trojanová:
LineIT: Similarity Search and Recommendation Tool for Photo Lineup Assembling. 199-209 - Irena Holubová
, Martin Svoboda
, Tomás Skopal
, David Bernhauer
, Ladislav Peska
:
Advanced Behavioral Analyses Using Inferred Social Networks: A Vision. 210-219
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.