Marthie Grobler,Raj Gaire,Surya Nepal
Marthie Grobler
The effectiveness of cyber security measures are often questioned in the wake of hard hitting security events. Despite much work being done in the field of cyber security, most of the focus seems to be concentrated on system usage. In this ...
Named Data Networking for Genomics Data Management and Integrated Workflows [0.03%]
基于命名数据网络的基因组学数据管理与集成工作流研究进展
Cameron Ogle,David Reddick,Coleman McKnight et al.
Cameron Ogle et al.
Advanced imaging and DNA sequencing technologies now enable the diverse biology community to routinely generate and analyze terabytes of high resolution biological data. The community is rapidly heading toward the petascale in single invest...
Corrigendum: FoodKG: A Tool to Enrich Knowledge Graphs Using Machine Learning Techniques [0.03%]
FoodKG:一种利用机器学习技术丰富知识图谱的工具(勘误)
Mohamed Gharibi,Arun Zachariah,Praveen Rao
Mohamed Gharibi
[This corrects the article DOI: 10.3389/fdata.2020.00012.]. Keywords: AGROVOC; graph embeddings; knowledge g...
Published Erratum
Frontiers in big data. 2020 Jun 10:3:21. DOI:10.3389/fdata.2020.00021 2020
What Do You Think About Your Company's Leaks? A Survey on End-Users Perception Toward Data Leakage Mechanisms [0.03%]
关于公司泄密,你了解多少?一项关于终端用户对数据泄露机制认知的调查
Yoann Bertrand,Karima Boudaoud,Michel Riveill
Yoann Bertrand
Data leakage can lead to severe issues for a company, including financial loss, damage of goodwill, reputation, lawsuits and loss of future sales. To prevent these problems, a company can use other mechanisms on top of traditional Access Co...
Editorial: Innovations and Perspectives in Data Mining and Knowledge Discovery [0.03%]
数据挖掘与知识发现的创新与发展展望
Naoki Abe,Huan Liu,Kuansan Wang
Naoki Abe
Muhammad Ifte Islam,Farhan Tanvir,Ginger Johnson et al.
Muhammad Ifte Islam et al.
Network embedding that encodes structural information of graphs into a low-dimensional vector space has been proven to be essential for network analysis applications, including node classification and community detection. Although recent me...
GPU-Accelerated Machine Learning Inference as a Service for Computing in Neutrino Experiments [0.03%]
用于中微子实验计算的基于GPU的机器学习推理即服务
Michael Wang,Tingjun Yang,Maria Acosta Flechas et al.
Michael Wang et al.
Machine learning algorithms are becoming increasingly prevalent and performant in the reconstruction of events in accelerator-based neutrino experiments. These sophisticated algorithms can be computationally expensive. At the same time, the...
A Policy and Practice Review of Consumer Protections and Their Application to Hospital-Sourced Data Aggregation and Analytics by Third-Party Companies [0.03%]
第三方公司收集和分析医院数据的消费者保护政策与实践回顾
Vasiliki Rahimzadeh
Vasiliki Rahimzadeh
The Office of the National Coordinator for Health Information Technology estimates that 96% of all U.S. hospitals use a basic electronic health record, but only 62% are able to exchange health information with outside providers. Barriers to...
Heterogeneous Reconstruction of Tracks and Primary Vertices With the CMS Pixel Tracker [0.03%]
基于CMS像素探测器的径迹和初级顶点的异构重建
A Bocci,V Innocente,M Kortelainen et al.
A Bocci et al.
The High-Luminosity upgrade of the Large Hadron Collider (LHC) will see the accelerator reach an instantaneous luminosity of 7 × 1034 cm-2 s-1 with an average pileup of 200 proton-proton collisions. These conditions will pose an unpreceden...
Entropy of Co-Enrolment Networks Reveal Disparities in High School STEM Participation [0.03%]
基于共注册网络的熵揭示了高中STEM参与的差异性
Steven Martin Turnbull,Dion R J ONeale
Steven Martin Turnbull
The current study uses a network analysis approach to explore the STEM pathways that students take through their final year of high school in Aotearoa New Zealand. By accessing individual-level microdata from New Zealand's Integrated Data I...