460599. Data management and data science not elsewhere classified


Title460599. Data management and data science not elsewhere classified
Parent4605. Data management and data science

Latest research outputs

Sort by Date Title
GraphTune: An Efficient Dependency-Aware Substrate to Alleviate Irregularity in Concurrent Graph Processing
Zhao, Jin, Zhang, Yu, He, Ligang, Li, Qikun, Zhang, Xiang, Jiang, Xinyu, Yu, Hui, Liao, Xiaofei, Jin, Hai, Gu, Lin, Liu, Haikun, He, Bingsheng, Zhang, Ji, Song, Xianzheng, Wang, Lin and Zhou, Jun. 2023. "GraphTune: An Efficient Dependency-Aware Substrate to Alleviate Irregularity in Concurrent Graph Processing." ACM Transactions on Architecture and Code Optimization. 20 (3), pp. 1-24. https://doi.org/10.1145/3600091

Article

IDGMS: a One-Stop Graph Mining System for Infectious Diseases
Xu, Zenghui, Yu, Ting, Hong, Xingyun, Li, Mingzhang, Zhang, Yang, Ren, Zujie and Zhang, Ji. 2023. "IDGMS: a One-Stop Graph Mining System for Infectious Diseases." Proceedings of the 10th IEEE International Conference on Big Data (2022). Osaka, Japan 17 - 20 Dec 2022 United States. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/BigData55660.2022.10020537

Paper

Injecting purpose and trust into data anonymisation
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Zhang, Yanchun. 2011. "Injecting purpose and trust into data anonymisation." Computers and Security. 30 (5), pp. 332-345. https://doi.org/10.1016/j.cose.2011.05.005

Article

Injecting purpose and trust into data anonymisation
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2009. "Injecting purpose and trust into data anonymisation." Cheung, David, Song, Il-Yeol, Chu, Wesley, Hu, Xiaohua and Lin, Jimmy (ed.) 18th ACM International Conference on Information and Knowledge Management (CIKM 2009) . Hong Kong, China 02 - 06 Nov 2009 New York, USA. https://doi.org/10.1145/1645953.1646166

Poster

Instance independent concurrency control for semistructured databases
Dekeyser, Stijn, Hidders, Jan and Paredaens, Jan. 2003. "Instance independent concurrency control for semistructured databases." Flesca, Sergio and Sacca, Domenico (ed.) 11th Italian Symposium on Advanced Database Systems. Cetraro, Italy 24 - 27 Jun 2003

Paper

Knowledge Tracing Based on Gated Heterogeneous Graph Convolutional Networks
Zhang, Yang, Wang, Zhen, Yu, Ting, Lu, Mingming, Ren, Zujie and Zhang, Ji. 2023. "Knowledge Tracing Based on Gated Heterogeneous Graph Convolutional Networks." Proceedings of the 10th IEEE International Conference on Big Data (2022). Osaka, Japan 17 - 20 Dec 2022 United States. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/BigData55660.2022.10020547

Paper

Manufacturing big data ecosystem: A systematic literature review
Cui, Yesheng, Kara, Sami and Chan, Ka C.. 2020. "Manufacturing big data ecosystem: A systematic literature review." Robotics and Computer Integrated Manufacturing. 62, pp. 1-20. https://doi.org/10.1016/j.rcim.2019.101861

Article

Method and dataset entity mining in scientific literature: A CNN + BiLSTM model with self-attention
Hou, Linlin, Zhang, Ji, Wu, Ou, Yu, Ting, Wang, Zhen, Li, Zhao, Gao, Jianliang, Ye, Yingchun and Yao, Rujing. 2022. "Method and dataset entity mining in scientific literature: A CNN + BiLSTM model with self-attention." Knowledge-Based Systems. 235. https://doi.org/10.1016/j.knosys.2021.107621

Article

Modelling of staged routing for reduced carbon footprints of large server clusters
Kist, Alexander A.. 2011. "Modelling of staged routing for reduced carbon footprints of large server clusters." International Journal of Communication Networks and Distributed Systems. 6 (1), pp. 28-44. https://doi.org/10.1504/IJCNDS.2011.037326

Article

Multiple Graph Adaptive Regularized Semi-Supervised Nonnegative Matrix Factorization with Sparse Constraint for Data Representation
Zhang, Kexin, Li, Lingling, Di, Jinhong, Wang, Yi, Zhao, Xuezhuan and Zhang, Ji. 2022. "Multiple Graph Adaptive Regularized Semi-Supervised Nonnegative Matrix Factorization with Sparse Constraint for Data Representation." Processes. 10 (12). https://doi.org/10.3390/pr10122623

Article

On memory and I/O efficient duplication detection for multiple self-clean data sources
Zhang, Ji, Shu, Yanfeng and Wang, Hua. 2010. "On memory and I/O efficient duplication detection for multiple self-clean data sources." Yoshikawa, M. (ed.) DASFAA 2010: 15th International Conference on Database Systems for Advanced Applications. Tsukuba, Japan 01 - 04 Apr 2010 Germany. Springer. https://doi.org/10.1007/978-3-642-14589-6_14

Paper

On the identity anonymization of high-dimensional rating data
Sun, Xiaoxun, Wang, Hua and Zhang, Yanchun. 2012. "On the identity anonymization of high-dimensional rating data." Concurrency and Computation: Practice and Experience. 24 (10), pp. 1108-1122. https://doi.org/10.1002/cpe.1724

Article

Optimal privacy-aware path in hippocratic databases
Li, Min, Sun, Xiaoxun, Wang, Hua and Zhang, Yanchun. 2009. "Optimal privacy-aware path in hippocratic databases." Zhou, X. (ed.) DASFAA 2009: 14th International Conference on Database Systems for Advanced Applications. Brisbane, Australia 21 - 23 Apr 2009 Germany. Springer. https://doi.org/10.1007/978-3-642-00887-0_39

Paper

PAX: using pseudonymization and anonymization to protect patients’ identities and data in the healthcare system
Al-Zubaidie, Mishall, Zhang, Zhongwei and Zhang, Ji. 2019. "PAX: using pseudonymization and anonymization to protect patients’ identities and data in the healthcare system." International Journal of Environmental Research and Public Health. 16 (1490), pp. 1-36. https://doi.org/10.3390/ijerph16091490

Article

Privacy-aware access control with generalization boundaries
Li, Min, Wang, Hua and Plank, Ashley. 2009. "Privacy-aware access control with generalization boundaries." Mans, Bernard (ed.) 32nd Australasian Computer Science Conference (ACSC 2009). Wellington, New Zealand 19 - 23 Jan 2009 Sydney, Australia.

Paper

Resampling methods for generating continuous multivariate synthetic data for disclosure control
Khan, Atikur R. and Kabir, Enamul. 2021. "Resampling methods for generating continuous multivariate synthetic data for disclosure control." Journal of Data, Information and Management. 3, pp. 225-235. https://doi.org/10.1007/s42488-021-00054-2

Article

Seed identification using a computerised database
Gupta, Madan, George, Doug and Basnet, Badri Bahadur. 2005. "Seed identification using a computerised database." Seed Science and Technology. 33 (3), pp. 647-654. https://doi.org/10.15258/sst.2005.33.3.12

Article

Semantic labelling for document feature patterns using ontological subjects
Tao, Xiaohui, Li, Yuefeng, Liu, Bin and Shen, Yan. 2012. "Semantic labelling for document feature patterns using ontological subjects." Zhong, Ning and Gong, Zhiguo (ed.) 2012 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2012). Macau, China 04 - 07 Dec 2012 Los Alamitos, CA. United States. https://doi.org/10.1109/WI-IAT.2012.47

Paper

Specifying role-based access constraints with object constraint language
Wang, Hua, Zhang, Yanchun, Cao, Jinli and Yang, Jian. 2004. "Specifying role-based access constraints with object constraint language." Yu, Jeffrey Xu, Lin, Xuemin, Lu, Hongjun and Zhang, Yanchun (ed.) 6th Asia-Pacific Web Conference: Advanced Web Technologies and Applications (APWeb 2004). Hangzhou, China 14 - 17 Apr 2004 Berlin, Germany. Springer.

Paper

Suggestions for Asian/Australasian regional cooperation based on a critical evaluation of collaboration and standardisation across Australian institutional repositories
Sefton, Peter and Watson, Kate. 2009. "Suggestions for Asian/Australasian regional cooperation based on a critical evaluation of collaboration and standardisation across Australian institutional repositories." DRF 2009: Open Access Repositories Now and In the Future: From the Global and Asia-Pacific Points of View. Tokyo, Japan 03 - 04 Dec 2009 Tokyo, Japan.

Poster

The conjurer's new card trick and the illusion of privacy: a discussion of the privacy and transparency issues associated with the proposed Australian Government Health and Social Services Access Card
Hart, Caroline. 2008. "The conjurer's new card trick and the illusion of privacy: a discussion of the privacy and transparency issues associated with the proposed Australian Government Health and Social Services Access Card." University of Tasmania Law Review. 25 (1), pp. 5-43.

Article

The perceived benefits of cloud computing technology for regional municipal governments and barriers to adoption
Ali, Omar Massoud Salim Hassan. 2016. The perceived benefits of cloud computing technology for regional municipal governments and barriers to adoption. PhD Thesis Doctor of Philosophy. University of Southern Queensland.

PhD Thesis

Towards Efficient Discovery of Periodic-Frequent Patterns in Dense Temporal Databases Using Complements
Veena, P., Sreepada, Tarun, Kiran, R. Uday, Dao, Minh-Son, Zettsu, Koji, Watanobe, Yutaka and Zhang, Ji. 2022. "Towards Efficient Discovery of Periodic-Frequent Patterns in Dense Temporal Databases Using Complements." 33rd International Conference on Database and Expert Systems Applications (DEXA 2022). Vienna, Austria 22 - 24 Aug 2022 Switzerland . Springer. https://doi.org/10.1007/978-3-031-12426-6_16

Paper

Towards Multi-User, Secure, and Verifiable kNN Query in Cloud Database
Cui, Ningning, Qian, Kang, Cai, Taotao, Li, Jianxin, Yang, Xiaochun, Cui, Jie and Zhong, Hong. 2023. "Towards Multi-User, Secure, and Verifiable kNN Query in Cloud Database." IEEE Transactions on Knowledge and Data Engineering. 35 (9), pp. 9333-9349. https://doi.org/10.1109/TKDE.2023.3237879

Article

Trust-based access control for privacy protection in collaborative environment
Li, Min, Wang, Hua and Ross, David. 2009. "Trust-based access control for privacy protection in collaborative environment." ICEBE 2009: IEEE International Conference on e-Business Engineering . Macau, China 21 - 23 Oct 2009 United States. https://doi.org/10.1109/ICEBE.2009.66

Paper

Trust-involved access control in collaborative open social networks
Wang, Hua and Sun, Lili. 2010. "Trust-involved access control in collaborative open social networks." Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza (ed.) NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/NSS.2010.13

Paper

Using usage control to access XML databases
Sun, Lili and Li, Yan. 2009. "Using usage control to access XML databases." International Journal of Information Systems in the Service Sector. 1 (3), pp. 32-44.

Article

Validating privacy requirements in large survey rating data
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2011. "Validating privacy requirements in large survey rating data." Bessis, Nik and Xhafa, Fatos (ed.) Next generation data technologies for collective computational intelligence. Berlin, Germany. Springer. pp. 445-469

Edited book (chapter)

VennTags: A file management system based on overlapping sets of tags
Albadri, Nehad, Dekeyser, Stijn and Watson, Richard. 2017. "VennTags: A file management system based on overlapping sets of tags." Sterzer, Wjatscheslaw and van de Sandt, Stephanie (ed.) iConference 2017 Effect, Expand, Evolve: Global Collaboration Across the Information Community. Wuhan, China 22 - 25 Mar 2017 United States. https://doi.org/10.9776/17002

Paper