Home > Research > Browse

Results for Big data

Publications & Outputs

  1. SLA-based adaptation schemes in distributed stream processing engines

    Hanif, M., Kim, E., Helal, S. & Lee, C., 13/03/2019, In : Applied Sciences (Switzerland). 9, 6, 21 p., 1045.

    Research output: Contribution to journalJournal article

  2. CityFlow: Exploiting Edge Computing for Large Scale Smart City Applications

    Giang, N. K., Leung, V. C. M., Kawano, M., Yonezawa, T., Nakazawa, J., Lea, R. & Broadbent, M., 19/02/2019, 2019 IEEE International Conference on Big Data and Smart Computing, BigComp 2019 - Proceedings. IEEE, 4 p. 8679234

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  3. A Composite Malicious Peer Eviction Mechanism for Super-P2P Systems

    Ismail, H., Roos, S. & Suri, N., 1/08/2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, p. 456-464 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  4. Merging MCMC subposteriors through Gaussian-Process Approximations

    Nemeth, C. & Sherlock, C. G., 03/2018, In : Bayesian Analysis. 13, 2, p. 507-530 24 p.

    Research output: Contribution to journalJournal article

  5. Multi-dimensional predictive analytics for risk estimation of extreme events

    Raghupathi, L., Randell, D., Ross, E., Ewans, K. C. & Jonathan, P., 19/12/2016, 2016 IEEE 23rd International Conference on High Performance Computing Workshops (HiPCW). IEEE, p. 60-69 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  6. SENTRY: A novel approach for mitigating application layer DDoS threats

    Zhang, H., Taha, A., Trapero, R., Luna, J. & Suri, N., 23/08/2016, 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE, p. 465-472 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  7. Trust validation of cloud IaaS: A customer-centric approach

    Manzoor, S., Taha, A. & Suri, N., 23/08/2016, 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE, p. 97-104 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  8. Division of labor in vocabulary structure: insights from corpus analyses

    Christiansen, M. H. & Monaghan, P., 07/2016, In : Topics in Cognitive Science. 8, 3, p. 610-624 15 p.

    Research output: Contribution to journalJournal article

  9. Garden City Utopias and Everyday Life: exploring the spatial accessibility of Welwyn Garden City

    Cureton, P. & Versluis, L., 1/11/2015.

    Research output: Contribution to conference - Without ISBN/ISSN Other

  10. WSelector: A multi-scenario and multi-view worker selection framework for crowd-sensing

    Wang, J., Helal, S., Wang, Y., Zhang, D., J., M. (ed.), A., L. (ed.), H., N. (ed.) & L.T., Y. (ed.), 10/08/2015, Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015 IEEE 12th Intl Conf on. IEEE, p. 54-61 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  11. Sustaining Computer's impact and adapting to change

    Helal, S., 2015, In : Computer. 48, 1, p. 7-9 3 p.

    Research output: Contribution to journalEditorial

More results »

??????

  1. Data topography of NGS Genomes

    MacKenzie, A. & McNally, R.

    10/05/1231/08/12

    Project: NonFunded ProjectResearch