callback( { "result":{ "query":":facetid:type:\"Reference_Works\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"51.04" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"0" }, "hits":{ "@total":"27366", "@computed":"1000", "@sent":"1000", "@first":"0", "hit":[{ "@score":"1", "@id":"463968", "info":{"authors":{"author":[{"@pid":"33/3048","text":"Bo Hu Li 0001"},{"@pid":"82/5191","text":"Wenhui Fan"},{"@pid":"37/1629-9","text":"Lin Zhang 0009"}]},"title":"Trends, Desirable Features, and Challenges.","venue":"Body of Knowledge for Modeling and Simulation","pages":"471-494","year":"2023","type":"Reference Works","access":"closed","key":"reference/sp/0001F023","doi":"10.1007/978-3-031-11085-6_19","ee":"https://doi.org/10.1007/978-3-031-11085-6_19","url":"https://dblp.org/rec/reference/sp/0001F023"}, "url":"URL#463968" }, { "@score":"1", "@id":"463969", "info":{"authors":{"author":[{"@pid":"95/5132","text":"Andrea D'Ambrogio"},{"@pid":"01/2478","text":"Chen Yang"},{"@pid":"08/5556","text":"Hessam S. Sarjoughian"}]},"title":"Supporting Engineering Areas.","venue":"Body of Knowledge for Modeling and Simulation","pages":"353-371","year":"2023","type":"Reference Works","access":"closed","key":"reference/sp/DAmbrogioYS23","doi":"10.1007/978-3-031-11085-6_14","ee":"https://doi.org/10.1007/978-3-031-11085-6_14","url":"https://dblp.org/rec/reference/sp/DAmbrogioYS23"}, "url":"URL#463969" }, { "@score":"1", "@id":"463970", "info":{"authors":{"author":{"@pid":"34/2738","text":"Paul K. Davis"}},"title":"Supporting Social Science and Management Areas.","venue":"Body of Knowledge for Modeling and Simulation","pages":"373-382","year":"2023","type":"Reference Works","access":"closed","key":"reference/sp/Davis23","doi":"10.1007/978-3-031-11085-6_15","ee":"https://doi.org/10.1007/978-3-031-11085-6_15","url":"https://dblp.org/rec/reference/sp/Davis23"}, "url":"URL#463970" }, { "@score":"1", "@id":"463971", "info":{"authors":{"author":[{"@pid":"22/2230","text":"Paul A. Fishwick"},{"@pid":"87/3302","text":"Saikou Y. Diallo"},{"@pid":"47/5226","text":"Umut Durak"},{"@pid":"62/1267","text":"Baocun Hou"},{"@pid":"33/3048","text":"Bo Hu Li 0001"},{"@pid":"57/7211","text":"Chunhui Su"},{"@pid":"12/5978","text":"Yanguang Wang"},{"@pid":"37/1629-9","text":"Lin Zhang 0009"},{"@pid":"95/7632","text":"Xu Xie"},{"@pid":"191/6532","text":"Longfei Zhou"},{"@pid":"z/BernardPZeigler","text":"Bernard P. Zeigler"},{"@pid":"19/5384","text":"Thorsten Pawletta"},{"@pid":"203/9226","text":"Hendrik Folkerts"},{"@pid":"66/4604","text":"Saurabh Mittal"}]},"title":"Core Research Areas.","venue":"Body of Knowledge for Modeling and Simulation","pages":"435-470","year":"2023","type":"Reference Works","access":"closed","key":"reference/sp/FishwickDDH0SW0XZZPFM23","doi":"10.1007/978-3-031-11085-6_18","ee":"https://doi.org/10.1007/978-3-031-11085-6_18","url":"https://dblp.org/rec/reference/sp/FishwickDDH0SW0XZZPFM23"}, "url":"URL#463971" }, { "@score":"1", "@id":"463972", "info":{"authors":{"author":[{"@pid":"231/4789","text":"Nico Formanek"},{"@pid":"153/5691","text":"Juan Manuel Durán"},{"@pid":"34/2738","text":"Paul K. Davis"},{"@pid":"t/ATolk","text":"Andreas Tolk"},{"@pid":"136/0328","text":"Tuncer I. Ören"}]},"title":"Ethics.","venue":"Body of Knowledge for Modeling and Simulation","pages":"205-219","year":"2023","type":"Reference Works","access":"closed","key":"reference/sp/FormanekDDTO23","doi":"10.1007/978-3-031-11085-6_8","ee":"https://doi.org/10.1007/978-3-031-11085-6_8","url":"https://dblp.org/rec/reference/sp/FormanekDDTO23"}, "url":"URL#463972" }, { "@score":"1", "@id":"463973", "info":{"authors":{"author":[{"@pid":"339/0512","text":"Hezam Haidar"},{"@pid":"76/2231","text":"Nicolas Daclin"},{"@pid":"02/2531","text":"Gregory Zacharewicz"},{"@pid":"21/2151","text":"Guy Doumeingts"}]},"title":"Enterprise Modeling and Simulation.","venue":"Body of Knowledge for Modeling and Simulation","pages":"221-247","year":"2023","type":"Reference Works","access":"closed","key":"reference/sp/HaidarDZD23","doi":"10.1007/978-3-031-11085-6_9","ee":"https://doi.org/10.1007/978-3-031-11085-6_9","url":"https://dblp.org/rec/reference/sp/HaidarDZD23"}, "url":"URL#463973" }, { "@score":"1", "@id":"463974", "info":{"authors":{"author":[{"@pid":"41/163","text":"Margaret L. Loper"},{"@pid":"136/0328","text":"Tuncer I. Ören"},{"@pid":"96/7136","text":"Cláudio Gomes 0001"},{"@pid":"151/3182","text":"Valdemar Vicente Graciano Neto"},{"@pid":"18/3600","text":"Ernest H. Page"}]},"title":"Infrastructure.","venue":"Body of Knowledge for Modeling and Simulation","pages":"149-165","year":"2023","type":"Reference Works","access":"closed","key":"reference/sp/LoperO0NP23","doi":"10.1007/978-3-031-11085-6_6","ee":"https://doi.org/10.1007/978-3-031-11085-6_6","url":"https://dblp.org/rec/reference/sp/LoperO0NP23"}, "url":"URL#463974" }, { "@score":"1", "@id":"463975", "info":{"authors":{"author":[{"@pid":"136/0328","text":"Tuncer I. Ören"},{"@pid":"34/2738","text":"Paul K. Davis"},{"@pid":"88/4717","text":"Rhys Goldstein"},{"@pid":"00/6056","text":"Azam Khan"},{"@pid":"07/4334","text":"Laurent Capocchi"},{"@pid":"47/3480","text":"Maâmar El-Amine Hamri"},{"@pid":"04/3633","text":"Navonil Mustafee"},{"@pid":"212/5548","text":"Alison Harper"},{"@pid":"62/1267","text":"Baocun Hou"},{"@pid":"33/3048","text":"Bo Hu Li 0001"},{"@pid":"51/3710","text":"Yang Liu"}]},"title":"Simulation as Experimentation.","venue":"Body of Knowledge for Modeling and Simulation","pages":"77-119","year":"2023","type":"Reference Works","access":"closed","key":"reference/sp/Oren0GKCHMHH0L23","doi":"10.1007/978-3-031-11085-6_3","ee":"https://doi.org/10.1007/978-3-031-11085-6_3","url":"https://dblp.org/rec/reference/sp/Oren0GKCHMHH0L23"}, "url":"URL#463975" }, { "@score":"1", "@id":"463976", "info":{"authors":{"author":[{"@pid":"136/0328","text":"Tuncer I. Ören"},{"@pid":"47/5226","text":"Umut Durak"},{"@pid":"18/3600","text":"Ernest H. Page"},{"@pid":"t/ATolk","text":"Andreas Tolk"},{"@pid":"87/3302","text":"Saikou Y. Diallo"}]},"title":"Simulation as Experience to Enhance Three Types of Skills.","venue":"Body of Knowledge for Modeling and Simulation","pages":"121-139","year":"2023","type":"Reference Works","access":"closed","key":"reference/sp/OrenDPTD23","doi":"10.1007/978-3-031-11085-6_4","ee":"https://doi.org/10.1007/978-3-031-11085-6_4","url":"https://dblp.org/rec/reference/sp/OrenDPTD23"}, "url":"URL#463976" }, { "@score":"1", "@id":"463977", "info":{"authors":{"author":[{"@pid":"136/0328","text":"Tuncer I. Ören"},{"@pid":"339/0902","text":"Umang Kant"},{"@pid":"227/0192","text":"Mayank Singh 0008"},{"@pid":"22/2230","text":"Paul A. Fishwick"},{"@pid":"55/1407","text":"Mamadou Kaba Traoré"},{"@pid":"37/1629-9","text":"Lin Zhang 0009"},{"@pid":"34/10150","text":"Yuanjun Laili"},{"@pid":"z/BernardPZeigler","text":"Bernard P. Zeigler"},{"@pid":"t/ATolk","text":"Andreas Tolk"},{"@pid":"02/2531","text":"Gregory Zacharewicz"},{"@pid":"91/2882","text":"Mohammad S. Obaidat"},{"@pid":"51/6294","text":"Balqies Sadoun"}]},"title":"M&S Bok Core Areas and the Big Picture.","venue":"Body of Knowledge for Modeling and Simulation","pages":"21-75","year":"2023","type":"Reference Works","access":"closed","key":"reference/sp/OrenK0FT0LZTZOS23","doi":"10.1007/978-3-031-11085-6_2","ee":"https://doi.org/10.1007/978-3-031-11085-6_2","url":"https://dblp.org/rec/reference/sp/OrenK0FT0LZTZOS23"}, "url":"URL#463977" }, { "@score":"1", "@id":"463978", "info":{"authors":{"author":[{"@pid":"136/0328","text":"Tuncer I. Ören"},{"@pid":"41/163","text":"Margaret L. Loper"}]},"title":"Maturity and Accreditation.","venue":"Body of Knowledge for Modeling and Simulation","pages":"249-253","year":"2023","type":"Reference Works","access":"closed","key":"reference/sp/OrenL23","doi":"10.1007/978-3-031-11085-6_10","ee":"https://doi.org/10.1007/978-3-031-11085-6_10","url":"https://dblp.org/rec/reference/sp/OrenL23"}, "url":"URL#463978" }, { "@score":"1", "@id":"463979", "info":{"authors":{"author":[{"@pid":"136/0328","text":"Tuncer I. Ören"},{"@pid":"151/3182","text":"Valdemar Vicente Graciano Neto"},{"@pid":"34/2738","text":"Paul K. Davis"},{"@pid":"z/BernardPZeigler","text":"Bernard P. Zeigler"}]},"title":"Reliability and Quality Assurance of M&S.","venue":"Body of Knowledge for Modeling and Simulation","pages":"167-204","year":"2023","type":"Reference Works","access":"closed","key":"reference/sp/OrenNDZ23","doi":"10.1007/978-3-031-11085-6_7","ee":"https://doi.org/10.1007/978-3-031-11085-6_7","url":"https://dblp.org/rec/reference/sp/OrenNDZ23"}, "url":"URL#463979" }, { "@score":"1", "@id":"463980", "info":{"authors":{"author":[{"@pid":"136/0328","text":"Tuncer I. Ören"},{"@pid":"z/BernardPZeigler","text":"Bernard P. Zeigler"},{"@pid":"19/5384","text":"Thorsten Pawletta"}]},"title":"Preliminary.","venue":"Body of Knowledge for Modeling and Simulation","pages":"1-20","year":"2023","type":"Reference Works","access":"closed","key":"reference/sp/OrenZP23","doi":"10.1007/978-3-031-11085-6_1","ee":"https://doi.org/10.1007/978-3-031-11085-6_1","url":"https://dblp.org/rec/reference/sp/OrenZP23"}, "url":"URL#463980" }, { "@score":"1", "@id":"463981", "info":{"authors":{"author":[{"@pid":"57/7989","text":"Rodrigo Pereira dos Santos"},{"@pid":"59/5772","text":"Esteban Walter Gonzalez Clua"}]},"title":"Simulation Games.","venue":"Body of Knowledge for Modeling and Simulation","pages":"141-148","year":"2023","type":"Reference Works","access":"closed","key":"reference/sp/SantosC23","doi":"10.1007/978-3-031-11085-6_5","ee":"https://doi.org/10.1007/978-3-031-11085-6_5","url":"https://dblp.org/rec/reference/sp/SantosC23"}, "url":"URL#463981" }, { "@score":"1", "@id":"463982", "info":{"authors":{"author":[{"@pid":"50/6373","text":"Jean François Santucci"},{"@pid":"07/4334","text":"Laurent Capocchi"},{"@pid":"136/0328","text":"Tuncer I. Ören"},{"@pid":"66/4604","text":"Saurabh Mittal"},{"@pid":"33/3048","text":"Bo Hu Li 0001"},{"@pid":"37/1629-9","text":"Lin Zhang 0009"},{"@pid":"138/7101-1","text":"Tingyu Lin 0001"},{"@pid":"34/10150","text":"Yuanjun Laili"},{"@pid":"11/1325","text":"Claudia Szabo"}]},"title":"Supporting Computer Domains.","venue":"Body of Knowledge for Modeling and Simulation","pages":"255-285","year":"2023","type":"Reference Works","access":"closed","key":"reference/sp/SantucciCOM00LLS23","doi":"10.1007/978-3-031-11085-6_11","ee":"https://doi.org/10.1007/978-3-031-11085-6_11","url":"https://dblp.org/rec/reference/sp/SantucciCOM00LLS23"}, "url":"URL#463982" }, { "@score":"1", "@id":"463983", "info":{"authors":{"author":[{"@pid":"50/6373","text":"Jean François Santucci"},{"@pid":"07/4334","text":"Laurent Capocchi"},{"@pid":"136/0328","text":"Tuncer I. Ören"},{"@pid":"11/1325","text":"Claudia Szabo"},{"@pid":"151/3182","text":"Valdemar Vicente Graciano Neto"}]},"title":"Synergies of Soft Computing and M&S.","venue":"Body of Knowledge for Modeling and Simulation","pages":"287-309","year":"2023","type":"Reference Works","access":"closed","key":"reference/sp/SantucciCOSN23","doi":"10.1007/978-3-031-11085-6_12","ee":"https://doi.org/10.1007/978-3-031-11085-6_12","url":"https://dblp.org/rec/reference/sp/SantucciCOSN23"}, "url":"URL#463983" }, { "@score":"1", "@id":"463984", "info":{"authors":{"author":[{"@pid":"t/ATolk","text":"Andreas Tolk"},{"@pid":"18/3600","text":"Ernest H. Page"},{"@pid":"151/3182","text":"Valdemar Vicente Graciano Neto"},{"@pid":"54/8653","text":"Paul Weirich"},{"@pid":"231/4789","text":"Nico Formanek"},{"@pid":"153/5691","text":"Juan Manuel Durán"},{"@pid":"50/6373","text":"Jean François Santucci"},{"@pid":"66/4604","text":"Saurabh Mittal"}]},"title":"Philosophy and Modeling and Simulation.","venue":"Body of Knowledge for Modeling and Simulation","pages":"383-412","year":"2023","type":"Reference Works","access":"closed","key":"reference/sp/TolkPNWFDSM23","doi":"10.1007/978-3-031-11085-6_16","ee":"https://doi.org/10.1007/978-3-031-11085-6_16","url":"https://dblp.org/rec/reference/sp/TolkPNWFDSM23"}, "url":"URL#463984" }, { "@score":"1", "@id":"463985", "info":{"authors":{"author":[{"@pid":"z/BernardPZeigler","text":"Bernard P. Zeigler"},{"@pid":"122/4837","text":"Breno Bernard Nicolau de França"},{"@pid":"151/3182","text":"Valdemar Vicente Graciano Neto"},{"@pid":"71/1779","text":"Raymond R. Hill"},{"@pid":"07/2165","text":"Lance E. Champagne"},{"@pid":"136/0328","text":"Tuncer I. Ören"}]},"title":"History of Simulation.","venue":"Body of Knowledge for Modeling and Simulation","pages":"413-434","year":"2023","type":"Reference Works","access":"closed","key":"reference/sp/ZeiglerFNHCO23","doi":"10.1007/978-3-031-11085-6_17","ee":"https://doi.org/10.1007/978-3-031-11085-6_17","url":"https://dblp.org/rec/reference/sp/ZeiglerFNHCO23"}, "url":"URL#463985" }, { "@score":"1", "@id":"463986", "info":{"authors":{"author":[{"@pid":"z/BernardPZeigler","text":"Bernard P. Zeigler"},{"@pid":"120/4712","text":"Paul Wach"},{"@pid":"07/4334","text":"Laurent Capocchi"},{"@pid":"54/8653","text":"Paul Weirich"},{"@pid":"91/2882","text":"Mohammad S. Obaidat"},{"@pid":"51/6294","text":"Balqies Sadoun"},{"@pid":"11/1325","text":"Claudia Szabo"}]},"title":"Supporting Science Areas.","venue":"Body of Knowledge for Modeling and Simulation","pages":"311-351","year":"2023","type":"Reference Works","access":"closed","key":"reference/sp/ZeiglerWCWOSS23","doi":"10.1007/978-3-031-11085-6_13","ee":"https://doi.org/10.1007/978-3-031-11085-6_13","url":"https://dblp.org/rec/reference/sp/ZeiglerWCWOSS23"}, "url":"URL#463986" }, { "@score":"1", "@id":"957151", "info":{"authors":{"author":[{"@pid":"r/FrancescoRicci","text":"Francesco Ricci 0001"},{"@pid":"r/LiorRokach","text":"Lior Rokach"},{"@pid":"74/6180","text":"Bracha Shapira"}]},"title":"Recommender Systems: Techniques, Applications, and Challenges.","venue":"Recommender Systems Handbook","pages":"1-35","year":"2022","type":"Reference Works","access":"closed","key":"reference/sp/0001RS22","doi":"10.1007/978-1-0716-2197-4_1","ee":"https://doi.org/10.1007/978-1-0716-2197-4_1","url":"https://dblp.org/rec/reference/sp/0001RS22"}, "url":"URL#957151" }, { "@score":"1", "@id":"957152", "info":{"authors":{"author":[{"@pid":"71/208-7","text":"Shuai Zhang 0007"},{"@pid":"188/6350","text":"Yi Tay"},{"@pid":"56/6651-1","text":"Lina Yao 0001"},{"@pid":"78/5155","text":"Aixin Sun"},{"@pid":"97/919-1","text":"Ce Zhang 0001"}]},"title":"Deep Learning for Recommender Systems.","venue":"Recommender Systems Handbook","pages":"173-210","year":"2022","type":"Reference Works","access":"closed","key":"reference/sp/0007T0S022","doi":"10.1007/978-1-0716-2197-4_5","ee":"https://doi.org/10.1007/978-1-0716-2197-4_5","url":"https://dblp.org/rec/reference/sp/0007T0S022"}, "url":"URL#957152" }, { "@score":"1", "@id":"957153", "info":{"authors":{"author":[{"@pid":"184/2105","text":"Himan Abdollahpouri"},{"@pid":"58/2337","text":"Robin Burke"}]},"title":"Multistakeholder Recommender Systems.","venue":"Recommender Systems Handbook","pages":"647-677","year":"2022","type":"Reference Works","access":"closed","key":"reference/sp/AbdollahpouriB22","doi":"10.1007/978-1-0716-2197-4_17","ee":"https://doi.org/10.1007/978-1-0716-2197-4_17","url":"https://dblp.org/rec/reference/sp/AbdollahpouriB22"}, "url":"URL#957153" }, { "@score":"1", "@id":"957154", "info":{"authors":{"author":[{"@pid":"28/4208","text":"Gediminas Adomavicius"},{"@pid":"151/2491","text":"Konstantin Bauman"},{"@pid":"t/AlexanderTuzhilin","text":"Alexander Tuzhilin"},{"@pid":"151/0222","text":"Moshe Unger"}]},"title":"Context-Aware Recommender Systems: From Foundations to Recent Developments.","venue":"Recommender Systems Handbook","pages":"211-250","year":"2022","type":"Reference Works","access":"closed","key":"reference/sp/AdomaviciusBTU22","doi":"10.1007/978-1-0716-2197-4_6","ee":"https://doi.org/10.1007/978-1-0716-2197-4_6","url":"https://dblp.org/rec/reference/sp/AdomaviciusBTU22"}, "url":"URL#957154" }, { "@score":"1", "@id":"957155", "info":{"authors":{"author":[{"@pid":"171/0384","text":"Vito Walter Anelli"},{"@pid":"167/2847","text":"Yashar Deldjoo"},{"@pid":"58/5192","text":"Tommaso Di Noia"},{"@pid":"247/5939","text":"Felice Antonio Merra"}]},"title":"Adversarial Recommender Systems: Attack, Defense, and Advances.","venue":"Recommender Systems Handbook","pages":"335-379","year":"2022","type":"Reference Works","access":"closed","key":"reference/sp/AnelliDNM22","doi":"10.1007/978-1-0716-2197-4_9","ee":"https://doi.org/10.1007/978-1-0716-2197-4_9","url":"https://dblp.org/rec/reference/sp/AnelliDNM22"}, "url":"URL#957155" }, { "@score":"1", "@id":"957156", "info":{"authors":{"author":[{"@pid":"c/PabloCastells","text":"Pablo Castells"},{"@pid":"86/2778","text":"Neil Hurley"},{"@pid":"61/9910","text":"Saúl Vargas"}]},"title":"Novelty and Diversity in Recommender Systems.","venue":"Recommender Systems Handbook","pages":"603-646","year":"2022","type":"Reference Works","access":"closed","key":"reference/sp/CastellsHV22","doi":"10.1007/978-1-0716-2197-4_16","ee":"https://doi.org/10.1007/978-1-0716-2197-4_16","url":"https://dblp.org/rec/reference/sp/CastellsHV22"}, "url":"URL#957156" }, { "@score":"1", "@id":"957157", "info":{"authors":{"author":[{"@pid":"225/7792","text":"Maurizio Ferrari Dacrema"},{"@pid":"29/791","text":"Iván Cantador"},{"@pid":"50/10009","text":"Ignacio Fernández-Tobías"},{"@pid":"35/5995","text":"Shlomo Berkovsky"},{"@pid":"03/3233","text":"Paolo Cremonesi"}]},"title":"Design and Evaluation of Cross-Domain Recommender Systems.","venue":"Recommender Systems Handbook","pages":"485-516","year":"2022","type":"Reference Works","access":"closed","key":"reference/sp/DacremaCFBC22","doi":"10.1007/978-1-0716-2197-4_13","ee":"https://doi.org/10.1007/978-1-0716-2197-4_13","url":"https://dblp.org/rec/reference/sp/DacremaCFBC22"}, "url":"URL#957157" }, { "@score":"1", "@id":"957158", "info":{"authors":{"author":[{"@pid":"167/2847","text":"Yashar Deldjoo"},{"@pid":"77/271","text":"Markus Schedl"},{"@pid":"15/9988","text":"Balázs Hidasi"},{"@pid":"247/9379","text":"Yinwei Wei"},{"@pid":"59/1007","text":"Xiangnan He 0001"}]},"title":"Multimedia Recommender Systems: Algorithms and Challenges.","venue":"Recommender Systems Handbook","pages":"973-1014","year":"2022","type":"Reference Works","access":"closed","key":"reference/sp/DeldjooSHW022","doi":"10.1007/978-1-0716-2197-4_25","ee":"https://doi.org/10.1007/978-1-0716-2197-4_25","url":"https://dblp.org/rec/reference/sp/DeldjooSHW022"}, "url":"URL#957158" }, { "@score":"1", "@id":"957159", "info":{"authors":{"author":[{"@pid":"69/7949","text":"Michael D. Ekstrand"},{"@pid":"166/0983-1","text":"Anubrata Das 0001"},{"@pid":"58/2337","text":"Robin Burke"},{"@pid":"38/2451-1","text":"Fernando Diaz 0001"}]},"title":"Fairness in Recommender Systems.","venue":"Recommender Systems Handbook","pages":"679-707","year":"2022","type":"Reference Works","access":"closed","key":"reference/sp/Ekstrand0B022","doi":"10.1007/978-1-0716-2197-4_18","ee":"https://doi.org/10.1007/978-1-0716-2197-4_18","url":"https://dblp.org/rec/reference/sp/Ekstrand0B022"}, "url":"URL#957159" }, { "@score":"1", "@id":"957160", "info":{"authors":{"author":[{"@pid":"21/4257","text":"David Elsweiler"},{"@pid":"173/2178","text":"Hanna Hauptmann"},{"@pid":"94/8283","text":"Christoph Trattner"}]},"title":"Food Recommender Systems.","venue":"Recommender Systems Handbook","pages":"871-925","year":"2022","type":"Reference Works","access":"closed","key":"reference/sp/ElsweilerHT22","doi":"10.1007/978-1-0716-2197-4_23","ee":"https://doi.org/10.1007/978-1-0716-2197-4_23","url":"https://dblp.org/rec/reference/sp/ElsweilerHT22"}, "url":"URL#957160" }, { "@score":"1", "@id":"957161", "info":{"authors":{"author":[{"@pid":"89/1274","text":"Asela Gunawardana"},{"@pid":"77/5955","text":"Guy Shani"},{"@pid":"75/5657","text":"Sivan Yogev"}]},"title":"Evaluating Recommender Systems.","venue":"Recommender Systems Handbook","pages":"547-601","year":"2022","type":"Reference Works","access":"closed","key":"reference/sp/GunawardanaSY22","doi":"10.1007/978-1-0716-2197-4_15","ee":"https://doi.org/10.1007/978-1-0716-2197-4_15","url":"https://dblp.org/rec/reference/sp/GunawardanaSY22"}, "url":"URL#957161" }, { "@score":"1", "@id":"957162", "info":{"authors":{"author":{"@pid":"46/650","text":"Ido Guy"}},"title":"Social Recommender Systems.","venue":"Recommender Systems Handbook","pages":"835-870","year":"2022","type":"Reference Works","access":"closed","key":"reference/sp/Guy22","doi":"10.1007/978-1-0716-2197-4_22","ee":"https://doi.org/10.1007/978-1-0716-2197-4_22","url":"https://dblp.org/rec/reference/sp/Guy22"}, "url":"URL#957162" }, { "@score":"1", "@id":"957163", "info":{"authors":{"author":[{"@pid":"j/AnthonyJameson","text":"Anthony Jameson"},{"@pid":"26/7455","text":"Martijn C. Willemsen"},{"@pid":"71/915","text":"Alexander Felfernig"}]},"title":"Individual and Group Decision Making and Recommender Systems.","venue":"Recommender Systems Handbook","pages":"789-832","year":"2022","type":"Reference Works","access":"closed","key":"reference/sp/JamesonWF22","doi":"10.1007/978-1-0716-2197-4_21","ee":"https://doi.org/10.1007/978-1-0716-2197-4_21","url":"https://dblp.org/rec/reference/sp/JamesonWF22"}, "url":"URL#957163" }, { "@score":"1", "@id":"957164", "info":{"authors":{"author":[{"@pid":"j/DietmarJannach","text":"Dietmar Jannach"},{"@pid":"135/5066","text":"Massimo Quadrana"},{"@pid":"03/3233","text":"Paolo Cremonesi"}]},"title":"Session-Based Recommender Systems.","venue":"Recommender Systems Handbook","pages":"301-334","year":"2022","type":"Reference Works","access":"closed","key":"reference/sp/JannachQC22","doi":"10.1007/978-1-0716-2197-4_8","ee":"https://doi.org/10.1007/978-1-0716-2197-4_8","url":"https://dblp.org/rec/reference/sp/JannachQC22"}, "url":"URL#957164" }, { "@score":"1", "@id":"957165", "info":{"authors":{"author":[{"@pid":"j/DietmarJannach","text":"Dietmar Jannach"},{"@pid":"90/3147","text":"Markus Zanker"}]},"title":"Value and Impact of Recommender Systems.","venue":"Recommender Systems Handbook","pages":"519-546","year":"2022","type":"Reference Works","access":"closed","key":"reference/sp/JannachZ22","doi":"10.1007/978-1-0716-2197-4_14","ee":"https://doi.org/10.1007/978-1-0716-2197-4_14","url":"https://dblp.org/rec/reference/sp/JannachZ22"}, "url":"URL#957165" }, { "@score":"1", "@id":"957166", "info":{"authors":{"author":[{"@pid":"175/5262","text":"Shatha Jaradat"},{"@pid":"45/7498","text":"Nima Dokoohaki"},{"@pid":"167/4080","text":"Humberto Jesús Corona Pampín"},{"@pid":"71/8762","text":"Reza Shirvany"}]},"title":"Fashion Recommender Systems.","venue":"Recommender Systems Handbook","pages":"1015-1055","year":"2022","type":"Reference Works","access":"closed","key":"reference/sp/JaradatDPS22","doi":"10.1007/978-1-0716-2197-4_26","ee":"https://doi.org/10.1007/978-1-0716-2197-4_26","url":"https://dblp.org/rec/reference/sp/JaradatDPS22"}, "url":"URL#957166" }, { "@score":"1", "@id":"957167", "info":{"authors":{"author":[{"@pid":"k/IrenaKoprinska","text":"Irena Koprinska"},{"@pid":"71/6687","text":"Kalina Yacef"}]},"title":"People-to-People Reciprocal Recommenders.","venue":"Recommender Systems Handbook","pages":"421-446","year":"2022","type":"Reference Works","access":"closed","key":"reference/sp/KoprinskaY22","doi":"10.1007/978-1-0716-2197-4_11","ee":"https://doi.org/10.1007/978-1-0716-2197-4_11","url":"https://dblp.org/rec/reference/sp/KoprinskaY22"}, "url":"URL#957167" }, { "@score":"1", "@id":"957168", "info":{"authors":{"author":[{"@pid":"k/YehudaKoren","text":"Yehuda Koren"},{"@pid":"67/5601","text":"Steffen Rendle"},{"@pid":"97/1217","text":"Robert M. Bell"}]},"title":"Advances in Collaborative Filtering.","venue":"Recommender Systems Handbook","pages":"91-142","year":"2022","type":"Reference Works","access":"closed","key":"reference/sp/KorenRB22","doi":"10.1007/978-1-0716-2197-4_3","ee":"https://doi.org/10.1007/978-1-0716-2197-4_3","url":"https://dblp.org/rec/reference/sp/KorenRB22"}, "url":"URL#957168" }, { "@score":"1", "@id":"957169", "info":{"authors":{"author":[{"@pid":"88/2124","text":"Judith Masthoff"},{"@pid":"173/2189","text":"Amra Delic"}]},"title":"Group Recommender Systems: Beyond Preference Aggregation.","venue":"Recommender Systems Handbook","pages":"381-420","year":"2022","type":"Reference Works","access":"closed","key":"reference/sp/MasthoffD22","doi":"10.1007/978-1-0716-2197-4_10","ee":"https://doi.org/10.1007/978-1-0716-2197-4_10","url":"https://dblp.org/rec/reference/sp/MasthoffD22"}, "url":"URL#957169" }, { "@score":"1", "@id":"957170", "info":{"authors":{"author":[{"@pid":"81/7422","text":"Cataldo Musto"},{"@pid":"28/3141","text":"Marco de Gemmis"},{"@pid":"78/5518","text":"Pasquale Lops"},{"@pid":"64/7424","text":"Fedelucio Narducci"},{"@pid":"41/446","text":"Giovanni Semeraro"}]},"title":"Semantics and Content-Based Recommendations.","venue":"Recommender Systems Handbook","pages":"251-298","year":"2022","type":"Reference Works","access":"closed","key":"reference/sp/MustoGLNS22","doi":"10.1007/978-1-0716-2197-4_7","ee":"https://doi.org/10.1007/978-1-0716-2197-4_7","url":"https://dblp.org/rec/reference/sp/MustoGLNS22"}, "url":"URL#957170" }, { "@score":"1", "@id":"957171", "info":{"authors":{"author":[{"@pid":"125/8501","text":"Athanasios N. Nikolakopoulos"},{"@pid":"28/1717","text":"Xia Ning"},{"@pid":"15/4137","text":"Christian Desrosiers"},{"@pid":"k/GeorgeKarypis","text":"George Karypis"}]},"title":"Trust Your Neighbors: A Comprehensive Survey of Neighborhood-Based Methods for Recommender Systems.","venue":"Recommender Systems Handbook","pages":"39-89","year":"2022","type":"Reference Works","access":"closed","key":"reference/sp/NikolakopoulosNDK22","doi":"10.1007/978-1-0716-2197-4_2","ee":"https://doi.org/10.1007/978-1-0716-2197-4_2","url":"https://dblp.org/rec/reference/sp/NikolakopoulosNDK22"}, "url":"URL#957171" }, { "@score":"1", "@id":"957172", "info":{"authors":{"author":{"@pid":"67/5601","text":"Steffen Rendle"}},"title":"Item Recommendation from Implicit Feedback.","venue":"Recommender Systems Handbook","pages":"143-171","year":"2022","type":"Reference Works","access":"closed","key":"reference/sp/Rendle22","doi":"10.1007/978-1-0716-2197-4_4","ee":"https://doi.org/10.1007/978-1-0716-2197-4_4","url":"https://dblp.org/rec/reference/sp/Rendle22"}, "url":"URL#957172" }, { "@score":"1", "@id":"957173", "info":{"authors":{"author":[{"@pid":"77/271","text":"Markus Schedl"},{"@pid":"04/6168","text":"Peter Knees"},{"@pid":"23/7058","text":"Brian McFee"},{"@pid":"33/8414","text":"Dmitry Bogdanov"}]},"title":"Music Recommendation Systems: Techniques, Use Cases, and Challenges.","venue":"Recommender Systems Handbook","pages":"927-971","year":"2022","type":"Reference Works","access":"closed","key":"reference/sp/SchedlKMB22","doi":"10.1007/978-1-0716-2197-4_24","ee":"https://doi.org/10.1007/978-1-0716-2197-4_24","url":"https://dblp.org/rec/reference/sp/SchedlKMB22"}, "url":"URL#957173" }, { "@score":"1", "@id":"957174", "info":{"authors":{"author":[{"@pid":"34/8612","text":"Oren Sar Shalom"},{"@pid":"94/4396","text":"Haggai Roitman"},{"@pid":"129/1488","text":"Pigi Kouki"}]},"title":"Natural Language Processing for Recommender Systems.","venue":"Recommender Systems Handbook","pages":"447-483","year":"2022","type":"Reference Works","access":"closed","key":"reference/sp/ShalomRK22","doi":"10.1007/978-1-0716-2197-4_12","ee":"https://doi.org/10.1007/978-1-0716-2197-4_12","url":"https://dblp.org/rec/reference/sp/ShalomRK22"}, "url":"URL#957174" }, { "@score":"1", "@id":"957175", "info":{"authors":{"author":[{"@pid":"71/6178","text":"Nava Tintarev"},{"@pid":"88/2124","text":"Judith Masthoff"}]},"title":"Beyond Explaining Single Item Recommendations.","venue":"Recommender Systems Handbook","pages":"711-756","year":"2022","type":"Reference Works","access":"closed","key":"reference/sp/TintarevM22","doi":"10.1007/978-1-0716-2197-4_19","ee":"https://doi.org/10.1007/978-1-0716-2197-4_19","url":"https://dblp.org/rec/reference/sp/TintarevM22"}, "url":"URL#957175" }, { "@score":"1", "@id":"957176", "info":{"authors":{"author":[{"@pid":"24/8697","text":"Marko Tkalcic"},{"@pid":"181/2847","text":"Li Chen"}]},"title":"Personality and Recommender Systems.","venue":"Recommender Systems Handbook","pages":"757-787","year":"2022","type":"Reference Works","access":"closed","key":"reference/sp/TkalcicC22","doi":"10.1007/978-1-0716-2197-4_20","ee":"https://doi.org/10.1007/978-1-0716-2197-4_20","url":"https://dblp.org/rec/reference/sp/TkalcicC22"}, "url":"URL#957176" }, { "@score":"1", "@id":"2299423", "info":{"authors":{"author":[{"@pid":"s/MarcShapiro","text":"Marc Shapiro 0001"},{"@pid":"09/5760","text":"Pierre Sutra"}]},"title":"Database Consistency Models.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/0001S19","doi":"10.1007/978-3-319-63962-8_203-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_203-1","url":"https://dblp.org/rec/reference/bdt/0001S19"}, "url":"URL#2299423" }, { "@score":"1", "@id":"2299424", "info":{"authors":{"author":[{"@pid":"181/2592-2","text":"Carlos Costa 0002"},{"@pid":"182/2928","text":"Carina Andrade"},{"@pid":"78/4150","text":"Maribel Yasmina Santos"}]},"title":"Big Data Warehouses for Smart Industries.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/0002AS19","doi":"10.1007/978-3-319-63962-8_204-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_204-1","url":"https://dblp.org/rec/reference/bdt/0002AS19"}, "url":"URL#2299424" }, { "@score":"1", "@id":"2299425", "info":{"authors":{"author":[{"@pid":"10/1388-3","text":"Christian Schulz 0003"},{"@pid":"18/3295","text":"Darren Strash"}]},"title":"Graph Partitioning: Formulations and Applications to Big Data.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/0003S19","doi":"10.1007/978-3-319-63962-8_312-2","ee":"https://doi.org/10.1007/978-3-319-63962-8_312-2","url":"https://dblp.org/rec/reference/bdt/0003S19"}, "url":"URL#2299425" }, { "@score":"1", "@id":"2299426", "info":{"authors":{"author":[{"@pid":"88/619-6","text":"Peng Sun 0006"},{"@pid":"33/885","text":"Yonggang Wen 0001"}]},"title":"Scalable Architectures for Big Data Analysis.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/0006W19","doi":"10.1007/978-3-319-63962-8_281-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_281-1","url":"https://dblp.org/rec/reference/bdt/0006W19"}, "url":"URL#2299426" }, { "@score":"1", "@id":"2299427", "info":{"authors":{"author":{"@pid":"38/8707","text":"Ziawasch Abedjan"}},"title":"Data Profiling.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Abedjan19","doi":"10.1007/978-3-319-63962-8_8-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_8-1","url":"https://dblp.org/rec/reference/bdt/Abedjan19"}, "url":"URL#2299427" }, { "@score":"1", "@id":"2299428", "info":{"authors":{"author":[{"@pid":"21/10280","text":"Maribel Acosta"},{"@pid":"29/3132","text":"Olaf Hartig"},{"@pid":"93/3423","text":"Juan F. Sequeda"}]},"title":"Federated RDF Query Processing.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/AcostaHS19","doi":"10.1007/978-3-319-63962-8_228-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_228-1","url":"https://dblp.org/rec/reference/bdt/AcostaHS19"}, "url":"URL#2299428" }, { "@score":"1", "@id":"2299429", "info":{"authors":{"author":[{"@pid":"75/5249","text":"Marco Aldinucci"},{"@pid":"73/8263","text":"Maurizio Drocco"},{"@pid":"144/4305","text":"Claudia Misale"},{"@pid":"88/3584","text":"Guy Tremblay"}]},"title":"Languages for Big Data analysis.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/AldinucciDMT19","doi":"10.1007/978-3-319-63962-8_142-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_142-1","url":"https://dblp.org/rec/reference/bdt/AldinucciDMT19"}, "url":"URL#2299429" }, { "@score":"1", "@id":"2299430", "info":{"authors":{"author":{"@pid":"42/8510","text":"Alexander Alexandrov 0001"}},"title":"Scala.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Alexandrov19","doi":"10.1007/978-3-319-63962-8_306-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_306-1","url":"https://dblp.org/rec/reference/bdt/Alexandrov19"}, "url":"URL#2299430" }, { "@score":"1", "@id":"2299431", "info":{"authors":{"author":{"@pid":"29/9884","text":"Khaled Ammar"}},"title":"Graph Benchmarking.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Ammar19","doi":"10.1007/978-3-319-63962-8_298-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_298-1","url":"https://dblp.org/rec/reference/bdt/Ammar19"}, "url":"URL#2299431" }, { "@score":"1", "@id":"2299432", "info":{"authors":{"author":[{"@pid":"36/2474","text":"Renzo Angles"},{"@pid":"36/27","text":"Juan L. Reutter"},{"@pid":"19/1082","text":"Hannes Voigt"}]},"title":"Graph Query Languages.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/AnglesRV19","doi":"10.1007/978-3-319-63962-8_75-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_75-1","url":"https://dblp.org/rec/reference/bdt/AnglesRV19"}, "url":"URL#2299432" }, { "@score":"1", "@id":"2299433", "info":{"authors":{"author":{"@pid":"57/1978","text":"Raja Appuswamy"}},"title":"Cheap Data Analytics on Cold Storage.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Appuswamy19","doi":"10.1007/978-3-319-63962-8_147-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_147-1","url":"https://dblp.org/rec/reference/bdt/Appuswamy19"}, "url":"URL#2299433" }, { "@score":"1", "@id":"2299434", "info":{"authors":{"author":[{"@pid":"76/6735","text":"Marcelo Arenas"},{"@pid":"29/5169","text":"Pablo Barceló"},{"@pid":"l/LeonidLibkin","text":"Leonid Libkin"}]},"title":"Graph Path Navigation.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/ArenasBL19","doi":"10.1007/978-3-319-63962-8_214-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_214-1","url":"https://dblp.org/rec/reference/bdt/ArenasBL19"}, "url":"URL#2299434" }, { "@score":"1", "@id":"2299435", "info":{"authors":{"author":{"@pid":"46/10440","text":"Abel Armas-Cervantes"}},"title":"Process Model Repair.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Armas-Cervantes19","doi":"10.1007/978-3-319-63962-8_90-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_90-1","url":"https://dblp.org/rec/reference/bdt/Armas-Cervantes19"}, "url":"URL#2299435" }, { "@score":"1", "@id":"2299436", "info":{"authors":{"author":[{"@pid":"175/1050","text":"Booma Sowkarthiga Balasubramani"},{"@pid":"c/IFCruz","text":"Isabel F. Cruz"}]},"title":"Spatial Data Integration.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/BalasubramaniC19","doi":"10.1007/978-3-319-63962-8_218-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_218-1","url":"https://dblp.org/rec/reference/bdt/BalasubramaniC19"}, "url":"URL#2299436" }, { "@score":"1", "@id":"2299437", "info":{"authors":{"author":[{"@pid":"05/5654-2","text":"Soumya Banerjee 0002"},{"@pid":"b/SamiaBouzefrane","text":"Samia Bouzefrane 0001"},{"@pid":"235/5773","text":"Hanene Maupas"}]},"title":"Exploring Scope of Computational Intelligence in IoT Security Paradigm.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/BanerjeeBM19","doi":"10.1007/978-3-319-63962-8_239-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_239-1","url":"https://dblp.org/rec/reference/bdt/BanerjeeBM19"}, "url":"URL#2299437" }, { "@score":"1", "@id":"2299438", "info":{"authors":{"author":[{"@pid":"33/3527","text":"Ronald Barber"},{"@pid":"r/VijayshankarRaman","text":"Vijayshankar Raman"},{"@pid":"84/3614","text":"Richard Sidle"},{"@pid":"27/3375","text":"Yuanyuan Tian"},{"@pid":"86/9726","text":"Pinar Tözün"}]},"title":"Wildfire: HTAP for Big Data.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/BarberRSTT19","doi":"10.1007/978-3-319-63962-8_257-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_257-1","url":"https://dblp.org/rec/reference/bdt/BarberRSTT19"}, "url":"URL#2299438" }, { "@score":"1", "@id":"2299439", "info":{"authors":{"author":[{"@pid":"201/7795","text":"Sibghat Ullah Bazai"},{"@pid":"20/4659","text":"Julian Jang-Jaccard"},{"@pid":"54/8558","text":"Xuyun Zhang"}]},"title":"Scalable Big Data Privacy with MapReduce.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/BazaiJZ19","doi":"10.1007/978-3-319-63962-8_243-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_243-1","url":"https://dblp.org/rec/reference/bdt/BazaiJZ19"}, "url":"URL#2299439" }, { "@score":"1", "@id":"2299440", "info":{"authors":{"author":[{"@pid":"99/10584","text":"Loris Belcastro"},{"@pid":"34/9378","text":"Fabrizio Marozzo"}]},"title":"Workflow Systems for Big Data Analysis.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/BelcastroM19","doi":"10.1007/978-3-319-63962-8_137-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_137-1","url":"https://dblp.org/rec/reference/bdt/BelcastroM19"}, "url":"URL#2299440" }, { "@score":"1", "@id":"2299441", "info":{"authors":{"author":[{"@pid":"66/5525","text":"András A. Benczúr"},{"@pid":"62/3645","text":"Levente Kocsis"},{"@pid":"132/9381","text":"Róbert Pálovics"}]},"title":"Online Machine Learning Algorithms over Data Streams.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/BenczurKP19","doi":"10.1007/978-3-319-63962-8_329-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_329-1","url":"https://dblp.org/rec/reference/bdt/BenczurKP19"}, "url":"URL#2299441" }, { "@score":"1", "@id":"2299442", "info":{"authors":{"author":[{"@pid":"66/5525","text":"András A. Benczúr"},{"@pid":"62/3645","text":"Levente Kocsis"},{"@pid":"132/9381","text":"Róbert Pálovics"}]},"title":"Online Machine Learning in Big Data Streams: Overview.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/BenczurKP19a","doi":"10.1007/978-3-319-63962-8_326-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_326-1","url":"https://dblp.org/rec/reference/bdt/BenczurKP19a"}, "url":"URL#2299442" }, { "@score":"1", "@id":"2299443", "info":{"authors":{"author":[{"@pid":"66/5525","text":"András A. Benczúr"},{"@pid":"62/3645","text":"Levente Kocsis"},{"@pid":"132/9381","text":"Róbert Pálovics"}]},"title":"Recommender Systems Over Data Streams.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/BenczurKP19b","doi":"10.1007/978-3-319-63962-8_328-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_328-1","url":"https://dblp.org/rec/reference/bdt/BenczurKP19b"}, "url":"URL#2299443" }, { "@score":"1", "@id":"2299444", "info":{"authors":{"author":[{"@pid":"66/5525","text":"András A. Benczúr"},{"@pid":"62/3645","text":"Levente Kocsis"},{"@pid":"132/9381","text":"Róbert Pálovics"}]},"title":"Reinforcement Learning, Unsupervised Methods, and Concept Drift in Stream Learning.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/BenczurKP19c","doi":"10.1007/978-3-319-63962-8_327-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_327-1","url":"https://dblp.org/rec/reference/bdt/BenczurKP19c"}, "url":"URL#2299444" }, { "@score":"1", "@id":"2299445", "info":{"authors":{"author":{"@pid":"b/LaureBertiEquille","text":"Laure Berti-Équille"}},"title":"Truth Discovery.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Berti-Equille19","doi":"10.1007/978-3-319-63962-8_23-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_23-1","url":"https://dblp.org/rec/reference/bdt/Berti-Equille19"}, "url":"URL#2299445" }, { "@score":"1", "@id":"2299446", "info":{"authors":{"author":{"@pid":"44/3111","text":"Milind A. Bhandarkar"}},"title":"End-to-End Benchmark.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Bhandarkar19","doi":"10.1007/978-3-319-63962-8_112-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_112-1","url":"https://dblp.org/rec/reference/bdt/Bhandarkar19"}, "url":"URL#2299446" }, { "@score":"1", "@id":"2299447", "info":{"authors":{"author":[{"@pid":"35/8319","text":"Pramod Bhatotia"},{"@pid":"44/3421","text":"Umut A. Acar"},{"@pid":"27/2404","text":"Flavio Paiva Junqueira"},{"@pid":"87/6689","text":"Rodrigo Rodrigues 0001"}]},"title":"Incremental Sliding Window Analytics.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/BhatotiaAJR19","doi":"10.1007/978-3-319-63962-8_156-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_156-1","url":"https://dblp.org/rec/reference/bdt/BhatotiaAJR19"}, "url":"URL#2299447" }, { "@score":"1", "@id":"2299448", "info":{"authors":{"author":[{"@pid":"b/SSBhowmick","text":"Sourav S. Bhowmick"},{"@pid":"07/1560","text":"Byron Choi"}]},"title":"Visual Graph Querying.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/BhowmickC19","doi":"10.1007/978-3-319-63962-8_78-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_78-1","url":"https://dblp.org/rec/reference/bdt/BhowmickC19"}, "url":"URL#2299448" }, { "@score":"1", "@id":"2299449", "info":{"authors":{"author":{"@pid":"57/7247","text":"Nikos Bikakis"}},"title":"Big Data Visualization Tools.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Bikakis19","doi":"10.1007/978-3-319-63962-8_109-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_109-1","url":"https://dblp.org/rec/reference/bdt/Bikakis19"}, "url":"URL#2299449" }, { "@score":"1", "@id":"2299450", "info":{"authors":{"author":{"@pid":"65/5338","text":"Spyros Blanas"}},"title":"In-Memory Transactions.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Blanas19","doi":"10.1007/978-3-319-63962-8_177-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_177-1","url":"https://dblp.org/rec/reference/bdt/Blanas19"}, "url":"URL#2299450" }, { "@score":"1", "@id":"2299451", "info":{"authors":{"author":{"@pid":"65/5338","text":"Spyros Blanas"}},"title":"Parallel Join Algorithms in MapReduce.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Blanas19a","doi":"10.1007/978-3-319-63962-8_206-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_206-1","url":"https://dblp.org/rec/reference/bdt/Blanas19a"}, "url":"URL#2299451" }, { "@score":"1", "@id":"2299452", "info":{"authors":{"author":{"@pid":"33/2668","text":"Eva Blomqvist"}},"title":"Ontologies for Big Data.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Blomqvist19","doi":"10.1007/978-3-319-63962-8_313-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_313-1","url":"https://dblp.org/rec/reference/bdt/Blomqvist19"}, "url":"URL#2299452" }, { "@score":"1", "@id":"2299453", "info":{"authors":{"author":{"@pid":"75/887","text":"Matthias Boehm 0001"}},"title":"Apache SystemML.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Boehm19","doi":"10.1007/978-3-319-63962-8_187-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_187-1","url":"https://dblp.org/rec/reference/bdt/Boehm19"}, "url":"URL#2299453" }, { "@score":"1", "@id":"2299454", "info":{"authors":{"author":{"@pid":"71/3661","text":"Paolo Boldi"}},"title":"Graph Invariants.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Boldi19","doi":"10.1007/978-3-319-63962-8_77-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_77-1","url":"https://dblp.org/rec/reference/bdt/Boldi19"}, "url":"URL#2299454" }, { "@score":"1", "@id":"2299455", "info":{"authors":{"author":[{"@pid":"71/3661","text":"Paolo Boldi"},{"@pid":"27/6106","text":"Sebastiano Vigna"}]},"title":"(Web/Social) Graph Compression.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/BoldiV19","doi":"10.1007/978-3-319-63962-8_54-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_54-1","url":"https://dblp.org/rec/reference/bdt/BoldiV19"}, "url":"URL#2299455" }, { "@score":"1", "@id":"2299456", "info":{"authors":{"author":[{"@pid":"b/ABonifati","text":"Angela Bonifati"},{"@pid":"133/8432","text":"Ioana Ileana"}]},"title":"Graph Data Integration and Exchange.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/BonifatiI19","doi":"10.1007/978-3-319-63962-8_209-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_209-1","url":"https://dblp.org/rec/reference/bdt/BonifatiI19"}, "url":"URL#2299456" }, { "@score":"1", "@id":"2299457", "info":{"authors":{"author":[{"@pid":"b/ABonifati","text":"Angela Bonifati"},{"@pid":"05/2347","text":"Arnau Prat-Pérez"}]},"title":"Graph Generation and Benchmarks.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/BonifatiP19","doi":"10.1007/978-3-319-63962-8_79-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_79-1","url":"https://dblp.org/rec/reference/bdt/BonifatiP19"}, "url":"URL#2299457" }, { "@score":"1", "@id":"2299458", "info":{"authors":{"author":{"@pid":"81/8569","text":"Andrea Burattin"}},"title":"Streaming Process Discovery and Conformance Checking.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Burattin19","doi":"10.1007/978-3-319-63962-8_103-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_103-1","url":"https://dblp.org/rec/reference/bdt/Burattin19"}, "url":"URL#2299458" }, { "@score":"1", "@id":"2299459", "info":{"authors":{"author":{"@pid":"78/6512","text":"Rodrigo N. Calheiros"}},"title":"Big Data Architectures.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Calheiros19","doi":"10.1007/978-3-319-63962-8_39-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_39-1","url":"https://dblp.org/rec/reference/bdt/Calheiros19"}, "url":"URL#2299459" }, { "@score":"1", "@id":"2299460", "info":{"authors":{"author":{"@pid":"c/MarioCannataro","text":"Mario Cannataro"}},"title":"Big Data Analysis in Bioinformatics.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Cannataro19","doi":"10.1007/978-3-319-63962-8_139-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_139-1","url":"https://dblp.org/rec/reference/bdt/Cannataro19"}, "url":"URL#2299460" }, { "@score":"1", "@id":"2299461", "info":{"authors":{"author":[{"@pid":"90/7704","text":"Paris Carbone"},{"@pid":"64/7497","text":"Asterios Katsifodimos"},{"@pid":"h/SeifHaridi","text":"Seif Haridi"}]},"title":"Stream Window Aggregation Semantics and Optimization.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/CarboneKH19","doi":"10.1007/978-3-319-63962-8_154-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_154-1","url":"https://dblp.org/rec/reference/bdt/CarboneKH19"}, "url":"URL#2299461" }, { "@score":"1", "@id":"2299462", "info":{"authors":{"author":{"@pid":"52/5368","text":"Josep Carmona 0001"}},"title":"Decomposed Process Discovery and Conformance Checking.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Carmona19","doi":"10.1007/978-3-319-63962-8_95-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_95-1","url":"https://dblp.org/rec/reference/bdt/Carmona19"}, "url":"URL#2299462" }, { "@score":"1", "@id":"2299463", "info":{"authors":{"author":{"@pid":"16/3377","text":"Eugenio Cesario"}},"title":"Big Data Analysis for Smart City Applications.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Cesario19","doi":"10.1007/978-3-319-63962-8_140-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_140-1","url":"https://dblp.org/rec/reference/bdt/Cesario19"}, "url":"URL#2299463" }, { "@score":"1", "@id":"2299464", "info":{"authors":{"author":[{"@pid":"97/3628","text":"Abhishek Chandra"},{"@pid":"117/3629","text":"Benjamin Heintz"},{"@pid":"s/RameshKSitaraman","text":"Ramesh K. Sitaraman"}]},"title":"Optimizing Geo-Distributed Streaming Analytics.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/ChandraHS19","doi":"10.1007/978-3-319-63962-8_155-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_155-1","url":"https://dblp.org/rec/reference/bdt/ChandraHS19"}, "url":"URL#2299464" }, { "@score":"1", "@id":"2299465", "info":{"authors":{"author":[{"@pid":"44/5138","text":"Chii Chang"},{"@pid":"120/0583","text":"Amnir Hadachi"},{"@pid":"09/1571","text":"Satish Narayana Srirama"},{"@pid":"55/9566","text":"Mart Min"}]},"title":"Mobile Big Data: Foundations, State of the Art, and Future Directions.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/ChangHSM19","doi":"10.1007/978-3-319-63962-8_46-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_46-1","url":"https://dblp.org/rec/reference/bdt/ChangHSM19"}, "url":"URL#2299465" }, { "@score":"1", "@id":"2299466", "info":{"authors":{"author":[{"@pid":"159/7654","text":"Xuntao Cheng"},{"@pid":"15/2288","text":"Cheng Liu"},{"@pid":"h/BingshengHe","text":"Bingsheng He"}]},"title":"Emerging Hardware Technologies.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/ChengLH19","doi":"10.1007/978-3-319-63962-8_170-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_170-1","url":"https://dblp.org/rec/reference/bdt/ChengLH19"}, "url":"URL#2299466" }, { "@score":"1", "@id":"2299467", "info":{"authors":{"author":[{"@pid":"235/5782","text":"Shekha Chenthara"},{"@pid":"33/3535-2","text":"Hua Wang 0002"},{"@pid":"61/10695","text":"Khandakar Ahmed"}]},"title":"Security and Privacy in Big Data Environment.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/ChentharaWA19","doi":"10.1007/978-3-319-63962-8_245-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_245-1","url":"https://dblp.org/rec/reference/bdt/ChentharaWA19"}, "url":"URL#2299467" }, { "@score":"1", "@id":"2299468", "info":{"authors":{"author":{"@pid":"131/4767","text":"Xu Chu"}},"title":"Data Cleaning.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Chu19","doi":"10.1007/978-3-319-63962-8_3-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_3-1","url":"https://dblp.org/rec/reference/bdt/Chu19"}, "url":"URL#2299468" }, { "@score":"1", "@id":"2299469", "info":{"authors":{"author":{"@pid":"43/4568","text":"Carmela Comito"}},"title":"Energy Efficiency in Big Data Analysis.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Comito19","doi":"10.1007/978-3-319-63962-8_141-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_141-1","url":"https://dblp.org/rec/reference/bdt/Comito19"}, "url":"URL#2299469" }, { "@score":"1", "@id":"2299470", "info":{"authors":{"author":{"@pid":"08/10352","text":"Raffaele Conforti"}},"title":"Hierarchical Process Discovery.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Conforti19","doi":"10.1007/978-3-319-63962-8_94-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_94-1","url":"https://dblp.org/rec/reference/bdt/Conforti19"}, "url":"URL#2299470" }, { "@score":"1", "@id":"2299471", "info":{"authors":{"author":[{"@pid":"33/3180","text":"Gao Cong"},{"@pid":"j/ChristianSJensen","text":"Christian S. Jensen"}]},"title":"Spatio-Textual Data.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/CongJ19","doi":"10.1007/978-3-319-63962-8_68-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_68-1","url":"https://dblp.org/rec/reference/bdt/CongJ19"}, "url":"URL#2299471" }, { "@score":"1", "@id":"2299472", "info":{"authors":{"author":[{"@pid":"c/PCrescenzi","text":"Pierluigi Crescenzi"},{"@pid":"57/7900","text":"Andrea Marino 0001"}]},"title":"Degrees of Separation and Diameter in Large Graphs.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/CrescenziM19","doi":"10.1007/978-3-319-63962-8_59-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_59-1","url":"https://dblp.org/rec/reference/bdt/CrescenziM19"}, "url":"URL#2299472" }, { "@score":"1", "@id":"2299473", "info":{"authors":{"author":{"@pid":"54/6788","text":"Alain Crolotte"}},"title":"Metrics for Big Data Benchmarks.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Crolotte19","doi":"10.1007/978-3-319-63962-8_122-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_122-1","url":"https://dblp.org/rec/reference/bdt/Crolotte19"}, "url":"URL#2299473" }, { "@score":"1", "@id":"2299474", "info":{"authors":{"author":{"@pid":"161/0113","text":"Natacha Crooks"}},"title":"TARDiS: A Branch-and-Merge Approach to Weak Consistency.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Crooks19","doi":"10.1007/978-3-319-63962-8_160-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_160-1","url":"https://dblp.org/rec/reference/bdt/Crooks19"}, "url":"URL#2299474" }, { "@score":"1", "@id":"2299475", "info":{"authors":{"author":{"@pid":"71/5578","text":"Philippe Cudré-Mauroux"}},"title":"SciDB.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Cudre-Mauroux19","doi":"10.1007/978-3-319-63962-8_271-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_271-1","url":"https://dblp.org/rec/reference/bdt/Cudre-Mauroux19"}, "url":"URL#2299475" }, { "@score":"1", "@id":"2299476", "info":{"authors":{"author":{"@pid":"71/5578","text":"Philippe Cudré-Mauroux"}},"title":"Semantic Search.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Cudre-Mauroux19a","doi":"10.1007/978-3-319-63962-8_231-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_231-1","url":"https://dblp.org/rec/reference/bdt/Cudre-Mauroux19a"}, "url":"URL#2299476" }, { "@score":"1", "@id":"2299477", "info":{"authors":{"author":{"@pid":"133/8646","text":"Renato Luiz de Freitas Cunha"}},"title":"Databases as a Service.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Cunha19","doi":"10.1007/978-3-319-63962-8_83-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_83-1","url":"https://dblp.org/rec/reference/bdt/Cunha19"}, "url":"URL#2299477" }, { "@score":"1", "@id":"2299478", "info":{"authors":{"author":{"@pid":"05/3422","text":"Gianluca Demartini"}},"title":"Semantic Interlinking.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Demartini19","doi":"10.1007/978-3-319-63962-8_229-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_229-1","url":"https://dblp.org/rec/reference/bdt/Demartini19"}, "url":"URL#2299478" }, { "@score":"1", "@id":"2299479", "info":{"authors":{"author":[{"@pid":"35/6844","text":"Benoît Depaire"},{"@pid":"157/0683","text":"Niels Martin"}]},"title":"Data-Driven Process Simulation.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/DepaireM19","doi":"10.1007/978-3-319-63962-8_102-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_102-1","url":"https://dblp.org/rec/reference/bdt/DepaireM19"}, "url":"URL#2299479" }, { "@score":"1", "@id":"2299480", "info":{"authors":{"author":{"@pid":"68/7109","text":"Helena F. Deus"}},"title":"Big Semantic Data Processing in the Life Sciences Domain.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Deus19","doi":"10.1007/978-3-319-63962-8_315-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_315-1","url":"https://dblp.org/rec/reference/bdt/Deus19"}, "url":"URL#2299480" }, { "@score":"1", "@id":"2299481", "info":{"authors":{"author":[{"@pid":"75/7646","text":"Arturo Diaz-Perez"},{"@pid":"159/3772","text":"Alberto Garcia-Robledo"},{"@pid":"29/3282-2","text":"José Luis González Compeán"}]},"title":"Graph Processing Frameworks.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Diaz-PerezGC19","doi":"10.1007/978-3-319-63962-8_283-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_283-1","url":"https://dblp.org/rec/reference/bdt/Diaz-PerezGC19"}, "url":"URL#2299481" }, { "@score":"1", "@id":"2299482", "info":{"authors":{"author":[{"@pid":"25/5167","text":"Stefan Dietze"},{"@pid":"84/2154","text":"Elena Demidova"},{"@pid":"36/6753","text":"Konstantin Todorov"}]},"title":"RDF Dataset Profiling.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/DietzeDT19","doi":"10.1007/978-3-319-63962-8_288-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_288-1","url":"https://dblp.org/rec/reference/bdt/DietzeDT19"}, "url":"URL#2299482" }, { "@score":"1", "@id":"2299483", "info":{"authors":{"author":[{"@pid":"08/4676","text":"Idilio Drago"},{"@pid":"18/6316","text":"Marco Mellia"},{"@pid":"71/6170","text":"Alessandro D'Alconzo"}]},"title":"Big Data in Computer Network Monitoring.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/DragoMD19","doi":"10.1007/978-3-319-63962-8_26-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_26-1","url":"https://dblp.org/rec/reference/bdt/DragoMD19"}, "url":"URL#2299483" }, { "@score":"1", "@id":"2299484", "info":{"authors":{"author":{"@pid":"77/1359","text":"Dirk Düllmann"}},"title":"Storage Hierarchies for Big Data.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Dullmann19","doi":"10.1007/978-3-319-63962-8_175-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_175-1","url":"https://dblp.org/rec/reference/bdt/Dullmann19"}, "url":"URL#2299484" }, { "@score":"1", "@id":"2299485", "info":{"authors":{"author":[{"@pid":"d/MarlonDumas","text":"Marlon Dumas"},{"@pid":"m/JanMendling","text":"Jan Mendling"}]},"title":"Business Process Event Logs and Visualization.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/DumasM19","doi":"10.1007/978-3-319-63962-8_86-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_86-1","url":"https://dblp.org/rec/reference/bdt/DumasM19"}, "url":"URL#2299485" }, { "@score":"1", "@id":"2299486", "info":{"authors":{"author":[{"@pid":"d/MarlonDumas","text":"Marlon Dumas"},{"@pid":"61/267","text":"Matthias Weidlich 0001"}]},"title":"Business Process Analytics.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/DumasW19","doi":"10.1007/978-3-319-63962-8_85-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_85-1","url":"https://dblp.org/rec/reference/bdt/DumasW19"}, "url":"URL#2299486" }, { "@score":"1", "@id":"2299487", "info":{"authors":{"author":{"@pid":"64/5617","text":"Ted Dunning"}},"title":"Management of Time.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Dunning19","doi":"10.1007/978-3-319-63962-8_190-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_190-1","url":"https://dblp.org/rec/reference/bdt/Dunning19"}, "url":"URL#2299487" }, { "@score":"1", "@id":"2299488", "info":{"authors":{"author":[{"@pid":"64/5617","text":"Ted Dunning"},{"@pid":"235/5770","text":"Ellen Friedman"}]},"title":"Rendezvous Architectures.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/DunningF19","doi":"10.1007/978-3-319-63962-8_199-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_199-1","url":"https://dblp.org/rec/reference/bdt/DunningF19"}, "url":"URL#2299488" }, { "@score":"1", "@id":"2299489", "info":{"authors":{"author":[{"@pid":"64/5617","text":"Ted Dunning"},{"@pid":"235/5770","text":"Ellen Friedman"}]},"title":"Streaming Microservices.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/DunningF19a","doi":"10.1007/978-3-319-63962-8_198-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_198-1","url":"https://dblp.org/rec/reference/bdt/DunningF19a"}, "url":"URL#2299489" }, { "@score":"1", "@id":"2299490", "info":{"authors":{"author":{"@pid":"66/9726","text":"Ahmed Eldawy"}},"title":"Visualization.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Eldawy19","doi":"10.1007/978-3-319-63962-8_67-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_67-1","url":"https://dblp.org/rec/reference/bdt/Eldawy19"}, "url":"URL#2299490" }, { "@score":"1", "@id":"2299491", "info":{"authors":{"author":{"@pid":"49/6395","text":"Mohamed Y. Eltabakh"}},"title":"Big Data Indexing.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Eltabakh19","doi":"10.1007/978-3-319-63962-8_255-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_255-1","url":"https://dblp.org/rec/reference/bdt/Eltabakh19"}, "url":"URL#2299491" }, { "@score":"1", "@id":"2299492", "info":{"authors":{"author":{"@pid":"67/5970","text":"Dirk Fahland"}},"title":"Artifact-Centric Process Mining.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Fahland19","doi":"10.1007/978-3-319-63962-8_93-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_93-1","url":"https://dblp.org/rec/reference/bdt/Fahland19"}, "url":"URL#2299492" }, { "@score":"1", "@id":"2299493", "info":{"authors":{"author":[{"@pid":"47/4207","text":"Javier D. Fernández"},{"@pid":"84/3901","text":"Miguel A. Martínez-Prieto"}]},"title":"RDF Serialization and Archival.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/FernandezM19","doi":"10.1007/978-3-319-63962-8_286-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_286-1","url":"https://dblp.org/rec/reference/bdt/FernandezM19"}, "url":"URL#2299493" }, { "@score":"1", "@id":"2299494", "info":{"authors":{"author":[{"@pid":"06/11039","text":"Pierdomenico Fiadino"},{"@pid":"60/2773","text":"Marc Torrent-Moreno"}]},"title":"Big Data in Mobile Networks.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/FiadinoT19","doi":"10.1007/978-3-319-63962-8_259-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_259-1","url":"https://dblp.org/rec/reference/bdt/FiadinoT19"}, "url":"URL#2299494" }, { "@score":"1", "@id":"2299495", "info":{"authors":{"author":[{"@pid":"f/GeorgeHLFletcher","text":"George H. L. Fletcher"},{"@pid":"t/MartinTheobald","text":"Martin Theobald"}]},"title":"Indexing for Graph Query Evaluation.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/FletcherT19","doi":"10.1007/978-3-319-63962-8_212-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_212-1","url":"https://dblp.org/rec/reference/bdt/FletcherT19"}, "url":"URL#2299495" }, { "@score":"1", "@id":"2299496", "info":{"authors":{"author":{"@pid":"08/7992","text":"Avrilia Floratou"}},"title":"Columnar Storage Formats.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Floratou19","doi":"10.1007/978-3-319-63962-8_248-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_248-1","url":"https://dblp.org/rec/reference/bdt/Floratou19"}, "url":"URL#2299496" }, { "@score":"1", "@id":"2299497", "info":{"authors":{"author":[{"@pid":"f/GianluigiFolino","text":"Gianluigi Folino"},{"@pid":"41/7251","text":"Massimo Guarascio 0001"},{"@pid":"149/0499","text":"Maryam Amir Haeri"}]},"title":"Deep Learning on Big Data.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/FolinoGH19","doi":"10.1007/978-3-319-63962-8_307-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_307-1","url":"https://dblp.org/rec/reference/bdt/FolinoGH19"}, "url":"URL#2299497" }, { "@score":"1", "@id":"2299498", "info":{"authors":{"author":[{"@pid":"76/5134","text":"Francesco Folino"},{"@pid":"20/842","text":"Luigi Pontieri"}]},"title":"Business Process Deviance Mining.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/FolinoP19","doi":"10.1007/978-3-319-63962-8_100-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_100-1","url":"https://dblp.org/rec/reference/bdt/FolinoP19"}, "url":"URL#2299498" }, { "@score":"1", "@id":"2299499", "info":{"authors":{"author":{"@pid":"90/4850","text":"Chiara Di Francescomarino"}},"title":"Predictive Business Process Monitoring.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Francescomarino19","doi":"10.1007/978-3-319-63962-8_105-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_105-1","url":"https://dblp.org/rec/reference/bdt/Francescomarino19"}, "url":"URL#2299499" }, { "@score":"1", "@id":"2299500", "info":{"authors":{"author":[{"@pid":"58/6589","text":"Steffen Friedrich"},{"@pid":"r/NRitter","text":"Norbert Ritter"}]},"title":"CRUD Benchmarks.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/FriedrichR19","doi":"10.1007/978-3-319-63962-8_116-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_116-1","url":"https://dblp.org/rec/reference/bdt/FriedrichR19"}, "url":"URL#2299500" }, { "@score":"1", "@id":"2299501", "info":{"authors":{"author":[{"@pid":"58/6589","text":"Steffen Friedrich"},{"@pid":"r/NRitter","text":"Norbert Ritter"}]},"title":"YCSB.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/FriedrichR19a","doi":"10.1007/978-3-319-63962-8_131-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_131-1","url":"https://dblp.org/rec/reference/bdt/FriedrichR19a"}, "url":"URL#2299501" }, { "@score":"1", "@id":"2299502", "info":{"authors":{"author":[{"@pid":"00/3487","text":"Travis Gagie"},{"@pid":"n/GonzaloNavarro","text":"Gonzalo Navarro 0001"}]},"title":"Compressed Indexes for Repetitive Textual Datasets.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/GagieN19","doi":"10.1007/978-3-319-63962-8_53-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_53-1","url":"https://dblp.org/rec/reference/bdt/GagieN19"}, "url":"URL#2299502" }, { "@score":"1", "@id":"2299503", "info":{"authors":{"author":{"@pid":"g/AvigdorGal","text":"Avigdor Gal"}},"title":"Uncertain Schema Matching.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Gal19","doi":"10.1007/978-3-319-63962-8_24-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_24-1","url":"https://dblp.org/rec/reference/bdt/Gal19"}, "url":"URL#2299503" }, { "@score":"1", "@id":"2299504", "info":{"authors":{"author":[{"@pid":"g/AvigdorGal","text":"Avigdor Gal"},{"@pid":"162/1973","text":"Nicolo Rivetti"}]},"title":"Uncertainty in Streams.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/GalR19","doi":"10.1007/978-3-319-63962-8_332-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_332-1","url":"https://dblp.org/rec/reference/bdt/GalR19"}, "url":"URL#2299504" }, { "@score":"1", "@id":"2299505", "info":{"authors":{"author":[{"@pid":"09/6745-1","text":"Jesús García 0001"},{"@pid":"m/JoseMMolinaLopez","text":"José Manuel Molina 0001"},{"@pid":"11/3691","text":"Antonio Berlanga"},{"@pid":"70/6314","text":"Miguel Ángel Patricio Guisado"}]},"title":"Data Fusion.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/GarciaMBP19","doi":"10.1007/978-3-319-63962-8_5-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_5-1","url":"https://dblp.org/rec/reference/bdt/GarciaMBP19"}, "url":"URL#2299505" }, { "@score":"1", "@id":"2299506", "info":{"authors":{"author":[{"@pid":"04/883","text":"Saurabh Kumar Garg 0001"},{"@pid":"145/2904","text":"Siqi Wang"},{"@pid":"68/163-1","text":"Rajiv Ranjan 0001"}]},"title":"Orchestration Tools for Big Data.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/GargWR19","doi":"10.1007/978-3-319-63962-8_43-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_43-1","url":"https://dblp.org/rec/reference/bdt/GargWR19"}, "url":"URL#2299506" }, { "@score":"1", "@id":"2299507", "info":{"authors":{"author":{"@pid":"71/7259","text":"Alan F. Gates"}},"title":"Hive.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Gates19","doi":"10.1007/978-3-319-63962-8_250-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_250-1","url":"https://dblp.org/rec/reference/bdt/Gates19"}, "url":"URL#2299507" }, { "@score":"1", "@id":"2299508", "info":{"authors":{"author":{"@pid":"86/4259","text":"Ricard Gavaldà"}},"title":"Adaptive Windowing.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Gavalda19","doi":"10.1007/978-3-319-63962-8_194-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_194-1","url":"https://dblp.org/rec/reference/bdt/Gavalda19"}, "url":"URL#2299508" }, { "@score":"1", "@id":"2299509", "info":{"authors":{"author":[{"@pid":"32/7263","text":"Jana Giceva"},{"@pid":"56/7016","text":"Mohammad Sadoghi"}]},"title":"Hybrid OLTP and OLAP.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/GicevaS19","doi":"10.1007/978-3-319-63962-8_179-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_179-1","url":"https://dblp.org/rec/reference/bdt/GicevaS19"}, "url":"URL#2299509" }, { "@score":"1", "@id":"2299510", "info":{"authors":{"author":{"@pid":"235/5779","text":"Robert M. Goerge"}},"title":"Big Data Analysis for Social Good.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Goerge19","doi":"10.1007/978-3-319-63962-8_277-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_277-1","url":"https://dblp.org/rec/reference/bdt/Goerge19"}, "url":"URL#2299510" }, { "@score":"1", "@id":"2299511", "info":{"authors":{"author":{"@pid":"42/3296","text":"Lukasz Golab"}},"title":"Types of Stream Processing Algorithms.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Golab19","doi":"10.1007/978-3-319-63962-8_193-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_193-1","url":"https://dblp.org/rec/reference/bdt/Golab19"}, "url":"URL#2299511" }, { "@score":"1", "@id":"2299512", "info":{"authors":{"author":{"@pid":"235/5775","text":"Renata Ghisloti Duarte de Souza Granha"}},"title":"Hadoop.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Granha19","doi":"10.1007/978-3-319-63962-8_36-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_36-1","url":"https://dblp.org/rec/reference/bdt/Granha19"}, "url":"URL#2299512" }, { "@score":"1", "@id":"2299513", "info":{"authors":{"author":{"@pid":"81/10578","text":"Anja Gruenheid"}},"title":"Record Linkage.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Gruenheid19","doi":"10.1007/978-3-319-63962-8_19-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_19-1","url":"https://dblp.org/rec/reference/bdt/Gruenheid19"}, "url":"URL#2299513" }, { "@score":"1", "@id":"2299514", "info":{"authors":{"author":[{"@pid":"13/8330","text":"Vincenzo Gulisano"},{"@pid":"p/MPapatriantafilou","text":"Marina Papatriantafilou"},{"@pid":"92/9596","text":"Alessandro Vittorio Papadopoulos"}]},"title":"Elasticity.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/GulisanoPP19","doi":"10.1007/978-3-319-63962-8_191-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_191-1","url":"https://dblp.org/rec/reference/bdt/GulisanoPP19"}, "url":"URL#2299514" }, { "@score":"1", "@id":"2299515", "info":{"authors":{"author":[{"@pid":"235/5760","text":"Ananth Gundabattula"},{"@pid":"235/5753","text":"Thomas Weise 0003"}]},"title":"Apache Apex.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/GundabattulaW19","doi":"10.1007/978-3-319-63962-8_316-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_316-1","url":"https://dblp.org/rec/reference/bdt/GundabattulaW19"}, "url":"URL#2299515" }, { "@score":"1", "@id":"2299516", "info":{"authors":{"author":[{"@pid":"136/5662","text":"Suyash Gupta"},{"@pid":"56/7016","text":"Mohammad Sadoghi"}]},"title":"Blockchain Transaction Processing.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/GuptaS19","doi":"10.1007/978-3-319-63962-8_333-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_333-1","url":"https://dblp.org/rec/reference/bdt/GuptaS19"}, "url":"URL#2299516" }, { "@score":"1", "@id":"2299517", "info":{"authors":{"author":[{"@pid":"g/ClaudioGutierrez","text":"Claudio Gutierrez 0001"},{"@pid":"h/JanHidders","text":"Jan Hidders"},{"@pid":"w/PeterTWood","text":"Peter T. Wood"}]},"title":"Graph Data Models.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/GutierrezHW19","doi":"10.1007/978-3-319-63962-8_81-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_81-1","url":"https://dblp.org/rec/reference/bdt/GutierrezHW19"}, "url":"URL#2299517" }, { "@score":"1", "@id":"2299518", "info":{"authors":{"author":{"@pid":"66/3133","text":"Martin Hahmann"}},"title":"Big Data Analysis Techniques.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Hahmann19","doi":"10.1007/978-3-319-63962-8_279-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_279-1","url":"https://dblp.org/rec/reference/bdt/Hahmann19"}, "url":"URL#2299518" }, { "@score":"1", "@id":"2299519", "info":{"authors":{"author":[{"@pid":"124/7062","text":"Muhammad Hanif"},{"@pid":"73/1942","text":"Muhammad Atif Tahir"},{"@pid":"87/5371","text":"Muhammad Rafi"},{"@pid":"235/5756","text":"Furqan Shaikh"}]},"title":"Flood Detection Using Social Media Big Data Streams.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/HanifTRS19","doi":"10.1007/978-3-319-63962-8_73-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_73-1","url":"https://dblp.org/rec/reference/bdt/HanifTRS19"}, "url":"URL#2299519" }, { "@score":"1", "@id":"2299520", "info":{"authors":{"author":[{"@pid":"29/3132","text":"Olaf Hartig"},{"@pid":"h/KatjaHose","text":"Katja Hose"},{"@pid":"93/3423","text":"Juan F. Sequeda"}]},"title":"Linked Data Management.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/HartigHS19","doi":"10.1007/978-3-319-63962-8_76-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_76-1","url":"https://dblp.org/rec/reference/bdt/HartigHS19"}, "url":"URL#2299520" }, { "@score":"1", "@id":"2299521", "info":{"authors":{"author":[{"@pid":"85/3208","text":"Bernhard Haslhofer"},{"@pid":"11/3002","text":"Antoine Isaac"},{"@pid":"99/239","text":"Rainer Simon"}]},"title":"Knowledge Graphs in the Libraries and Digital Humanities Domain.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/HaslhoferIS19","doi":"10.1007/978-3-319-63962-8_291-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_291-1","url":"https://dblp.org/rec/reference/bdt/HaslhoferIS19"}, "url":"URL#2299521" }, { "@score":"1", "@id":"2299522", "info":{"authors":{"author":[{"@pid":"27/4508","text":"Jeffrey Heer"},{"@pid":"h/JosephMHellerstein","text":"Joseph M. Hellerstein"},{"@pid":"57/3823","text":"Sean Kandel"}]},"title":"Data Wrangling.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/HeerHK19","doi":"10.1007/978-3-319-63962-8_9-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_9-1","url":"https://dblp.org/rec/reference/bdt/HeerHK19"}, "url":"URL#2299522" }, { "@score":"1", "@id":"2299523", "info":{"authors":{"author":{"@pid":"34/6431","text":"Martin Hirzel"}},"title":"Continuous Queries.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Hirzel19","doi":"10.1007/978-3-319-63962-8_305-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_305-1","url":"https://dblp.org/rec/reference/bdt/Hirzel19"}, "url":"URL#2299523" }, { "@score":"1", "@id":"2299524", "info":{"authors":{"author":[{"@pid":"34/6431","text":"Martin Hirzel"},{"@pid":"137/3096","text":"Guillaume Baudart"}]},"title":"Stream Processing Languages and Abstractions.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/HirzelB19","doi":"10.1007/978-3-319-63962-8_260-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_260-1","url":"https://dblp.org/rec/reference/bdt/HirzelB19"}, "url":"URL#2299524" }, { "@score":"1", "@id":"2299525", "info":{"authors":{"author":[{"@pid":"34/6431","text":"Martin Hirzel"},{"@pid":"49/6828","text":"Robert Soulé"},{"@pid":"87/3826","text":"Bugra Gedik"},{"@pid":"45/4064","text":"Scott Schneider 0001"}]},"title":"Stream Query Optimization.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/HirzelSG019","doi":"10.1007/978-3-319-63962-8_261-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_261-1","url":"https://dblp.org/rec/reference/bdt/HirzelSG019"}, "url":"URL#2299525" }, { "@score":"1", "@id":"2299526", "info":{"authors":{"author":{"@pid":"18/6067","text":"Erik G. Hoel"}},"title":"Architectures.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Hoel19","doi":"10.1007/978-3-319-63962-8_216-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_216-1","url":"https://dblp.org/rec/reference/bdt/Hoel19"}, "url":"URL#2299526" }, { "@score":"1", "@id":"2299527", "info":{"authors":{"author":[{"@pid":"235/5758","text":"Nur Farhana Hordri"},{"@pid":"40/10128","text":"Siti Sophiayati Yuhaniz"},{"@pid":"08/3802","text":"Siti Mariyam Shamsuddin"},{"@pid":"90/8782","text":"Nurulhuda Firdaus Mohd Azmi"}]},"title":"Big Data Deep Learning Tools.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/HordriYSA19","doi":"10.1007/978-3-319-63962-8_310-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_310-1","url":"https://dblp.org/rec/reference/bdt/HordriYSA19"}, "url":"URL#2299527" }, { "@score":"1", "@id":"2299528", "info":{"authors":{"author":[{"@pid":"235/5768","text":"Jhalak Hota"},{"@pid":"154/0895","text":"Deepak Puthal"},{"@pid":"235/5780","text":"Abhay Kumar Samal"}]},"title":"Privacy Cube.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/HotaPS19","doi":"10.1007/978-3-319-63962-8_242-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_242-1","url":"https://dblp.org/rec/reference/bdt/HotaPS19"}, "url":"URL#2299528" }, { "@score":"1", "@id":"2299529", "info":{"authors":{"author":{"@pid":"62/6816","text":"Yuchong Hu"}},"title":"Distributed File Systems.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Hu19","doi":"10.1007/978-3-319-63962-8_44-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_44-1","url":"https://dblp.org/rec/reference/bdt/Hu19"}, "url":"URL#2299529" }, { "@score":"1", "@id":"2299530", "info":{"authors":{"author":[{"@pid":"92/498-1","text":"Yifan Hu 0001"},{"@pid":"41/4420","text":"Martin Nöllenburg"}]},"title":"Graph Visualization.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/HuN19","doi":"10.1007/978-3-319-63962-8_324-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_324-1","url":"https://dblp.org/rec/reference/bdt/HuN19"}, "url":"URL#2299530" }, { "@score":"1", "@id":"2299531", "info":{"authors":{"author":[{"@pid":"55/6773","text":"Fabian Hueske"},{"@pid":"235/5771","text":"Timo Walther"}]},"title":"Apache Flink.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/HueskeW19","doi":"10.1007/978-3-319-63962-8_303-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_303-1","url":"https://dblp.org/rec/reference/bdt/HueskeW19"}, "url":"URL#2299531" }, { "@score":"1", "@id":"2299532", "info":{"authors":{"author":[{"@pid":"49/10021","text":"Todor Ivanov"},{"@pid":"z/RZicari","text":"Roberto V. Zicari"}]},"title":"Analytics Benchmarks.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/IvanovZ19","doi":"10.1007/978-3-319-63962-8_113-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_113-1","url":"https://dblp.org/rec/reference/bdt/IvanovZ19"}, "url":"URL#2299532" }, { "@score":"1", "@id":"2299533", "info":{"authors":{"author":[{"@pid":"235/5763","text":"Calvin Jia"},{"@pid":"46/3744","text":"Haoyuan Li"}]},"title":"Virtual Distributed File System: Alluxio.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/JiaL19","doi":"10.1007/978-3-319-63962-8_321-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_321-1","url":"https://dblp.org/rec/reference/bdt/JiaL19"}, "url":"URL#2299533" }, { "@score":"1", "@id":"2299534", "info":{"authors":{"author":[{"@pid":"92/1104","text":"Peng Jiang"},{"@pid":"13/93","text":"Fuchun Guo"},{"@pid":"12/3447","text":"Willy Susilo"},{"@pid":"77/9673","text":"Jinguang Han"}]},"title":"Keyword Attacks and Privacy Preserving in Public-Key-Based Searchable Encryption.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/JiangGSH19","doi":"10.1007/978-3-319-63962-8_232-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_232-1","url":"https://dblp.org/rec/reference/bdt/JiangGSH19"}, "url":"URL#2299534" }, { "@score":"1", "@id":"2299535", "info":{"authors":{"author":{"@pid":"52/3440","text":"Peiquan Jin"}},"title":"Structures for Large Data Sets.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Jin19","doi":"10.1007/978-3-319-63962-8_168-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_168-1","url":"https://dblp.org/rec/reference/bdt/Jin19"}, "url":"URL#2299535" }, { "@score":"1", "@id":"2299536", "info":{"authors":{"author":[{"@pid":"24/8510","text":"Alekh Jindal"},{"@pid":"149/5876","text":"Anil Shanbhag"},{"@pid":"67/1328-10","text":"Yi Lu 0010"}]},"title":"Robust Data Partitioning.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/JindalSL19","doi":"10.1007/978-3-319-63962-8_149-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_149-1","url":"https://dblp.org/rec/reference/bdt/JindalSL19"}, "url":"URL#2299536" }, { "@score":"1", "@id":"2299537", "info":{"authors":{"author":[{"@pid":"59/7992","text":"Konstantinos Karanasos"},{"@pid":"217/6729","text":"Arun Suresh"},{"@pid":"20/11411","text":"Chris Douglas"}]},"title":"Advancements in YARN Resource Manager.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/KaranasosSD19","doi":"10.1007/978-3-319-63962-8_207-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_207-1","url":"https://dblp.org/rec/reference/bdt/KaranasosSD19"}, "url":"URL#2299537" }, { "@score":"1", "@id":"2299538", "info":{"authors":{"author":{"@pid":"167/2751","text":"Jeyhun Karimov"}},"title":"Stream Benchmarks.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Karimov19","doi":"10.1007/978-3-319-63962-8_299-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_299-1","url":"https://dblp.org/rec/reference/bdt/Karimov19"}, "url":"URL#2299538" }, { "@score":"1", "@id":"2299539", "info":{"authors":{"author":{"@pid":"k/MauricevanKeulen","text":"Maurice van Keulen"}},"title":"Probabilistic Data Integration.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Keulen19","doi":"10.1007/978-3-319-63962-8_18-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_18-1","url":"https://dblp.org/rec/reference/bdt/Keulen19"}, "url":"URL#2299539" }, { "@score":"1", "@id":"2299540", "info":{"authors":{"author":{"@pid":"187/2945","text":"Shadi Khalifa"}},"title":"Tools and Libraries for Big Data Analysis.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Khalifa19","doi":"10.1007/978-3-319-63962-8_282-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_282-1","url":"https://dblp.org/rec/reference/bdt/Khalifa19"}, "url":"URL#2299540" }, { "@score":"1", "@id":"2299541", "info":{"authors":{"author":[{"@pid":"23/706","text":"Zaheer Abbas Khan"},{"@pid":"11/10020","text":"Jan Peters-Anders"}]},"title":"Big Data in Smart Cities.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/KhanP19","doi":"10.1007/978-3-319-63962-8_33-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_33-1","url":"https://dblp.org/rec/reference/bdt/KhanP19"}, "url":"URL#2299541" }, { "@score":"1", "@id":"2299542", "info":{"authors":{"author":{"@pid":"128/5698","text":"Zuhair Khayyat"}},"title":"BSP Programming Model.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Khayyat19","doi":"10.1007/978-3-319-63962-8_265-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_265-1","url":"https://dblp.org/rec/reference/bdt/Khayyat19"}, "url":"URL#2299542" }, { "@score":"1", "@id":"2299543", "info":{"authors":{"author":[{"@pid":"97/7024","text":"Udayan Khurana"},{"@pid":"d/AmolDeshpande","text":"Amol Deshpande"}]},"title":"Historical Graph Management.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/KhuranaD19","doi":"10.1007/978-3-319-63962-8_210-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_210-1","url":"https://dblp.org/rec/reference/bdt/KhuranaD19"}, "url":"URL#2299543" }, { "@score":"1", "@id":"2299544", "info":{"authors":{"author":{"@pid":"40/10280","text":"Sabrina Kirrane"}},"title":"Security and Privacy Aspects of Semantic Data.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Kirrane19","doi":"10.1007/978-3-319-63962-8_290-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_290-1","url":"https://dblp.org/rec/reference/bdt/Kirrane19"}, "url":"URL#2299544" }, { "@score":"1", "@id":"2299545", "info":{"authors":{"author":{"@pid":"148/2880","text":"Martin Kleppmann"}},"title":"Apache Samza.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Kleppmann19","doi":"10.1007/978-3-319-63962-8_197-2","ee":"https://doi.org/10.1007/978-3-319-63962-8_197-2","url":"https://dblp.org/rec/reference/bdt/Kleppmann19"}, "url":"URL#2299545" }, { "@score":"1", "@id":"2299546", "info":{"authors":{"author":[{"@pid":"11/6425","text":"Marcel Kornacker"},{"@pid":"88/573","text":"Alexander Behm"}]},"title":"Impala.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/KornackerB19","doi":"10.1007/978-3-319-63962-8_253-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_253-1","url":"https://dblp.org/rec/reference/bdt/KornackerB19"}, "url":"URL#2299546" }, { "@score":"1", "@id":"2299547", "info":{"authors":{"author":[{"@pid":"40/4517","text":"Manolis Koubarakis"},{"@pid":"117/5974","text":"Konstantina Bereta"},{"@pid":"08/11271","text":"Charalampos Nikolaou"},{"@pid":"82/8857","text":"George Stamoulis"}]},"title":"Linked Geospatial Data.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/KoubarakisBNS19","doi":"10.1007/978-3-319-63962-8_71-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_71-1","url":"https://dblp.org/rec/reference/bdt/KoubarakisBNS19"}, "url":"URL#2299547" }, { "@score":"1", "@id":"2299548", "info":{"authors":{"author":[{"@pid":"09/3690","text":"Miroslaw Kutylowski"},{"@pid":"04/7354","text":"Przemyslaw Blaskiewicz"}]},"title":"Privacy-Aware Identity Management.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/KutylowskiB19","doi":"10.1007/978-3-319-63962-8_241-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_241-1","url":"https://dblp.org/rec/reference/bdt/KutylowskiB19"}, "url":"URL#2299548" }, { "@score":"1", "@id":"2299549", "info":{"authors":{"author":[{"@pid":"l/LVSLakshmanan","text":"Laks V. S. Lakshmanan"},{"@pid":"65/6838","text":"Panayiotis Tsaparas"},{"@pid":"36/4449","text":"Yuichi Yoshida"}]},"title":"Influence Analytics in Graphs.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/LakshmananTY19","doi":"10.1007/978-3-319-63962-8_325-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_325-1","url":"https://dblp.org/rec/reference/bdt/LakshmananTY19"}, "url":"URL#2299549" }, { "@score":"1", "@id":"2299550", "info":{"authors":{"author":[{"@pid":"l/PatrickLambrix","text":"Patrick Lambrix"},{"@pid":"211/0520","text":"Rickard Armiento"},{"@pid":"189/8358","text":"Anna Delin"},{"@pid":"193/1608","text":"Huanyu Li 0001"}]},"title":"Big Semantic Data Processing in the Materials Design Domain.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/LambrixAD019","doi":"10.1007/978-3-319-63962-8_293-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_293-1","url":"https://dblp.org/rec/reference/bdt/LambrixAD019"}, "url":"URL#2299550" }, { "@score":"1", "@id":"2299551", "info":{"authors":{"author":[{"@pid":"26/1729","text":"Klaus-Dieter Lange"},{"@pid":"143/4734","text":"Jóakim von Kistowski"}]},"title":"Energy Benchmarking.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/LangeK19","doi":"10.1007/978-3-319-63962-8_119-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_119-1","url":"https://dblp.org/rec/reference/bdt/LangeK19"}, "url":"URL#2299551" }, { "@score":"1", "@id":"2299552", "info":{"authors":{"author":[{"@pid":"26/1729","text":"Klaus-Dieter Lange"},{"@pid":"235/5767","text":"David L. Schmidt"}]},"title":"Component Benchmark.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/LangeS19","doi":"10.1007/978-3-319-63962-8_110-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_110-1","url":"https://dblp.org/rec/reference/bdt/LangeS19"}, "url":"URL#2299552" }, { "@score":"1", "@id":"2299553", "info":{"authors":{"author":{"@pid":"07/6242","text":"Kasper Green Larsen"}},"title":"Dimension Reduction.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Larsen19","doi":"10.1007/978-3-319-63962-8_60-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_60-1","url":"https://dblp.org/rec/reference/bdt/Larsen19"}, "url":"URL#2299553" }, { "@score":"1", "@id":"2299554", "info":{"authors":{"author":[{"@pid":"195/1123","text":"Duc C. Le"},{"@pid":"303/3845","text":"Nur Zincir-Heywood"}]},"title":"Big Data in Network Anomaly Detection.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/LeZ19","doi":"10.1007/978-3-319-63962-8_161-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_161-1","url":"https://dblp.org/rec/reference/bdt/LeZ19"}, "url":"URL#2299554" }, { "@score":"1", "@id":"2299555", "info":{"authors":{"author":{"@pid":"131/1671","text":"Sander J. J. Leemans"}},"title":"Automated Process Discovery.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Leemans19","doi":"10.1007/978-3-319-63962-8_88-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_88-1","url":"https://dblp.org/rec/reference/bdt/Leemans19"}, "url":"URL#2299555" }, { "@score":"1", "@id":"2299556", "info":{"authors":{"author":[{"@pid":"63/5900","text":"Massimiliano de Leoni"},{"@pid":"133/6845","text":"Felix Mannhardt"}]},"title":"Decision Discovery in Business Processes.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/LeoniM19","doi":"10.1007/978-3-319-63962-8_96-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_96-1","url":"https://dblp.org/rec/reference/bdt/LeoniM19"}, "url":"URL#2299556" }, { "@score":"1", "@id":"2299557", "info":{"authors":{"author":{"@pid":"25/8214","text":"Henrik Leopold"}},"title":"Business Process Model Matching.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Leopold19","doi":"10.1007/978-3-319-63962-8_107-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_107-1","url":"https://dblp.org/rec/reference/bdt/Leopold19"}, "url":"URL#2299557" }, { "@score":"1", "@id":"2299558", "info":{"authors":{"author":{"@pid":"11/444","text":"Wenhao Li"}},"title":"Hardware Reliability Requirements.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Li19","doi":"10.1007/978-3-319-63962-8_173-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_173-1","url":"https://dblp.org/rec/reference/bdt/Li19"}, "url":"URL#2299558" }, { "@score":"1", "@id":"2299559", "info":{"authors":{"author":[{"@pid":"66/2069","text":"Xiao Li"},{"@pid":"120/8826","text":"Cheng Lian"},{"@pid":"235/5765","text":"Shu Mo"}]},"title":"Spark SQL.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/LiLM19","doi":"10.1007/978-3-319-63962-8_251-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_251-1","url":"https://dblp.org/rec/reference/bdt/LiLM19"}, "url":"URL#2299559" }, { "@score":"1", "@id":"2299560", "info":{"authors":{"author":{"@pid":"167/4909","text":"Michael Luggen"}},"title":"Visualizing Semantic Data.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Luggen19","doi":"10.1007/978-3-319-63962-8_230-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_230-1","url":"https://dblp.org/rec/reference/bdt/Luggen19"}, "url":"URL#2299560" }, { "@score":"1", "@id":"2299561", "info":{"authors":{"author":{"@pid":"150/5352","text":"Tariq Magdon-Ismail"}},"title":"TPCx-HS.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Magdon-Ismail19","doi":"10.1007/978-3-319-63962-8_129-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_129-1","url":"https://dblp.org/rec/reference/bdt/Magdon-Ismail19"}, "url":"URL#2299561" }, { "@score":"1", "@id":"2299562", "info":{"authors":{"author":{"@pid":"150/5352","text":"Tariq Magdon-Ismail"}},"title":"Virtualized Big Data Benchmarks.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Magdon-Ismail19a","doi":"10.1007/978-3-319-63962-8_120-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_120-1","url":"https://dblp.org/rec/reference/bdt/Magdon-Ismail19a"}, "url":"URL#2299562" }, { "@score":"1", "@id":"2299563", "info":{"authors":{"author":{"@pid":"05/8073-1","text":"Amr Magdy 0001"}},"title":"Query Processing: Computational Geometry.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Magdy19","doi":"10.1007/978-3-319-63962-8_297-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_297-1","url":"https://dblp.org/rec/reference/bdt/Magdy19"}, "url":"URL#2299563" }, { "@score":"1", "@id":"2299564", "info":{"authors":{"author":{"@pid":"05/801","text":"Fabrizio Maria Maggi"}},"title":"Declarative Process Mining.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Maggi19","doi":"10.1007/978-3-319-63962-8_92-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_92-1","url":"https://dblp.org/rec/reference/bdt/Maggi19"}, "url":"URL#2299564" }, { "@score":"1", "@id":"2299565", "info":{"authors":{"author":[{"@pid":"73/10806","text":"Ahmed R. Mahmood"},{"@pid":"a/WGAref","text":"Walid G. Aref"}]},"title":"Streaming Big Spatial Data.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/MahmoodA19","doi":"10.1007/978-3-319-63962-8_70-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_70-1","url":"https://dblp.org/rec/reference/bdt/MahmoodA19"}, "url":"URL#2299565" }, { "@score":"1", "@id":"2299566", "info":{"authors":{"author":[{"@pid":"141/6156","text":"Adnan Mahmood"},{"@pid":"41/7825","text":"Hushairi Zen"},{"@pid":"209/7595","text":"Shadi M. S. Hilles"}]},"title":"Big Data and Privacy Issues for Connected Vehicles in Intelligent Transportation Systems.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/MahmoodZH19","doi":"10.1007/978-3-319-63962-8_234-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_234-1","url":"https://dblp.org/rec/reference/bdt/MahmoodZH19"}, "url":"URL#2299566" }, { "@score":"1", "@id":"2299567", "info":{"authors":{"author":{"@pid":"34/6253","text":"Nikos Mamoulis"}},"title":"Query Processing: Joins.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Mamoulis19","doi":"10.1007/978-3-319-63962-8_219-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_219-1","url":"https://dblp.org/rec/reference/bdt/Mamoulis19"}, "url":"URL#2299567" }, { "@score":"1", "@id":"2299568", "info":{"authors":{"author":{"@pid":"m/SebastianManeth","text":"Sebastian Maneth"}},"title":"Grammar-Based Compression.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Maneth19","doi":"10.1007/978-3-319-63962-8_56-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_56-1","url":"https://dblp.org/rec/reference/bdt/Maneth19"}, "url":"URL#2299568" }, { "@score":"1", "@id":"2299569", "info":{"authors":{"author":{"@pid":"05/7380","text":"Alessandro Margara"}},"title":"Pattern Recognition.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Margara19","doi":"10.1007/978-3-319-63962-8_189-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_189-1","url":"https://dblp.org/rec/reference/bdt/Margara19"}, "url":"URL#2299569" }, { "@score":"1", "@id":"2299570", "info":{"authors":{"author":[{"@pid":"05/7380","text":"Alessandro Margara"},{"@pid":"10/760","text":"Tilmann Rabl"}]},"title":"Definition of Data Streams.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/MargaraR19","doi":"10.1007/978-3-319-63962-8_188-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_188-1","url":"https://dblp.org/rec/reference/bdt/MargaraR19"}, "url":"URL#2299570" }, { "@score":"1", "@id":"2299571", "info":{"authors":{"author":[{"@pid":"34/9378","text":"Fabrizio Marozzo"},{"@pid":"99/10584","text":"Loris Belcastro"}]},"title":"Cloud Computing for Big Data Analysis.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/MarozzoB19","doi":"10.1007/978-3-319-63962-8_136-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_136-1","url":"https://dblp.org/rec/reference/bdt/MarozzoB19"}, "url":"URL#2299571" }, { "@score":"1", "@id":"2299572", "info":{"authors":{"author":[{"@pid":"45/9936","text":"André Martin"},{"@pid":"25/4955","text":"Andrey Brito"},{"@pid":"f/ChristofFetzer","text":"Christof Fetzer"}]},"title":"StreamMine3G: Elastic and Fault Tolerant Large Scale Stream Processing.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/MartinBF19","doi":"10.1007/978-3-319-63962-8_145-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_145-1","url":"https://dblp.org/rec/reference/bdt/MartinBF19"}, "url":"URL#2299572" }, { "@score":"1", "@id":"2299573", "info":{"authors":{"author":[{"@pid":"84/3901","text":"Miguel A. Martínez-Prieto"},{"@pid":"47/4207","text":"Javier D. Fernández"},{"@pid":"164/8743","text":"Antonio Hernández-Illera"},{"@pid":"g/ClaudioGutierrez","text":"Claudio Gutierrez 0001"}]},"title":"RDF Compression.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Martinez-PrietoFHG19","doi":"10.1007/978-3-319-63962-8_62-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_62-1","url":"https://dblp.org/rec/reference/bdt/Martinez-PrietoFHG19"}, "url":"URL#2299573" }, { "@score":"1", "@id":"2299574", "info":{"authors":{"author":[{"@pid":"43/6783","text":"Norman S. Matloff"},{"@pid":"235/5777","text":"Clark Fitzgerald"},{"@pid":"224/0648","text":"Robin Elizabeth Yancey"}]},"title":"The R Language: A Powerful Tool for Taming Big Data.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/MatloffFY19","doi":"10.1007/978-3-319-63962-8_294-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_294-1","url":"https://dblp.org/rec/reference/bdt/MatloffFY19"}, "url":"URL#2299574" }, { "@score":"1", "@id":"2299575", "info":{"authors":{"author":[{"@pid":"11/6470","text":"Mario Mezzanzanica"},{"@pid":"69/7560","text":"Fabio Mercorio"}]},"title":"Big Data Enables Labor Market Intelligence.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/MezzanzanicaM19","doi":"10.1007/978-3-319-63962-8_276-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_276-1","url":"https://dblp.org/rec/reference/bdt/MezzanzanicaM19"}, "url":"URL#2299575" }, { "@score":"1", "@id":"2299576", "info":{"authors":{"author":{"@pid":"157/9835","text":"Nicolas Michael"}},"title":"Benchmark Harness.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Michael19","doi":"10.1007/978-3-319-63962-8_134-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_134-1","url":"https://dblp.org/rec/reference/bdt/Michael19"}, "url":"URL#2299576" }, { "@score":"1", "@id":"2299577", "info":{"authors":{"author":[{"@pid":"202/9691","text":"Sambit Kumar Mishra"},{"@pid":"153/3863","text":"Sampa Sahoo"},{"@pid":"86/1418-1","text":"Bibhudatta Sahoo 0001"}]},"title":"Secure Big Data Computing in Cloud: An Overview.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/MishraSS19","doi":"10.1007/978-3-319-63962-8_233-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_233-1","url":"https://dblp.org/rec/reference/bdt/MishraSS19"}, "url":"URL#2299577" }, { "@score":"1", "@id":"2299578", "info":{"authors":{"author":[{"@pid":"48/4842","text":"Amit Mitra"},{"@pid":"00/909","text":"Kamran Munir"}]},"title":"Big Data Application in Manufacturing Industry.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/MitraM19","doi":"10.1007/978-3-319-63962-8_31-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_31-1","url":"https://dblp.org/rec/reference/bdt/MitraM19"}, "url":"URL#2299578" }, { "@score":"1", "@id":"2299579", "info":{"authors":{"author":{"@pid":"235/5769","text":"Nicolas Modrzyk"}},"title":"Clojure.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Modrzyk19","doi":"10.1007/978-3-319-63962-8_302-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_302-1","url":"https://dblp.org/rec/reference/bdt/Modrzyk19"}, "url":"URL#2299579" }, { "@score":"1", "@id":"2299580", "info":{"authors":{"author":[{"@pid":"m/AlistairMoffat","text":"Alistair Moffat"},{"@pid":"61/10435","text":"Matthias Petri"}]},"title":"Computing the Cost of Compressed Data.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/MoffatP19","doi":"10.1007/978-3-319-63962-8_57-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_57-1","url":"https://dblp.org/rec/reference/bdt/MoffatP19"}, "url":"URL#2299580" }, { "@score":"1", "@id":"2299581", "info":{"authors":{"author":[{"@pid":"91/3428","text":"Henrique Moniz"},{"@pid":"38/5295","text":"João Leitão 0001"},{"@pid":"47/7413","text":"Ricardo J. Dias"},{"@pid":"g/JohannesGehrke","text":"Johannes Gehrke"},{"@pid":"18/4843","text":"Nuno M. Preguiça"},{"@pid":"87/6689","text":"Rodrigo Rodrigues 0001"}]},"title":"Achieving Low Latency Transactions for Geo-replicated Storage with Blotter.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Moniz0DGPR19","doi":"10.1007/978-3-319-63962-8_158-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_158-1","url":"https://dblp.org/rec/reference/bdt/Moniz0DGPR19"}, "url":"URL#2299581" }, { "@score":"1", "@id":"2299582", "info":{"authors":{"author":{"@pid":"97/4042","text":"Vincenzo Moscato"}},"title":"Big Data in Cultural Heritage.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Moscato19","doi":"10.1007/978-3-319-63962-8_29-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_29-1","url":"https://dblp.org/rec/reference/bdt/Moscato19"}, "url":"URL#2299582" }, { "@score":"1", "@id":"2299583", "info":{"authors":{"author":[{"@pid":"135/7623","text":"Davide Mottin"},{"@pid":"32/6122","text":"Yinghui Wu"}]},"title":"Graph Exploration and Search.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/MottinW19","doi":"10.1007/978-3-319-63962-8_80-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_80-1","url":"https://dblp.org/rec/reference/bdt/MottinW19"}, "url":"URL#2299583" }, { "@score":"1", "@id":"2299584", "info":{"authors":{"author":{"@pid":"45/2495","text":"Barzan Mozafari"}},"title":"SnappyData.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Mozafari19","doi":"10.1007/978-3-319-63962-8_258-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_258-1","url":"https://dblp.org/rec/reference/bdt/Mozafari19"}, "url":"URL#2299584" }, { "@score":"1", "@id":"2299585", "info":{"authors":{"author":{"@pid":"235/5757","text":"Awais Akram Mughal"}},"title":"Big Data in Automotive Industry.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Mughal19","doi":"10.1007/978-3-319-63962-8_34-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_34-1","url":"https://dblp.org/rec/reference/bdt/Mughal19"}, "url":"URL#2299585" }, { "@score":"1", "@id":"2299586", "info":{"authors":{"author":{"@pid":"33/8488","text":"Jorge Munoz-Gama"}},"title":"Conformance Checking.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Munoz-Gama19","doi":"10.1007/978-3-319-63962-8_89-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_89-1","url":"https://dblp.org/rec/reference/bdt/Munoz-Gama19"}, "url":"URL#2299586" }, { "@score":"1", "@id":"2299587", "info":{"authors":{"author":{"@pid":"235/5759","text":"Andrew Musselman"}},"title":"Apache Mahout.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Musselman19","doi":"10.1007/978-3-319-63962-8_144-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_144-1","url":"https://dblp.org/rec/reference/bdt/Musselman19"}, "url":"URL#2299587" }, { "@score":"1", "@id":"2299588", "info":{"authors":{"author":[{"@pid":"160/1064","text":"Sergi Nadal"},{"@pid":"88/2053","text":"Alberto Abelló"}]},"title":"Integration-Oriented Ontology.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/NadalA19","doi":"10.1007/978-3-319-63962-8_13-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_13-1","url":"https://dblp.org/rec/reference/bdt/NadalA19"}, "url":"URL#2299588" }, { "@score":"1", "@id":"2299589", "info":{"authors":{"author":{"@pid":"235/5776","text":"Sandeep Nagar"}},"title":"Python.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Nagar19","doi":"10.1007/978-3-319-63962-8_269-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_269-1","url":"https://dblp.org/rec/reference/bdt/Nagar19"}, "url":"URL#2299589" }, { "@score":"1", "@id":"2299590", "info":{"authors":{"author":[{"@pid":"13/9532","text":"Mahsa Najafzadeh"},{"@pid":"j/SJagannathan","text":"Suresh Jagannathan"}]},"title":"Geo-Replication Models.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/NajafzadehJ19","doi":"10.1007/978-3-319-63962-8_186-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_186-1","url":"https://dblp.org/rec/reference/bdt/NajafzadehJ19"}, "url":"URL#2299590" }, { "@score":"1", "@id":"2299591", "info":{"authors":{"author":{"@pid":"55/11299","text":"Faisal Nawab"}},"title":"Coordination Avoidance.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Nawab19","doi":"10.1007/978-3-319-63962-8_182-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_182-1","url":"https://dblp.org/rec/reference/bdt/Nawab19"}, "url":"URL#2299591" }, { "@score":"1", "@id":"2299592", "info":{"authors":{"author":{"@pid":"55/11299","text":"Faisal Nawab"}},"title":"Geo-Scale Transaction Processing.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Nawab19a","doi":"10.1007/978-3-319-63962-8_180-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_180-1","url":"https://dblp.org/rec/reference/bdt/Nawab19a"}, "url":"URL#2299592" }, { "@score":"1", "@id":"2299593", "info":{"authors":{"author":{"@pid":"55/11299","text":"Faisal Nawab"}},"title":"Weaker Consistency Models/Eventual Consistency.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Nawab19b","doi":"10.1007/978-3-319-63962-8_181-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_181-1","url":"https://dblp.org/rec/reference/bdt/Nawab19b"}, "url":"URL#2299593" }, { "@score":"1", "@id":"2299594", "info":{"authors":{"author":[{"@pid":"46/9716","text":"Salman Niazi"},{"@pid":"128/1882","text":"Mahmoud Ismail"},{"@pid":"h/SeifHaridi","text":"Seif Haridi"},{"@pid":"d/JimDowling","text":"Jim Dowling"}]},"title":"HopsFS: Scaling Hierarchical File System Metadata Using NewSQL Databases.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/NiaziIHD19","doi":"10.1007/978-3-319-63962-8_146-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_146-1","url":"https://dblp.org/rec/reference/bdt/NiaziIHD19"}, "url":"URL#2299594" }, { "@score":"1", "@id":"2299595", "info":{"authors":{"author":{"@pid":"57/10355-1","text":"Milos Nikolic 0001"}},"title":"Distributed Incremental View Maintenance.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Nikolic19","doi":"10.1007/978-3-319-63962-8_148-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_148-1","url":"https://dblp.org/rec/reference/bdt/Nikolic19"}, "url":"URL#2299595" }, { "@score":"1", "@id":"2299596", "info":{"authors":{"author":[{"@pid":"175/5813","text":"Zhaojie Niu"},{"@pid":"h/BingshengHe","text":"Bingsheng He"}]},"title":"Storage Technologies for Big Data.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/NiuH19","doi":"10.1007/978-3-319-63962-8_176-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_176-1","url":"https://dblp.org/rec/reference/bdt/NiuH19"}, "url":"URL#2299596" }, { "@score":"1", "@id":"2299597", "info":{"authors":{"author":{"@pid":"p/RasmusPagh","text":"Rasmus Pagh"}},"title":"Similarity Sketching.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Pagh19","doi":"10.1007/978-3-319-63962-8_58-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_58-1","url":"https://dblp.org/rec/reference/bdt/Pagh19"}, "url":"URL#2299597" }, { "@score":"1", "@id":"2299598", "info":{"authors":{"author":[{"@pid":"59/6490","text":"Jeff Z. Pan"},{"@pid":"72/5841","text":"Jianfeng Du"}]},"title":"Automated Reasoning.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/PanD19","doi":"10.1007/978-3-319-63962-8_314-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_314-1","url":"https://dblp.org/rec/reference/bdt/PanD19"}, "url":"URL#2299598" }, { "@score":"1", "@id":"2299599", "info":{"authors":{"author":[{"@pid":"99/11140","text":"Gene Pang"},{"@pid":"46/3744-1","text":"Haoyuan Li 0001"}]},"title":"Caching for SQL-on-Hadoop.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/PangL19","doi":"10.1007/978-3-319-63962-8_249-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_249-1","url":"https://dblp.org/rec/reference/bdt/PangL19"}, "url":"URL#2299599" }, { "@score":"1", "@id":"2299600", "info":{"authors":{"author":{"@pid":"p/PaoloPapotti","text":"Paolo Papotti"}},"title":"Schema Mapping.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Papotti19","doi":"10.1007/978-3-319-63962-8_20-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_20-1","url":"https://dblp.org/rec/reference/bdt/Papotti19"}, "url":"URL#2299600" }, { "@score":"1", "@id":"2299601", "info":{"authors":{"author":[{"@pid":"p/PaoloPapotti","text":"Paolo Papotti"},{"@pid":"32/5873","text":"Donatello Santoro"}]},"title":"Data Integration.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/PapottiS19","doi":"10.1007/978-3-319-63962-8_6-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_6-1","url":"https://dblp.org/rec/reference/bdt/PapottiS19"}, "url":"URL#2299601" }, { "@score":"1", "@id":"2299602", "info":{"authors":{"author":[{"@pid":"31/8766","text":"Marcus Paradies"},{"@pid":"93/3568","text":"Stefan Plantikow"},{"@pid":"130/9761","text":"Oskar van Rest"}]},"title":"Graph Data Management Systems.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/ParadiesPR19","doi":"10.1007/978-3-319-63962-8_82-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_82-1","url":"https://dblp.org/rec/reference/bdt/ParadiesPR19"}, "url":"URL#2299602" }, { "@score":"1", "@id":"2299603", "info":{"authors":{"author":[{"@pid":"31/8766","text":"Marcus Paradies"},{"@pid":"19/1082","text":"Hannes Voigt"}]},"title":"Graph Representations and Storage.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/ParadiesV19","doi":"10.1007/978-3-319-63962-8_211-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_211-1","url":"https://dblp.org/rec/reference/bdt/ParadiesV19"}, "url":"URL#2299603" }, { "@score":"1", "@id":"2299604", "info":{"authors":{"author":{"@pid":"p/BehroozParhami","text":"Behrooz Parhami"}},"title":"Computer Architecture for Big Data.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Parhami19","doi":"10.1007/978-3-319-63962-8_164-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_164-1","url":"https://dblp.org/rec/reference/bdt/Parhami19"}, "url":"URL#2299604" }, { "@score":"1", "@id":"2299605", "info":{"authors":{"author":{"@pid":"p/BehroozParhami","text":"Behrooz Parhami"}},"title":"Data Longevity and Compatibility.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Parhami19a","doi":"10.1007/978-3-319-63962-8_331-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_331-1","url":"https://dblp.org/rec/reference/bdt/Parhami19a"}, "url":"URL#2299605" }, { "@score":"1", "@id":"2299606", "info":{"authors":{"author":{"@pid":"p/BehroozParhami","text":"Behrooz Parhami"}},"title":"Data Replication and Encoding.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Parhami19b","doi":"10.1007/978-3-319-63962-8_174-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_174-1","url":"https://dblp.org/rec/reference/bdt/Parhami19b"}, "url":"URL#2299606" }, { "@score":"1", "@id":"2299607", "info":{"authors":{"author":{"@pid":"p/BehroozParhami","text":"Behrooz Parhami"}},"title":"Energy Implications of Big Data.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Parhami19c","doi":"10.1007/978-3-319-63962-8_171-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_171-1","url":"https://dblp.org/rec/reference/bdt/Parhami19c"}, "url":"URL#2299607" }, { "@score":"1", "@id":"2299608", "info":{"authors":{"author":{"@pid":"p/BehroozParhami","text":"Behrooz Parhami"}},"title":"Parallel Processing with Big Data.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Parhami19d","doi":"10.1007/978-3-319-63962-8_165-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_165-1","url":"https://dblp.org/rec/reference/bdt/Parhami19d"}, "url":"URL#2299608" }, { "@score":"1", "@id":"2299609", "info":{"authors":{"author":{"@pid":"p/BehroozParhami","text":"Behrooz Parhami"}},"title":"Tabular Computation.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Parhami19e","doi":"10.1007/978-3-319-63962-8_169-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_169-1","url":"https://dblp.org/rec/reference/bdt/Parhami19e"}, "url":"URL#2299609" }, { "@score":"1", "@id":"2299610", "info":{"authors":{"author":[{"@pid":"52/6414","text":"Johns Paul"},{"@pid":"h/BingshengHe","text":"Bingsheng He"},{"@pid":"30/6609","text":"Chiew Tong Lau"}]},"title":"GPU-Based Hardware Platforms.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/PaulHL19","doi":"10.1007/978-3-319-63962-8_172-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_172-1","url":"https://dblp.org/rec/reference/bdt/PaulHL19"}, "url":"URL#2299610" }, { "@score":"1", "@id":"2299611", "info":{"authors":{"author":[{"@pid":"52/6414","text":"Johns Paul"},{"@pid":"h/BingshengHe","text":"Bingsheng He"},{"@pid":"30/6609","text":"Chiew Tong Lau"}]},"title":"Search and Query Accelerators.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/PaulHL19a","doi":"10.1007/978-3-319-63962-8_166-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_166-1","url":"https://dblp.org/rec/reference/bdt/PaulHL19a"}, "url":"URL#2299611" }, { "@score":"1", "@id":"2299612", "info":{"authors":{"author":{"@pid":"130/2269","text":"Rogério Abreu de Paula"}},"title":"Visualization Techniques.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Paula19","doi":"10.1007/978-3-319-63962-8_84-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_84-1","url":"https://dblp.org/rec/reference/bdt/Paula19"}, "url":"URL#2299612" }, { "@score":"1", "@id":"2299613", "info":{"authors":{"author":{"@pid":"139/2656","text":"Valerio Persico"}},"title":"Big Data for Health.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Persico19","doi":"10.1007/978-3-319-63962-8_25-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_25-1","url":"https://dblp.org/rec/reference/bdt/Persico19"}, "url":"URL#2299613" }, { "@score":"1", "@id":"2299614", "info":{"authors":{"author":[{"@pid":"p/IliaPetrov","text":"Ilia Petrov 0001"},{"@pid":"84/1948-1","text":"Andreas Koch 0001"},{"@pid":"178/2061","text":"Tobias Vinçon"},{"@pid":"135/4703","text":"Sergey Hardock"},{"@pid":"214/7037","text":"Christian Riegger"}]},"title":"Hardware-Assisted Transaction Processing: NVM.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Petrov0VHR19","doi":"10.1007/978-3-319-63962-8_202-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_202-1","url":"https://dblp.org/rec/reference/bdt/Petrov0VHR19"}, "url":"URL#2299614" }, { "@score":"1", "@id":"2299615", "info":{"authors":{"author":[{"@pid":"p/IliaPetrov","text":"Ilia Petrov 0001"},{"@pid":"178/2061","text":"Tobias Vinçon"},{"@pid":"84/1948-1","text":"Andreas Koch 0001"},{"@pid":"133/5083","text":"Julian Oppermann"},{"@pid":"135/4703","text":"Sergey Hardock"},{"@pid":"214/7037","text":"Christian Riegger"}]},"title":"Active Storage.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/PetrovV0OHR19","doi":"10.1007/978-3-319-63962-8_309-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_309-1","url":"https://dblp.org/rec/reference/bdt/PetrovV0OHR19"}, "url":"URL#2299615" }, { "@score":"1", "@id":"2299616", "info":{"authors":{"author":[{"@pid":"210/8438","text":"Thye Way Phua"},{"@pid":"75/11480","text":"Ryan K. L. Ko"}]},"title":"Data Provenance for Big Data Security and Accountability.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/PhuaK19","doi":"10.1007/978-3-319-63962-8_237-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_237-1","url":"https://dblp.org/rec/reference/bdt/PhuaK19"}, "url":"URL#2299616" }, { "@score":"1", "@id":"2299617", "info":{"authors":{"author":[{"@pid":"23/6145","text":"Danh Le Phuoc"},{"@pid":"h/ManfredHauswirth","text":"Manfred Hauswirth"}]},"title":"Semantic Stream Processing.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/PhuocH19","doi":"10.1007/978-3-319-63962-8_287-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_287-1","url":"https://dblp.org/rec/reference/bdt/PhuocH19"}, "url":"URL#2299617" }, { "@score":"1", "@id":"2299618", "info":{"authors":{"author":[{"@pid":"204/0111","text":"Giulio Ermanno Pibiri"},{"@pid":"44/5068","text":"Rossano Venturini"}]},"title":"Inverted Index Compression.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/PibiriV19","doi":"10.1007/978-3-319-63962-8_52-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_52-1","url":"https://dblp.org/rec/reference/bdt/PibiriV19"}, "url":"URL#2299618" }, { "@score":"1", "@id":"2299619", "info":{"authors":{"author":{"@pid":"62/431","text":"Antonio Picariello"}},"title":"Big Data in Social Networks.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Picariello19","doi":"10.1007/978-3-319-63962-8_28-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_28-1","url":"https://dblp.org/rec/reference/bdt/Picariello19"}, "url":"URL#2299619" }, { "@score":"1", "@id":"2299620", "info":{"authors":{"author":[{"@pid":"177/5612","text":"John Poelman"},{"@pid":"235/5784","text":"Emily May Curtin"}]},"title":"SparkBench.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/PoelmanC19","doi":"10.1007/978-3-319-63962-8_300-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_300-1","url":"https://dblp.org/rec/reference/bdt/PoelmanC19"}, "url":"URL#2299620" }, { "@score":"1", "@id":"2299621", "info":{"authors":{"author":{"@pid":"p/MeikelPoss","text":"Meikel Poess"}},"title":"TPC-DS.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Poess19","doi":"10.1007/978-3-319-63962-8_127-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_127-1","url":"https://dblp.org/rec/reference/bdt/Poess19"}, "url":"URL#2299621" }, { "@score":"1", "@id":"2299622", "info":{"authors":{"author":{"@pid":"p/MeikelPoss","text":"Meikel Poess"}},"title":"TPC-H.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Poess19a","doi":"10.1007/978-3-319-63962-8_126-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_126-1","url":"https://dblp.org/rec/reference/bdt/Poess19a"}, "url":"URL#2299622" }, { "@score":"1", "@id":"2299623", "info":{"authors":{"author":[{"@pid":"p/MeikelPoss","text":"Meikel Poess"},{"@pid":"n/RaghuOthayothNambiar","text":"Raghunath Nambiar"}]},"title":"TPC.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/PoessN19","doi":"10.1007/978-3-319-63962-8_319-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_319-1","url":"https://dblp.org/rec/reference/bdt/PoessN19"}, "url":"URL#2299623" }, { "@score":"1", "@id":"2299624", "info":{"authors":{"author":{"@pid":"21/7644","text":"Nicolás Poggi"}},"title":"Microbenchmark.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Poggi19","doi":"10.1007/978-3-319-63962-8_111-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_111-1","url":"https://dblp.org/rec/reference/bdt/Poggi19"}, "url":"URL#2299624" }, { "@score":"1", "@id":"2299625", "info":{"authors":{"author":{"@pid":"17/4121","text":"Artem Polyvyanyy"}},"title":"Business Process Querying.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Polyvyanyy19","doi":"10.1007/978-3-319-63962-8_108-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_108-1","url":"https://dblp.org/rec/reference/bdt/Polyvyanyy19"}, "url":"URL#2299625" }, { "@score":"1", "@id":"2299626", "info":{"authors":{"author":[{"@pid":"18/4843","text":"Nuno M. Preguiça"},{"@pid":"42/2941","text":"Carlos Baquero"},{"@pid":"s/MarcShapiro","text":"Marc Shapiro 0001"}]},"title":"Conflict-Free Replicated Data Types CRDTs.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/PreguicaB019","doi":"10.1007/978-3-319-63962-8_185-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_185-1","url":"https://dblp.org/rec/reference/bdt/PreguicaB019"}, "url":"URL#2299626" }, { "@score":"1", "@id":"2299627", "info":{"authors":{"author":[{"@pid":"154/0895","text":"Deepak Puthal"},{"@pid":"68/163-1","text":"Rajiv Ranjan 0001"},{"@pid":"06/2379","text":"Jinjun Chen"}]},"title":"Big Data Stream Security Classification for IoT Applications.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/PuthalRC19","doi":"10.1007/978-3-319-63962-8_236-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_236-1","url":"https://dblp.org/rec/reference/bdt/PuthalRC19"}, "url":"URL#2299627" }, { "@score":"1", "@id":"2299628", "info":{"authors":{"author":[{"@pid":"41/1074-1","text":"Jianzhong Qi 0001"},{"@pid":"03/505","text":"Rui Zhang 0003"}]},"title":"Indexing.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/QiZ19","doi":"10.1007/978-3-319-63962-8_217-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_217-1","url":"https://dblp.org/rec/reference/bdt/QiZ19"}, "url":"URL#2299628" }, { "@score":"1", "@id":"2299629", "info":{"authors":{"author":[{"@pid":"41/1074-1","text":"Jianzhong Qi 0001"},{"@pid":"03/505","text":"Rui Zhang 0003"}]},"title":"Query Processing - kNN.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/QiZ19a","doi":"10.1007/978-3-319-63962-8_220-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_220-1","url":"https://dblp.org/rec/reference/bdt/QiZ19a"}, "url":"URL#2299629" }, { "@score":"1", "@id":"2299630", "info":{"authors":{"author":[{"@pid":"16/262","text":"Yongrui Qin"},{"@pid":"s/QuanZSheng","text":"Quan Z. Sheng"}]},"title":"Big Data Analysis and IoT.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/QinS19","doi":"10.1007/978-3-319-63962-8_308-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_308-1","url":"https://dblp.org/rec/reference/bdt/QinS19"}, "url":"URL#2299630" }, { "@score":"1", "@id":"2299631", "info":{"authors":{"author":[{"@pid":"q/ChristophQuix","text":"Christoph Quix"},{"@pid":"163/0801-1","text":"Rihan Hai 0001"}]},"title":"Data Lake.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/QuixH19","doi":"10.1007/978-3-319-63962-8_7-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_7-1","url":"https://dblp.org/rec/reference/bdt/QuixH19"}, "url":"URL#2299631" }, { "@score":"1", "@id":"2299632", "info":{"authors":{"author":[{"@pid":"145/0805","text":"Do Le Quoc"},{"@pid":"70/2640","text":"Martin Beck"},{"@pid":"35/8319","text":"Pramod Bhatotia"},{"@pid":"03/2050","text":"Ruichuan Chen"},{"@pid":"f/ChristofFetzer","text":"Christof Fetzer"},{"@pid":"69/2809","text":"Thorsten Strufe"}]},"title":"Privacy-Preserving Data Analytics.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/QuocBBCFS19","doi":"10.1007/978-3-319-63962-8_152-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_152-1","url":"https://dblp.org/rec/reference/bdt/QuocBBCFS19"}, "url":"URL#2299632" }, { "@score":"1", "@id":"2299633", "info":{"authors":{"author":[{"@pid":"145/0805","text":"Do Le Quoc"},{"@pid":"03/2050","text":"Ruichuan Chen"},{"@pid":"35/8319","text":"Pramod Bhatotia"},{"@pid":"f/ChristofFetzer","text":"Christof Fetzer"},{"@pid":"29/1947","text":"Volker Hilt"},{"@pid":"69/2809","text":"Thorsten Strufe"}]},"title":"Approximate Computing for Stream Analytics.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/QuocCBFHS19","doi":"10.1007/978-3-319-63962-8_153-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_153-1","url":"https://dblp.org/rec/reference/bdt/QuocCBFHS19"}, "url":"URL#2299633" }, { "@score":"1", "@id":"2299634", "info":{"authors":{"author":[{"@pid":"145/0805","text":"Do Le Quoc"},{"@pid":"178/3696","text":"Dhanya R. Krishnan"},{"@pid":"35/8319","text":"Pramod Bhatotia"},{"@pid":"f/ChristofFetzer","text":"Christof Fetzer"},{"@pid":"87/6689","text":"Rodrigo Rodrigues 0001"}]},"title":"Incremental Approximate Computing.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/QuocKBFR19","doi":"10.1007/978-3-319-63962-8_151-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_151-1","url":"https://dblp.org/rec/reference/bdt/QuocKBFR19"}, "url":"URL#2299634" }, { "@score":"1", "@id":"2299635", "info":{"authors":{"author":{"@pid":"24/6162","text":"Francois Raab"}},"title":"Auditing.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Raab19","doi":"10.1007/978-3-319-63962-8_125-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_125-1","url":"https://dblp.org/rec/reference/bdt/Raab19"}, "url":"URL#2299635" }, { "@score":"1", "@id":"2299636", "info":{"authors":{"author":{"@pid":"24/6162","text":"Francois Raab"}},"title":"System Under Test.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Raab19a","doi":"10.1007/978-3-319-63962-8_124-2","ee":"https://doi.org/10.1007/978-3-319-63962-8_124-2","url":"https://dblp.org/rec/reference/bdt/Raab19a"}, "url":"URL#2299636" }, { "@score":"1", "@id":"2299637", "info":{"authors":{"author":[{"@pid":"69/11464","text":"Mohammad Saiedur Rahaman"},{"@pid":"05/4792","text":"Margaret Hamilton 0001"},{"@pid":"08/1554","text":"Flora D. Salim"}]},"title":"Using Big Spatial Data for Planning User Mobility.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/RahamanHS19","doi":"10.1007/978-3-319-63962-8_224-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_224-1","url":"https://dblp.org/rec/reference/bdt/RahamanHS19"}, "url":"URL#2299637" }, { "@score":"1", "@id":"2299638", "info":{"authors":{"author":[{"@pid":"r/ERahm","text":"Erhard Rahm"},{"@pid":"91/7933","text":"Eric Peukert"}]},"title":"Holistic Schema Matching.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/RahmP19","doi":"10.1007/978-3-319-63962-8_12-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_12-1","url":"https://dblp.org/rec/reference/bdt/RahmP19"}, "url":"URL#2299638" }, { "@score":"1", "@id":"2299639", "info":{"authors":{"author":[{"@pid":"r/ERahm","text":"Erhard Rahm"},{"@pid":"91/7933","text":"Eric Peukert"}]},"title":"Large Scale Entity Resolution.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/RahmP19a","doi":"10.1007/978-3-319-63962-8_4-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_4-1","url":"https://dblp.org/rec/reference/bdt/RahmP19a"}, "url":"URL#2299639" }, { "@score":"1", "@id":"2299640", "info":{"authors":{"author":[{"@pid":"r/ERahm","text":"Erhard Rahm"},{"@pid":"91/7933","text":"Eric Peukert"}]},"title":"Large-Scale Schema Matching.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/RahmP19b","doi":"10.1007/978-3-319-63962-8_330-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_330-1","url":"https://dblp.org/rec/reference/bdt/RahmP19b"}, "url":"URL#2299640" }, { "@score":"1", "@id":"2299641", "info":{"authors":{"author":[{"@pid":"139/2250","text":"Vineeth Rakesh"},{"@pid":"07/4708-1","text":"Lei Tang 0001"},{"@pid":"92/309-1","text":"Huan Liu 0001"}]},"title":"Feature Learning from Social Graphs.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/RakeshT019","doi":"10.1007/978-3-319-63962-8_273-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_273-1","url":"https://dblp.org/rec/reference/bdt/RakeshT019"}, "url":"URL#2299641" }, { "@score":"1", "@id":"2299642", "info":{"authors":{"author":[{"@pid":"70/9551","text":"Niranjan Kumar Ray"},{"@pid":"235/5774","text":"Biswaranjan Acharya"},{"@pid":"235/5783","text":"Anil Kumar Swain"}]},"title":"Network Big Data Security Issues.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/RayAS19","doi":"10.1007/978-3-319-63962-8_240-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_240-1","url":"https://dblp.org/rec/reference/bdt/RayAS19"}, "url":"URL#2299642" }, { "@score":"1", "@id":"2299643", "info":{"authors":{"author":{"@pid":"r/StefanieRinderle","text":"Stefanie Rinderle-Ma"}},"title":"Multidimensional Process Analytics.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Rinderle-Ma19","doi":"10.1007/978-3-319-63962-8_97-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_97-1","url":"https://dblp.org/rec/reference/bdt/Rinderle-Ma19"}, "url":"URL#2299643" }, { "@score":"1", "@id":"2299644", "info":{"authors":{"author":{"@pid":"162/1973","text":"Nicolo Rivetti"}},"title":"Introduction to Stream Processing Algorithms.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Rivetti19","doi":"10.1007/978-3-319-63962-8_192-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_192-1","url":"https://dblp.org/rec/reference/bdt/Rivetti19"}, "url":"URL#2299644" }, { "@score":"1", "@id":"2299645", "info":{"authors":{"author":[{"@pid":"128/5117","text":"Fábio Diniz Rossi"},{"@pid":"140/8275","text":"Guilherme da Cunha Rodrigues"}]},"title":"Network-Level Support for Big Data Computing.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/RossiR19","doi":"10.1007/978-3-319-63962-8_45-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_45-1","url":"https://dblp.org/rec/reference/bdt/RossiR19"}, "url":"URL#2299645" }, { "@score":"1", "@id":"2299646", "info":{"authors":{"author":[{"@pid":"05/3463","text":"Paolo Rosso"},{"@pid":"32/10716","text":"Dingqi Yang"},{"@pid":"71/5578","text":"Philippe Cudré-Mauroux"}]},"title":"Knowledge Graph Embeddings.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/RossoYC19","doi":"10.1007/978-3-319-63962-8_284-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_284-1","url":"https://dblp.org/rec/reference/bdt/RossoYC19"}, "url":"URL#2299646" }, { "@score":"1", "@id":"2299647", "info":{"authors":{"author":[{"@pid":"153/3863","text":"Sampa Sahoo"},{"@pid":"202/9691","text":"Sambit Kumar Mishra"},{"@pid":"86/1418-1","text":"Bibhudatta Sahoo 0001"},{"@pid":"24/6016","text":"Ashok Kumar Turuk"}]},"title":"Co-resident Attack in Cloud Computing: An Overview.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/SahooMST19","doi":"10.1007/978-3-319-63962-8_322-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_322-1","url":"https://dblp.org/rec/reference/bdt/SahooMST19"}, "url":"URL#2299647" }, { "@score":"1", "@id":"2299648", "info":{"authors":{"author":{"@pid":"s/SherifSakr","text":"Sherif Sakr"}},"title":"NoSQL Database Systems.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Sakr19","doi":"10.1007/978-3-319-63962-8_50-2","ee":"https://doi.org/10.1007/978-3-319-63962-8_50-2","url":"https://dblp.org/rec/reference/bdt/Sakr19"}, "url":"URL#2299648" }, { "@score":"1", "@id":"2299649", "info":{"authors":{"author":[{"@pid":"55/6560","text":"Semih Salihoglu"},{"@pid":"92/9686","text":"Nikolay Yakovets"}]},"title":"Graph Query Processing.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/SalihogluY19","doi":"10.1007/978-3-319-63962-8_215-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_215-1","url":"https://dblp.org/rec/reference/bdt/SalihogluY19"}, "url":"URL#2299649" }, { "@score":"1", "@id":"2299650", "info":{"authors":{"author":[{"@pid":"95/9990","text":"Mohamed Sarwat"},{"@pid":"177/9081","text":"Yuhan Sun"}]},"title":"Spatio-Social Data.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/SarwatS19","doi":"10.1007/978-3-319-63962-8_69-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_69-1","url":"https://dblp.org/rec/reference/bdt/SarwatS19"}, "url":"URL#2299650" }, { "@score":"1", "@id":"2299651", "info":{"authors":{"author":{"@pid":"117/4970","text":"Matthias J. Sax"}},"title":"Apache Kafka.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Sax19","doi":"10.1007/978-3-319-63962-8_196-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_196-1","url":"https://dblp.org/rec/reference/bdt/Sax19"}, "url":"URL#2299651" }, { "@score":"1", "@id":"2299652", "info":{"authors":{"author":[{"@pid":"s/KhalidSayood","text":"Khalid Sayood"},{"@pid":"47/3425","text":"Sina Balkir"}]},"title":"Hardware-Assisted Compression.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/SayoodB19","doi":"10.1007/978-3-319-63962-8_311-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_311-1","url":"https://dblp.org/rec/reference/bdt/SayoodB19"}, "url":"URL#2299652" }, { "@score":"1", "@id":"2299653", "info":{"authors":{"author":{"@pid":"146/4547","text":"Arik Senderovich"}},"title":"Queue Mining.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Senderovich19","doi":"10.1007/978-3-319-63962-8_101-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_101-1","url":"https://dblp.org/rec/reference/bdt/Senderovich19"}, "url":"URL#2299653" }, { "@score":"1", "@id":"2299654", "info":{"authors":{"author":[{"@pid":"s/ShashiShekhar","text":"Shashi Shekhar"},{"@pid":"134/6781","text":"Jayant Gupta"}]},"title":"Spatial Graph Big Data.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/ShekharG19","doi":"10.1007/978-3-319-63962-8_222-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_222-1","url":"https://dblp.org/rec/reference/bdt/ShekharG19"}, "url":"URL#2299654" }, { "@score":"1", "@id":"2299655", "info":{"authors":{"author":{"@pid":"s/YogeshSimmhan","text":"Yogesh Simmhan"}},"title":"Big Data and Fog Computing.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Simmhan19","doi":"10.1007/978-3-319-63962-8_41-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_41-1","url":"https://dblp.org/rec/reference/bdt/Simmhan19"}, "url":"URL#2299655" }, { "@score":"1", "@id":"2299656", "info":{"authors":{"author":[{"@pid":"234/8165","text":"Alisa Smirnova"},{"@pid":"131/6679","text":"Julien Audiffren"},{"@pid":"71/5578","text":"Philippe Cudré-Mauroux"}]},"title":"Distant Supervision from Knowledge Graphs.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/SmirnovaAC19","doi":"10.1007/978-3-319-63962-8_285-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_285-1","url":"https://dblp.org/rec/reference/bdt/SmirnovaAC19"}, "url":"URL#2299656" }, { "@score":"1", "@id":"2299657", "info":{"authors":{"author":{"@pid":"07/1330","text":"Mohamed A. Soliman"}},"title":"Query Optimization Challenges for SQL-on-Hadoop.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Soliman19","doi":"10.1007/978-3-319-63962-8_323-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_323-1","url":"https://dblp.org/rec/reference/bdt/Soliman19"}, "url":"URL#2299657" }, { "@score":"1", "@id":"2299658", "info":{"authors":{"author":{"@pid":"35/9961","text":"Andreas Solti"}},"title":"Event Log Cleaning for Business Process Analytics.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Solti19","doi":"10.1007/978-3-319-63962-8_87-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_87-1","url":"https://dblp.org/rec/reference/bdt/Solti19"}, "url":"URL#2299658" }, { "@score":"1", "@id":"2299659", "info":{"authors":{"author":{"@pid":"121/0078","text":"Giancarlo Sperlì"}},"title":"Big Data and Recommendation.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Sperli19","doi":"10.1007/978-3-319-63962-8_30-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_30-1","url":"https://dblp.org/rec/reference/bdt/Sperli19"}, "url":"URL#2299659" }, { "@score":"1", "@id":"2299660", "info":{"authors":{"author":{"@pid":"s/TorstenSuel","text":"Torsten Suel"}},"title":"Delta Compression Techniques.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Suel19","doi":"10.1007/978-3-319-63962-8_63-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_63-1","url":"https://dblp.org/rec/reference/bdt/Suel19"}, "url":"URL#2299660" }, { "@score":"1", "@id":"2299661", "info":{"authors":{"author":[{"@pid":"64/4316","text":"Kanat Tangwongsan"},{"@pid":"34/6431","text":"Martin Hirzel"},{"@pid":"45/4064","text":"Scott Schneider 0001"}]},"title":"Sliding-Window Aggregation Algorithms.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/TangwongsanH019","doi":"10.1007/978-3-319-63962-8_157-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_157-1","url":"https://dblp.org/rec/reference/bdt/TangwongsanH019"}, "url":"URL#2299661" }, { "@score":"1", "@id":"2299662", "info":{"authors":{"author":{"@pid":"48/1224","text":"Christian Thomsen 0001"}},"title":"ETL.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Thomsen19","doi":"10.1007/978-3-319-63962-8_11-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_11-1","url":"https://dblp.org/rec/reference/bdt/Thomsen19"}, "url":"URL#2299662" }, { "@score":"1", "@id":"2299663", "info":{"authors":{"author":{"@pid":"27/3375","text":"Yuanyuan Tian"}},"title":"Hybrid Systems Based on Traditional Database Extensions.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Tian19","doi":"10.1007/978-3-319-63962-8_254-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_254-1","url":"https://dblp.org/rec/reference/bdt/Tian19"}, "url":"URL#2299663" }, { "@score":"1", "@id":"2299664", "info":{"authors":{"author":{"@pid":"86/9726","text":"Pinar Tözün"}},"title":"Hardware-Assisted Transaction Processing.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Tozun19","doi":"10.1007/978-3-319-63962-8_178-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_178-1","url":"https://dblp.org/rec/reference/bdt/Tozun19"}, "url":"URL#2299664" }, { "@score":"1", "@id":"2299665", "info":{"authors":{"author":{"@pid":"15/7454","text":"Jacopo Urbani"}},"title":"Reasoning at Scale.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Urbani19","doi":"10.1007/978-3-319-63962-8_317-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_317-1","url":"https://dblp.org/rec/reference/bdt/Urbani19"}, "url":"URL#2299665" }, { "@score":"1", "@id":"2299666", "info":{"authors":{"author":[{"@pid":"58/6139","text":"Alejandro A. Vaisman"},{"@pid":"82/2871","text":"Esteban Zimányi"}]},"title":"Graph OLAP.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/VaismanZ19","doi":"10.1007/978-3-319-63962-8_208-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_208-1","url":"https://dblp.org/rec/reference/bdt/VaismanZ19"}, "url":"URL#2299666" }, { "@score":"1", "@id":"2299667", "info":{"authors":{"author":[{"@pid":"89/7958","text":"Dinusha Vatsalan"},{"@pid":"132/9541","text":"Dimitrios Karapiperis"},{"@pid":"94/1028","text":"Vassilios S. Verykios"}]},"title":"Privacy-Preserving Record Linkage.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/VatsalanKV19","doi":"10.1007/978-3-319-63962-8_17-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_17-1","url":"https://dblp.org/rec/reference/bdt/VatsalanKV19"}, "url":"URL#2299667" }, { "@score":"1", "@id":"2299668", "info":{"authors":{"author":[{"@pid":"160/2226","text":"Jorge Veiga"},{"@pid":"86/11495","text":"Roberto R. Expósito"},{"@pid":"t/JuanTourino","text":"Juan Touriño"}]},"title":"Performance Evaluation of Big Data Analysis.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/VeigaET19","doi":"10.1007/978-3-319-63962-8_143-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_143-1","url":"https://dblp.org/rec/reference/bdt/VeigaET19"}, "url":"URL#2299668" }, { "@score":"1", "@id":"2299669", "info":{"authors":{"author":[{"@pid":"235/5755","text":"Alexandre Aa Silva Veith"},{"@pid":"66/2150","text":"Marcos Dias de Assunção"}]},"title":"Apache Spark.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/VeithA19","doi":"10.1007/978-3-319-63962-8_37-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_37-1","url":"https://dblp.org/rec/reference/bdt/VeithA19"}, "url":"URL#2299669" }, { "@score":"1", "@id":"2299670", "info":{"authors":{"author":{"@pid":"16/8777","text":"Zacharias Voulgaris"}},"title":"Julia.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Voulgaris19","doi":"10.1007/978-3-319-63962-8_268-2","ee":"https://doi.org/10.1007/978-3-319-63962-8_268-2","url":"https://dblp.org/rec/reference/bdt/Voulgaris19"}, "url":"URL#2299670" }, { "@score":"1", "@id":"2299671", "info":{"authors":{"author":{"@pid":"47/1110","text":"Lance A. Waller"}},"title":"Applications of Big Spatial Data: Health.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Waller19","doi":"10.1007/978-3-319-63962-8_72-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_72-1","url":"https://dblp.org/rec/reference/bdt/Waller19"}, "url":"URL#2299671" }, { "@score":"1", "@id":"2299672", "info":{"authors":{"author":[{"@pid":"36/4791","text":"Shuliang Wang"},{"@pid":"221/5842","text":"Tisinee Surapunt"}]},"title":"Spatial Data Mining.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/WangS19","doi":"10.1007/978-3-319-63962-8_66-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_66-1","url":"https://dblp.org/rec/reference/bdt/WangS19"}, "url":"URL#2299672" }, { "@score":"1", "@id":"2299673", "info":{"authors":{"author":{"@pid":"41/9119","text":"Jochen De Weerdt"}},"title":"Trace Clustering.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Weerdt19","doi":"10.1007/978-3-319-63962-8_91-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_91-1","url":"https://dblp.org/rec/reference/bdt/Weerdt19"}, "url":"URL#2299673" }, { "@score":"1", "@id":"2299674", "info":{"authors":{"author":[{"@pid":"38/6575","text":"Lena Wiese"},{"@pid":"275/9413","text":"Armin Otto Schmitt"},{"@pid":"123/6206","text":"Mehmet Gültas"}]},"title":"Big Data Technologies for DNA Sequencing.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/WieseSG19","doi":"10.1007/978-3-319-63962-8_32-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_32-1","url":"https://dblp.org/rec/reference/bdt/WieseSG19"}, "url":"URL#2299674" }, { "@score":"1", "@id":"2299675", "info":{"authors":{"author":[{"@pid":"32/6122","text":"Yinghui Wu"},{"@pid":"67/2933","text":"Arijit Khan 0001"}]},"title":"Graph Pattern Matching.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/WuK19","doi":"10.1007/978-3-319-63962-8_74-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_74-1","url":"https://dblp.org/rec/reference/bdt/WuK19"}, "url":"URL#2299675" }, { "@score":"1", "@id":"2299676", "info":{"authors":{"author":[{"@pid":"170/4209","text":"Markus Wurzenberger"},{"@pid":"29/3125","text":"Florian Skopik"},{"@pid":"150/7785","text":"Giuseppe Settanni"}]},"title":"Big Data for Cybersecurity.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/WurzenbergerSS19","doi":"10.1007/978-3-319-63962-8_163-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_163-1","url":"https://dblp.org/rec/reference/bdt/WurzenbergerSS19"}, "url":"URL#2299676" }, { "@score":"1", "@id":"2299677", "info":{"authors":{"author":[{"@pid":"09/10285","text":"Marcin Wylot"},{"@pid":"s/SherifSakr","text":"Sherif Sakr"}]},"title":"Framework-Based Scale-Out RDF Systems.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/WylotS19","doi":"10.1007/978-3-319-63962-8_225-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_225-1","url":"https://dblp.org/rec/reference/bdt/WylotS19"}, "url":"URL#2299677" }, { "@score":"1", "@id":"2299678", "info":{"authors":{"author":[{"@pid":"09/10285","text":"Marcin Wylot"},{"@pid":"s/SherifSakr","text":"Sherif Sakr"}]},"title":"Native Distributed RDF Systems.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/WylotS19a","doi":"10.1007/978-3-319-63962-8_226-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_226-1","url":"https://dblp.org/rec/reference/bdt/WylotS19a"}, "url":"URL#2299678" }, { "@score":"1", "@id":"2299679", "info":{"authors":{"author":[{"@pid":"81/9436-1","text":"Da Yan 0001"},{"@pid":"43/6690","text":"Hang Liu"}]},"title":"Parallel Graph Processing.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/YanL19","doi":"10.1007/978-3-319-63962-8_272-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_272-1","url":"https://dblp.org/rec/reference/bdt/YanL19"}, "url":"URL#2299679" }, { "@score":"1", "@id":"2299680", "info":{"authors":{"author":[{"@pid":"43/9678","text":"Amrapali Zaveri"},{"@pid":"09/10282","text":"Anisa Rula"}]},"title":"Data Quality and Data Cleansing of Semantic Data.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/ZaveriR19","doi":"10.1007/978-3-319-63962-8_289-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_289-1","url":"https://dblp.org/rec/reference/bdt/ZaveriR19"}, "url":"URL#2299680" }, { "@score":"1", "@id":"2299681", "info":{"authors":{"author":{"@pid":"12/4550-1","text":"Kaiwen Zhang 0001"}},"title":"Transactions in Massively Multiplayer Online Games.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Zhang19","doi":"10.1007/978-3-319-63962-8_184-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_184-1","url":"https://dblp.org/rec/reference/bdt/Zhang19"}, "url":"URL#2299681" }, { "@score":"1", "@id":"2299682", "info":{"authors":{"author":{"@pid":"18/4350","text":"Peixiang Zhao"}},"title":"Link Analytics in Graphs.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Zhao19","doi":"10.1007/978-3-319-63962-8_320-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_320-1","url":"https://dblp.org/rec/reference/bdt/Zhao19"}, "url":"URL#2299682" }, { "@score":"1", "@id":"2299683", "info":{"authors":{"author":[{"@pid":"z/XiaofangZhou","text":"Xiaofang Zhou 0001"},{"@pid":"13/7007-3","text":"Lei Li 0003"}]},"title":"Spatiotemporal Data: Trajectories.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Zhou019","doi":"10.1007/978-3-319-63962-8_221-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_221-1","url":"https://dblp.org/rec/reference/bdt/Zhou019"}, "url":"URL#2299683" }, { "@score":"1", "@id":"2299684", "info":{"authors":{"author":[{"@pid":"131/6619","text":"Amelie Chi Zhou"},{"@pid":"h/BingshengHe","text":"Bingsheng He"}]},"title":"Big Data and Exascale Computing.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/ZhouH19","doi":"10.1007/978-3-319-63962-8_167-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_167-1","url":"https://dblp.org/rec/reference/bdt/ZhouH19"}, "url":"URL#2299684" }, { "@score":"1", "@id":"2299685", "info":{"authors":{"author":[{"@pid":"164/4621","text":"Kaiyuan Zhu"},{"@pid":"122/2388","text":"Ibrahim Numanagic"},{"@pid":"s/SCSahinalp","text":"Süleyman Cenk Sahinalp"}]},"title":"Genomic Data Compression.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/ZhuNS19","doi":"10.1007/978-3-319-63962-8_55-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_55-1","url":"https://dblp.org/rec/reference/bdt/ZhuNS19"}, "url":"URL#2299685" }, { "@score":"1", "@id":"2299686", "info":{"authors":{"author":[{"@pid":"235/5764","text":"S. M. Zobaed"},{"@pid":"53/2578","text":"Mohsen Amini Salehi"}]},"title":"Big Data in the Cloud.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/ZobaedS19","doi":"10.1007/978-3-319-63962-8_40-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_40-1","url":"https://dblp.org/rec/reference/bdt/ZobaedS19"}, "url":"URL#2299686" }, { "@score":"1", "@id":"2299687", "info":{"authors":{"author":{"@pid":"40/4880","text":"Marcin Zukowski"}},"title":"Cloud-based SQL Solutions for Big Data.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/Zukowski19","doi":"10.1007/978-3-319-63962-8_318-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_318-1","url":"https://dblp.org/rec/reference/bdt/Zukowski19"}, "url":"URL#2299687" }, { "@score":"1", "@id":"2299688", "info":{"authors":{"author":[{"@pid":"43/8687","text":"Adela del-Río-Ortega"},{"@pid":"41/3443","text":"Manuel Resinas"},{"@pid":"c/AntonioRuizCortes","text":"Antonio Ruiz-Cortés"}]},"title":"Business Process Performance Measurement.","venue":"Encyclopedia of Big Data Technologies","year":"2019","type":"Reference Works","access":"closed","key":"reference/bdt/del-Rio-OrtegaRR19","doi":"10.1007/978-3-319-63962-8_99-1","ee":"https://doi.org/10.1007/978-3-319-63962-8_99-1","url":"https://dblp.org/rec/reference/bdt/del-Rio-OrtegaRR19"}, "url":"URL#2299688" }, { "@score":"1", "@id":"2299689", "info":{"authors":{"author":{"@pid":"97/10045-1","text":"Stefano Beretta 0001"}},"title":"Algorithms for Strings and Sequences: Pairwise Alignment.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"22-29","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/000119","doi":"10.1016/B978-0-12-809633-8.20317-8","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20317-8","url":"https://dblp.org/rec/reference/bioinf/000119"}, "url":"URL#2299689" }, { "@score":"1", "@id":"2299690", "info":{"authors":{"author":{"@pid":"p/MPellegrini","text":"Marco Pellegrini 0001"}},"title":"Community Detection in Biological Networks.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"978-987","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/000119a","doi":"10.1016/B978-0-12-809633-8.20428-7","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20428-7","url":"https://dblp.org/rec/reference/bioinf/000119a"}, "url":"URL#2299690" }, { "@score":"1", "@id":"2299691", "info":{"authors":{"author":{"@pid":"66/1033","text":"Y-h. Taguchi 0001"}},"title":"Regulation of Gene Expression.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"806-813","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/000119b","doi":"10.1016/B978-0-12-809633-8.20667-5","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20667-5","url":"https://dblp.org/rec/reference/bioinf/000119b"}, "url":"URL#2299691" }, { "@score":"1", "@id":"2299692", "info":{"authors":{"author":{"@pid":"66/1033","text":"Y-h. Taguchi 0001"}},"title":"Comparative Transcriptomics Analysis.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"814-818","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/000119c","doi":"10.1016/B978-0-12-809633-8.20163-5","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20163-5","url":"https://dblp.org/rec/reference/bioinf/000119c"}, "url":"URL#2299692" }, { "@score":"1", "@id":"2299693", "info":{"authors":{"author":[{"@pid":"97/10045-1","text":"Stefano Beretta 0001"},{"@pid":"200/3106","text":"Luca Denti"},{"@pid":"146/0686","text":"Marco Previtali"}]},"title":"Graph Theory and Definitions.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"922-927","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/0001DP19","doi":"10.1016/B978-0-12-809633-8.20421-4","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20421-4","url":"https://dblp.org/rec/reference/bioinf/0001DP19"}, "url":"URL#2299693" }, { "@score":"1", "@id":"2299694", "info":{"authors":{"author":[{"@pid":"97/10045-1","text":"Stefano Beretta 0001"},{"@pid":"200/3106","text":"Luca Denti"},{"@pid":"146/0686","text":"Marco Previtali"}]},"title":"Network Properties.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"928-932","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/0001DP19a","doi":"10.1016/B978-0-12-809633-8.20422-6","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20422-6","url":"https://dblp.org/rec/reference/bioinf/0001DP19a"}, "url":"URL#2299694" }, { "@score":"1", "@id":"2299695", "info":{"authors":{"author":[{"@pid":"m/GiuseppeManco-1","text":"Giuseppe Manco 0001"},{"@pid":"67/4235","text":"Ettore Ritacco"},{"@pid":"41/7251","text":"Massimo Guarascio 0001"}]},"title":"Network Topology.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"958-967","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/0001RG19","doi":"10.1016/B978-0-12-809633-8.20426-3","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20426-3","url":"https://dblp.org/rec/reference/bioinf/0001RG19"}, "url":"URL#2299695" }, { "@score":"1", "@id":"2299696", "info":{"authors":{"author":[{"@pid":"45/1696-1","text":"Haiying Wang 0001"},{"@pid":"203/2114","text":"Jyotsna Talreja Wassan"},{"@pid":"27/2027","text":"Huiru Zheng"}]},"title":"Measurements of Accuracy in Biostatistics.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"685-690","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/0001WZ19","doi":"10.1016/B978-0-12-809633-8.20355-5","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20355-5","url":"https://dblp.org/rec/reference/bioinf/0001WZ19"}, "url":"URL#2299696" }, { "@score":"1", "@id":"2299697", "info":{"authors":{"author":[{"@pid":"25/929-2","text":"Anna Bernasconi 0002"},{"@pid":"32/1035","text":"Marco Masseroli"}]},"title":"Biological and Medical Ontologies: Disease Ontology (DO).","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"838-847","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/0002M19","doi":"10.1016/B978-0-12-809633-8.20397-X","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20397-x","url":"https://dblp.org/rec/reference/bioinf/0002M19"}, "url":"URL#2299697" }, { "@score":"1", "@id":"2299698", "info":{"authors":{"author":[{"@pid":"25/929-2","text":"Anna Bernasconi 0002"},{"@pid":"32/1035","text":"Marco Masseroli"}]},"title":"Biological and Medical Ontologies: Human Phenotype Ontology (HPO).","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"848-857","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/0002M19a","doi":"10.1016/B978-0-12-809633-8.20398-1","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20398-1","url":"https://dblp.org/rec/reference/bioinf/0002M19a"}, "url":"URL#2299698" }, { "@score":"1", "@id":"2299699", "info":{"authors":{"author":[{"@pid":"25/929-2","text":"Anna Bernasconi 0002"},{"@pid":"32/1035","text":"Marco Masseroli"}]},"title":"Biological and Medical Ontologies: Systems Biology Ontology (SBO).","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"858-866","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/0002M19b","doi":"10.1016/B978-0-12-809633-8.20399-3","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20399-3","url":"https://dblp.org/rec/reference/bioinf/0002M19b"}, "url":"URL#2299699" }, { "@score":"1", "@id":"2299700", "info":{"authors":{"author":[{"@pid":"62/893","text":"Sanne Abeln"},{"@pid":"06/732","text":"K. Anton Feenstra"},{"@pid":"85/5966","text":"Jaap Heringa"}]},"title":"Protein Three-Dimensional Structure Prediction.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"497-511","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/AbelnFH19","doi":"10.1016/B978-0-12-809633-8.20505-0","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20505-0","url":"https://dblp.org/rec/reference/bioinf/AbelnFH19"}, "url":"URL#2299700" }, { "@score":"1", "@id":"2299701", "info":{"authors":{"author":{"@pid":"181/7577","text":"Luciano A. Abriata"}},"title":"Computational Tools for Structural Analysis of Proteins.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"539-549","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Abriata19","doi":"10.1016/B978-0-12-809633-8.12366-0","ee":"https://doi.org/10.1016/b978-0-12-809633-8.12366-0","url":"https://dblp.org/rec/reference/bioinf/Abriata19"}, "url":"URL#2299701" }, { "@score":"1", "@id":"2299702", "info":{"authors":{"author":[{"@pid":"23/4172","text":"Josep F. Abril"},{"@pid":"60/4110","text":"Sergi Castellano"}]},"title":"Genome Annotation.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"195-209","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/AbrilC19","doi":"10.1016/B978-0-12-809633-8.20226-4","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20226-4","url":"https://dblp.org/rec/reference/bioinf/AbrilC19"}, "url":"URL#2299702" }, { "@score":"1", "@id":"2299703", "info":{"authors":{"author":[{"@pid":"126/0525","text":"Arpah Abu"},{"@pid":"126/0517","text":"Sarinder Kaur Dhillon"}]},"title":"Bioimage Databases.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"1011-1027","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/AbuD19","doi":"10.1016/B978-0-12-809633-8.20309-9","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20309-9","url":"https://dblp.org/rec/reference/bioinf/AbuD19"}, "url":"URL#2299703" }, { "@score":"1", "@id":"2299704", "info":{"authors":{"author":{"@pid":"65/9707","text":"Giuseppe Agapito"}},"title":"Standards and Models for Biological Data: SBML.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"142-146","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Agapito19","doi":"10.1016/B978-0-12-809633-8.20417-2","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20417-2","url":"https://dblp.org/rec/reference/bioinf/Agapito19"}, "url":"URL#2299704" }, { "@score":"1", "@id":"2299705", "info":{"authors":{"author":{"@pid":"65/9707","text":"Giuseppe Agapito"}},"title":"Standards and Models for Biological Data: BioPAX.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"147-153","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Agapito19a","doi":"10.1016/B978-0-12-809633-8.20492-5","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20492-5","url":"https://dblp.org/rec/reference/bioinf/Agapito19a"}, "url":"URL#2299705" }, { "@score":"1", "@id":"2299706", "info":{"authors":{"author":{"@pid":"65/9707","text":"Giuseppe Agapito"}},"title":"Computing Languages for Bioinformatics: Perl.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"176-186","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Agapito19b","doi":"10.1016/B978-0-12-809633-8.20364-6","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20364-6","url":"https://dblp.org/rec/reference/bioinf/Agapito19b"}, "url":"URL#2299706" }, { "@score":"1", "@id":"2299707", "info":{"authors":{"author":{"@pid":"65/9707","text":"Giuseppe Agapito"}},"title":"Computing Languages for Bioinformatics: BioPerl.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"187-194","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Agapito19c","doi":"10.1016/B978-0-12-809633-8.20365-8","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20365-8","url":"https://dblp.org/rec/reference/bioinf/Agapito19c"}, "url":"URL#2299707" }, { "@score":"1", "@id":"2299708", "info":{"authors":{"author":{"@pid":"65/9707","text":"Giuseppe Agapito"}},"title":"Biological Pathways.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"1047-1062","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Agapito19d","doi":"10.1016/B978-0-12-809633-8.20431-7","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20431-7","url":"https://dblp.org/rec/reference/bioinf/Agapito19d"}, "url":"URL#2299708" }, { "@score":"1", "@id":"2299709", "info":{"authors":{"author":{"@pid":"65/9707","text":"Giuseppe Agapito"}},"title":"Visualization of Biological Pathways.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"1085-1091","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Agapito19e","doi":"10.1016/B978-0-12-809633-8.20497-4","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20497-4","url":"https://dblp.org/rec/reference/bioinf/Agapito19e"}, "url":"URL#2299709" }, { "@score":"1", "@id":"2299710", "info":{"authors":{"author":[{"@pid":"240/2627","text":"Mohammed N. M. Ali"},{"@pid":"277/7515","text":"Amy Y. Then Hui"},{"@pid":"126/0517","text":"Sarinder Kaur Dhillon"}]},"title":"Challenges in Creating Online Biodiversity Repositories With Taxonomic Classification.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"1124-1130","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/AliHD19","doi":"10.1016/B978-0-12-809633-8.20199-4","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20199-4","url":"https://dblp.org/rec/reference/bioinf/AliHD19"}, "url":"URL#2299710" }, { "@score":"1", "@id":"2299711", "info":{"authors":{"author":[{"@pid":"05/8127","text":"Rubbiya Ali"},{"@pid":"277/7417","text":"Ali Naqi"},{"@pid":"98/3227","text":"Sarah Ali"},{"@pid":"238/2077","text":"Mashal Fatima"},{"@pid":"277/7357","text":"Musarat Ishaq"},{"@pid":"92/8126","text":"Ahmed M. Mehdi"}]},"title":"Statistical and Probabilistic Approaches to Predict Protein Abundance.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"847-854","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/AliNAFIM19","doi":"10.1016/B978-0-12-809633-8.20466-4","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20466-4","url":"https://dblp.org/rec/reference/bioinf/AliNAFIM19"}, "url":"URL#2299711" }, { "@score":"1", "@id":"2299712", "info":{"authors":{"author":[{"@pid":"98/3142","text":"Md. Altaf-Ul-Amin"},{"@pid":"48/1812","text":"Shigehiko Kanaya"},{"@pid":"32/8245","text":"Zeti-Azura Mohamed-Hussein"}]},"title":"Investigating Metabolic Pathways and Networks.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"489-503","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Altaf-Ul-AminKM19","doi":"10.1016/B978-0-12-809633-8.20140-4","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20140-4","url":"https://dblp.org/rec/reference/bioinf/Altaf-Ul-AminKM19"}, "url":"URL#2299712" }, { "@score":"1", "@id":"2299713", "info":{"authors":{"author":[{"@pid":"88/9414","text":"Alessia Amelio"},{"@pid":"t/AndreaTagarelli","text":"Andrea Tagarelli"}]},"title":"Data Mining: Clustering.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"437-448","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/AmelioT19","doi":"10.1016/B978-0-12-809633-8.20489-5","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20489-5","url":"https://dblp.org/rec/reference/bioinf/AmelioT19"}, "url":"URL#2299713" }, { "@score":"1", "@id":"2299714", "info":{"authors":{"author":{"@pid":"06/5612","text":"Claudia Angelini"}},"title":"Hypothesis Testing.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"691-697","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Angelini19","doi":"10.1016/B978-0-12-809633-8.20356-7","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20356-7","url":"https://dblp.org/rec/reference/bioinf/Angelini19"}, "url":"URL#2299714" }, { "@score":"1", "@id":"2299715", "info":{"authors":{"author":{"@pid":"06/5612","text":"Claudia Angelini"}},"title":"Regression Analysis.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"722-730","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Angelini19a","doi":"10.1016/B978-0-12-809633-8.20360-9","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20360-9","url":"https://dblp.org/rec/reference/bioinf/Angelini19a"}, "url":"URL#2299715" }, { "@score":"1", "@id":"2299716", "info":{"authors":{"author":{"@pid":"a/FabrizioAngiulli","text":"Fabrizio Angiulli"}},"title":"Data Mining: Outlier Detection.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"456-462","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Angiulli19","doi":"10.1016/B978-0-12-809633-8.20386-5","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20386-5","url":"https://dblp.org/rec/reference/bioinf/Angiulli19"}, "url":"URL#2299716" }, { "@score":"1", "@id":"2299717", "info":{"authors":{"author":{"@pid":"77/834","text":"Miguel Arenas"}},"title":"Applications of the Coalescent for the Evolutionary Analysis of Genetic Data.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"746-758","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Arenas19","doi":"10.1016/B978-0-12-809633-8.20260-4","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20260-4","url":"https://dblp.org/rec/reference/bioinf/Arenas19"}, "url":"URL#2299717" }, { "@score":"1", "@id":"2299718", "info":{"authors":{"author":[{"@pid":"175/1860","text":"David R. Armstrong"},{"@pid":"141/5297","text":"John M. Berrisford"},{"@pid":"13/9441","text":"Matthew J. Conroy"},{"@pid":"175/2069","text":"Alice R. Clark"},{"@pid":"97/5418","text":"Deepti Gupta"},{"@pid":"141/5279","text":"Abhik Mukhopadhyay"}]},"title":"Protein Structure Databases.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"460-471","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/ArmstrongBCCGM19","doi":"10.1016/B978-0-12-809633-8.20280-X","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20280-x","url":"https://dblp.org/rec/reference/bioinf/ArmstrongBCCGM19"}, "url":"URL#2299718" }, { "@score":"1", "@id":"2299719", "info":{"authors":{"author":[{"@pid":"a/TerriKAttwood","text":"Teresa K. Attwood"},{"@pid":"02/4204","text":"Alex L. Mitchell"}]},"title":"The Evolution of Protein Family Databases.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"34-45","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/AttwoodM19","doi":"10.1016/B978-0-12-809633-8.20268-9","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20268-9","url":"https://dblp.org/rec/reference/bioinf/AttwoodM19"}, "url":"URL#2299719" }, { "@score":"1", "@id":"2299720", "info":{"authors":{"author":{"@pid":"86/555","text":"Daniel Berrar"}},"title":"Bayes' Theorem and Naive Bayes Classifier.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"403-412","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Berrar19","doi":"10.1016/B978-0-12-809633-8.20473-1","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20473-1","url":"https://dblp.org/rec/reference/bioinf/Berrar19"}, "url":"URL#2299720" }, { "@score":"1", "@id":"2299721", "info":{"authors":{"author":{"@pid":"86/555","text":"Daniel Berrar"}},"title":"Cross-Validation.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"542-545","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Berrar19a","doi":"10.1016/B978-0-12-809633-8.20349-X","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20349-x","url":"https://dblp.org/rec/reference/bioinf/Berrar19a"}, "url":"URL#2299721" }, { "@score":"1", "@id":"2299722", "info":{"authors":{"author":{"@pid":"86/555","text":"Daniel Berrar"}},"title":"Performance Measures for Binary Classification.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"546-560","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Berrar19b","doi":"10.1016/B978-0-12-809633-8.20351-8","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20351-8","url":"https://dblp.org/rec/reference/bioinf/Berrar19b"}, "url":"URL#2299722" }, { "@score":"1", "@id":"2299723", "info":{"authors":{"author":{"@pid":"86/555","text":"Daniel Berrar"}},"title":"Introduction to the Non-Parametric Bootstrap.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"766-773","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Berrar19c","doi":"10.1016/B978-0-12-809633-8.20350-6","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20350-6","url":"https://dblp.org/rec/reference/bioinf/Berrar19c"}, "url":"URL#2299723" }, { "@score":"1", "@id":"2299724", "info":{"authors":{"author":{"@pid":"277/7580","text":"Aivett Bilbao"}},"title":"Proteomics Mass Spectrometry Data Analysis Tools.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"84-95","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Bilbao19","doi":"10.1016/B978-0-12-809633-8.20274-4","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20274-4","url":"https://dblp.org/rec/reference/bioinf/Bilbao19"}, "url":"URL#2299724" }, { "@score":"1", "@id":"2299725", "info":{"authors":{"author":[{"@pid":"139/5661","text":"Mariaconcetta Bilotta"},{"@pid":"95/1778","text":"Giuseppe Tradigo"},{"@pid":"v/PierangeloVeltri","text":"Pierangelo Veltri"}]},"title":"Bioinformatics Data Models, Representation and Storage.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"110-116","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/BilottaTV19","doi":"10.1016/B978-0-12-809633-8.20410-X","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20410-x","url":"https://dblp.org/rec/reference/bioinf/BilottaTV19"}, "url":"URL#2299725" }, { "@score":"1", "@id":"2299726", "info":{"authors":{"author":[{"@pid":"277/7668","text":"Camila Pereira Braga"},{"@pid":"54/2538","text":"Jiri Adamec"}]},"title":"Metabolome Analysis.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"463-475","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/BragaA19","doi":"10.1016/B978-0-12-809633-8.20134-9","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20134-9","url":"https://dblp.org/rec/reference/bioinf/BragaA19"}, "url":"URL#2299726" }, { "@score":"1", "@id":"2299727", "info":{"authors":{"author":[{"@pid":"90/3368","text":"Francesco Buccafurri"},{"@pid":"246/5602","text":"Vincenzo De Angelis"},{"@pid":"21/350","text":"Gianluca Lax"},{"@pid":"135/0904","text":"Serena Nicolazzo"},{"@pid":"08/7399","text":"Antonino Nocera"}]},"title":"The Challenge of Privacy in the Cloud.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"265-271","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/BuccafurriALNN19","doi":"10.1016/B978-0-12-809633-8.20379-8","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20379-8","url":"https://dblp.org/rec/reference/bioinf/BuccafurriALNN19"}, "url":"URL#2299727" }, { "@score":"1", "@id":"2299728", "info":{"authors":{"author":{"@pid":"51/2431","text":"Conrad J. Burden"}},"title":"Population Genetics.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"759-788","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Burden19","doi":"10.1016/B978-0-12-809633-8.90693-9","ee":"https://doi.org/10.1016/b978-0-12-809633-8.90693-9","url":"https://dblp.org/rec/reference/bioinf/Burden19"}, "url":"URL#2299728" }, { "@score":"1", "@id":"2299729", "info":{"authors":{"author":{"@pid":"36/2507","text":"William S. Bush"}},"title":"Genome-Wide Association Studies.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"235-241","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Bush19","doi":"10.1016/B978-0-12-809633-8.20232-X","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20232-x","url":"https://dblp.org/rec/reference/bioinf/Bush19"}, "url":"URL#2299729" }, { "@score":"1", "@id":"2299730", "info":{"authors":{"author":[{"@pid":"c/MassimoCafaro","text":"Massimo Cafaro"},{"@pid":"13/2171","text":"Italo Epicoco"},{"@pid":"22/676","text":"Marco Pulimeno"}]},"title":"Techniques for Designing Bioinformatics Algorithms.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"5-14","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/CafaroEP19","doi":"10.1016/B978-0-12-809633-8.20316-6","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20316-6","url":"https://dblp.org/rec/reference/bioinf/CafaroEP19"}, "url":"URL#2299730" }, { "@score":"1", "@id":"2299731", "info":{"authors":{"author":[{"@pid":"c/MassimoCafaro","text":"Massimo Cafaro"},{"@pid":"13/2171","text":"Italo Epicoco"},{"@pid":"22/676","text":"Marco Pulimeno"}]},"title":"Data Mining: Mining Frequent Patterns, Associations Rules, and Correlations.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"358-366","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/CafaroEP19a","doi":"10.1016/B978-0-12-809633-8.20472-X","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20472-x","url":"https://dblp.org/rec/reference/bioinf/CafaroEP19a"}, "url":"URL#2299731" }, { "@score":"1", "@id":"2299732", "info":{"authors":{"author":{"@pid":"09/9636","text":"Barbara Calabrese"}},"title":"Experimental Platforms for Extracting Biological Data: Mass Spectrometry, Microarray, Next Generation Sequencing.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"126-129","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Calabrese19","doi":"10.1016/B978-0-12-809633-8.20412-3","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20412-3","url":"https://dblp.org/rec/reference/bioinf/Calabrese19"}, "url":"URL#2299732" }, { "@score":"1", "@id":"2299733", "info":{"authors":{"author":{"@pid":"09/9636","text":"Barbara Calabrese"}},"title":"Standards and Models for Biological Data: Common Formats.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"130-136","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Calabrese19a","doi":"10.1016/B978-0-12-809633-8.20418-4","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20418-4","url":"https://dblp.org/rec/reference/bioinf/Calabrese19a"}, "url":"URL#2299733" }, { "@score":"1", "@id":"2299734", "info":{"authors":{"author":{"@pid":"09/9636","text":"Barbara Calabrese"}},"title":"Standards and Models for Biological Data: FGED and HUPO.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"137-141","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Calabrese19b","doi":"10.1016/B978-0-12-809633-8.20416-0","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20416-0","url":"https://dblp.org/rec/reference/bioinf/Calabrese19b"}, "url":"URL#2299734" }, { "@score":"1", "@id":"2299735", "info":{"authors":{"author":{"@pid":"09/9636","text":"Barbara Calabrese"}},"title":"Cloud-Based Bioinformatics Tools.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"252-256","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Calabrese19c","doi":"10.1016/B978-0-12-809633-8.20376-2","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20376-2","url":"https://dblp.org/rec/reference/bioinf/Calabrese19c"}, "url":"URL#2299735" }, { "@score":"1", "@id":"2299736", "info":{"authors":{"author":{"@pid":"09/9636","text":"Barbara Calabrese"}},"title":"Cloud-Based Bioinformatics Platforms.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"257-260","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Calabrese19d","doi":"10.1016/B978-0-12-809633-8.20377-4","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20377-4","url":"https://dblp.org/rec/reference/bioinf/Calabrese19d"}, "url":"URL#2299736" }, { "@score":"1", "@id":"2299737", "info":{"authors":{"author":{"@pid":"09/9636","text":"Barbara Calabrese"}},"title":"Cloud-Based Molecular Modeling Systems.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"261-264","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Calabrese19e","doi":"10.1016/B978-0-12-809633-8.20378-6","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20378-6","url":"https://dblp.org/rec/reference/bioinf/Calabrese19e"}, "url":"URL#2299737" }, { "@score":"1", "@id":"2299738", "info":{"authors":{"author":{"@pid":"09/9636","text":"Barbara Calabrese"}},"title":"Data Cleaning.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"472-476","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Calabrese19f","doi":"10.1016/B978-0-12-809633-8.20458-5","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20458-5","url":"https://dblp.org/rec/reference/bioinf/Calabrese19f"}, "url":"URL#2299738" }, { "@score":"1", "@id":"2299739", "info":{"authors":{"author":{"@pid":"09/9636","text":"Barbara Calabrese"}},"title":"Data Integration and Transformation.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"477-479","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Calabrese19g","doi":"10.1016/B978-0-12-809633-8.20459-7","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20459-7","url":"https://dblp.org/rec/reference/bioinf/Calabrese19g"}, "url":"URL#2299739" }, { "@score":"1", "@id":"2299740", "info":{"authors":{"author":{"@pid":"09/9636","text":"Barbara Calabrese"}},"title":"Data Reduction.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"480-485","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Calabrese19h","doi":"10.1016/B978-0-12-809633-8.20460-3","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20460-3","url":"https://dblp.org/rec/reference/bioinf/Calabrese19h"}, "url":"URL#2299740" }, { "@score":"1", "@id":"2299741", "info":{"authors":{"author":{"@pid":"09/9636","text":"Barbara Calabrese"}},"title":"Linkage Disequilibrium.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"763-765","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Calabrese19i","doi":"10.1016/B978-0-12-809633-8.20234-3","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20234-3","url":"https://dblp.org/rec/reference/bioinf/Calabrese19i"}, "url":"URL#2299741" }, { "@score":"1", "@id":"2299742", "info":{"authors":{"author":{"@pid":"20/2209","text":"Daniela De Canditiis"}},"title":"Statistical Inference Techniques.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"698-705","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Canditiis19","doi":"10.1016/B978-0-12-809633-8.20357-9","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20357-9","url":"https://dblp.org/rec/reference/bioinf/Canditiis19"}, "url":"URL#2299742" }, { "@score":"1", "@id":"2299743", "info":{"authors":{"author":[{"@pid":"c/MarioCannataro","text":"Mario Cannataro"},{"@pid":"65/9707","text":"Giuseppe Agapito"}]},"title":"Computing for Bioinformatics.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"160-175","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/CannataroA19","doi":"10.1016/B978-0-12-809633-8.20363-4","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20363-4","url":"https://dblp.org/rec/reference/bioinf/CannataroA19"}, "url":"URL#2299743" }, { "@score":"1", "@id":"2299744", "info":{"authors":{"author":[{"@pid":"277/7655","text":"David I. Cantor"},{"@pid":"76/9445","text":"Harish Reddy Cheruku"}]},"title":"Utilising IPG-IEF to Identify Differentially-Expressed Proteins.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"891-910","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/CantorC19","doi":"10.1016/B978-0-12-809633-8.20448-2","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20448-2","url":"https://dblp.org/rec/reference/bioinf/CantorC19"}, "url":"URL#2299744" }, { "@score":"1", "@id":"2299745", "info":{"authors":{"author":{"@pid":"43/7859","text":"Maria Francesca Carfora"}},"title":"Stochastic Processes.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"747-752","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Carfora19","doi":"10.1016/B978-0-12-809633-8.20362-2","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20362-2","url":"https://dblp.org/rec/reference/bioinf/Carfora19"}, "url":"URL#2299745" }, { "@score":"1", "@id":"2299746", "info":{"authors":{"author":[{"@pid":"92/7966","text":"Mauro Castelli"},{"@pid":"69/645","text":"Leonardo Vanneschi"},{"@pid":"89/8571","text":"Álvaro Rubio-Largo"}]},"title":"Supervised Learning: Classification.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"342-349","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/CastelliVR19","doi":"10.1016/B978-0-12-809633-8.20332-4","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20332-4","url":"https://dblp.org/rec/reference/bioinf/CastelliVR19"}, "url":"URL#2299746" }, { "@score":"1", "@id":"2299747", "info":{"authors":{"author":[{"@pid":"43/6861","text":"Filippo Castiglione"},{"@pid":"16/8771","text":"Emiliano Mancini"},{"@pid":"25/1395","text":"Marco Pedicini"},{"@pid":"10/5605","text":"Abdul Salam Jarrah"}]},"title":"Quantitative Modelling Approaches.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"874-883","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/CastiglioneMPJ19","doi":"10.1016/B978-0-12-809633-8.20454-8","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20454-8","url":"https://dblp.org/rec/reference/bioinf/CastiglioneMPJ19"}, "url":"URL#2299747" }, { "@score":"1", "@id":"2299748", "info":{"authors":{"author":[{"@pid":"82/288","text":"Giuseppe Cattaneo"},{"@pid":"g/RaffaeleGiancarlo","text":"Raffaele Giancarlo"},{"@pid":"41/3936","text":"Umberto Ferraro Petrillo"},{"@pid":"143/4168","text":"Gianluca Roscigno"}]},"title":"MapReduce in Computational Biology Via Hadoop and Spark.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"221-229","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/CattaneoGPR19","doi":"10.1016/B978-0-12-809633-8.20371-3","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20371-3","url":"https://dblp.org/rec/reference/bioinf/CattaneoGPR19"}, "url":"URL#2299748" }, { "@score":"1", "@id":"2299749", "info":{"authors":{"author":[{"@pid":"133/8758","text":"Francesco Cauteruccio"},{"@pid":"t/GiorgioTerracina","text":"Giorgio Terracina"},{"@pid":"u/DomenicoUrsino","text":"Domenico Ursino"}]},"title":"Algorithms for Strings and Sequences: Searching Motifs.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"15-21","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/CauteruccioTU19","doi":"10.1016/B978-0-12-809633-8.20482-2","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20482-2","url":"https://dblp.org/rec/reference/bioinf/CauteruccioTU19"}, "url":"URL#2299749" }, { "@score":"1", "@id":"2299750", "info":{"authors":{"author":[{"@pid":"201/9044","text":"Danilo Cavaliere"},{"@pid":"78/4247","text":"Sabrina Senatore"},{"@pid":"35/3222","text":"Vincenzo Loia"}]},"title":"Data-Information-Concept Continuum From a Text Mining Perspective.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"586-601","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/CavaliereSL19","doi":"10.1016/B978-0-12-809633-8.20408-1","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20408-1","url":"https://dblp.org/rec/reference/bioinf/CavaliereSL19"}, "url":"URL#2299750" }, { "@score":"1", "@id":"2299751", "info":{"authors":{"author":[{"@pid":"277/7376","text":"Balakumar Chandrasekaran"},{"@pid":"130/3870","text":"Nikhil Agrawal"},{"@pid":"226/7299","text":"Sandeep Kaushik"}]},"title":"Pharmacophore Development.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"677-687","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/ChandrasekaranAK19","doi":"10.1016/B978-0-12-809633-8.20276-8","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20276-8","url":"https://dblp.org/rec/reference/bioinf/ChandrasekaranAK19"}, "url":"URL#2299751" }, { "@score":"1", "@id":"2299752", "info":{"authors":{"author":{"@pid":"95/6354","text":"Michael A. Charleston"}},"title":"Molecular Phylogenetics.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"700-711","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Charleston19","doi":"10.1016/B978-0-12-809633-8.20675-4","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20675-4","url":"https://dblp.org/rec/reference/bioinf/Charleston19"}, "url":"URL#2299752" }, { "@score":"1", "@id":"2299753", "info":{"authors":{"author":[{"@pid":"116/6817","text":"Jieming Chen"},{"@pid":"261/4570","text":"Akdes Serin Harmanci"},{"@pid":"18/7105","text":"Arif Ozgun Harmanci"}]},"title":"Detecting and Annotating Rare Variants.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"388-399","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/ChenHH19","doi":"10.1016/B978-0-12-809633-8.20121-0","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20121-0","url":"https://dblp.org/rec/reference/bioinf/ChenHH19"}, "url":"URL#2299753" }, { "@score":"1", "@id":"2299754", "info":{"authors":{"author":[{"@pid":"01/5394-21","text":"Liang Chen 0021"},{"@pid":"84/5873","text":"Garry Wong"}]},"title":"Transcriptome Informatics.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"324-340","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/ChenW19","doi":"10.1016/B978-0-12-809633-8.20204-5","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20204-5","url":"https://dblp.org/rec/reference/bioinf/ChenW19"}, "url":"URL#2299754" }, { "@score":"1", "@id":"2299755", "info":{"authors":{"author":[{"@pid":"25/9512","text":"Davide Chicco"},{"@pid":"32/1035","text":"Marco Masseroli"}]},"title":"Biological and Medical Ontologies: Protein Ontology (PRO).","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"832-837","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/ChiccoM19","doi":"10.1016/B978-0-12-809633-8.20396-8","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20396-8","url":"https://dblp.org/rec/reference/bioinf/ChiccoM19"}, "url":"URL#2299755" }, { "@score":"1", "@id":"2299756", "info":{"authors":{"author":[{"@pid":"123/7345","text":"Sy Bing Choi"},{"@pid":"277/7746","text":"Beow Keat Yap"},{"@pid":"141/0355","text":"Yee-Siew Choong"},{"@pid":"03/5922","text":"Habibah A. Wahab"}]},"title":"Molecular Dynamics Simulations in Drug Discovery.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"652-665","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/ChoiYCW19","doi":"10.1016/B978-0-12-809633-8.20154-4","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20154-4","url":"https://dblp.org/rec/reference/bioinf/ChoiYCW19"}, "url":"URL#2299756" }, { "@score":"1", "@id":"2299757", "info":{"authors":{"author":[{"@pid":"277/7323","text":"Li C. Chong"},{"@pid":"10/8247","text":"Asif M. Khan"}]},"title":"Vaccine Target Discovery.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"241-251","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/ChongK19","doi":"10.1016/B978-0-12-809633-8.20100-3","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20100-3","url":"https://dblp.org/rec/reference/bioinf/ChongK19"}, "url":"URL#2299757" }, { "@score":"1", "@id":"2299758", "info":{"authors":{"author":[{"@pid":"32/4393","text":"Alan Christoffels"},{"@pid":"160/3544","text":"Peter van Heusden"}]},"title":"Genome Annotation: Perspective From Bacterial Genomes.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"152-156","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/ChristoffelsH19","doi":"10.1016/B978-0-12-809633-8.20092-7","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20092-7","url":"https://dblp.org/rec/reference/bioinf/ChristoffelsH19"}, "url":"URL#2299758" }, { "@score":"1", "@id":"2299759", "info":{"authors":{"author":[{"@pid":"121/1371","text":"Pietro Cinaglia"},{"@pid":"165/9033","text":"Domenico Mirarchi"},{"@pid":"v/PierangeloVeltri","text":"Pierangelo Veltri"}]},"title":"Information Retrieval in Life Sciences.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"1104-1108","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/CinagliaMV19","doi":"10.1016/B978-0-12-809633-8.20390-7","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20390-7","url":"https://dblp.org/rec/reference/bioinf/CinagliaMV19"}, "url":"URL#2299759" }, { "@score":"1", "@id":"2299760", "info":{"authors":{"author":[{"@pid":"58/2715","text":"Francisco M. Couto"},{"@pid":"146/5036","text":"Andre Lamurias"}]},"title":"Semantic Similarity Definition.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"870-876","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/CoutoL19","doi":"10.1016/B978-0-12-809633-8.20401-9","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20401-9","url":"https://dblp.org/rec/reference/bioinf/CoutoL19"}, "url":"URL#2299760" }, { "@score":"1", "@id":"2299761", "info":{"authors":{"author":[{"@pid":"96/3307","text":"Xuefeng Cui"},{"@pid":"234/3816","text":"Yaosen Min"}]},"title":"Homologous Protein Detection.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"697-705","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/CuiM19","doi":"10.1016/B978-0-12-809633-8.90698-8","ee":"https://doi.org/10.1016/b978-0-12-809633-8.90698-8","url":"https://dblp.org/rec/reference/bioinf/CuiM19"}, "url":"URL#2299761" }, { "@score":"1", "@id":"2299762", "info":{"authors":{"author":{"@pid":"32/6082","text":"Luisa Cutillo"}},"title":"Parametric and Multivariate Methods.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"738-746","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Cutillo19","doi":"10.1016/B978-0-12-809633-8.20335-X","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20335-x","url":"https://dblp.org/rec/reference/bioinf/Cutillo19"}, "url":"URL#2299762" }, { "@score":"1", "@id":"2299763", "info":{"authors":{"author":[{"@pid":"124/1438","text":"Natalie L. Dawson"},{"@pid":"141/5376","text":"Sayoni Das"},{"@pid":"31/1012","text":"Jonathan G. Lees"},{"@pid":"71/4733","text":"Christine A. Orengo"}]},"title":"Protein Structure Classification.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"472-487","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/DawsonDLO19","doi":"10.1016/B978-0-12-809633-8.20281-1","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20281-1","url":"https://dblp.org/rec/reference/bioinf/DawsonDLO19"}, "url":"URL#2299763" }, { "@score":"1", "@id":"2299764", "info":{"authors":{"author":[{"@pid":"277/7470","text":"Wayne K. Dawson"},{"@pid":"44/9062","text":"Michal Lazniewski"},{"@pid":"56/812","text":"Dariusz Plewczynski"}]},"title":"Chromatin: A Semi-Structured Polymer.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"288-307","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/DawsonLP19","doi":"10.1016/B978-0-12-809633-8.20240-9","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20240-9","url":"https://dblp.org/rec/reference/bioinf/DawsonLP19"}, "url":"URL#2299764" }, { "@score":"1", "@id":"2299765", "info":{"authors":{"author":[{"@pid":"23/6298","text":"Saravanan Dayalan"},{"@pid":"09/7111","text":"Jianguo Xia"},{"@pid":"277/7651","text":"Rachel A. Spicer"},{"@pid":"124/1415","text":"Reza M. Salek"},{"@pid":"123/5934","text":"Ute Roessner"}]},"title":"Metabolome Analysis.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"396-409","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/DayalanXSSR19","doi":"10.1016/B978-0-12-809633-8.20251-3","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20251-3","url":"https://dblp.org/rec/reference/bioinf/DayalanXSSR19"}, "url":"URL#2299765" }, { "@score":"1", "@id":"2299766", "info":{"authors":{"author":{"@pid":"277/7739","text":"Marc Delord"}},"title":"Differential Expression From Microarray and RNA-seq Experiments.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"372-387","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Delord19","doi":"10.1016/B978-0-12-809633-8.20211-2","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20211-2","url":"https://dblp.org/rec/reference/bioinf/Delord19"}, "url":"URL#2299766" }, { "@score":"1", "@id":"2299767", "info":{"authors":{"author":[{"@pid":"143/7862","text":"Jaspreet Kaur Dhanjal"},{"@pid":"160/6930","text":"Vidhi Malik"},{"@pid":"277/7728","text":"Navaneethan Radhakrishnan"},{"@pid":"277/7550","text":"Moolchand Sigar"},{"@pid":"277/7112","text":"Anjani Kumari"},{"@pid":"47/7122","text":"Durai Sundar"}]},"title":"Computational Protein Engineering Approaches for Effective Design of New Molecules.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"631-643","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/DhanjalMRSKS19","doi":"10.1016/B978-0-12-809633-8.20150-7","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20150-7","url":"https://dblp.org/rec/reference/bioinf/DhanjalMRSKS19"}, "url":"URL#2299767" }, { "@score":"1", "@id":"2299768", "info":{"authors":{"author":{"@pid":"126/0517","text":"Sarinder Kaur Dhillon"}},"title":"Biological Databases.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"96-117","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Dhillon19","doi":"10.1016/B978-0-12-809633-8.20198-2","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20198-2","url":"https://dblp.org/rec/reference/bioinf/Dhillon19"}, "url":"URL#2299768" }, { "@score":"1", "@id":"2299769", "info":{"authors":{"author":{"@pid":"35/8728","text":"Socrates Dokos"}},"title":"Multi-Scale Modelling in Biology.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"900-905","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Dokos19","doi":"10.1016/B978-0-12-809633-8.20300-2","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20300-2","url":"https://dblp.org/rec/reference/bioinf/Dokos19"}, "url":"URL#2299769" }, { "@score":"1", "@id":"2299770", "info":{"authors":{"author":[{"@pid":"59/1669","text":"Riccardo Dondi"},{"@pid":"79/4374","text":"Giancarlo Mauri"},{"@pid":"50/3639","text":"Italo Zoppis"}]},"title":"Graph Isomorphism.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"933-939","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/DondiMZ19","doi":"10.1016/B978-0-12-809633-8.20423-8","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20423-8","url":"https://dblp.org/rec/reference/bioinf/DondiMZ19"}, "url":"URL#2299770" }, { "@score":"1", "@id":"2299771", "info":{"authors":{"author":[{"@pid":"59/1669","text":"Riccardo Dondi"},{"@pid":"79/4374","text":"Giancarlo Mauri"},{"@pid":"50/3639","text":"Italo Zoppis"}]},"title":"Graph Algorithms.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"940-949","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/DondiMZ19a","doi":"10.1016/B978-0-12-809633-8.20424-X","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20424-x","url":"https://dblp.org/rec/reference/bioinf/DondiMZ19a"}, "url":"URL#2299771" }, { "@score":"1", "@id":"2299772", "info":{"authors":{"author":{"@pid":"74/5582","text":"Richard J. Edwards"}},"title":"Phylogenetic Tree Rooting.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"727-735","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Edwards19","doi":"10.1016/B978-0-12-809633-8.20258-6","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20258-6","url":"https://dblp.org/rec/reference/bioinf/Edwards19"}, "url":"URL#2299772" }, { "@score":"1", "@id":"2299773", "info":{"authors":{"author":[{"@pid":"277/7110","text":"Christine L. P. Eng"},{"@pid":"33/1961","text":"Tin Wee Tan"},{"@pid":"81/4605","text":"Joo Chuan Tong"}]},"title":"Immunoinformatics Databases.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"931-939","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/EngTT19","doi":"10.1016/B978-0-12-809633-8.20469-X","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20469-x","url":"https://dblp.org/rec/reference/bioinf/EngTT19"}, "url":"URL#2299773" }, { "@score":"1", "@id":"2299774", "info":{"authors":{"author":{"@pid":"46/6025","text":"Giuseppe Di Fatta"}},"title":"Association Rules and Frequent Patterns.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"367-373","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Fatta19","doi":"10.1016/B978-0-12-809633-8.20333-6","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20333-6","url":"https://dblp.org/rec/reference/bioinf/Fatta19"}, "url":"URL#2299774" }, { "@score":"1", "@id":"2299775", "info":{"authors":{"author":{"@pid":"61/4830","text":"Italia De Feis"}},"title":"Dimensionality Reduction.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"486-494","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Feis19","doi":"10.1016/B978-0-12-809633-8.20336-1","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20336-1","url":"https://dblp.org/rec/reference/bioinf/Feis19"}, "url":"URL#2299775" }, { "@score":"1", "@id":"2299776", "info":{"authors":{"author":{"@pid":"43/3753","text":"Valeria Fionda"}},"title":"Networks in Biology.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"915-921","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Fionda19","doi":"10.1016/B978-0-12-809633-8.20420-2","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20420-2","url":"https://dblp.org/rec/reference/bioinf/Fionda19"}, "url":"URL#2299776" }, { "@score":"1", "@id":"2299777", "info":{"authors":{"author":[{"@pid":"43/3753","text":"Valeria Fionda"},{"@pid":"50/96","text":"Giuseppe Pirrò"}]},"title":"Ontology: Definition Languages.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"790-799","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/FiondaP19","doi":"10.1016/B978-0-12-809633-8.20393-2","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20393-2","url":"https://dblp.org/rec/reference/bioinf/FiondaP19"}, "url":"URL#2299777" }, { "@score":"1", "@id":"2299778", "info":{"authors":{"author":[{"@pid":"43/3753","text":"Valeria Fionda"},{"@pid":"50/96","text":"Giuseppe Pirrò"}]},"title":"Ontology: Querying Languages and Development.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"800-808","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/FiondaP19a","doi":"10.1016/B978-0-12-809633-8.20394-4","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20394-4","url":"https://dblp.org/rec/reference/bioinf/FiondaP19a"}, "url":"URL#2299778" }, { "@score":"1", "@id":"2299779", "info":{"authors":{"author":[{"@pid":"189/0035","text":"Edson Luiz Folador"},{"@pid":"74/11214","text":"Sandeep Tiwari"},{"@pid":"277/7076","text":"Camila E. Da Paz Barbosa"},{"@pid":"277/7595","text":"Syed B. Jamal"},{"@pid":"277/7483","text":"Marco Da Costa Schulze"},{"@pid":"81/8970","text":"Debmalya Barh"},{"@pid":"98/11252","text":"Vasco Ariston de Carvalho Azevedo"}]},"title":"Protein-Protein Interactions: An Overview.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"821-833","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/FoladorTBJSBA19","doi":"10.1016/B978-0-12-809633-8.20292-6","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20292-6","url":"https://dblp.org/rec/reference/bioinf/FoladorTBJSBA19"}, "url":"URL#2299779" }, { "@score":"1", "@id":"2299780", "info":{"authors":{"author":[{"@pid":"219/1350","text":"Monica Franzese"},{"@pid":"138/4762","text":"Antonella Iuliano"}]},"title":"Descriptive Statistics.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"672-684","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/FranzeseI19","doi":"10.1016/B978-0-12-809633-8.20354-3","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20354-3","url":"https://dblp.org/rec/reference/bioinf/FranzeseI19"}, "url":"URL#2299780" }, { "@score":"1", "@id":"2299781", "info":{"authors":{"author":[{"@pid":"219/1350","text":"Monica Franzese"},{"@pid":"138/4762","text":"Antonella Iuliano"}]},"title":"Correlation Analysis.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"706-721","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/FranzeseI19a","doi":"10.1016/B978-0-12-809633-8.20358-0","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20358-0","url":"https://dblp.org/rec/reference/bioinf/FranzeseI19a"}, "url":"URL#2299781" }, { "@score":"1", "@id":"2299782", "info":{"authors":{"author":[{"@pid":"219/1350","text":"Monica Franzese"},{"@pid":"138/4762","text":"Antonella Iuliano"}]},"title":"Hidden Markov Models.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"753-762","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/FranzeseI19b","doi":"10.1016/B978-0-12-809633-8.20488-3","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20488-3","url":"https://dblp.org/rec/reference/bioinf/FranzeseI19b"}, "url":"URL#2299782" }, { "@score":"1", "@id":"2299783", "info":{"authors":{"author":[{"@pid":"162/7475","text":"Michele Fratello"},{"@pid":"69/6674","text":"Roberto Tagliaferri"}]},"title":"Decision Trees and Random Forests.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"374-383","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/FratelloT19","doi":"10.1016/B978-0-12-809633-8.20337-3","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20337-3","url":"https://dblp.org/rec/reference/bioinf/FratelloT19"}, "url":"URL#2299783" }, { "@score":"1", "@id":"2299784", "info":{"authors":{"author":[{"@pid":"168/6104","text":"Paola Galdi"},{"@pid":"69/6674","text":"Roberto Tagliaferri"}]},"title":"Data Mining: Accuracy and Error Measures for Classification and Prediction.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"431-436","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/GaldiT19","doi":"10.1016/B978-0-12-809633-8.20474-3","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20474-3","url":"https://dblp.org/rec/reference/bioinf/GaldiT19"}, "url":"URL#2299784" }, { "@score":"1", "@id":"2299785", "info":{"authors":{"author":[{"@pid":"45/6665","text":"Alfredo Garro"},{"@pid":"m/MaxMuhlhauser","text":"Max Mühlhäuser"},{"@pid":"23/10589","text":"Andrea Tundis"},{"@pid":"65/964-1","text":"Stefano Mariani 0001"},{"@pid":"o/AndreaOmicini","text":"Andrea Omicini"},{"@pid":"19/1650","text":"Giuseppe Vizzari"}]},"title":"Intelligent Agents and Environment.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"309-314","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/GarroMT0OV19","doi":"10.1016/B978-0-12-809633-8.20327-0","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20327-0","url":"https://dblp.org/rec/reference/bioinf/GarroMT0OV19"}, "url":"URL#2299785" }, { "@score":"1", "@id":"2299786", "info":{"authors":{"author":[{"@pid":"45/6665","text":"Alfredo Garro"},{"@pid":"m/MaxMuhlhauser","text":"Max Mühlhäuser"},{"@pid":"23/10589","text":"Andrea Tundis"},{"@pid":"b/MatteoBaldoni","text":"Matteo Baldoni"},{"@pid":"b/CristinaBaroglio","text":"Cristina Baroglio"},{"@pid":"02/6554","text":"Federico Bergenti"},{"@pid":"t/PaoloTorroni","text":"Paolo Torroni"}]},"title":"Intelligent Agents: Multi-Agent Systems.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"315-320","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/GarroMTBBBT19","doi":"10.1016/B978-0-12-809633-8.20328-2","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20328-2","url":"https://dblp.org/rec/reference/bioinf/GarroMTBBBT19"}, "url":"URL#2299786" }, { "@score":"1", "@id":"2299787", "info":{"authors":{"author":{"@pid":"38/2033","text":"Pascale Gaudet"}},"title":"The Gene Ontology.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"1-7","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Gaudet19","doi":"10.1016/B978-0-12-809633-8.20500-1","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20500-1","url":"https://dblp.org/rec/reference/bioinf/Gaudet19"}, "url":"URL#2299787" }, { "@score":"1", "@id":"2299788", "info":{"authors":{"author":[{"@pid":"277/7171","text":"Nur S. A. Ghani"},{"@pid":"91/4733","text":"Mohd Firdaus Raih"},{"@pid":"52/5068","text":"Shandar Ahmad"}]},"title":"Computational Prediction of Nucleic Acid Binding Residues From Sequence.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"678-687","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/GhaniRA19","doi":"10.1016/B978-0-12-809633-8.20662-6","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20662-6","url":"https://dblp.org/rec/reference/bioinf/GhaniRA19"}, "url":"URL#2299788" }, { "@score":"1", "@id":"2299789", "info":{"authors":{"author":[{"@pid":"54/4241","text":"Arpita Ghosh"},{"@pid":"209/1550","text":"Aditya Mehta"},{"@pid":"10/8247","text":"Asif M. Khan"}]},"title":"Metagenomic Analysis and its Applications.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"184-193","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/GhoshMK19","doi":"10.1016/B978-0-12-809633-8.20178-7","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20178-7","url":"https://dblp.org/rec/reference/bioinf/GhoshMK19"}, "url":"URL#2299789" }, { "@score":"1", "@id":"2299790", "info":{"authors":{"author":[{"@pid":"g/RaffaeleGiancarlo","text":"Raffaele Giancarlo"},{"@pid":"249/9867","text":"Daniele Greco"},{"@pid":"248/8536","text":"Francesco Landolina"},{"@pid":"r/SimonaERombo","text":"Simona E. Rombo"}]},"title":"Network Centralities and Node Ranking.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"950-957","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/GiancarloGLR19","doi":"10.1016/B978-0-12-809633-8.20425-1","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20425-1","url":"https://dblp.org/rec/reference/bioinf/GiancarloGLR19"}, "url":"URL#2299790" }, { "@score":"1", "@id":"2299791", "info":{"authors":{"author":[{"@pid":"g/RaffaeleGiancarlo","text":"Raffaele Giancarlo"},{"@pid":"08/2475","text":"Filippo Utro"}]},"title":"Computation Cluster Validation in the Big Data Era.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"449-455","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/GiancarloU19","doi":"10.1016/B978-0-12-809633-8.20385-3","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20385-3","url":"https://dblp.org/rec/reference/bioinf/GiancarloU19"}, "url":"URL#2299791" }, { "@score":"1", "@id":"2299792", "info":{"authors":{"author":[{"@pid":"207/5539","text":"Paolo Lo Giudice"},{"@pid":"u/DomenicoUrsino","text":"Domenico Ursino"}]},"title":"Algorithms for Graph and Network Analysis: Graph Indexes/Descriptors.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"81-88","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/GiudiceU19","doi":"10.1016/B978-0-12-809633-8.20322-1","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20322-1","url":"https://dblp.org/rec/reference/bioinf/GiudiceU19"}, "url":"URL#2299792" }, { "@score":"1", "@id":"2299793", "info":{"authors":{"author":[{"@pid":"207/5539","text":"Paolo Lo Giudice"},{"@pid":"u/DomenicoUrsino","text":"Domenico Ursino"}]},"title":"Algorithms for Graph and Network Analysis: Traversing/Searching/Sampling Graphs.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"89-94","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/GiudiceU19a","doi":"10.1016/B978-0-12-809633-8.20323-3","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20323-3","url":"https://dblp.org/rec/reference/bioinf/GiudiceU19a"}, "url":"URL#2299793" }, { "@score":"1", "@id":"2299794", "info":{"authors":{"author":{"@pid":"49/659","text":"Martin Golebiewski"}},"title":"Data Formats for Systems Biology and Quantitative Modeling.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"884-893","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Golebiewski19","doi":"10.1016/B978-0-12-809633-8.20471-8","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20471-8","url":"https://dblp.org/rec/reference/bioinf/Golebiewski19"}, "url":"URL#2299794" }, { "@score":"1", "@id":"2299795", "info":{"authors":{"author":[{"@pid":"258/4890","text":"Marta Gomez-Perosanz"},{"@pid":"166/8770","text":"Giulia Russo"},{"@pid":"277/7512","text":"Jose Luis Sanchez-Trincado Lopez"},{"@pid":"24/4958","text":"Marzio Pennisi"},{"@pid":"38/3546","text":"Pedro A. Reche"},{"@pid":"40/5534","text":"Adrian J. Shepherd"},{"@pid":"f/FPappalardo","text":"Francesco Pappalardo 0001"}]},"title":"Computational Immunogenetics.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"906-930","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Gomez-PerosanzRLPRS019","doi":"10.1016/B978-0-12-809633-8.20452-4","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20452-4","url":"https://dblp.org/rec/reference/bioinf/Gomez-PerosanzRLPRS019"}, "url":"URL#2299795" }, { "@score":"1", "@id":"2299796", "info":{"authors":{"author":{"@pid":"22/4682","text":"Madhu Goyal"}},"title":"Genome Databases and Browsers for Cancer.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"1077-1082","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Goyal19","doi":"10.1016/B978-0-12-809633-8.20235-5","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20235-5","url":"https://dblp.org/rec/reference/bioinf/Goyal19"}, "url":"URL#2299796" }, { "@score":"1", "@id":"2299797", "info":{"authors":{"author":[{"@pid":"17/1770","text":"Gianluigi Greco"},{"@pid":"30/5454","text":"Marco Manna"},{"@pid":"r/FrancescoRicca","text":"Francesco Ricca"}]},"title":"Ontology: Introduction.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"785-789","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/GrecoMR19","doi":"10.1016/B978-0-12-809633-8.20392-0","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20392-0","url":"https://dblp.org/rec/reference/bioinf/GrecoMR19"}, "url":"URL#2299797" }, { "@score":"1", "@id":"2299798", "info":{"authors":{"author":{"@pid":"99/1651","text":"Michael Gribskov"}},"title":"Identification of Sequence Patterns, Motifs and Domains.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"332-340","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Gribskov19","doi":"10.1016/B978-0-12-809633-8.20498-6","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20498-6","url":"https://dblp.org/rec/reference/bioinf/Gribskov19"}, "url":"URL#2299798" }, { "@score":"1", "@id":"2299799", "info":{"authors":{"author":[{"@pid":"07/1037","text":"M. Michael Gromiha"},{"@pid":"277/7687","text":"Raju Nagarajan"},{"@pid":"64/974","text":"Samuel Selvaraj"}]},"title":"Protein Structural Bioinformatics: An Overview.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"445-459","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/GromihaNS19","doi":"10.1016/B978-0-12-809633-8.20278-1","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20278-1","url":"https://dblp.org/rec/reference/bioinf/GromihaNS19"}, "url":"URL#2299799" }, { "@score":"1", "@id":"2299800", "info":{"authors":{"author":[{"@pid":"41/7251","text":"Massimo Guarascio 0001"},{"@pid":"m/GiuseppeManco-1","text":"Giuseppe Manco 0001"},{"@pid":"67/4235","text":"Ettore Ritacco"}]},"title":"Knowledge Discovery in Databases.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"336-341","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Guarascio0R19","doi":"10.1016/B978-0-12-809633-8.20456-1","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20456-1","url":"https://dblp.org/rec/reference/bioinf/Guarascio0R19"}, "url":"URL#2299800" }, { "@score":"1", "@id":"2299801", "info":{"authors":{"author":[{"@pid":"41/7251","text":"Massimo Guarascio 0001"},{"@pid":"m/GiuseppeManco-1","text":"Giuseppe Manco 0001"},{"@pid":"67/4235","text":"Ettore Ritacco"}]},"title":"Deep Learning.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"634-647","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Guarascio0R19a","doi":"10.1016/B978-0-12-809633-8.20352-X","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20352-x","url":"https://dblp.org/rec/reference/bioinf/Guarascio0R19a"}, "url":"URL#2299801" }, { "@score":"1", "@id":"2299802", "info":{"authors":{"author":[{"@pid":"41/7251","text":"Massimo Guarascio 0001"},{"@pid":"m/GiuseppeManco-1","text":"Giuseppe Manco 0001"},{"@pid":"67/4235","text":"Ettore Ritacco"}]},"title":"Network Models.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"968-977","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Guarascio0R19b","doi":"10.1016/B978-0-12-809633-8.20427-5","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20427-5","url":"https://dblp.org/rec/reference/bioinf/Guarascio0R19b"}, "url":"URL#2299802" }, { "@score":"1", "@id":"2299803", "info":{"authors":{"author":{"@pid":"60/161","text":"Pietro Hiram Guzzi"}},"title":"Algorithms for Strings and Sequences: Multiple Alignment.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"30-31","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Guzzi19","doi":"10.1016/B978-0-12-809633-8.20318-X","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20318-x","url":"https://dblp.org/rec/reference/bioinf/Guzzi19"}, "url":"URL#2299803" }, { "@score":"1", "@id":"2299804", "info":{"authors":{"author":{"@pid":"60/161","text":"Pietro H. Guzzi"}},"title":"Computing Languages for Bioinformatics: Python.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"195-198","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Guzzi19a","doi":"10.1016/B978-0-12-809633-8.20366-X","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20366-x","url":"https://dblp.org/rec/reference/bioinf/Guzzi19a"}, "url":"URL#2299804" }, { "@score":"1", "@id":"2299805", "info":{"authors":{"author":{"@pid":"60/161","text":"Pietro H. Guzzi"}},"title":"Computing Languages for Bioinformatics: Java.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"206-208","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Guzzi19b","doi":"10.1016/B978-0-12-809633-8.20368-3","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20368-3","url":"https://dblp.org/rec/reference/bioinf/Guzzi19b"}, "url":"URL#2299805" }, { "@score":"1", "@id":"2299806", "info":{"authors":{"author":{"@pid":"60/161","text":"Pietro H. Guzzi"}},"title":"Ontology in Bioinformatics.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"809-812","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Guzzi19c","doi":"10.1016/B978-0-12-809633-8.20490-1","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20490-1","url":"https://dblp.org/rec/reference/bioinf/Guzzi19c"}, "url":"URL#2299806" }, { "@score":"1", "@id":"2299807", "info":{"authors":{"author":{"@pid":"60/161","text":"Pietro H. Guzzi"}},"title":"Ontology-Based Annotation Methods.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"867-869","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Guzzi19d","doi":"10.1016/B978-0-12-809633-8.20400-7","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20400-7","url":"https://dblp.org/rec/reference/bioinf/Guzzi19d"}, "url":"URL#2299807" }, { "@score":"1", "@id":"2299808", "info":{"authors":{"author":{"@pid":"60/161","text":"Pietro H. Guzzi"}},"title":"Functional Enrichment Analysis Methods.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"896-897","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Guzzi19e","doi":"10.1016/B978-0-12-809633-8.20404-4","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20404-4","url":"https://dblp.org/rec/reference/bioinf/Guzzi19e"}, "url":"URL#2299808" }, { "@score":"1", "@id":"2299809", "info":{"authors":{"author":{"@pid":"18/3019","text":"Antonella Guzzo"}},"title":"Data Storage and Representation.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"117-125","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Guzzo19","doi":"10.1016/B978-0-12-809633-8.20411-1","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20411-1","url":"https://dblp.org/rec/reference/bioinf/Guzzo19"}, "url":"URL#2299809" }, { "@score":"1", "@id":"2299810", "info":{"authors":{"author":[{"@pid":"164/0264","text":"Molly A. Hall"},{"@pid":"198/1586","text":"Brian S. Cole"},{"@pid":"07/315","text":"Jason H. Moore"}]},"title":"Gene-Gene Interactions: An Essential Component to Modeling Complexity for Precision Medicine.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"171-177","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/HallCM19","doi":"10.1016/B978-0-12-809633-8.20213-6","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20213-6","url":"https://dblp.org/rec/reference/bioinf/HallCM19"}, "url":"URL#2299810" }, { "@score":"1", "@id":"2299811", "info":{"authors":{"author":[{"@pid":"124/1147","text":"Hazrina Yusof Hamdani"},{"@pid":"277/7632","text":"Zatil H. Yahaya"},{"@pid":"91/4733","text":"Mohd Firdaus Raih"}]},"title":"Predicting RNA-RNA Interactions in Three-Dimensional Structures.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"546-553","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/HamdaniYR19","doi":"10.1016/B978-0-12-809633-8.20142-8","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20142-8","url":"https://dblp.org/rec/reference/bioinf/HamdaniYR19"}, "url":"URL#2299811" }, { "@score":"1", "@id":"2299812", "info":{"authors":{"author":[{"@pid":"19/3011-8","text":"Xu Han 0008"},{"@pid":"32/228","text":"Chee Keong Kwoh 0001"}]},"title":"Natural Language Processing Approaches in Bioinformatics.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"561-574","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Han019","doi":"10.1016/B978-0-12-809633-8.20463-9","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20463-9","url":"https://dblp.org/rec/reference/bioinf/Han019"}, "url":"URL#2299812" }, { "@score":"1", "@id":"2299813", "info":{"authors":{"author":[{"@pid":"163/6056","text":"Xusi Han"},{"@pid":"01/10357","text":"Woong-Hee Shin"},{"@pid":"163/6080","text":"Charles Christoffer"},{"@pid":"122/8797","text":"Genki Terashi"},{"@pid":"277/7067","text":"Lyman Monroe"},{"@pid":"13/915","text":"Daisuke Kihara"}]},"title":"Study of the Variability of the Native Protein Structure.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"606-619","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/HanSCTMK19","doi":"10.1016/B978-0-12-809633-8.20148-9","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20148-9","url":"https://dblp.org/rec/reference/bioinf/HanSCTMK19"}, "url":"URL#2299813" }, { "@score":"1", "@id":"2299814", "info":{"authors":{"author":[{"@pid":"212/0141","text":"Ari Hardianto"},{"@pid":"141/3358","text":"Muhammad Yusuf"},{"@pid":"64/1350-36","text":"Fei Liu 0036"},{"@pid":"r/ShobaRanganathan","text":"Shoba Ranganathan"}]},"title":"Structure-Based Drug Design Workflow.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"273-282","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/HardiantoY0R19","doi":"10.1016/B978-0-12-809633-8.20104-0","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20104-0","url":"https://dblp.org/rec/reference/bioinf/HardiantoY0R19"}, "url":"URL#2299814" }, { "@score":"1", "@id":"2299815", "info":{"authors":{"author":[{"@pid":"187/4457","text":"Ranjeev Hari"},{"@pid":"277/7749","text":"Suhanya Parthasarathy"}]},"title":"Next Generation Sequencing Data Analysis.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"157-163","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/HariP19","doi":"10.1016/B978-0-12-809633-8.20093-9","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20093-9","url":"https://dblp.org/rec/reference/bioinf/HariP19"}, "url":"URL#2299815" }, { "@score":"1", "@id":"2299816", "info":{"authors":{"author":[{"@pid":"187/4457","text":"Ranjeev Hari"},{"@pid":"277/7749","text":"Suhanya Parthasarathy"}]},"title":"Prediction of Coding and Non-Coding RNA.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"230-240","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/HariP19a","doi":"10.1016/B978-0-12-809633-8.20099-X","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20099-x","url":"https://dblp.org/rec/reference/bioinf/HariP19a"}, "url":"URL#2299816" }, { "@score":"1", "@id":"2299817", "info":{"authors":{"author":[{"@pid":"277/7416","text":"Marwa S. Hassan"},{"@pid":"150/1627","text":"Abdalhameed A. Shaalan"},{"@pid":"76/2326","text":"Moawad I. Dessouky"},{"@pid":"255/1262","text":"Abdelaziz Elsaid Abdelnaiem"},{"@pid":"277/7488","text":"Dalia A. Abdel-Haleem"},{"@pid":"93/10624","text":"Mahmoud ElHefnawi"}]},"title":"Predicting Non-Synonymous Single Nucleotide Variants Pathogenic Effects in Human Diseases.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"400-409","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/HassanSDAAE19","doi":"10.1016/B978-0-12-809633-8.90692-7","ee":"https://doi.org/10.1016/b978-0-12-809633-8.90692-7","url":"https://dblp.org/rec/reference/bioinf/HassanSDAAE19"}, "url":"URL#2299817" }, { "@score":"1", "@id":"2299818", "info":{"authors":{"author":[{"@pid":"128/0192","text":"Anne-Christin Hauschild"},{"@pid":"146/9092","text":"Chiara Pastrello"},{"@pid":"213/7009","text":"Andrea E. M. Rossos"},{"@pid":"27/4777","text":"Igor Jurisica"}]},"title":"Visualization of Biomedical Networks.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"1016-1035","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/HauschildPRJ19","doi":"10.1016/B978-0-12-809633-8.20430-5","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20430-5","url":"https://dblp.org/rec/reference/bioinf/HauschildPRJ19"}, "url":"URL#2299818" }, { "@score":"1", "@id":"2299819", "info":{"authors":{"author":[{"@pid":"277/7102","text":"Petter Holland"},{"@pid":"03/6254","text":"Jens Nielsen"},{"@pid":"221/6893","text":"Thierry D. G. A. Mondeel"},{"@pid":"97/2198","text":"Matteo Barberis"}]},"title":"Coupling Cell Division to Metabolic Pathways Through Transcription.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"74-93","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/HollandNMB19","doi":"10.1016/B978-0-12-809633-8.20081-2","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20081-2","url":"https://dblp.org/rec/reference/bioinf/HollandNMB19"}, "url":"URL#2299819" }, { "@score":"1", "@id":"2299820", "info":{"authors":{"author":[{"@pid":"00/1879","text":"Xiaojing Huo"},{"@pid":"277/7636","text":"Jeremy Ng"},{"@pid":"277/7466","text":"Mingchen Tan"},{"@pid":"49/7063","text":"Greg Tucker-Kellogg"}]},"title":"Genome-Wide Probing of RNA Structure.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"574-585","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/HuoNTT19","doi":"10.1016/B978-0-12-809633-8.20145-3","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20145-3","url":"https://dblp.org/rec/reference/bioinf/HuoNTT19"}, "url":"URL#2299820" }, { "@score":"1", "@id":"2299821", "info":{"authors":{"author":[{"@pid":"138/4762","text":"Antonella Iuliano"},{"@pid":"219/1350","text":"Monica Franzese"}]},"title":"Introduction to Biostatistics.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"648-671","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/IulianoF19","doi":"10.1016/B978-0-12-809633-8.20353-1","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20353-1","url":"https://dblp.org/rec/reference/bioinf/IulianoF19"}, "url":"URL#2299821" }, { "@score":"1", "@id":"2299822", "info":{"authors":{"author":[{"@pid":"204/5427","text":"Fransiskus Xaverius Ivan"},{"@pid":"32/228","text":"Chee-Keong Kwoh 0001"},{"@pid":"20/4497","text":"Vincent T. K. Chow"},{"@pid":"94/190-2","text":"Jie Zheng 0002"}]},"title":"Genome Analysis - Identification of Genes Involved in Host-Pathogen Protein-Protein Interaction Networks.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"410-424","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Ivan0C019","doi":"10.1016/B978-0-12-809633-8.20124-6","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20124-6","url":"https://dblp.org/rec/reference/bioinf/Ivan0C019"}, "url":"URL#2299822" }, { "@score":"1", "@id":"2299823", "info":{"authors":{"author":[{"@pid":"135/5772","text":"Junichi Iwakiri"},{"@pid":"70/3045","text":"Kiyoshi Asai"}]},"title":"RNA Structure Prediction.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"575-584","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/IwakiriA19","doi":"10.1016/B978-0-12-809633-8.20286-0","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20286-0","url":"https://dblp.org/rec/reference/bioinf/IwakiriA19"}, "url":"URL#2299823" }, { "@score":"1", "@id":"2299824", "info":{"authors":{"author":[{"@pid":"277/7326","text":"Shoya Iwanami"},{"@pid":"99/10991","text":"Shingo Iwami"}]},"title":"Quantitative Immunology by Data Analysis Using Mathematical Models.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"984-992","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/IwanamiI19","doi":"10.1016/B978-0-12-809633-8.20250-1","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20250-1","url":"https://dblp.org/rec/reference/bioinf/IwanamiI19"}, "url":"URL#2299824" }, { "@score":"1", "@id":"2299825", "info":{"authors":{"author":[{"@pid":"277/7534","text":"Amara Jabeen"},{"@pid":"235/6568","text":"Abidali Mohamedali"},{"@pid":"r/ShobaRanganathan","text":"Shoba Ranganathan"}]},"title":"Protocol for Protein Structure Modelling.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"252-272","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/JabeenMR19","doi":"10.1016/B978-0-12-809633-8.20477-9","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20477-9","url":"https://dblp.org/rec/reference/bioinf/JabeenMR19"}, "url":"URL#2299825" }, { "@score":"1", "@id":"2299826", "info":{"authors":{"author":{"@pid":"36/3937","text":"Katherine J. L. Jackson"}},"title":"Study of Human Antibody Responses From Analysis of Immunoglobulin Gene Sequences.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"940-951","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Jackson19","doi":"10.1016/B978-0-12-809633-8.20246-X","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20246-x","url":"https://dblp.org/rec/reference/bioinf/Jackson19"}, "url":"URL#2299826" }, { "@score":"1", "@id":"2299827", "info":{"authors":{"author":{"@pid":"84/8731","text":"Audrone Jakaitiene"}},"title":"Nonlinear Regression Models.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"731-737","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Jakaitiene19","doi":"10.1016/B978-0-12-809633-8.20361-0","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20361-0","url":"https://dblp.org/rec/reference/bioinf/Jakaitiene19"}, "url":"URL#2299827" }, { "@score":"1", "@id":"2299828", "info":{"authors":{"author":[{"@pid":"65/7794","text":"Yongshuai Jiang"},{"@pid":"07/1951","text":"Jing Xu"}]},"title":"Genome-Wide Haplotype Association Study.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"441-446","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/JiangX19","doi":"10.1016/B978-0-12-809633-8.20128-3","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20128-3","url":"https://dblp.org/rec/reference/bioinf/JiangX19"}, "url":"URL#2299828" }, { "@score":"1", "@id":"2299829", "info":{"authors":{"author":[{"@pid":"56/10478","text":"Saowaluck Kaewkamnerd"},{"@pid":"06/5977","text":"Apichart Intarapanich"},{"@pid":"29/1264","text":"Sissades Tongsima"}]},"title":"Segmentation Techniques for Bioimages.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"1028-1045","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/KaewkamnerdIT19","doi":"10.1016/B978-0-12-809633-8.20310-5","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20310-5","url":"https://dblp.org/rec/reference/bioinf/KaewkamnerdIT19"}, "url":"URL#2299829" }, { "@score":"1", "@id":"2299830", "info":{"authors":{"author":[{"@pid":"226/7299","text":"Sandeep Kaushik"},{"@pid":"140/3688","text":"Priyanka Baloni"},{"@pid":"277/7532","text":"Charu K. Midha"}]},"title":"Text Mining Resources for Bioinformatics.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"1083-1092","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/KaushikBM19","doi":"10.1016/B978-0-12-809633-8.20499-8","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20499-8","url":"https://dblp.org/rec/reference/bioinf/KaushikBM19"}, "url":"URL#2299830" }, { "@score":"1", "@id":"2299831", "info":{"authors":{"author":[{"@pid":"277/7080","text":"Shalini Kaushik"},{"@pid":"226/7299","text":"Sandeep Kaushik"},{"@pid":"87/4567","text":"Deepak Sharma"}]},"title":"Functional Genomics.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"118-133","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/KaushikKS19","doi":"10.1016/B978-0-12-809633-8.20222-7","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20222-7","url":"https://dblp.org/rec/reference/bioinf/KaushikKS19"}, "url":"URL#2299831" }, { "@score":"1", "@id":"2299832", "info":{"authors":{"author":[{"@pid":"226/7299","text":"Sandeep Kaushik"},{"@pid":"277/7409","text":"Chakrawarti Prasun"},{"@pid":"87/4567","text":"Deepak Sharma"}]},"title":"Translational and Disease Bioinformatics.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"1046-1057","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/KaushikPS19","doi":"10.1016/B978-0-12-809633-8.20302-6","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20302-6","url":"https://dblp.org/rec/reference/bioinf/KaushikPS19"}, "url":"URL#2299832" }, { "@score":"1", "@id":"2299833", "info":{"authors":{"author":[{"@pid":"226/7299","text":"Sandeep Kaushik"},{"@pid":"277/7327","text":"Soumya Lipsa Rath"}]},"title":"Protein Structure Visualization.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"520-538","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/KaushikR19","doi":"10.1016/B978-0-12-809633-8.20283-5","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20283-5","url":"https://dblp.org/rec/reference/bioinf/KaushikR19"}, "url":"URL#2299833" }, { "@score":"1", "@id":"2299834", "info":{"authors":{"author":[{"@pid":"157/9607","text":"Rahul Kaushik"},{"@pid":"52/10957","text":"Ankita Singh"},{"@pid":"132/3951","text":"B. Jayaram 0001"}]},"title":"Ab initio Protein Structure Prediction.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"62-76","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/KaushikS019","doi":"10.1016/B978-0-12-809633-8.20321-X","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20321-x","url":"https://dblp.org/rec/reference/bioinf/KaushikS019"}, "url":"URL#2299834" }, { "@score":"1", "@id":"2299835", "info":{"authors":{"author":{"@pid":"15/3030","text":"Takeshi Kawashima"}},"title":"Comparative and Evolutionary Genomics.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"257-267","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Kawashima19","doi":"10.1016/B978-0-12-809633-8.20236-7","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20236-7","url":"https://dblp.org/rec/reference/bioinf/Kawashima19"}, "url":"URL#2299835" }, { "@score":"1", "@id":"2299836", "info":{"authors":{"author":[{"@pid":"04/9438","text":"Anil K. Kesarwani"},{"@pid":"264/3352","text":"Ankit Malhotra"},{"@pid":"32/6819","text":"Anuj Srivastava"},{"@pid":"169/3479","text":"Guruprasad Ananda"},{"@pid":"123/3731","text":"Haitham Ashoor"},{"@pid":"52/3551","text":"Parveen Kumar"},{"@pid":"124/5517","text":"Rupesh K. Kesharwani"},{"@pid":"266/0925","text":"Vishal Kumar Sarsani"},{"@pid":"59/871","text":"Yi Li"},{"@pid":"210/4387","text":"Joshy George"},{"@pid":"169/3197","text":"Krishna M. Karuturi"}]},"title":"Genome Informatics.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"178-194","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/KesarwaniMSAAKKSLGK19","doi":"10.1016/B978-0-12-809633-8.20223-9","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20223-9","url":"https://dblp.org/rec/reference/bioinf/KesarwaniMSAAKKSLGK19"}, "url":"URL#2299836" }, { "@score":"1", "@id":"2299837", "info":{"authors":{"author":[{"@pid":"38/7120","text":"Varun Khanna"},{"@pid":"r/ShobaRanganathan","text":"Shoba Ranganathan"},{"@pid":"42/2201","text":"Nikolai Petrovsky"}]},"title":"Rational Structure-Based Drug Design.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"585-600","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/KhannaRP19","doi":"10.1016/B978-0-12-809633-8.20275-6","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20275-6","url":"https://dblp.org/rec/reference/bioinf/KhannaRP19"}, "url":"URL#2299837" }, { "@score":"1", "@id":"2299838", "info":{"authors":{"author":{"@pid":"96/5577-2","text":"Sunghwan Kim 0002"}},"title":"Public Chemical Databases.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"628-639","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Kim19","doi":"10.1016/B978-0-12-809633-8.20192-1","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20192-1","url":"https://dblp.org/rec/reference/bioinf/Kim19"}, "url":"URL#2299838" }, { "@score":"1", "@id":"2299839", "info":{"authors":{"author":[{"@pid":"99/41","text":"Oliver Koch"},{"@pid":"269/0434","text":"Christiane Ehrt"},{"@pid":"209/7144","text":"Tobias Brinkjost"}]},"title":"Binding Site Comparison - Software and Applications.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"650-660","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/KochEB19","doi":"10.1016/B978-0-12-809633-8.20196-9","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20196-9","url":"https://dblp.org/rec/reference/bioinf/KochEB19"}, "url":"URL#2299839" }, { "@score":"1", "@id":"2299840", "info":{"authors":{"author":[{"@pid":"99/41","text":"Oliver Koch"},{"@pid":"97/8178","text":"Nils M. Kriege"},{"@pid":"200/1544","text":"Lina Humbeck"}]},"title":"Chemical Similarity and Substructure Searches.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"640-649","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/KochKH19","doi":"10.1016/B978-0-12-809633-8.20195-7","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20195-7","url":"https://dblp.org/rec/reference/bioinf/KochKH19"}, "url":"URL#2299840" }, { "@score":"1", "@id":"2299841", "info":{"authors":{"author":[{"@pid":"277/7519","text":"Roman Kogay"},{"@pid":"90/4789","text":"Christian Schönbach"}]},"title":"Epitope Predictions.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"952-971","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/KogayS19","doi":"10.1016/B978-0-12-809633-8.20248-3","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20248-3","url":"https://dblp.org/rec/reference/bioinf/KogayS19"}, "url":"URL#2299841" }, { "@score":"1", "@id":"2299842", "info":{"authors":{"author":[{"@pid":"41/2774","text":"Max Kotlyar"},{"@pid":"146/9092","text":"Chiara Pastrello"},{"@pid":"213/7009","text":"Andrea E. M. Rossos"},{"@pid":"27/4777","text":"Igor Jurisica"}]},"title":"Protein-Protein Interaction Databases.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"988-996","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/KotlyarPRJ19","doi":"10.1016/B978-0-12-809633-8.20495-0","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20495-0","url":"https://dblp.org/rec/reference/bioinf/KotlyarPRJ19"}, "url":"URL#2299842" }, { "@score":"1", "@id":"2299843", "info":{"authors":{"author":[{"@pid":"124/9329","text":"Prasun Kumar"},{"@pid":"277/7677","text":"Swagata Halder"},{"@pid":"92/6874","text":"Manju Bansal"}]},"title":"Biomolecular Structures: Prediction, Identification and Analyses.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"504-534","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/KumarHB19","doi":"10.1016/B978-0-12-809633-8.20141-6","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20141-6","url":"https://dblp.org/rec/reference/bioinf/KumarHB19"}, "url":"URL#2299843" }, { "@score":"1", "@id":"2299844", "info":{"authors":{"author":[{"@pid":"277/7275","text":"Ammu Prasanna Kumar"},{"@pid":"94/3031","text":"Suryani Lukman"},{"@pid":"90/8086","text":"Minh N. Nguyen"}]},"title":"Drug Repurposing and Multi-Target Therapies.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"780-791","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/KumarLN19","doi":"10.1016/B978-0-12-809633-8.20160-X","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20160-x","url":"https://dblp.org/rec/reference/bioinf/KumarLN19"}, "url":"URL#2299844" }, { "@score":"1", "@id":"2299845", "info":{"authors":{"author":[{"@pid":"209/7423","text":"Anna Laddach"},{"@pid":"277/7133","text":"Sun Sook Chung"},{"@pid":"17/1504","text":"Franca Fraternali"}]},"title":"Prediction of Protein-Protein Interactions: Looking Through the Kaleidoscope.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"834-848","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/LaddachCF19","doi":"10.1016/B978-0-12-809633-8.20470-6","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20470-6","url":"https://dblp.org/rec/reference/bioinf/LaddachCF19"}, "url":"URL#2299845" }, { "@score":"1", "@id":"2299846", "info":{"authors":{"author":[{"@pid":"277/7225","text":"Kaitao Lai"},{"@pid":"277/7594","text":"Natalie Twine"},{"@pid":"150/2938","text":"Aidan O'Brien"},{"@pid":"24/3508","text":"Yi Guo"},{"@pid":"54/6719","text":"Denis C. Bauer"}]},"title":"Artificial Intelligence and Machine Learning in Bioinformatics.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"272-286","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/LaiTOGB19","doi":"10.1016/B978-0-12-809633-8.20325-7","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20325-7","url":"https://dblp.org/rec/reference/bioinf/LaiTOGB19"}, "url":"URL#2299846" }, { "@score":"1", "@id":"2299847", "info":{"authors":{"author":[{"@pid":"146/5036","text":"Andre Lamurias"},{"@pid":"58/2715","text":"Francisco M. Couto"}]},"title":"Text Mining for Bioinformatics Using Biomedical Literature.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"602-611","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/LamuriasC19","doi":"10.1016/B978-0-12-809633-8.20409-3","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20409-3","url":"https://dblp.org/rec/reference/bioinf/LamuriasC19"}, "url":"URL#2299847" }, { "@score":"1", "@id":"2299848", "info":{"authors":{"author":{"@pid":"07/11040","text":"Jeremy Leipzig"}},"title":"Computational Pipelines and Workflows in Bioinformatics.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"1151-1162","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Leipzig19","doi":"10.1016/B978-0-12-809633-8.20187-8","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20187-8","url":"https://dblp.org/rec/reference/bioinf/Leipzig19"}, "url":"URL#2299848" }, { "@score":"1", "@id":"2299849", "info":{"authors":{"author":{"@pid":"64/6078","text":"Emmanuelle Lerat"}},"title":"Repeat in Genomes: How and Why You Should Consider Them in Genome Analyses?","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"210-220","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Lerat19","doi":"10.1016/B978-0-12-809633-8.20227-6","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20227-6","url":"https://dblp.org/rec/reference/bioinf/Lerat19"}, "url":"URL#2299849" }, { "@score":"1", "@id":"2299850", "info":{"authors":{"author":[{"@pid":"277/7221","text":"Bryan T. Li"},{"@pid":"277/7105","text":"Jin Xing Lim"},{"@pid":"06/4325","text":"Maurice H. T. Ling"}]},"title":"Analyzing Transcriptome-Phenotype Correlations.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"819-824","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/LiLL19","doi":"10.1016/B978-0-12-809633-8.20164-7","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20164-7","url":"https://dblp.org/rec/reference/bioinf/LiLL19"}, "url":"URL#2299850" }, { "@score":"1", "@id":"2299851", "info":{"authors":{"author":[{"@pid":"73/6657","text":"David A. Liberles"},{"@pid":"54/6659","text":"Barbara R. Holland"}]},"title":"Evolutionary Models.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"712-718","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/LiberlesH19","doi":"10.1016/B978-0-12-809633-8.20256-2","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20256-2","url":"https://dblp.org/rec/reference/bioinf/LiberlesH19"}, "url":"URL#2299851" }, { "@score":"1", "@id":"2299852", "info":{"authors":{"author":[{"@pid":"277/7105","text":"Jin Xing Lim"},{"@pid":"277/7221","text":"Bryan T. Li"},{"@pid":"06/4325","text":"Maurice H. T. Ling"}]},"title":"Sequence Composition.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"323-326","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/LimLL19","doi":"10.1016/B978-0-12-809633-8.20439-1","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20439-1","url":"https://dblp.org/rec/reference/bioinf/LimLL19"}, "url":"URL#2299852" }, { "@score":"1", "@id":"2299853", "info":{"authors":{"author":{"@pid":"06/4325","text":"Maurice H. T. Ling"}},"title":"Survey of Antisense Transcription.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"842-846","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Ling19","doi":"10.1016/B978-0-12-809633-8.20465-2","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20465-2","url":"https://dblp.org/rec/reference/bioinf/Ling19"}, "url":"URL#2299853" }, { "@score":"1", "@id":"2299854", "info":{"authors":{"author":{"@pid":"57/1534","text":"Frédérique Lisacek"}},"title":"Proteome Informatics.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"60-75","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Lisacek19","doi":"10.1016/B978-0-12-809633-8.20479-2","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20479-2","url":"https://dblp.org/rec/reference/bioinf/Lisacek19"}, "url":"URL#2299854" }, { "@score":"1", "@id":"2299855", "info":{"authors":{"author":[{"@pid":"249/3123-2","text":"Enze Liu 0002"},{"@pid":"l/LangLi","text":"Lang Li 0001"},{"@pid":"34/10626","text":"Lijun Cheng"}]},"title":"Gene Regulatory Network Review.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"155-164","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Liu0C19","doi":"10.1016/B978-0-12-809633-8.20218-5","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20218-5","url":"https://dblp.org/rec/reference/bioinf/Liu0C19"}, "url":"URL#2299855" }, { "@score":"1", "@id":"2299856", "info":{"authors":{"author":[{"@pid":"277/7603","text":"Mun Fai Loke"},{"@pid":"277/7371","text":"Aimi Hanafi"}]},"title":"Molecular Mechanisms Responsible for Drug Resistance.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"926-931","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/LokeH19","doi":"10.1016/B978-0-12-809633-8.20467-6","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20467-6","url":"https://dblp.org/rec/reference/bioinf/LokeH19"}, "url":"URL#2299856" }, { "@score":"1", "@id":"2299857", "info":{"authors":{"author":[{"@pid":"25/6048","text":"Yosvany López"},{"@pid":"174/8860","text":"Piotr J. Kamola"},{"@pid":"188/5745","text":"Ronesh Sharma"},{"@pid":"80/2181","text":"Daichi Shigemizu"},{"@pid":"13/5504","text":"Tatsuhiko Tsunoda"},{"@pid":"90/2375","text":"Alok Sharma"}]},"title":"Computational Pipelines and Workflows in Bioinformatics.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"113-134","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/LopezKSSTS19","doi":"10.1016/B978-0-12-809633-8.20089-7","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20089-7","url":"https://dblp.org/rec/reference/bioinf/LopezKSSTS19"}, "url":"URL#2299857" }, { "@score":"1", "@id":"2299858", "info":{"authors":{"author":[{"@pid":"277/7683","text":"Zen H. Lu"},{"@pid":"277/7335","text":"Naeem Shafqat"},{"@pid":"277/7450","text":"Nani Azman"},{"@pid":"277/7145","text":"Mark I. R. Petalcorin"},{"@pid":"194/9705","text":"Lie Chen"}]},"title":"Population Analysis of Pharmacogenetic Polymorphisms.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"379-387","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/LuSAPC19","doi":"10.1016/B978-0-12-809633-8.20120-9","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20120-9","url":"https://dblp.org/rec/reference/bioinf/LuSAPC19"}, "url":"URL#2299858" }, { "@score":"1", "@id":"2299859", "info":{"authors":{"author":[{"@pid":"17/7503","text":"Carmen De Maio"},{"@pid":"20/3807","text":"Giuseppe Fenza"},{"@pid":"35/3222","text":"Vincenzo Loia"},{"@pid":"p/MimmoParente","text":"Mimmo Parente"}]},"title":"Text Mining Basics in Bioinformatics.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"575-585","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/MaioFLP19","doi":"10.1016/B978-0-12-809633-8.20475-5","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20475-5","url":"https://dblp.org/rec/reference/bioinf/MaioFLP19"}, "url":"URL#2299859" }, { "@score":"1", "@id":"2299860", "info":{"authors":{"author":[{"@pid":"95/7716","text":"Sorayya Malek"},{"@pid":"277/7159","text":"Cham Hui"},{"@pid":"277/7264","text":"Nanyonga Aziida"},{"@pid":"277/7309","text":"Song Cheen"},{"@pid":"277/7101","text":"Sooh Toh"},{"@pid":"123/7322","text":"Pozi Milow"}]},"title":"Ecosystem Monitoring Through Predictive Modeling.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"1-8","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/MalekHACTM19","doi":"10.1016/B978-0-12-809633-8.20060-5","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20060-5","url":"https://dblp.org/rec/reference/bioinf/MalekHACTM19"}, "url":"URL#2299860" }, { "@score":"1", "@id":"2299861", "info":{"authors":{"author":[{"@pid":"95/7716","text":"Sorayya Malek"},{"@pid":"123/7645","text":"Mogeeb A. A. Mosleh"},{"@pid":"126/0517","text":"Sarinder Kaur Dhillon"},{"@pid":"123/7322","text":"Pozi Milow"}]},"title":"Bioimage Informatics.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"993-1010","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/MalekMDM19","doi":"10.1016/B978-0-12-809633-8.20308-7","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20308-7","url":"https://dblp.org/rec/reference/bioinf/MalekMDM19"}, "url":"URL#2299861" }, { "@score":"1", "@id":"2299862", "info":{"authors":{"author":[{"@pid":"63/9216","text":"Adeel Malik"},{"@pid":"277/7342","text":"Mohammad H. Baig"},{"@pid":"174/0270","text":"Balachandran Manavalan"}]},"title":"Protein-Carbohydrate Interactions.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"666-677","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/MalikBM19","doi":"10.1016/B978-0-12-809633-8.20661-4","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20661-4","url":"https://dblp.org/rec/reference/bioinf/MalikBM19"}, "url":"URL#2299862" }, { "@score":"1", "@id":"2299863", "info":{"authors":{"author":[{"@pid":"277/7069","text":"Srikanth Manda"},{"@pid":"140/9658","text":"Daliah Michael"},{"@pid":"277/7030","text":"Sudhir Jadhao"},{"@pid":"33/4868","text":"Shivashankar H. Nagaraj"}]},"title":"Functional Enrichment Analysis.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"218-229","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/MandaMJN19","doi":"10.1016/B978-0-12-809633-8.20097-6","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20097-6","url":"https://dblp.org/rec/reference/bioinf/MandaMJN19"}, "url":"URL#2299863" }, { "@score":"1", "@id":"2299864", "info":{"authors":{"author":[{"@pid":"277/7152","text":"Toral Manvar"},{"@pid":"277/7710","text":"Vijay Lakhujani"}]},"title":"Profiling the Gut Microbiome: Practice and Potential.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"200-217","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/ManvarL19","doi":"10.1016/B978-0-12-809633-8.20503-7","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20503-7","url":"https://dblp.org/rec/reference/bioinf/ManvarL19"}, "url":"URL#2299864" }, { "@score":"1", "@id":"2299865", "info":{"authors":{"author":[{"@pid":"31/8506","text":"Mahendra Mariadassou"},{"@pid":"88/1820","text":"Avner Bar-Hen"},{"@pid":"66/6649","text":"Hirohisa Kishino"}]},"title":"Tree Evaluation and Robustness Testing.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"736-745","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/MariadassouBK19","doi":"10.1016/B978-0-12-809633-8.20259-8","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20259-8","url":"https://dblp.org/rec/reference/bioinf/MariadassouBK19"}, "url":"URL#2299865" }, { "@score":"1", "@id":"2299866", "info":{"authors":{"author":{"@pid":"34/9378","text":"Fabrizio Marozzo"}},"title":"Infrastructures for High-Performance Computing: Cloud Infrastructures.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"240-246","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Marozzo19","doi":"10.1016/B978-0-12-809633-8.20374-9","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20374-9","url":"https://dblp.org/rec/reference/bioinf/Marozzo19"}, "url":"URL#2299866" }, { "@score":"1", "@id":"2299867", "info":{"authors":{"author":[{"@pid":"34/9378","text":"Fabrizio Marozzo"},{"@pid":"t/PaoloTrunfio","text":"Paolo Trunfio"}]},"title":"Infrastructures for High-Performance Computing: Cloud Computing Development Environments.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"247-251","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/MarozzoT19","doi":"10.1016/B978-0-12-809633-8.20375-0","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20375-0","url":"https://dblp.org/rec/reference/bioinf/MarozzoT19"}, "url":"URL#2299867" }, { "@score":"1", "@id":"2299868", "info":{"authors":{"author":[{"@pid":"30/3511","text":"Pier Luigi Martelli"},{"@pid":"123/7686","text":"Giuseppe Profiti"},{"@pid":"54/2880","text":"Rita Casadio"}]},"title":"Protein Functional Annotation.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"8-14","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/MartelliPC19","doi":"10.1016/B978-0-12-809633-8.12364-7","ee":"https://doi.org/10.1016/b978-0-12-809633-8.12364-7","url":"https://dblp.org/rec/reference/bioinf/MartelliPC19"}, "url":"URL#2299868" }, { "@score":"1", "@id":"2299869", "info":{"authors":{"author":[{"@pid":"30/3511","text":"Pier Luigi Martelli"},{"@pid":"09/9970","text":"Castrense Savojardo"},{"@pid":"123/7686","text":"Giuseppe Profiti"},{"@pid":"54/2880","text":"Rita Casadio"}]},"title":"Transmembrane Domain Prediction.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"46-52","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/MartelliSPC19","doi":"10.1016/B978-0-12-809633-8.20269-0","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20269-0","url":"https://dblp.org/rec/reference/bioinf/MartelliSPC19"}, "url":"URL#2299869" }, { "@score":"1", "@id":"2299870", "info":{"authors":{"author":[{"@pid":"23/7091","text":"Maria Teresa Di Martino"},{"@pid":"60/161","text":"Pietro H. Guzzi"}]},"title":"Integrative Bioinformatics of Transcriptome: Databases, Tools and Pipelines.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"1099-1103","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/MartinoG19","doi":"10.1016/B978-0-12-809633-8.20389-0","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20389-0","url":"https://dblp.org/rec/reference/bioinf/MartinoG19"}, "url":"URL#2299870" }, { "@score":"1", "@id":"2299871", "info":{"authors":{"author":{"@pid":"32/1035","text":"Marco Masseroli"}},"title":"Biological and Medical Ontologies: Introduction.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"813-822","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Masseroli19","doi":"10.1016/B978-0-12-809633-8.20395-6","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20395-6","url":"https://dblp.org/rec/reference/bioinf/Masseroli19"}, "url":"URL#2299871" }, { "@score":"1", "@id":"2299872", "info":{"authors":{"author":{"@pid":"32/1035","text":"Marco Masseroli"}},"title":"Biological and Medical Ontologies: GO and GOA.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"823-831","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Masseroli19a","doi":"10.1016/B978-0-12-809633-8.20491-3","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20491-3","url":"https://dblp.org/rec/reference/bioinf/Masseroli19a"}, "url":"URL#2299872" }, { "@score":"1", "@id":"2299873", "info":{"authors":{"author":{"@pid":"32/1035","text":"Marco Masseroli"}},"title":"Integrative Bioinformatics.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"1092-1098","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Masseroli19b","doi":"10.1016/B978-0-12-809633-8.20388-9","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20388-9","url":"https://dblp.org/rec/reference/bioinf/Masseroli19b"}, "url":"URL#2299873" }, { "@score":"1", "@id":"2299874", "info":{"authors":{"author":[{"@pid":"235/2143","text":"Shuhaila Mat-Sharani"},{"@pid":"277/7538","text":"Doris H. X. Quay"},{"@pid":"277/7288","text":"Chyan Leong Ng"},{"@pid":"91/4733","text":"Mohd Firdaus Raih"}]},"title":"Structural Genomics.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"722-728","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Mat-SharaniQNR19","doi":"10.1016/B978-0-12-809633-8.20155-6","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20155-6","url":"https://dblp.org/rec/reference/bioinf/Mat-SharaniQNR19"}, "url":"URL#2299874" }, { "@score":"1", "@id":"2299875", "info":{"authors":{"author":[{"@pid":"120/5500","text":"Biswa Ranjan Meher"},{"@pid":"277/7396","text":"Megha Vaishnavi"},{"@pid":"120/5537","text":"Mattaparthi Venkata Satish Kumar"},{"@pid":"32/4487","text":"Seema Patel"},{"@pid":"226/7299","text":"Sandeep Kaushik"}]},"title":"Mutation Effects on 3D-Structural Reorganization Using HIV-1 Protease as a Case Study.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"706-721","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/MeherVKPK19","doi":"10.1016/B978-0-12-809633-8.20279-3","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20279-3","url":"https://dblp.org/rec/reference/bioinf/MeherVKPK19"}, "url":"URL#2299875" }, { "@score":"1", "@id":"2299876", "info":{"authors":{"author":{"@pid":"61/2401","text":"Ivan Merelli"}},"title":"Parallel Architectures for Bioinformatics.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"209-214","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Merelli19","doi":"10.1016/B978-0-12-809633-8.20369-5","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20369-5","url":"https://dblp.org/rec/reference/bioinf/Merelli19"}, "url":"URL#2299876" }, { "@score":"1", "@id":"2299877", "info":{"authors":{"author":{"@pid":"61/2401","text":"Ivan Merelli"}},"title":"Infrastructure for High-Performance Computing: Grids and Grid Computing.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"230-235","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Merelli19a","doi":"10.1016/B978-0-12-809633-8.20372-5","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20372-5","url":"https://dblp.org/rec/reference/bioinf/Merelli19a"}, "url":"URL#2299877" }, { "@score":"1", "@id":"2299878", "info":{"authors":{"author":[{"@pid":"79/11013","text":"Amir Feisal Merican"},{"@pid":"277/7447","text":"Hoda Mirsafian"},{"@pid":"141/1169","text":"Adiratna Mat Ripen"},{"@pid":"141/1121","text":"Saharuddin Bin Mohamad"}]},"title":"Studies of Body Systems.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"94-102","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/MericanMRM19","doi":"10.1016/B978-0-12-809633-8.20437-8","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20437-8","url":"https://dblp.org/rec/reference/bioinf/MericanMRM19"}, "url":"URL#2299878" }, { "@score":"1", "@id":"2299879", "info":{"authors":{"author":{"@pid":"77/10786","text":"Marianna Milano"}},"title":"Computing Languages for Bioinformatics: R.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"199-205","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Milano19","doi":"10.1016/B978-0-12-809633-8.20367-1","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20367-1","url":"https://dblp.org/rec/reference/bioinf/Milano19"}, "url":"URL#2299879" }, { "@score":"1", "@id":"2299880", "info":{"authors":{"author":{"@pid":"77/10786","text":"Marianna Milano"}},"title":"Tools for Semantic Analysis Based on Semantic Similarity.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"889-895","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Milano19a","doi":"10.1016/B978-0-12-809633-8.20403-2","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20403-2","url":"https://dblp.org/rec/reference/bioinf/Milano19a"}, "url":"URL#2299880" }, { "@score":"1", "@id":"2299881", "info":{"authors":{"author":{"@pid":"77/10786","text":"Marianna Milano"}},"title":"Gene Prioritization Tools.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"907-914","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Milano19b","doi":"10.1016/B978-0-12-809633-8.20406-8","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20406-8","url":"https://dblp.org/rec/reference/bioinf/Milano19b"}, "url":"URL#2299881" }, { "@score":"1", "@id":"2299882", "info":{"authors":{"author":[{"@pid":"277/7574","text":"Askhat Molkenov"},{"@pid":"277/7094","text":"Altyn Zhelambayeva"},{"@pid":"277/7260","text":"Akbar Yermekov"},{"@pid":"277/7663","text":"Saule Mussurova"},{"@pid":"277/7034","text":"Aliya Sarkytbayeva"},{"@pid":"277/7596","text":"Yerbol Kalykhbergenov"},{"@pid":"277/7733","text":"Zhaxybay Zhumadilov"},{"@pid":"125/2064","text":"Ulykbek Kairov"}]},"title":"Transcriptomic Databases.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"341-351","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/MolkenovZYMSKZK19","doi":"10.1016/B978-0-12-809633-8.20208-2","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20208-2","url":"https://dblp.org/rec/reference/bioinf/MolkenovZYMSKZK19"}, "url":"URL#2299882" }, { "@score":"1", "@id":"2299883", "info":{"authors":{"author":{"@pid":"277/7581","text":"Laurentino Quiroga Moreno"}},"title":"Graphlets and Motifs in Biological Networks.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"814-820","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Moreno19","doi":"10.1016/B978-0-12-809633-8.20291-4","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20291-4","url":"https://dblp.org/rec/reference/bioinf/Moreno19"}, "url":"URL#2299883" }, { "@score":"1", "@id":"2299884", "info":{"authors":{"author":{"@pid":"213/7129","text":"Nor Azlan Nor Muhammad"}},"title":"Biological Database Searching.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"29-38","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Muhammad19","doi":"10.1016/B978-0-12-809633-8.20072-1","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20072-1","url":"https://dblp.org/rec/reference/bioinf/Muhammad19"}, "url":"URL#2299884" }, { "@score":"1", "@id":"2299885", "info":{"authors":{"author":{"@pid":"38/6619","text":"Kenta Nakai"}},"title":"Prediction of Protein-Binding Sites in DNA Sequences.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"447-451","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Nakai19","doi":"10.1016/B978-0-12-809633-8.20131-3","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20131-3","url":"https://dblp.org/rec/reference/bioinf/Nakai19"}, "url":"URL#2299885" }, { "@score":"1", "@id":"2299886", "info":{"authors":{"author":[{"@pid":"38/6619","text":"Kenta Nakai"},{"@pid":"159/4054","text":"Kenichiro Imai"}]},"title":"Prediction of Protein Localization.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"53-59","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/NakaiI19","doi":"10.1016/B978-0-12-809633-8.20270-7","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20270-7","url":"https://dblp.org/rec/reference/bioinf/NakaiI19"}, "url":"URL#2299886" }, { "@score":"1", "@id":"2299887", "info":{"authors":{"author":[{"@pid":"277/7288","text":"Chyan Leong Ng"},{"@pid":"91/4733","text":"Mohd Firdaus Raih"}]},"title":"Applications of Ribosomal RNA Sequence and Structure Analysis for Extracting Evolutionary and Functional Insights.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"554-567","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/NgR19","doi":"10.1016/B978-0-12-809633-8.20443-3","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20443-3","url":"https://dblp.org/rec/reference/bioinf/NgR19"}, "url":"URL#2299887" }, { "@score":"1", "@id":"2299888", "info":{"authors":{"author":[{"@pid":"235/6704","text":"Zainab Noor"},{"@pid":"170/4551","text":"Subash Adhikari"},{"@pid":"r/ShobaRanganathan","text":"Shoba Ranganathan"},{"@pid":"235/6568","text":"Abidali Mohamedali"}]},"title":"Quantification of Proteins From Proteomic Analysis.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"871-890","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/NoorARM19","doi":"10.1016/B978-0-12-809633-8.20677-8","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20677-8","url":"https://dblp.org/rec/reference/bioinf/NoorARM19"}, "url":"URL#2299888" }, { "@score":"1", "@id":"2299889", "info":{"authors":{"author":[{"@pid":"235/6704","text":"Zainab Noor"},{"@pid":"235/6568","text":"Abidali Mohamedali"},{"@pid":"r/ShobaRanganathan","text":"Shoba Ranganathan"}]},"title":"Identification of Proteins From Proteomic Analysis.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"855-870","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/NoorMR19","doi":"10.1016/B978-0-12-809633-8.20478-0","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20478-0","url":"https://dblp.org/rec/reference/bioinf/NoorMR19"}, "url":"URL#2299889" }, { "@score":"1", "@id":"2299890", "info":{"authors":{"author":{"@pid":"277/7428","text":"Hui San Ong"}},"title":"Comparative Genomics Analysis.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"425-431","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Ong19","doi":"10.1016/B978-0-12-809633-8.20126-X","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20126-x","url":"https://dblp.org/rec/reference/bioinf/Ong19"}, "url":"URL#2299890" }, { "@score":"1", "@id":"2299891", "info":{"authors":{"author":[{"@pid":"86/1379","text":"Chuang Kee Ong"},{"@pid":"01/9422","text":"Russell S. Hamilton"}]},"title":"Constructing Computational Pipelines.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"135-143","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/OngH19","doi":"10.1016/B978-0-12-809633-8.20090-3","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20090-3","url":"https://dblp.org/rec/reference/bioinf/OngH19"}, "url":"URL#2299891" }, { "@score":"1", "@id":"2299892", "info":{"authors":{"author":[{"@pid":"86/1379","text":"Chuang Kee Ong"},{"@pid":"277/7227","text":"Qi Bin Kwong"},{"@pid":"141/1086","text":"Ai Ling Ong"},{"@pid":"277/7324","text":"Huey Ying Heng"},{"@pid":"277/7075","text":"Wai Yee Low"}]},"title":"Pipeline of High Throughput Sequencing.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"144-151","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/OngKOHL19","doi":"10.1016/B978-0-12-809633-8.20091-5","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20091-5","url":"https://dblp.org/rec/reference/bioinf/OngKOHL19"}, "url":"URL#2299892" }, { "@score":"1", "@id":"2299893", "info":{"authors":{"author":[{"@pid":"277/7394","text":"Munyati Othman"},{"@pid":"277/7606","text":"Siuk M. Ng"},{"@pid":"91/4733","text":"Mohd Firdaus Raih"}]},"title":"Computational Design and Experimental Implementation of Synthetic Riboswitches and Riboregulators.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"568-573","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/OthmanNR19","doi":"10.1016/B978-0-12-809633-8.20144-1","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20144-1","url":"https://dblp.org/rec/reference/bioinf/OthmanNR19"}, "url":"URL#2299893" }, { "@score":"1", "@id":"2299894", "info":{"authors":{"author":[{"@pid":"23/10560","text":"Sucheendra K. Palaniappan"},{"@pid":"277/7436","text":"Ayako Yachie-Kinoshita"},{"@pid":"00/4673","text":"Samik Ghosh"}]},"title":"Computational Systems Biology.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"789-795","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/PalaniappanYG19","doi":"10.1016/B978-0-12-809633-8.20287-2","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20287-2","url":"https://dblp.org/rec/reference/bioinf/PalaniappanYG19"}, "url":"URL#2299894" }, { "@score":"1", "@id":"2299895", "info":{"authors":{"author":{"@pid":"56/11254","text":"Nicolas Palopoli"}},"title":"Assessment of Structure Quality (RNA and Protein).","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"586-605","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Palopoli19","doi":"10.1016/B978-0-12-809633-8.20147-7","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20147-7","url":"https://dblp.org/rec/reference/bioinf/Palopoli19"}, "url":"URL#2299895" }, { "@score":"1", "@id":"2299896", "info":{"authors":{"author":[{"@pid":"p/LuigiPalopoli","text":"Luigi Palopoli 0001"},{"@pid":"r/SimonaERombo","text":"Simona E. Rombo"}]},"title":"Algorithms for Graph and Network Analysis: Graph Alignment.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"102-109","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/PalopoliR19","doi":"10.1016/B978-0-12-809633-8.20324-5","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20324-5","url":"https://dblp.org/rec/reference/bioinf/PalopoliR19"}, "url":"URL#2299896" }, { "@score":"1", "@id":"2299897", "info":{"authors":{"author":[{"@pid":"277/7621","text":"Preeti Pandey"},{"@pid":"277/7359","text":"Sabeeha Hasnain"},{"@pid":"52/5068","text":"Shandar Ahmad"}]},"title":"Protein-DNA Interactions.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"142-154","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/PandeyHA19","doi":"10.1016/B978-0-12-809633-8.20217-3","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20217-3","url":"https://dblp.org/rec/reference/bioinf/PandeyHA19"}, "url":"URL#2299897" }, { "@score":"1", "@id":"2299898", "info":{"authors":{"author":[{"@pid":"277/7308","text":"Chi N. I. Pang"},{"@pid":"79/3057","text":"Marc R. Wilkins"}]},"title":"Protein Post-Translational Modification Prediction.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"15-27","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/PangW19","doi":"10.1016/B978-0-12-809633-8.20265-3","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20265-3","url":"https://dblp.org/rec/reference/bioinf/PangW19"}, "url":"URL#2299898" }, { "@score":"1", "@id":"2299899", "info":{"authors":{"author":{"@pid":"277/7747","text":"Sung-J. Park"}},"title":"Genome-Wide Scanning of Gene Expression.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"452-462","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Park19","doi":"10.1016/B978-0-12-809633-8.20132-5","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20132-5","url":"https://dblp.org/rec/reference/bioinf/Park19"}, "url":"URL#2299899" }, { "@score":"1", "@id":"2299900", "info":{"authors":{"author":{"@pid":"42/5182","text":"Ashwini Patil"}},"title":"Protein-Protein Interaction Databases.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"849-855","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Patil19","doi":"10.1016/B978-0-12-809633-8.20660-2","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20660-2","url":"https://dblp.org/rec/reference/bioinf/Patil19"}, "url":"URL#2299900" }, { "@score":"1", "@id":"2299901", "info":{"authors":{"author":{"@pid":"38/11252","text":"Josch Pauling"}},"title":"Computational Lipidomics.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"894-899","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Pauling19","doi":"10.1016/B978-0-12-809633-8.20298-7","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20298-7","url":"https://dblp.org/rec/reference/bioinf/Pauling19"}, "url":"URL#2299901" }, { "@score":"1", "@id":"2299902", "info":{"authors":{"author":{"@pid":"78/2331","text":"William R. Pearson"}},"title":"Identification of Homologs.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"980-984","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Pearson19","doi":"10.1016/B978-0-12-809633-8.20180-5","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20180-5","url":"https://dblp.org/rec/reference/bioinf/Pearson19"}, "url":"URL#2299902" }, { "@score":"1", "@id":"2299903", "info":{"authors":{"author":[{"@pid":"277/7354","text":"Marwenie F. Petalcorin"},{"@pid":"277/7335","text":"Naeem Shafqat"},{"@pid":"277/7683","text":"Zen H. Lu"},{"@pid":"277/7145","text":"Mark I. R. Petalcorin"}]},"title":"Clinical Proteomics.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"911-925","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/PetalcorinSLP19","doi":"10.1016/B978-0-12-809633-8.20450-0","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20450-0","url":"https://dblp.org/rec/reference/bioinf/PetalcorinSLP19"}, "url":"URL#2299903" }, { "@score":"1", "@id":"2299904", "info":{"authors":{"author":[{"@pid":"277/7084","text":"Swathik Clarancia Peter"},{"@pid":"143/7862","text":"Jaspreet Kaur Dhanjal"},{"@pid":"160/6930","text":"Vidhi Malik"},{"@pid":"277/7728","text":"Navaneethan Radhakrishnan"},{"@pid":"35/7122","text":"Mannu Jayakanthan"},{"@pid":"47/7122","text":"Durai Sundar"}]},"title":"Quantitative Structure-Activity Relationship (QSAR): Modeling Approaches to Biological Applications.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"661-676","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/PeterDMRJS19","doi":"10.1016/B978-0-12-809633-8.20197-0","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20197-0","url":"https://dblp.org/rec/reference/bioinf/PeterDMRJS19"}, "url":"URL#2299904" }, { "@score":"1", "@id":"2299905", "info":{"authors":{"author":{"@pid":"277/7486","text":"Russell Pickford"}},"title":"Mass Spectrometry-Based Metabolomic Analysis.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"410-425","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Pickford19","doi":"10.1016/B978-0-12-809633-8.20252-5","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20252-5","url":"https://dblp.org/rec/reference/bioinf/Pickford19"}, "url":"URL#2299905" }, { "@score":"1", "@id":"2299906", "info":{"authors":{"author":{"@pid":"50/96","text":"Giuseppe Pirrò"}},"title":"Semantic Similarity Functions and Measures.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"877-888","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Pirro19","doi":"10.1016/B978-0-12-809633-8.20402-0","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20402-0","url":"https://dblp.org/rec/reference/bioinf/Pirro19"}, "url":"URL#2299906" }, { "@score":"1", "@id":"2299907", "info":{"authors":{"author":{"@pid":"p/NadiaPisanti","text":"Nadia Pisanti"}},"title":"Algorithms Foundations.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"1-4","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Pisanti19","doi":"10.1016/B978-0-12-809633-8.20315-4","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20315-4","url":"https://dblp.org/rec/reference/bioinf/Pisanti19"}, "url":"URL#2299907" }, { "@score":"1", "@id":"2299908", "info":{"authors":{"author":[{"@pid":"p/ClaraPizzuti","text":"Clara Pizzuti"},{"@pid":"r/SimonaERombo","text":"Simona E. Rombo"}]},"title":"Algorithms for Graph and Network Analysis: Clustering and Search of Motifs in Graphs.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"95-101","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/PizzutiR19","doi":"10.1016/B978-0-12-809633-8.20486-X","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20486-x","url":"https://dblp.org/rec/reference/bioinf/PizzutiR19"}, "url":"URL#2299908" }, { "@score":"1", "@id":"2299909", "info":{"authors":{"author":[{"@pid":"254/3347","text":"Pazit Polak"},{"@pid":"88/5685","text":"Ramit Mehr"},{"@pid":"70/7208","text":"Gur Yaari"}]},"title":"Immunoglobulin Clonotype and Ontogeny Inference.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"972-983","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/PolakMY19","doi":"10.1016/B978-0-12-809633-8.20249-5","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20249-5","url":"https://dblp.org/rec/reference/bioinf/PolakMY19"}, "url":"URL#2299909" }, { "@score":"1", "@id":"2299910", "info":{"authors":{"author":{"@pid":"43/6178","text":"Jaroslaw Polanski"}},"title":"Chemoinformatics: From Chemical Art to Chemistry in Silico.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"601-618","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Polanski19","doi":"10.1016/B978-0-12-809633-8.20189-1","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20189-1","url":"https://dblp.org/rec/reference/bioinf/Polanski19"}, "url":"URL#2299910" }, { "@score":"1", "@id":"2299911", "info":{"authors":{"author":[{"@pid":"277/7576","text":"Sarita Poonia"},{"@pid":"277/7637","text":"Smriti Chawla"},{"@pid":"226/7299","text":"Sandeep Kaushik"},{"@pid":"14/11132","text":"Debarka Sengupta"}]},"title":"Pathway Informatics.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"796-804","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/PooniaCKS19","doi":"10.1016/B978-0-12-809633-8.20288-4","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20288-4","url":"https://dblp.org/rec/reference/bioinf/PooniaCKS19"}, "url":"URL#2299911" }, { "@score":"1", "@id":"2299912", "info":{"authors":{"author":{"@pid":"143/4938","text":"Joram M. Posma"}},"title":"Metabolic Profiling.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"426-437","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Posma19","doi":"10.1016/B978-0-12-809633-8.20254-9","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20254-9","url":"https://dblp.org/rec/reference/bioinf/Posma19"}, "url":"URL#2299912" }, { "@score":"1", "@id":"2299913", "info":{"authors":{"author":{"@pid":"02/4215","text":"Erinija Pranckeviciene"}},"title":"Gene Prioritization Using Semantic Similarity.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"898-906","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Pranckeviciene19","doi":"10.1016/B978-0-12-809633-8.20405-6","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20405-6","url":"https://dblp.org/rec/reference/bioinf/Pranckeviciene19"}, "url":"URL#2299913" }, { "@score":"1", "@id":"2299914", "info":{"authors":{"author":[{"@pid":"277/7608","text":"Malwina Prater"},{"@pid":"01/9422","text":"Russell S. Hamilton"}]},"title":"Epigenetics: Analysis of Cytosine Modifications at Single Base Resolution.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"341-353","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/PraterH19","doi":"10.1016/B978-0-12-809633-8.20111-8","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20111-8","url":"https://dblp.org/rec/reference/bioinf/PraterH19"}, "url":"URL#2299914" }, { "@score":"1", "@id":"2299915", "info":{"authors":{"author":[{"@pid":"122/8757","text":"Andrey D. Prjibelski"},{"@pid":"24/11279","text":"Anton I. Korobeynikov"},{"@pid":"33/8656","text":"Alla L. Lapidus"}]},"title":"Sequence Analysis.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"292-322","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/PrjibelskiKL19","doi":"10.1016/B978-0-12-809633-8.20106-4","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20106-4","url":"https://dblp.org/rec/reference/bioinf/PrjibelskiKL19"}, "url":"URL#2299915" }, { "@score":"1", "@id":"2299916", "info":{"authors":{"author":{"@pid":"277/7236","text":"Dwi A. Pujianto"}},"title":"Transcriptome During Cell Differentiation.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"825-829","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Pujianto19","doi":"10.1016/B978-0-12-809633-8.20444-5","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20444-5","url":"https://dblp.org/rec/reference/bioinf/Pujianto19"}, "url":"URL#2299916" }, { "@score":"1", "@id":"2299917", "info":{"authors":{"author":[{"@pid":"166/9778","text":"Upadhyayula S. Raghavender"},{"@pid":"277/7292","text":"Ravindranath S. Rathore"}]},"title":"Protein-Peptide Interactions in Regulatory Events.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"688-696","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/RaghavenderR19","doi":"10.1016/B978-0-12-809633-8.90694-0","ee":"https://doi.org/10.1016/b978-0-12-809633-8.90694-0","url":"https://dblp.org/rec/reference/bioinf/RaghavenderR19"}, "url":"URL#2299917" }, { "@score":"1", "@id":"2299918", "info":{"authors":{"author":[{"@pid":"16/2165","text":"Sara Rahmati"},{"@pid":"146/9092","text":"Chiara Pastrello"},{"@pid":"213/7009","text":"Andrea E. M. Rossos"},{"@pid":"27/4777","text":"Igor Jurisica"}]},"title":"Two Decades of Biological Pathway Databases: Results and Challenges.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"1071-1084","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/RahmatiPRJ19","doi":"10.1016/B978-0-12-809633-8.20496-2","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20496-2","url":"https://dblp.org/rec/reference/bioinf/RahmatiPRJ19"}, "url":"URL#2299918" }, { "@score":"1", "@id":"2299919", "info":{"authors":{"author":[{"@pid":"91/4733","text":"Mohd Firdaus Raih"},{"@pid":"277/7171","text":"Nur Syatila Abdul Ghani"}]},"title":"Identifying Functional Relationships Via the Annotation and Comparison of Three-Dimensional Amino Acid Arrangements in Protein Structures.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"620-630","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/RaihG19","doi":"10.1016/B978-0-12-809633-8.20149-0","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20149-0","url":"https://dblp.org/rec/reference/bioinf/RaihG19"}, "url":"URL#2299919" }, { "@score":"1", "@id":"2299920", "info":{"authors":{"author":[{"@pid":"63/9716","text":"Effirul I. Ramlan"},{"@pid":"91/4733","text":"Mohd Firdaus Raih"}]},"title":"Engineering of Supramolecular RNA Structures.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"535-545","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/RamlanR19","doi":"10.1016/B978-0-12-809633-8.20442-1","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20442-1","url":"https://dblp.org/rec/reference/bioinf/RamlanR19"}, "url":"URL#2299920" }, { "@score":"1", "@id":"2299921", "info":{"authors":{"author":{"@pid":"r/ShobaRanganathan","text":"Shoba Ranganathan"}},"title":"Preface.","venue":"Encyclopedia of Bioinformatics and Computational Biology","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Ranganathan19","doi":"10.1016/B978-0-12-811414-8.09005-2","ee":"https://doi.org/10.1016/b978-0-12-811414-8.09005-2","url":"https://dblp.org/rec/reference/bioinf/Ranganathan19"}, "url":"URL#2299921" }, { "@score":"1", "@id":"2299922", "info":{"authors":{"author":[{"@pid":"277/7521","text":"Raimi M. Redwan"},{"@pid":"277/7749","text":"Suhanya Parthasarathy"},{"@pid":"187/4457","text":"Ranjeev Hari"}]},"title":"Codon Usage.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"327-331","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/RedwanPH19","doi":"10.1016/B978-0-12-809633-8.20440-8","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20440-8","url":"https://dblp.org/rec/reference/bioinf/RedwanPH19"}, "url":"URL#2299922" }, { "@score":"1", "@id":"2299923", "info":{"authors":{"author":[{"@pid":"149/9537","text":"Jonas Reeb"},{"@pid":"66/159","text":"Burkhard Rost"}]},"title":"Secondary Structure Prediction.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"488-496","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/ReebR19","doi":"10.1016/B978-0-12-809633-8.20267-7","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20267-7","url":"https://dblp.org/rec/reference/bioinf/ReebR19"}, "url":"URL#2299923" }, { "@score":"1", "@id":"2299924", "info":{"authors":{"author":[{"@pid":"r/FrancescoRicca","text":"Francesco Ricca"},{"@pid":"t/GiorgioTerracina","text":"Giorgio Terracina"}]},"title":"Knowledge and Reasoning.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"294-299","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/RiccaT19","doi":"10.1016/B978-0-12-809633-8.20330-0","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20330-0","url":"https://dblp.org/rec/reference/bioinf/RiccaT19"}, "url":"URL#2299924" }, { "@score":"1", "@id":"2299925", "info":{"authors":{"author":{"@pid":"277/7472","text":"Thibault Robin"}},"title":"Proteomics Data Representation and Databases.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"76-83","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Robin19","doi":"10.1016/B978-0-12-809633-8.20273-2","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20273-2","url":"https://dblp.org/rec/reference/bioinf/Robin19"}, "url":"URL#2299925" }, { "@score":"1", "@id":"2299926", "info":{"authors":{"author":[{"@pid":"277/7755","text":"Christian Rockmann"},{"@pid":"236/9439","text":"Christoph Endrullat"},{"@pid":"45/5738","text":"Marcus Frohme"},{"@pid":"75/568","text":"Heike Pospisil"}]},"title":"Next Generation Sequence Analysis.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"352-363","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/RockmannEFP19","doi":"10.1016/B978-0-12-809633-8.20206-9","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20206-9","url":"https://dblp.org/rec/reference/bioinf/RockmannEFP19"}, "url":"URL#2299926" }, { "@score":"1", "@id":"2299927", "info":{"authors":{"author":{"@pid":"07/6105","text":"Raul Rodriguez-Esteban"}},"title":"Text Mining Applications.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"996-1000","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Rodriguez-Esteban19","doi":"10.1016/B978-0-12-809633-8.12372-6","ee":"https://doi.org/10.1016/b978-0-12-809633-8.12372-6","url":"https://dblp.org/rec/reference/bioinf/Rodriguez-Esteban19"}, "url":"URL#2299927" }, { "@score":"1", "@id":"2299928", "info":{"authors":{"author":[{"@pid":"120/3692","text":"Swarup Roy"},{"@pid":"211/4310","text":"Hazel N. Manners"},{"@pid":"184/2466","text":"Ahed Elmsallati"},{"@pid":"78/5662","text":"Jugal K. Kalita"}]},"title":"Alignment of Protein-Protein Interaction Networks.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"997-1015","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/RoyMEK19","doi":"10.1016/B978-0-12-809633-8.20429-9","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20429-9","url":"https://dblp.org/rec/reference/bioinf/RoyMEK19"}, "url":"URL#2299928" }, { "@score":"1", "@id":"2299929", "info":{"authors":{"author":[{"@pid":"120/3692","text":"Swarup Roy"},{"@pid":"57/6243","text":"Pooja Sharma"},{"@pid":"185/2300","text":"Keshab Nath"},{"@pid":"34/4138","text":"Dhruba K. Bhattacharyya"},{"@pid":"78/5662","text":"Jugal K. Kalita"}]},"title":"Pre-Processing: A Data Preparation Step.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"463-471","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/RoySNBK19","doi":"10.1016/B978-0-12-809633-8.20457-3","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20457-3","url":"https://dblp.org/rec/reference/bioinf/RoySNBK19"}, "url":"URL#2299929" }, { "@score":"1", "@id":"2299930", "info":{"authors":{"author":{"@pid":"74/1734","text":"Yutaka Saito"}},"title":"Comparative Epigenomics.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"354-362","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Saito19","doi":"10.1016/B978-0-12-809633-8.20112-X","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20112-x","url":"https://dblp.org/rec/reference/bioinf/Saito19"}, "url":"URL#2299930" }, { "@score":"1", "@id":"2299931", "info":{"authors":{"author":[{"@pid":"92/73","text":"Meena K. Sakharkar"},{"@pid":"277/7720","text":"Karthic Rajamanickam"},{"@pid":"277/7087","text":"Chidambaram S. Babu"},{"@pid":"214/3485","text":"Jitender Madan"},{"@pid":"15/3784","text":"Ramesh Chandra"},{"@pid":"181/2854","text":"Jian Yang"}]},"title":"Preclinical: Drug Target Identification and Validation in Human.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"1093-1098","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/SakharkarRBMCY19","doi":"10.1016/B978-0-12-809633-8.20665-1","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20665-1","url":"https://dblp.org/rec/reference/bioinf/SakharkarRBMCY19"}, "url":"URL#2299931" }, { "@score":"1", "@id":"2299932", "info":{"authors":{"author":[{"@pid":"277/7056","text":"Airy Sanjeev"},{"@pid":"120/5537","text":"Mattaparthi Venkata Satish Kumar"},{"@pid":"226/7299","text":"Sandeep Kaushik"}]},"title":"Nucleic-Acid Structure Database.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"567-574","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/SanjeevKK19","doi":"10.1016/B978-0-12-809633-8.20285-9","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20285-9","url":"https://dblp.org/rec/reference/bioinf/SanjeevKK19"}, "url":"URL#2299932" }, { "@score":"1", "@id":"2299933", "info":{"authors":{"author":[{"@pid":"277/7334","text":"Himakshi Sarma"},{"@pid":"277/7701","text":"Sushmita Pradhan"},{"@pid":"120/5537","text":"Mattaparthi Venkata Satish Kumar"},{"@pid":"226/7299","text":"Sandeep Kaushik"}]},"title":"Phylogenetic Analysis: Early Evolution of Life.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"938-952","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/SarmaPKK19","doi":"10.1016/B978-0-12-809633-8.20171-4","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20171-4","url":"https://dblp.org/rec/reference/bioinf/SarmaPKK19"}, "url":"URL#2299933" }, { "@score":"1", "@id":"2299934", "info":{"authors":{"author":[{"@pid":"277/7635","text":"Anita Sathyanarayanan"},{"@pid":"277/7069","text":"Srikanth Manda"},{"@pid":"262/8034","text":"Mukta Poojary"},{"@pid":"33/4868","text":"Shivashankar H. Nagaraj"}]},"title":"Exome Sequencing Data Analysis.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"164-175","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/SathyanarayananMPN19","doi":"10.1016/B978-0-12-809633-8.20094-0","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20094-0","url":"https://dblp.org/rec/reference/bioinf/SathyanarayananMPN19"}, "url":"URL#2299934" }, { "@score":"1", "@id":"2299935", "info":{"authors":{"author":{"@pid":"71/3711","text":"Francesco Scarcello"}},"title":"Artificial Intelligence.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"287-293","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Scarcello19","doi":"10.1016/B978-0-12-809633-8.20326-9","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20326-9","url":"https://dblp.org/rec/reference/bioinf/Scarcello19"}, "url":"URL#2299935" }, { "@score":"1", "@id":"2299936", "info":{"authors":{"author":[{"@pid":"80/1737","text":"Bertil Schmidt"},{"@pid":"39/2195","text":"Andreas Hildebrandt 0001"}]},"title":"Dedicated Bioinformatics Analysis Hardware.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"1142-1150","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Schmidt019","doi":"10.1016/B978-0-12-809633-8.20186-6","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20186-6","url":"https://dblp.org/rec/reference/bioinf/Schmidt019"}, "url":"URL#2299936" }, { "@score":"1", "@id":"2299937", "info":{"authors":{"author":{"@pid":"98/1730","text":"Daniela Schuster"}},"title":"Fingerprints and Pharmacophores.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"619-627","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Schuster19","doi":"10.1016/B978-0-12-809633-8.20190-8","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20190-8","url":"https://dblp.org/rec/reference/bioinf/Schuster19"}, "url":"URL#2299937" }, { "@score":"1", "@id":"2299938", "info":{"authors":{"author":[{"@pid":"26/6426","text":"Jean-Marc Schwartz"},{"@pid":"118/6094","text":"Zita Soons"}]},"title":"Metabolic Models.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"438-444","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/SchwartzS19","doi":"10.1016/B978-0-12-809633-8.20255-0","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20255-0","url":"https://dblp.org/rec/reference/bioinf/SchwartzS19"}, "url":"URL#2299938" }, { "@score":"1", "@id":"2299939", "info":{"authors":{"author":[{"@pid":"162/7408","text":"Angela Serra"},{"@pid":"69/6674","text":"Roberto Tagliaferri"}]},"title":"Unsupervised Learning: Clustering.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"350-357","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/SerraT19","doi":"10.1016/B978-0-12-809633-8.20487-1","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20487-1","url":"https://dblp.org/rec/reference/bioinf/SerraT19"}, "url":"URL#2299939" }, { "@score":"1", "@id":"2299940", "info":{"authors":{"author":[{"@pid":"211/4106","text":"Asuda Sharma"},{"@pid":"a/HHAli","text":"Hesham Ali 0001"},{"@pid":"33/7244","text":"Dario Ghersi"}]},"title":"Cluster Analysis of Biological Networks.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"1036-1046","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Sharma0G19","doi":"10.1016/B978-0-12-809633-8.20494-9","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20494-9","url":"https://dblp.org/rec/reference/bioinf/Sharma0G19"}, "url":"URL#2299940" }, { "@score":"1", "@id":"2299941", "info":{"authors":{"author":{"@pid":"63/2826","text":"Hagit Shatkay"}},"title":"Biomedical Text Mining.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"1099-1109","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Shatkay19","doi":"10.1016/B978-0-12-809633-8.12370-2","ee":"https://doi.org/10.1016/b978-0-12-809633-8.12370-2","url":"https://dblp.org/rec/reference/bioinf/Shatkay19"}, "url":"URL#2299941" }, { "@score":"1", "@id":"2299942", "info":{"authors":{"author":{"@pid":"94/9440","text":"Tsuyoshi Shirai"}},"title":"Protein Structure Analysis and Validation.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"512-519","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Shirai19","doi":"10.1016/B978-0-12-809633-8.20282-3","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20282-3","url":"https://dblp.org/rec/reference/bioinf/Shirai19"}, "url":"URL#2299942" }, { "@score":"1", "@id":"2299943", "info":{"authors":{"author":[{"@pid":"84/4375","text":"David Simoncini"},{"@pid":"44/8713","text":"Kam Y. J. Zhang"}]},"title":"Population-Based Sampling and Fragment-Based De Novo Protein Structure Prediction.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"774-784","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/SimonciniZ19","doi":"10.1016/B978-0-12-809633-8.20507-4","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20507-4","url":"https://dblp.org/rec/reference/bioinf/SimonciniZ19"}, "url":"URL#2299943" }, { "@score":"1", "@id":"2299944", "info":{"authors":{"author":[{"@pid":"60/7929","text":"Onkar Singh"},{"@pid":"35/6671-1","text":"Nai-Wen Chang 0001"},{"@pid":"91/6078","text":"Hong-Jie Dai"},{"@pid":"156/2238","text":"Jitendra Jonnagaddala"}]},"title":"Translational Bioinformatics Databases.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"1058-1062","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Singh0DJ19","doi":"10.1016/B978-0-12-809633-8.20303-8","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20303-8","url":"https://dblp.org/rec/reference/bioinf/Singh0DJ19"}, "url":"URL#2299944" }, { "@score":"1", "@id":"2299945", "info":{"authors":{"author":[{"@pid":"28/8076","text":"Tiratha Raj Singh"},{"@pid":"04/8821","text":"Ankush Bansal"}]},"title":"Gene Duplication and Speciation.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"965-974","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/SinghB19","doi":"10.1016/B978-0-12-809633-8.20176-3","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20176-3","url":"https://dblp.org/rec/reference/bioinf/SinghB19"}, "url":"URL#2299945" }, { "@score":"1", "@id":"2299946", "info":{"authors":{"author":[{"@pid":"28/8076","text":"Tiratha Raj Singh"},{"@pid":"139/1008","text":"Ankita Shukla"},{"@pid":"200/0609","text":"Taoufik Bensellak"},{"@pid":"43/1293","text":"Ahmed Moussa"},{"@pid":"134/3886","text":"Brigitte Vannier"}]},"title":"Disease Biomarker Discovery.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"476-488","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/SinghSBMV19","doi":"10.1016/B978-0-12-809633-8.20137-4","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20137-4","url":"https://dblp.org/rec/reference/bioinf/SinghSBMV19"}, "url":"URL#2299946" }, { "@score":"1", "@id":"2299947", "info":{"authors":{"author":[{"@pid":"277/7146","text":"Dean Southwood"},{"@pid":"r/ShobaRanganathan","text":"Shoba Ranganathan"}]},"title":"Genome Databases and Browsers.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"251-256","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/SouthwoodR19","doi":"10.1016/B978-0-12-809633-8.20754-1","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20754-1","url":"https://dblp.org/rec/reference/bioinf/SouthwoodR19"}, "url":"URL#2299947" }, { "@score":"1", "@id":"2299948", "info":{"authors":{"author":[{"@pid":"277/7146","text":"Dean Southwood"},{"@pid":"r/ShobaRanganathan","text":"Shoba Ranganathan"}]},"title":"Host-Pathogen Interactions.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"103-112","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/SouthwoodR19a","doi":"10.1016/B978-0-12-809633-8.20088-5","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20088-5","url":"https://dblp.org/rec/reference/bioinf/SouthwoodR19a"}, "url":"URL#2299948" }, { "@score":"1", "@id":"2299949", "info":{"authors":{"author":[{"@pid":"277/7734","text":"Srilakshmi Srinivasan"},{"@pid":"162/0562","text":"Jyotsna Batra"}]},"title":"Single Nucleotide Polymorphism Typing.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"432-440","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/SrinivasanB19","doi":"10.1016/B978-0-12-809633-8.20127-1","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20127-1","url":"https://dblp.org/rec/reference/bioinf/SrinivasanB19"}, "url":"URL#2299949" }, { "@score":"1", "@id":"2299950", "info":{"authors":{"author":[{"@pid":"32/6819","text":"Anuj Srivastava"},{"@pid":"210/4387","text":"Joshy George"},{"@pid":"61/5673","text":"R. Krishna Murthy Karuturi"}]},"title":"Transcriptome Analysis.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"792-805","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/SrivastavaGK19","doi":"10.1016/B978-0-12-809633-8.20161-1","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20161-1","url":"https://dblp.org/rec/reference/bioinf/SrivastavaGK19"}, "url":"URL#2299950" }, { "@score":"1", "@id":"2299951", "info":{"authors":{"author":[{"@pid":"41/1189","text":"Giovanni Stracquadanio"},{"@pid":"04/1137","text":"Panos M. Pardalos"}]},"title":"Stochastic Methods for Global Optimization and Problem Solving.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"321-327","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/StracquadanioP19","doi":"10.1016/B978-0-12-809633-8.20329-4","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20329-4","url":"https://dblp.org/rec/reference/bioinf/StracquadanioP19"}, "url":"URL#2299951" }, { "@score":"1", "@id":"2299952", "info":{"authors":{"author":[{"@pid":"277/7319","text":"Suhaila Sulaiman"},{"@pid":"277/7259","text":"Nur S. Yusoff"},{"@pid":"277/7609","text":"Ng S. Mun"},{"@pid":"277/7345","text":"Haslina Makmur"},{"@pid":"91/4733","text":"Mohd Firdaus Raih"}]},"title":"Inference of Horizontal Gene Transfer: Gaining Insights Into Evolution via Lateral Acquisition of Genetic Material.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"953-964","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/SulaimanYMMR19","doi":"10.1016/B978-0-12-809633-8.20173-8","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20173-8","url":"https://dblp.org/rec/reference/bioinf/SulaimanYMMR19"}, "url":"URL#2299952" }, { "@score":"1", "@id":"2299953", "info":{"authors":{"author":[{"@pid":"269/1520","text":"Xiangying Sun"},{"@pid":"99/1651","text":"Michael Gribskov"}]},"title":"MicroRNA and lncRNA Databases and Analysis.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"165-170","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/SunG19","doi":"10.1016/B978-0-12-809633-8.20220-3","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20220-3","url":"https://dblp.org/rec/reference/bioinf/SunG19"}, "url":"URL#2299953" }, { "@score":"1", "@id":"2299954", "info":{"authors":{"author":{"@pid":"76/11254","text":"Vijayaraghava Seshadri Sundararajan"}},"title":"Large Scale Ecological Modeling With Viruses: A Review.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"9-16","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Sundararajan19","doi":"10.1016/B978-0-12-809633-8.20435-4","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20435-4","url":"https://dblp.org/rec/reference/bioinf/Sundararajan19"}, "url":"URL#2299954" }, { "@score":"1", "@id":"2299955", "info":{"authors":{"author":{"@pid":"76/11254","text":"Vijayaraghava Seshadri Sundararajan"}},"title":"Epidemiology: A Review.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"975-979","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Sundararajan19a","doi":"10.1016/B978-0-12-809633-8.20177-5","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20177-5","url":"https://dblp.org/rec/reference/bioinf/Sundararajan19a"}, "url":"URL#2299955" }, { "@score":"1", "@id":"2299956", "info":{"authors":{"author":[{"@pid":"76/11254","text":"Vijayaraghava Seshadri Sundararajan"},{"@pid":"277/7742","text":"Shweta Shrotriya"},{"@pid":"277/7111","text":"Monisha Singhal"},{"@pid":"277/7162","text":"Pragya Chaturvedi"},{"@pid":"06/3392","text":"Prashanth Suravajhala"}]},"title":"Identification and Extraction of Biomarker Information.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"60-65","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/SundararajanSSCS19","doi":"10.1016/B978-0-12-809633-8.20078-2","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20078-2","url":"https://dblp.org/rec/reference/bioinf/SundararajanSSCS19"}, "url":"URL#2299956" }, { "@score":"1", "@id":"2299957", "info":{"authors":{"author":{"@pid":"s/WingKinSung","text":"Wing-Kin Sung"}},"title":"Learning Chromatin Interaction Using Hi-C Datasets.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"318-323","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Sung19","doi":"10.1016/B978-0-12-809633-8.20243-4","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20243-4","url":"https://dblp.org/rec/reference/bioinf/Sung19"}, "url":"URL#2299957" }, { "@score":"1", "@id":"2299958", "info":{"authors":{"author":[{"@pid":"277/7458","text":"Lena Takayasu"},{"@pid":"277/7664","text":"Wataru Suda"},{"@pid":"196/5533","text":"Masahira Hattori"}]},"title":"Mapping the Environmental Microbiome.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"17-28","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/TakayasuSH19","doi":"10.1016/B978-0-12-809633-8.20071-X","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20071-x","url":"https://dblp.org/rec/reference/bioinf/TakayasuSH19"}, "url":"URL#2299958" }, { "@score":"1", "@id":"2299959", "info":{"authors":{"author":[{"@pid":"26/2835","text":"Kazuhiro Takemoto"},{"@pid":"277/1045","text":"Midori Iida"}]},"title":"Ecological Networks.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"1131-1141","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/TakemotoI19","doi":"10.1016/B978-0-12-809633-8.20203-3","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20203-3","url":"https://dblp.org/rec/reference/bioinf/TakemotoI19"}, "url":"URL#2299959" }, { "@score":"1", "@id":"2299960", "info":{"authors":{"author":{"@pid":"44/5373","text":"Domenico Talia"}},"title":"Models and Languages for High-Performance Computing.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"215-220","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Talia19","doi":"10.1016/B978-0-12-809633-8.20370-1","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20370-1","url":"https://dblp.org/rec/reference/bioinf/Talia19"}, "url":"URL#2299960" }, { "@score":"1", "@id":"2299961", "info":{"authors":{"author":[{"@pid":"04/11191","text":"Vladimir B. Teif"},{"@pid":"277/7615","text":"Christopher T. Clarkson"}]},"title":"Nucleosome Positioning.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"308-317","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/TeifC19","doi":"10.1016/B978-0-12-809633-8.20242-2","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20242-2","url":"https://dblp.org/rec/reference/bioinf/TeifC19"}, "url":"URL#2299961" }, { "@score":"1", "@id":"2299962", "info":{"authors":{"author":[{"@pid":"123/7659","text":"Chian Teo"},{"@pid":"277/7452","text":"Zalikha Ibrahim"},{"@pid":"123/7352","text":"Mohd Basyaruddin Abdul Rahman"},{"@pid":"123/7403","text":"Bimo Ario Tejo"}]},"title":"Structure-Based Design of Peptide Inhibitors for Protein Arginine Deiminase Type IV (PAD4).","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"729-740","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/TeoIRT19","doi":"10.1016/B978-0-12-809633-8.20156-8","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20156-8","url":"https://dblp.org/rec/reference/bioinf/TeoIRT19"}, "url":"URL#2299962" }, { "@score":"1", "@id":"2299963", "info":{"authors":{"author":[{"@pid":"76/10805","text":"Prasoon Kumar Thakur"},{"@pid":"262/7451","text":"Hukam C. Rawal"},{"@pid":"277/7099","text":"Mina Obuca"},{"@pid":"226/7299","text":"Sandeep Kaushik"}]},"title":"Bioinformatics Approaches for Studying Alternative Splicing.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"221-234","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/ThakurROK19","doi":"10.1016/B978-0-12-809633-8.20228-8","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20228-8","url":"https://dblp.org/rec/reference/bioinf/ThakurROK19"}, "url":"URL#2299963" }, { "@score":"1", "@id":"2299964", "info":{"authors":{"author":[{"@pid":"50/1703","text":"Paolo Tieri"},{"@pid":"88/1445","text":"Lorenzo Farina"},{"@pid":"179/4534","text":"Manuela Petti"},{"@pid":"04/5812","text":"Laura Astolfi"},{"@pid":"18/7066","text":"Paola Paci"},{"@pid":"43/6861","text":"Filippo Castiglione"}]},"title":"Network Inference and Reconstruction in Bioinformatics.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"805-813","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/TieriFPAPC19","doi":"10.1016/B978-0-12-809633-8.20290-2","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20290-2","url":"https://dblp.org/rec/reference/bioinf/TieriFPAPC19"}, "url":"URL#2299964" }, { "@score":"1", "@id":"2299965", "info":{"authors":{"author":[{"@pid":"55/2731","text":"Alfredo Tirado-Ramos"},{"@pid":"182/0311","text":"Laura S. Manuel"}]},"title":"Models for Computable Phenotyping.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"154-159","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Tirado-RamosM19","doi":"10.1016/B978-0-12-809633-8.20419-6","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20419-6","url":"https://dblp.org/rec/reference/bioinf/Tirado-RamosM19"}, "url":"URL#2299965" }, { "@score":"1", "@id":"2299966", "info":{"authors":{"author":[{"@pid":"164/9177","text":"Pradeep Kumar Tiwari"},{"@pid":"41/3406","text":"Sonal Gupta"},{"@pid":"78/4454","text":"Anuj Kumar"},{"@pid":"20/8147","text":"Mansi Sharma"},{"@pid":"76/11254","text":"Vijayaraghava Seshadri Sundararajan"},{"@pid":"123/5915","text":"Shanker L. Kothari"},{"@pid":"277/7029","text":"Sandeep K. Mathur"},{"@pid":"277/7269","text":"Krishna M. Medicherla"},{"@pid":"06/3392","text":"Prashanth Suravajhala"},{"@pid":"277/7542","text":"Babita Malik"}]},"title":"Characterizing and Functional Assignment of Noncoding RNAs.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"47-59","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/TiwariGKSSKMMSM19","doi":"10.1016/B978-0-12-809633-8.20077-0","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20077-0","url":"https://dblp.org/rec/reference/bioinf/TiwariGKSSKMMSM19"}, "url":"URL#2299966" }, { "@score":"1", "@id":"2299967", "info":{"authors":{"author":{"@pid":"99/4630","text":"Hiroyuki Toh"}},"title":"Phylogenetic Footprinting.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"284-287","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Toh19","doi":"10.1016/B978-0-12-809633-8.20238-0","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20238-0","url":"https://dblp.org/rec/reference/bioinf/Toh19"}, "url":"URL#2299967" }, { "@score":"1", "@id":"2299968", "info":{"authors":{"author":[{"@pid":"277/7173","text":"Vartika Tomar"},{"@pid":"10/7631","text":"Mohit Mazumder"},{"@pid":"15/3784","text":"Ramesh Chandra"},{"@pid":"181/2854","text":"Jian Yang"},{"@pid":"92/73","text":"Meena K. Sakharkar"}]},"title":"Small Molecule Drug Design.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"741-760","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/TomarMCYS19","doi":"10.1016/B978-0-12-809633-8.20157-X","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20157-x","url":"https://dblp.org/rec/reference/bioinf/TomarMCYS19"}, "url":"URL#2299968" }, { "@score":"1", "@id":"2299969", "info":{"authors":{"author":{"@pid":"00/2749","text":"Kentaro Tomii"}},"title":"Protein Properties.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"28-33","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Tomii19","doi":"10.1016/B978-0-12-809633-8.20266-5","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20266-5","url":"https://dblp.org/rec/reference/bioinf/Tomii19"}, "url":"URL#2299969" }, { "@score":"1", "@id":"2299970", "info":{"authors":{"author":[{"@pid":"95/1778","text":"Giuseppe Tradigo"},{"@pid":"277/7369","text":"Francesca Rondinelli"},{"@pid":"19/6865","text":"Gianluca Pollastri"}]},"title":"Algorithms for Structure Comparison and Analysis: Prediction of Tertiary Structures of Proteins.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"32-37","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/TradigoRP19","doi":"10.1016/B978-0-12-809633-8.20483-4","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20483-4","url":"https://dblp.org/rec/reference/bioinf/TradigoRP19"}, "url":"URL#2299970" }, { "@score":"1", "@id":"2299971", "info":{"authors":{"author":[{"@pid":"95/1778","text":"Giuseppe Tradigo"},{"@pid":"277/7369","text":"Francesca Rondinelli"},{"@pid":"19/6865","text":"Gianluca Pollastri"}]},"title":"Algorithms for Structure Comparison and Analysis: Docking.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"77-80","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/TradigoRP19a","doi":"10.1016/B978-0-12-809633-8.20485-8","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20485-8","url":"https://dblp.org/rec/reference/bioinf/TradigoRP19a"}, "url":"URL#2299971" }, { "@score":"1", "@id":"2299972", "info":{"authors":{"author":[{"@pid":"178/0963","text":"Lokesh P. Tripathi"},{"@pid":"57/3421","text":"Yi-An Chen"},{"@pid":"16/1058","text":"Kenji Mizuguchi"},{"@pid":"14/3180","text":"Yoichi Murakami"}]},"title":"Network-Based Analysis for Biological Discovery.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"283-291","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/TripathiCMM19","doi":"10.1016/B978-0-12-809633-8.20674-2","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20674-2","url":"https://dblp.org/rec/reference/bioinf/TripathiCMM19"}, "url":"URL#2299972" }, { "@score":"1", "@id":"2299973", "info":{"authors":{"author":[{"@pid":"178/0963","text":"Lokesh P. Tripathi"},{"@pid":"57/3421","text":"Yi-An Chen"},{"@pid":"16/1058","text":"Kenji Mizuguchi"},{"@pid":"96/3349","text":"Eiji Morita"}]},"title":"Network-Based Analysis of Host-Pathogen Interactions.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"932-937","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/TripathiCMM19a","doi":"10.1016/B978-0-12-809633-8.20170-2","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20170-2","url":"https://dblp.org/rec/reference/bioinf/TripathiCMM19a"}, "url":"URL#2299973" }, { "@score":"1", "@id":"2299974", "info":{"authors":{"author":[{"@pid":"178/0963","text":"Lokesh P. Tripathi"},{"@pid":"277/7065","text":"Tsuyoshi Esaki"},{"@pid":"277/7153","text":"Mari N. Itoh"},{"@pid":"57/3421","text":"Yi-An Chen"},{"@pid":"16/1058","text":"Kenji Mizuguchi"}]},"title":"Integrative Analysis of Multi-Omics Data.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"194-199","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/TripathiEICM19","doi":"10.1016/B978-0-12-809633-8.20096-4","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20096-4","url":"https://dblp.org/rec/reference/bioinf/TripathiEICM19"}, "url":"URL#2299974" }, { "@score":"1", "@id":"2299975", "info":{"authors":{"author":{"@pid":"t/PaoloTrunfio","text":"Paolo Trunfio"}},"title":"Infrastructures for High-Performance Computing: Cloud Computing.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"236-239","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Trunfio19","doi":"10.1016/B978-0-12-809633-8.20373-7","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20373-7","url":"https://dblp.org/rec/reference/bioinf/Trunfio19"}, "url":"URL#2299975" }, { "@score":"1", "@id":"2299976", "info":{"authors":{"author":[{"@pid":"277/7148","text":"Fotis Tsetsos"},{"@pid":"67/1567","text":"Petros Drineas"},{"@pid":"203/7687","text":"Peristera Paschou"}]},"title":"Genetics and Population Analysis.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"363-378","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/TsetsosDP19","doi":"10.1016/B978-0-12-809633-8.20114-3","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20114-3","url":"https://dblp.org/rec/reference/bioinf/TsetsosDP19"}, "url":"URL#2299976" }, { "@score":"1", "@id":"2299977", "info":{"authors":{"author":[{"@pid":"56/576","text":"Alfonso Urso"},{"@pid":"05/4646","text":"Antonino Fiannaca"},{"@pid":"56/4832","text":"Massimo La Rosa"},{"@pid":"172/1565","text":"Valentina Ravì"},{"@pid":"27/2866","text":"Riccardo Rizzo"}]},"title":"Data Mining: Classification and Prediction.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"384-402","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/UrsoFRRR19","doi":"10.1016/B978-0-12-809633-8.20461-5","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20461-5","url":"https://dblp.org/rec/reference/bioinf/UrsoFRRR19"}, "url":"URL#2299977" }, { "@score":"1", "@id":"2299978", "info":{"authors":{"author":[{"@pid":"56/576","text":"Alfonso Urso"},{"@pid":"05/4646","text":"Antonino Fiannaca"},{"@pid":"56/4832","text":"Massimo La Rosa"},{"@pid":"172/1565","text":"Valentina Ravì"},{"@pid":"27/2866","text":"Riccardo Rizzo"}]},"title":"Data Mining: Prediction Methods.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"413-430","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/UrsoFRRR19a","doi":"10.1016/B978-0-12-809633-8.20462-7","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20462-7","url":"https://dblp.org/rec/reference/bioinf/UrsoFRRR19a"}, "url":"URL#2299978" }, { "@score":"1", "@id":"2299979", "info":{"authors":{"author":[{"@pid":"28/3355","text":"Fatemeh Vafaee"},{"@pid":"277/7644","text":"Hamed Dashti"},{"@pid":"130/0595","text":"Hamid Alinejad-Rokny"}]},"title":"Transcriptomic Data Normalization.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"364-371","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/VafaeeDA19","doi":"10.1016/B978-0-12-809633-8.20209-4","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20209-4","url":"https://dblp.org/rec/reference/bioinf/VafaeeDA19"}, "url":"URL#2299979" }, { "@score":"1", "@id":"2299980", "info":{"authors":{"author":[{"@pid":"69/645","text":"Leonardo Vanneschi"},{"@pid":"92/7966","text":"Mauro Castelli"}]},"title":"Multilayer Perceptrons.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"612-620","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/VanneschiC19","doi":"10.1016/B978-0-12-809633-8.20339-7","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20339-7","url":"https://dblp.org/rec/reference/bioinf/VanneschiC19"}, "url":"URL#2299980" }, { "@score":"1", "@id":"2299981", "info":{"authors":{"author":[{"@pid":"69/645","text":"Leonardo Vanneschi"},{"@pid":"92/7966","text":"Mauro Castelli"}]},"title":"Delta Rule and Backpropagation.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"621-633","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/VanneschiC19a","doi":"10.1016/B978-0-12-809633-8.20340-3","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20340-3","url":"https://dblp.org/rec/reference/bioinf/VanneschiC19a"}, "url":"URL#2299981" }, { "@score":"1", "@id":"2299982", "info":{"authors":{"author":[{"@pid":"277/7505","text":"Ramakanth Chirravuri Venkata"},{"@pid":"33/7244","text":"Dario Ghersi"}]},"title":"Biological Pathway Data Formats and Standards.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"1063-1066","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/VenkataG19","doi":"10.1016/B978-0-12-809633-8.20432-9","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20432-9","url":"https://dblp.org/rec/reference/bioinf/VenkataG19"}, "url":"URL#2299982" }, { "@score":"1", "@id":"2299983", "info":{"authors":{"author":[{"@pid":"277/7505","text":"Ramakanth Chirravuri Venkata"},{"@pid":"33/7244","text":"Dario Ghersi"}]},"title":"Biological Pathway Analysis.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"1067-1070","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/VenkataG19a","doi":"10.1016/B978-0-12-809633-8.20476-7","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20476-7","url":"https://dblp.org/rec/reference/bioinf/VenkataG19a"}, "url":"URL#2299983" }, { "@score":"1", "@id":"2299984", "info":{"authors":{"author":[{"@pid":"277/7698","text":"Cara Van Der Wal"},{"@pid":"144/2202","text":"Simon Y. W. Ho"}]},"title":"Molecular Clock.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"719-726","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/WalH19","doi":"10.1016/B978-0-12-809633-8.20257-4","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20257-4","url":"https://dblp.org/rec/reference/bioinf/WalH19"}, "url":"URL#2299984" }, { "@score":"1", "@id":"2299985", "info":{"authors":{"author":[{"@pid":"203/2114","text":"Jyotsna Talreja Wassan"},{"@pid":"45/1696-1","text":"Haiying Wang 0001"},{"@pid":"27/2027","text":"Huiru Zheng"}]},"title":"Machine Learning in Bioinformatics.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"300-308","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Wassan0Z19","doi":"10.1016/B978-0-12-809633-8.20331-2","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20331-2","url":"https://dblp.org/rec/reference/bioinf/Wassan0Z19"}, "url":"URL#2299985" }, { "@score":"1", "@id":"2299986", "info":{"authors":{"author":{"@pid":"277/7349","text":"Kelly L. Williams"}},"title":"Gene Mapping.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"242-250","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Williams19","doi":"10.1016/B978-0-12-809633-8.20233-1","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20233-1","url":"https://dblp.org/rec/reference/bioinf/Williams19"}, "url":"URL#2299986" }, { "@score":"1", "@id":"2299987", "info":{"authors":{"author":[{"@pid":"277/7646","text":"John-James Wilson"},{"@pid":"277/7468","text":"Kong-Wah Sing"},{"@pid":"277/7457","text":"Narong Jaturas"}]},"title":"DNA Barcoding: Bioinformatics Workflows for Beginners.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"985-995","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/WilsonSJ19","doi":"10.1016/B978-0-12-809633-8.20468-8","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20468-8","url":"https://dblp.org/rec/reference/bioinf/WilsonSJ19"}, "url":"URL#2299987" }, { "@score":"1", "@id":"2299988", "info":{"authors":{"author":{"@pid":"16/488","text":"Marco Wiltgen"}},"title":"Algorithms for Structure Comparison and Analysis: Homology Modelling of Proteins.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"38-61","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Wiltgen19","doi":"10.1016/B978-0-12-809633-8.20484-6","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20484-6","url":"https://dblp.org/rec/reference/bioinf/Wiltgen19"}, "url":"URL#2299988" }, { "@score":"1", "@id":"2299989", "info":{"authors":{"author":[{"@pid":"w/EdgarWingender","text":"Edgar Wingender"},{"@pid":"46/2015","text":"Alexander E. Kel"},{"@pid":"03/5692","text":"Mathias Krull"}]},"title":"Transcription Factor Databases.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"134-141","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/WingenderKK19","doi":"10.1016/B978-0-12-809633-8.20216-1","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20216-1","url":"https://dblp.org/rec/reference/bioinf/WingenderKK19"}, "url":"URL#2299989" }, { "@score":"1", "@id":"2299990", "info":{"authors":{"author":[{"@pid":"277/7558","text":"Adison Wong"},{"@pid":"06/4325","text":"Maurice H. T. Ling"}]},"title":"Characterization of Transcriptional Activities.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"830-841","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/WongL19","doi":"10.1016/B978-0-12-809633-8.20446-9","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20446-9","url":"https://dblp.org/rec/reference/bioinf/WongL19"}, "url":"URL#2299990" }, { "@score":"1", "@id":"2299991", "info":{"authors":{"author":[{"@pid":"277/7436","text":"Ayako Yachie-Kinoshita"},{"@pid":"46/535","text":"Kazunari Kaizu"}]},"title":"Cell Modeling and Simulation.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"864-873","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Yachie-KinoshitaK19","doi":"10.1016/B978-0-12-809633-8.20294-X","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20294-x","url":"https://dblp.org/rec/reference/bioinf/Yachie-KinoshitaK19"}, "url":"URL#2299991" }, { "@score":"1", "@id":"2299992", "info":{"authors":{"author":[{"@pid":"277/7436","text":"Ayako Yachie-Kinoshita"},{"@pid":"23/10560","text":"Sucheendra K. Palaniappan"},{"@pid":"00/4673","text":"Samik Ghosh"}]},"title":"Computational Systems Biology Applications.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"66-73","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Yachie-KinoshitaPG19","doi":"10.1016/B978-0-12-809633-8.20079-4","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20079-4","url":"https://dblp.org/rec/reference/bioinf/Yachie-KinoshitaPG19"}, "url":"URL#2299992" }, { "@score":"1", "@id":"2299993", "info":{"authors":{"author":{"@pid":"12/4925","text":"Tetsushi Yada"}},"title":"Genome Alignment.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"268-283","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Yada19","doi":"10.1016/B978-0-12-809633-8.20237-9","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20237-9","url":"https://dblp.org/rec/reference/bioinf/Yada19"}, "url":"URL#2299993" }, { "@score":"1", "@id":"2299994", "info":{"authors":{"author":[{"@pid":"277/7746","text":"Beow Keat Yap"},{"@pid":"277/7147","text":"Chong-Yew Lee"},{"@pid":"123/7345","text":"Sy Bing Choi"},{"@pid":"277/7731","text":"Ezatul E. Kamarulzaman"},{"@pid":"277/7022","text":"Maywan Hariono"},{"@pid":"03/5922","text":"Habibah A. Wahab"}]},"title":"In Silico Identification of Novel Inhibitors.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"761-779","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/YapLCKHW19","doi":"10.1016/B978-0-12-809633-8.20158-1","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20158-1","url":"https://dblp.org/rec/reference/bioinf/YapLCKHW19"}, "url":"URL#2299994" }, { "@score":"1", "@id":"2299995", "info":{"authors":{"author":[{"@pid":"238/9232","text":"Xiaoxin Ye"},{"@pid":"78/5950","text":"Joshua W. K. Ho"}]},"title":"Expression Clustering.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"388-395","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/YeH19","doi":"10.1016/B978-0-12-809633-8.20212-4","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20212-4","url":"https://dblp.org/rec/reference/bioinf/YeH19"}, "url":"URL#2299995" }, { "@score":"1", "@id":"2299996", "info":{"authors":{"author":{"@pid":"85/7947","text":"Ragothaman Yennamalli"}},"title":"Protein Design.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"644-651","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Yennamalli19","doi":"10.1016/B978-0-12-809633-8.20151-9","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20151-9","url":"https://dblp.org/rec/reference/bioinf/Yennamalli19"}, "url":"URL#2299996" }, { "@score":"1", "@id":"2299997", "info":{"authors":{"author":[{"@pid":"07/2864-2","text":"Rui Yin 0002"},{"@pid":"32/228","text":"Chee Keong Kwoh 0001"},{"@pid":"94/190-2","text":"Jie Zheng 0002"}]},"title":"Whole Genome Sequencing Analysis.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"176-183","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Yin0019","doi":"10.1016/B978-0-12-809633-8.20095-2","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20095-2","url":"https://dblp.org/rec/reference/bioinf/Yin0019"}, "url":"URL#2299997" }, { "@score":"1", "@id":"2299998", "info":{"authors":{"author":[{"@pid":"213/7604","text":"Hong Yung Yip"},{"@pid":"235/1994","text":"Nur Aishah Taib"},{"@pid":"277/7360","text":"Haris A. Khan"},{"@pid":"126/0517","text":"Sarinder Kaur Dhillon"}]},"title":"Electronic Health Record Integration.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"1063-1076","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/YipTKD19","doi":"10.1016/B978-0-12-809633-8.20306-3","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20306-3","url":"https://dblp.org/rec/reference/bioinf/YipTKD19"}, "url":"URL#2299998" }, { "@score":"1", "@id":"2299999", "info":{"authors":{"author":[{"@pid":"141/3358","text":"Muhammad Yusuf"},{"@pid":"212/0141","text":"Ari Hardianto"},{"@pid":"159/4825","text":"Muchtaridi Muchtaridi"},{"@pid":"277/6998","text":"Rina F. Nuwarda"},{"@pid":"277/7600","text":"Toto Subroto"}]},"title":"Introduction of Docking-Based Virtual Screening Workflow Using Desktop Personal Computer.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"688-699","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/YusufHMNS19","doi":"10.1016/B978-0-12-809633-8.20277-X","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20277-x","url":"https://dblp.org/rec/reference/bioinf/YusufHMNS19"}, "url":"URL#2299999" }, { "@score":"1", "@id":"2300000", "info":{"authors":{"author":[{"@pid":"277/7061","text":"Lina A. M. Zalani"},{"@pid":"277/7624","text":"Kho S. Jye"},{"@pid":"277/7241","text":"Shaarmini Balakrishnan"},{"@pid":"126/0517","text":"Sarinder Kaur Dhillon"}]},"title":"Biodiversity Databases and Tools.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"1110-1123","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/ZalaniJBD19","doi":"10.1016/B978-0-12-809633-8.20200-8","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20200-8","url":"https://dblp.org/rec/reference/bioinf/ZalaniJBD19"}, "url":"URL#2300000" }, { "@score":"1", "@id":"2300001", "info":{"authors":{"author":[{"@pid":"16/2037","text":"Guanglan Zhang"},{"@pid":"24/10786","text":"Derin B. Keskin"},{"@pid":"14/1033","text":"Lou Chitkushev"}]},"title":"Extraction of Immune Epitope Information.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"39-46","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/ZhangKC19","doi":"10.1016/B978-0-12-809633-8.20074-5","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20074-5","url":"https://dblp.org/rec/reference/bioinf/ZhangKC19"}, "url":"URL#2300001" }, { "@score":"1", "@id":"2300002", "info":{"authors":{"author":[{"@pid":"11/4656","text":"Zhongming Zhao"},{"@pid":"31/7388","text":"Junfeng Xia"}]},"title":"Computational Approaches for Modeling Signal Transduction Networks.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"856-863","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/ZhaoX19","doi":"10.1016/B978-0-12-809633-8.20293-8","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20293-8","url":"https://dblp.org/rec/reference/bioinf/ZhaoX19"}, "url":"URL#2300002" }, { "@score":"1", "@id":"2300003", "info":{"authors":{"author":[{"@pid":"277/7513","text":"Liangzhen Zheng"},{"@pid":"164/6645","text":"Amr Alhossary"},{"@pid":"32/228","text":"Chee-Keong Kwoh 0001"},{"@pid":"42/10998","text":"Yuguang Mu"}]},"title":"Molecular Dynamics and Simulation.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"550-566","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/ZhengA0M19","doi":"10.1016/B978-0-12-809633-8.20284-7","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20284-7","url":"https://dblp.org/rec/reference/bioinf/ZhengA0M19"}, "url":"URL#2300003" }, { "@score":"1", "@id":"2300004", "info":{"authors":{"author":[{"@pid":"50/3639","text":"Italo Zoppis"},{"@pid":"79/4374","text":"Giancarlo Mauri"},{"@pid":"59/1669","text":"Riccardo Dondi"}]},"title":"Kernel Machines: Introduction.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"495-502","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/ZoppisMD19","doi":"10.1016/B978-0-12-809633-8.20341-5","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20341-5","url":"https://dblp.org/rec/reference/bioinf/ZoppisMD19"}, "url":"URL#2300004" }, { "@score":"1", "@id":"2300005", "info":{"authors":{"author":[{"@pid":"50/3639","text":"Italo Zoppis"},{"@pid":"79/4374","text":"Giancarlo Mauri"},{"@pid":"59/1669","text":"Riccardo Dondi"}]},"title":"Kernel Methods: Support Vector Machines.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"503-510","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/ZoppisMD19a","doi":"10.1016/B978-0-12-809633-8.20342-7","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20342-7","url":"https://dblp.org/rec/reference/bioinf/ZoppisMD19a"}, "url":"URL#2300005" }, { "@score":"1", "@id":"2300006", "info":{"authors":{"author":[{"@pid":"50/3639","text":"Italo Zoppis"},{"@pid":"79/4374","text":"Giancarlo Mauri"},{"@pid":"59/1669","text":"Riccardo Dondi"}]},"title":"Kernel Machines: Applications.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"511-518","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/ZoppisMD19b","doi":"10.1016/B978-0-12-809633-8.20343-9","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20343-9","url":"https://dblp.org/rec/reference/bioinf/ZoppisMD19b"}, "url":"URL#2300006" }, { "@score":"1", "@id":"2300007", "info":{"authors":{"author":{"@pid":"185/7506","text":"Chiara Zucco"}},"title":"Data Mining in Bioinformatics.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"328-335","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Zucco19","doi":"10.1016/B978-0-12-809633-8.20381-6","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20381-6","url":"https://dblp.org/rec/reference/bioinf/Zucco19"}, "url":"URL#2300007" }, { "@score":"1", "@id":"2300008", "info":{"authors":{"author":{"@pid":"185/7506","text":"Chiara Zucco"}},"title":"Multiple Learners Combination: Introduction.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"519-524","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Zucco19a","doi":"10.1016/B978-0-12-809633-8.20344-0","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20344-0","url":"https://dblp.org/rec/reference/bioinf/Zucco19a"}, "url":"URL#2300008" }, { "@score":"1", "@id":"2300009", "info":{"authors":{"author":{"@pid":"185/7506","text":"Chiara Zucco"}},"title":"Multiple Learners Combination: Bagging.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"525-530","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Zucco19b","doi":"10.1016/B978-0-12-809633-8.20345-2","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20345-2","url":"https://dblp.org/rec/reference/bioinf/Zucco19b"}, "url":"URL#2300009" }, { "@score":"1", "@id":"2300010", "info":{"authors":{"author":{"@pid":"185/7506","text":"Chiara Zucco"}},"title":"Multiple Learners Combination: Boosting.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"531-535","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Zucco19c","doi":"10.1016/B978-0-12-809633-8.20346-4","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20346-4","url":"https://dblp.org/rec/reference/bioinf/Zucco19c"}, "url":"URL#2300010" }, { "@score":"1", "@id":"2300011", "info":{"authors":{"author":{"@pid":"185/7506","text":"Chiara Zucco"}},"title":"Multiple Learners Combination: Stacking.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"536-538","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Zucco19d","doi":"10.1016/B978-0-12-809633-8.20347-6","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20347-6","url":"https://dblp.org/rec/reference/bioinf/Zucco19d"}, "url":"URL#2300011" }, { "@score":"1", "@id":"2300012", "info":{"authors":{"author":{"@pid":"185/7506","text":"Chiara Zucco"}},"title":"Multiple Learners Combination: Cascading.","venue":"Encyclopedia of Bioinformatics and Computational Biology","pages":"539-541","year":"2019","type":"Reference Works","access":"closed","key":"reference/bioinf/Zucco19e","doi":"10.1016/B978-0-12-809633-8.20348-8","ee":"https://doi.org/10.1016/b978-0-12-809633-8.20348-8","url":"https://dblp.org/rec/reference/bioinf/Zucco19e"}, "url":"URL#2300012" }, { "@score":"1", "@id":"2300013", "info":{"authors":{"author":[{"@pid":"52/328-1","text":"Di Wu 0001"},{"@pid":"171/6694","text":"Yi-Hao Ke"},{"@pid":"24/6837","text":"Jian He"},{"@pid":"93/2334-8","text":"Yong Li 0008"},{"@pid":"50/6996-3","text":"Min Chen 0003"}]},"title":"Mobile Cloud Gaming.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/0001KHLC19","doi":"10.1007/978-3-319-08234-9_77-2","ee":"https://doi.org/10.1007/978-3-319-08234-9_77-2","url":"https://dblp.org/rec/reference/ecgg/0001KHLC19"}, "url":"URL#2300013" }, { "@score":"1", "@id":"2300014", "info":{"authors":{"author":[{"@pid":"38/175","text":"Leigh Achterbosch"},{"@pid":"v/PeterVamplew","text":"Peter Vamplew 0001"}]},"title":"Griefing in MMORPGs.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/AchterboschV19","doi":"10.1007/978-3-319-08234-9_200-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_200-1","url":"https://dblp.org/rec/reference/ecgg/AchterboschV19"}, "url":"URL#2300014" }, { "@score":"1", "@id":"2300015", "info":{"authors":{"author":{"@pid":"203/0117","text":"Ali Adjorlu"}},"title":"Virtual Reality Therapy.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Adjorlu19","doi":"10.1007/978-3-319-08234-9_244-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_244-1","url":"https://dblp.org/rec/reference/ecgg/Adjorlu19"}, "url":"URL#2300015" }, { "@score":"1", "@id":"2300016", "info":{"authors":{"author":[{"@pid":"238/9351","text":"Alonso Gragera Aguaza"},{"@pid":"139/8142","text":"Jean-François Baffier"},{"@pid":"72/10310","text":"Vorapong Suppakitpaisarn"}]},"title":"Skull and Roses Card Game.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/AguazaBS19","doi":"10.1007/978-3-319-08234-9_19-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_19-1","url":"https://dblp.org/rec/reference/ecgg/AguazaBS19"}, "url":"URL#2300016" }, { "@score":"1", "@id":"2300017", "info":{"authors":{"author":[{"@pid":"117/8137","text":"Ryuya Akase"},{"@pid":"83/198","text":"Yoshihiro Okada"}]},"title":"3D Room Layout System Using IEC (Interactive Evaluational Computation).","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/AkaseO19","doi":"10.1007/978-3-319-08234-9_34-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_34-1","url":"https://dblp.org/rec/reference/ecgg/AkaseO19"}, "url":"URL#2300017" }, { "@score":"1", "@id":"2300018", "info":{"authors":{"author":[{"@pid":"238/9319","text":"Kemal Akay"},{"@pid":"238/9325","text":"Cansu Nur Simsek"}]},"title":"Design of Alienation in Video Games.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/AkayS19","doi":"10.1007/978-3-319-08234-9_150-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_150-1","url":"https://dblp.org/rec/reference/ecgg/AkayS19"}, "url":"URL#2300018" }, { "@score":"1", "@id":"2300019", "info":{"authors":{"author":{"@pid":"238/9333","text":"Tariq Alrimawi"}},"title":"Challenges Facing the Arab Animation Cinema.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Alrimawi19","doi":"10.1007/978-3-319-08234-9_62-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_62-1","url":"https://dblp.org/rec/reference/ecgg/Alrimawi19"}, "url":"URL#2300019" }, { "@score":"1", "@id":"2300020", "info":{"authors":{"author":[{"@pid":"230/6301","text":"Luís Aly"},{"@pid":"143/5080","text":"Rui Penha"},{"@pid":"134/6313","text":"Gilberto Bernardes"}]},"title":"Biosensing in Interactive Art: A User-Centered Taxonomy.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/AlyPB19","doi":"10.1007/978-3-319-08234-9_210-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_210-1","url":"https://dblp.org/rec/reference/ecgg/AlyPB19"}, "url":"URL#2300020" }, { "@score":"1", "@id":"2300021", "info":{"authors":{"author":[{"@pid":"182/6304","text":"Inês Amaral"},{"@pid":"238/9322","text":"Frederico Fonseca"}]},"title":"Games and Active Aging.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/AmaralF19","doi":"10.1007/978-3-319-08234-9_159-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_159-1","url":"https://dblp.org/rec/reference/ecgg/AmaralF19"}, "url":"URL#2300021" }, { "@score":"1", "@id":"2300022", "info":{"authors":{"author":[{"@pid":"157/6674","text":"Jaime Arias 0001"},{"@pid":"118/4077","text":"Raphaël Marczak"},{"@pid":"41/4845","text":"Myriam Desainte-Catherine"}]},"title":"Timed Automata for Video Games and Interaction.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/AriasMD19","doi":"10.1007/978-3-319-08234-9_298-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_298-1","url":"https://dblp.org/rec/reference/ecgg/AriasMD19"}, "url":"URL#2300022" }, { "@score":"1", "@id":"2300023", "info":{"authors":{"author":[{"@pid":"238/9354","text":"Metin Arica"},{"@pid":"238/9359","text":"Burak Tezateser"}]},"title":"Comic Arts in Games, Asset Production, and Rendering.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/AricaT19","doi":"10.1007/978-3-319-08234-9_153-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_153-1","url":"https://dblp.org/rec/reference/ecgg/AricaT19"}, "url":"URL#2300023" }, { "@score":"1", "@id":"2300024", "info":{"authors":{"author":{"@pid":"14/1222","text":"Sylvester Arnab"}},"title":"Game-Based Interventions in Public Health: Exploiting the Engaging Factor of Gameplay.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Arnab19","doi":"10.1007/978-3-319-08234-9_29-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_29-1","url":"https://dblp.org/rec/reference/ecgg/Arnab19"}, "url":"URL#2300024" }, { "@score":"1", "@id":"2300025", "info":{"authors":{"author":[{"@pid":"a/RamazanSavasAygun","text":"Ramazan S. Aygün"},{"@pid":"158/4774","text":"Vineetha Bettaiah"}]},"title":"Query-by-Gaming.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/AygunB19","doi":"10.1007/978-3-319-08234-9_100-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_100-1","url":"https://dblp.org/rec/reference/ecgg/AygunB19"}, "url":"URL#2300025" }, { "@score":"1", "@id":"2300026", "info":{"authors":{"author":{"@pid":"238/9343","text":"Ross Berger"}},"title":"Game Writer's Dilemma: Context vs. Story.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Berger19","doi":"10.1007/978-3-319-08234-9_129-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_129-1","url":"https://dblp.org/rec/reference/ecgg/Berger19"}, "url":"URL#2300026" }, { "@score":"1", "@id":"2300027", "info":{"authors":{"author":{"@pid":"238/9343","text":"Ross Berger"}},"title":"Video Game Storytelling Fundamentals: Setting, Power Status, Tone, Escalation.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Berger19a","doi":"10.1007/978-3-319-08234-9_128-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_128-1","url":"https://dblp.org/rec/reference/ecgg/Berger19a"}, "url":"URL#2300027" }, { "@score":"1", "@id":"2300028", "info":{"authors":{"author":{"@pid":"238/9343","text":"Ross Berger"}},"title":"Video Game Trolls and Dopamine Withdrawal.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Berger19b","doi":"10.1007/978-3-319-08234-9_127-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_127-1","url":"https://dblp.org/rec/reference/ecgg/Berger19b"}, "url":"URL#2300028" }, { "@score":"1", "@id":"2300029", "info":{"authors":{"author":{"@pid":"122/4020","text":"Mehmet Ilker Berkman"}},"title":"Eye Tracking in Virtual Reality.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Berkman19","doi":"10.1007/978-3-319-08234-9_170-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_170-1","url":"https://dblp.org/rec/reference/ecgg/Berkman19"}, "url":"URL#2300029" }, { "@score":"1", "@id":"2300030", "info":{"authors":{"author":{"@pid":"122/4020","text":"Mehmet Ilker Berkman"}},"title":"History of Virtual Reality.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Berkman19a","doi":"10.1007/978-3-319-08234-9_169-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_169-1","url":"https://dblp.org/rec/reference/ecgg/Berkman19a"}, "url":"URL#2300030" }, { "@score":"1", "@id":"2300031", "info":{"authors":{"author":[{"@pid":"122/4020","text":"Mehmet Ilker Berkman"},{"@pid":"238/9328","text":"Ecehan Akan"}]},"title":"Presence and Immersion in Virtual Reality.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/BerkmanA19","doi":"10.1007/978-3-319-08234-9_162-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_162-1","url":"https://dblp.org/rec/reference/ecgg/BerkmanA19"}, "url":"URL#2300031" }, { "@score":"1", "@id":"2300032", "info":{"authors":{"author":[{"@pid":"134/6313","text":"Gilberto Bernardes"},{"@pid":"175/0459","text":"Diogo Cocharro"}]},"title":"Dynamic Music Generation, Audio Analysis-Synthesis Methods.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/BernardesC19","doi":"10.1007/978-3-319-08234-9_211-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_211-1","url":"https://dblp.org/rec/reference/ecgg/BernardesC19"}, "url":"URL#2300032" }, { "@score":"1", "@id":"2300033", "info":{"authors":{"author":[{"@pid":"237/9700","text":"Dominik Borer"},{"@pid":"238/9314","text":"Simone Guggiari"},{"@pid":"30/4038","text":"Robert W. Sumner"},{"@pid":"24/1309","text":"Martin Guay"}]},"title":"Interacting with a Fully Simulated Self-Balancing Bipedal Character in Augmented and Virtual Reality.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/BorerGSG19","doi":"10.1007/978-3-319-08234-9_220-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_220-1","url":"https://dblp.org/rec/reference/ecgg/BorerGSG19"}, "url":"URL#2300033" }, { "@score":"1", "@id":"2300034", "info":{"authors":{"author":{"@pid":"238/9357","text":"Daniel N. Boulos"}},"title":"Abstraction and Stylized Design in 3D Animated Films: Extrapolation of 2D Animation Design.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Boulos19","doi":"10.1007/978-3-319-08234-9_58-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_58-1","url":"https://dblp.org/rec/reference/ecgg/Boulos19"}, "url":"URL#2300034" }, { "@score":"1", "@id":"2300035", "info":{"authors":{"author":{"@pid":"144/5010","text":"Lal "Lila" Bozgeyikli"}},"title":"Information Presentation Methods in Virtual Reality.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Bozgeyikli19","doi":"10.1007/978-3-319-08234-9_181-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_181-1","url":"https://dblp.org/rec/reference/ecgg/Bozgeyikli19"}, "url":"URL#2300035" }, { "@score":"1", "@id":"2300036", "info":{"authors":{"author":{"@pid":"130/2453","text":"Evren Bozgeyikli"}},"title":"Locomotion in Virtual Reality Video Games.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Bozgeyikli19a","doi":"10.1007/978-3-319-08234-9_186-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_186-1","url":"https://dblp.org/rec/reference/ecgg/Bozgeyikli19a"}, "url":"URL#2300036" }, { "@score":"1", "@id":"2300037", "info":{"authors":{"author":[{"@pid":"144/5010","text":"Lal "Lila" Bozgeyikli"},{"@pid":"130/2453","text":"Evren Bozgeyikli"}]},"title":"Immersive Virtual Reality Serious Games.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/BozgeyikliB19","doi":"10.1007/978-3-319-08234-9_182-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_182-1","url":"https://dblp.org/rec/reference/ecgg/BozgeyikliB19"}, "url":"URL#2300037" }, { "@score":"1", "@id":"2300038", "info":{"authors":{"author":{"@pid":"129/0225","text":"Anthony Lewis Brooks"}},"title":"Computer Graphics, Video Games, and Gamification Impacting (Re)Habilitation, Healthcare, and Inclusive Well-Being.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Brooks19","doi":"10.1007/978-3-319-08234-9_256-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_256-1","url":"https://dblp.org/rec/reference/ecgg/Brooks19"}, "url":"URL#2300038" }, { "@score":"1", "@id":"2300039", "info":{"authors":{"author":{"@pid":"38/6460","text":"Douglas Brown"}},"title":"Games and the Magic Circle.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Brown19","doi":"10.1007/978-3-319-08234-9_32-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_32-1","url":"https://dblp.org/rec/reference/ecgg/Brown19"}, "url":"URL#2300039" }, { "@score":"1", "@id":"2300040", "info":{"authors":{"author":{"@pid":"174/1635","text":"Jon Ram Bruun-Pedersen"}},"title":"Virtual Reality Exercise and Rehabilitation.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Bruun-Pedersen19","doi":"10.1007/978-3-319-08234-9_247-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_247-1","url":"https://dblp.org/rec/reference/ecgg/Bruun-Pedersen19"}, "url":"URL#2300040" }, { "@score":"1", "@id":"2300041", "info":{"authors":{"author":{"@pid":"238/9337","text":"Petyo Budakov"}},"title":"3D-Rendered Images and Their Application in the Interior Design.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Budakov19","doi":"10.1007/978-3-319-08234-9_262-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_262-1","url":"https://dblp.org/rec/reference/ecgg/Budakov19"}, "url":"URL#2300041" }, { "@score":"1", "@id":"2300042", "info":{"authors":{"author":{"@pid":"238/9347","text":"Inma Carpe"}},"title":"Animation and Neurocinematics: Visible Language of E-motion-S and Its Magical Science.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Carpe19","doi":"10.1007/978-3-319-08234-9_70-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_70-1","url":"https://dblp.org/rec/reference/ecgg/Carpe19"}, "url":"URL#2300042" }, { "@score":"1", "@id":"2300043", "info":{"authors":{"author":{"@pid":"87/7624","text":"Arindam Chaudhuri"}},"title":"Shape Deformation Models.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Chaudhuri19","doi":"10.1007/978-3-319-08234-9_358-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_358-1","url":"https://dblp.org/rec/reference/ecgg/Chaudhuri19"}, "url":"URL#2300043" }, { "@score":"1", "@id":"2300044", "info":{"authors":{"author":[{"@pid":"41/6476","text":"David Churchill"},{"@pid":"p/MikePreuss","text":"Mike Preuss"},{"@pid":"45/1799","text":"Florian Richoux"},{"@pid":"65/8774","text":"Gabriel Synnaeve"},{"@pid":"135/8789","text":"Alberto Uriarte"},{"@pid":"o/SantiagoOntanon","text":"Santiago Ontañón"},{"@pid":"131/6689","text":"Michal Certický"}]},"title":"StarCraft Bots and Competitions.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/ChurchillPRSUOC19","doi":"10.1007/978-3-319-08234-9_18-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_18-1","url":"https://dblp.org/rec/reference/ecgg/ChurchillPRSUOC19"}, "url":"URL#2300044" }, { "@score":"1", "@id":"2300045", "info":{"authors":{"author":{"@pid":"121/5267","text":"Fabrizio Cutolo"}},"title":"Augmented Reality in Image-Guided Surgery.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Cutolo19","doi":"10.1007/978-3-319-08234-9_78-2","ee":"https://doi.org/10.1007/978-3-319-08234-9_78-2","url":"https://dblp.org/rec/reference/ecgg/Cutolo19"}, "url":"URL#2300045" }, { "@score":"1", "@id":"2300046", "info":{"authors":{"author":[{"@pid":"92/1237","text":"Gabriele D'Angelo"},{"@pid":"47/3798","text":"Stefano Ferretti"},{"@pid":"83/27","text":"Moreno Marzolla"}]},"title":"Cloud for Gaming.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/DAngeloFM19","doi":"10.1007/978-3-319-08234-9_39-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_39-1","url":"https://dblp.org/rec/reference/ecgg/DAngeloFM19"}, "url":"URL#2300046" }, { "@score":"1", "@id":"2300047", "info":{"authors":{"author":[{"@pid":"118/5135","text":"Jeffery Jonathan Joshua Davis"},{"@pid":"38/5037-1","text":"Robert Kozma 0001"}]},"title":"Movie-Making of Spatiotemporal Dynamics in Complex Systems.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/DavisK19","doi":"10.1007/978-3-319-08234-9_287-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_287-1","url":"https://dblp.org/rec/reference/ecgg/DavisK19"}, "url":"URL#2300047" }, { "@score":"1", "@id":"2300048", "info":{"authors":{"author":[{"@pid":"118/5135","text":"Jeffery Jonathan Joshua Davis"},{"@pid":"38/5037-1","text":"Robert Kozma 0001"},{"@pid":"238/9317","text":"Florian Schübeler"}]},"title":"Stress Reduction, Relaxation, and Meditative States Using Psychophysiological Measurements Based on Biofeedback Systems via HRV and EEG.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/DavisKS19","doi":"10.1007/978-3-319-08234-9_330-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_330-1","url":"https://dblp.org/rec/reference/ecgg/DavisKS19"}, "url":"URL#2300048" }, { "@score":"1", "@id":"2300049", "info":{"authors":{"author":{"@pid":"17/3709","text":"Sébastien Deguy"}},"title":"The New Age of Procedural Texturing.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Deguy19","doi":"10.1007/978-3-319-08234-9_50-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_50-1","url":"https://dblp.org/rec/reference/ecgg/Deguy19"}, "url":"URL#2300049" }, { "@score":"1", "@id":"2300050", "info":{"authors":{"author":{"@pid":"76/2819","text":"Roberto Dillon"}},"title":"Game Design and Emotions: Analysis Models.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Dillon19","doi":"10.1007/978-3-319-08234-9_112-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_112-1","url":"https://dblp.org/rec/reference/ecgg/Dillon19"}, "url":"URL#2300050" }, { "@score":"1", "@id":"2300051", "info":{"authors":{"author":{"@pid":"70/9568","text":"Simena Dinas"}},"title":"Bounding Volume Hierarchies for Rigid Bodies.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Dinas19","doi":"10.1007/978-3-319-08234-9_332-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_332-1","url":"https://dblp.org/rec/reference/ecgg/Dinas19"}, "url":"URL#2300051" }, { "@score":"1", "@id":"2300052", "info":{"authors":{"author":{"@pid":"70/9568","text":"Simena Dinas"}},"title":"Collision Detection.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Dinas19a","doi":"10.1007/978-3-319-08234-9_291-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_291-1","url":"https://dblp.org/rec/reference/ecgg/Dinas19a"}, "url":"URL#2300052" }, { "@score":"1", "@id":"2300053", "info":{"authors":{"author":[{"@pid":"238/9331","text":"Dilek Dogan"},{"@pid":"39/7407","text":"Murat Çinar"},{"@pid":"31/7200","text":"Hakan Tüzün"}]},"title":"Multi-user Virtual Environments for Education.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/DoganCT19","doi":"10.1007/978-3-319-08234-9_172-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_172-1","url":"https://dblp.org/rec/reference/ecgg/DoganCT19"}, "url":"URL#2300053" }, { "@score":"1", "@id":"2300054", "info":{"authors":{"author":[{"@pid":"182/4075","text":"Matt Dombrowski"},{"@pid":"238/9320","text":"Jaime Lochner"}]},"title":"Gamification of Modern Society: Digital Media's Influence on Current Social Practices.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/DombrowskiL19","doi":"10.1007/978-3-319-08234-9_64-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_64-1","url":"https://dblp.org/rec/reference/ecgg/DombrowskiL19"}, "url":"URL#2300054" }, { "@score":"1", "@id":"2300055", "info":{"authors":{"author":{"@pid":"238/9345","text":"Jennifer Coleman Dowling"}},"title":"Exploring Innovative Technology: 2D Image Based Animation with the iPad.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Dowling19","doi":"10.1007/978-3-319-08234-9_56-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_56-1","url":"https://dblp.org/rec/reference/ecgg/Dowling19"}, "url":"URL#2300055" }, { "@score":"1", "@id":"2300056", "info":{"authors":{"author":[{"@pid":"205/5563","text":"Elena Dzardanova"},{"@pid":"133/7681","text":"Vlasios Kasapakis"},{"@pid":"41/308","text":"Damianos Gavalas"}]},"title":"Social Virtual Reality.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/DzardanovaKG19","doi":"10.1007/978-3-319-08234-9_204-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_204-1","url":"https://dblp.org/rec/reference/ecgg/DzardanovaKG19"}, "url":"URL#2300056" }, { "@score":"1", "@id":"2300057", "info":{"authors":{"author":[{"@pid":"170/5362","text":"Sehar Shahzad Farooq"},{"@pid":"29/6903","text":"Kyung-Joong Kim 0001"}]},"title":"Game Player Modeling.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/FarooqK19","doi":"10.1007/978-3-319-08234-9_14-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_14-1","url":"https://dblp.org/rec/reference/ecgg/FarooqK19"}, "url":"URL#2300057" }, { "@score":"1", "@id":"2300058", "info":{"authors":{"author":[{"@pid":"47/3798","text":"Stefano Ferretti"},{"@pid":"92/1237","text":"Gabriele D'Angelo"}]},"title":"Client/Server Gaming Architectures.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/FerrettiD19","doi":"10.1007/978-3-319-08234-9_272-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_272-1","url":"https://dblp.org/rec/reference/ecgg/FerrettiD19"}, "url":"URL#2300058" }, { "@score":"1", "@id":"2300059", "info":{"authors":{"author":[{"@pid":"47/3798","text":"Stefano Ferretti"},{"@pid":"92/1237","text":"Gabriele D'Angelo"}]},"title":"Online Gaming Architectures.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/FerrettiD19a","doi":"10.1007/978-3-319-08234-9_217-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_217-1","url":"https://dblp.org/rec/reference/ecgg/FerrettiD19a"}, "url":"URL#2300059" }, { "@score":"1", "@id":"2300060", "info":{"authors":{"author":[{"@pid":"47/3798","text":"Stefano Ferretti"},{"@pid":"92/1237","text":"Gabriele D'Angelo"}]},"title":"Online Gaming Scalability.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/FerrettiD19b","doi":"10.1007/978-3-319-08234-9_218-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_218-1","url":"https://dblp.org/rec/reference/ecgg/FerrettiD19b"}, "url":"URL#2300060" }, { "@score":"1", "@id":"2300061", "info":{"authors":{"author":{"@pid":"238/9349","text":"Mikhail Fiadotau"}},"title":"Audiogame.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Fiadotau19","doi":"10.1007/978-3-319-08234-9_194-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_194-1","url":"https://dblp.org/rec/reference/ecgg/Fiadotau19"}, "url":"URL#2300061" }, { "@score":"1", "@id":"2300062", "info":{"authors":{"author":{"@pid":"238/9349","text":"Mikhail Fiadotau"}},"title":"Digital Games for Animals.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Fiadotau19a","doi":"10.1007/978-3-319-08234-9_191-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_191-1","url":"https://dblp.org/rec/reference/ecgg/Fiadotau19a"}, "url":"URL#2300062" }, { "@score":"1", "@id":"2300063", "info":{"authors":{"author":{"@pid":"238/9349","text":"Mikhail Fiadotau"}},"title":"Incremental Games.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Fiadotau19b","doi":"10.1007/978-3-319-08234-9_192-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_192-1","url":"https://dblp.org/rec/reference/ecgg/Fiadotau19b"}, "url":"URL#2300063" }, { "@score":"1", "@id":"2300064", "info":{"authors":{"author":{"@pid":"238/9349","text":"Mikhail Fiadotau"}},"title":"Indie Game.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Fiadotau19c","doi":"10.1007/978-3-319-08234-9_188-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_188-1","url":"https://dblp.org/rec/reference/ecgg/Fiadotau19c"}, "url":"URL#2300064" }, { "@score":"1", "@id":"2300065", "info":{"authors":{"author":[{"@pid":"238/9334","text":"Tom Alexander Garner"},{"@pid":"146/3500","text":"Wendy A. Powell"},{"@pid":"134/3351","text":"Vaughan Powell"}]},"title":"Everyday Virtual Reality.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/GarnerPP19","doi":"10.1007/978-3-319-08234-9_259-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_259-1","url":"https://dblp.org/rec/reference/ecgg/GarnerPP19"}, "url":"URL#2300065" }, { "@score":"1", "@id":"2300066", "info":{"authors":{"author":[{"@pid":"24/5133","text":"Lionel Garnier"},{"@pid":"03/4771","text":"Jean-Paul Bécar"},{"@pid":"20/9810","text":"Lucie Druoton"},{"@pid":"04/3740","text":"Laurent Fuchs"},{"@pid":"14/1943","text":"Géraldine Morin"}]},"title":"Theory of Minkowski-Lorentz Spaces.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/GarnierBDFM19","doi":"10.1007/978-3-319-08234-9_111-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_111-1","url":"https://dblp.org/rec/reference/ecgg/GarnierBDFM19"}, "url":"URL#2300066" }, { "@score":"1", "@id":"2300067", "info":{"authors":{"author":{"@pid":"04/36","text":"George Papagiannakis"}},"title":"Gamification and Serious Games.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/George19","doi":"10.1007/978-3-319-08234-9_90-2","ee":"https://doi.org/10.1007/978-3-319-08234-9_90-2","url":"https://dblp.org/rec/reference/ecgg/George19"}, "url":"URL#2300067" }, { "@score":"1", "@id":"2300068", "info":{"authors":{"author":{"@pid":"44/11263","text":"Michele Geronazzo"}},"title":"Immersive Auralization Using Headphones.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Geronazzo19","doi":"10.1007/978-3-319-08234-9_257-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_257-1","url":"https://dblp.org/rec/reference/ecgg/Geronazzo19"}, "url":"URL#2300068" }, { "@score":"1", "@id":"2300069", "info":{"authors":{"author":{"@pid":"44/11263","text":"Michele Geronazzo"}},"title":"Sound Spatialization.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Geronazzo19a","doi":"10.1007/978-3-319-08234-9_250-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_250-1","url":"https://dblp.org/rec/reference/ecgg/Geronazzo19a"}, "url":"URL#2300069" }, { "@score":"1", "@id":"2300070", "info":{"authors":{"author":{"@pid":"44/11263","text":"Michele Geronazzo"}},"title":"User Acoustics with Head-Related Transfer Functions.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Geronazzo19b","doi":"10.1007/978-3-319-08234-9_258-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_258-1","url":"https://dblp.org/rec/reference/ecgg/Geronazzo19b"}, "url":"URL#2300070" }, { "@score":"1", "@id":"2300071", "info":{"authors":{"author":[{"@pid":"13/8905","text":"David C. Gibson"},{"@pid":"198/5456","text":"Leah Irving"},{"@pid":"238/9340","text":"Katy Scott"}]},"title":"Challenge-Based Learning in a Serious Global Game.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/GibsonIS19","doi":"10.1007/978-3-319-08234-9_115-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_115-1","url":"https://dblp.org/rec/reference/ecgg/GibsonIS19"}, "url":"URL#2300071" }, { "@score":"1", "@id":"2300072", "info":{"authors":{"author":[{"@pid":"184/1281","text":"Alexandros Gouvatsos"},{"@pid":"161/6735","text":"Zhidong Xiao"}]},"title":"Sketch-Based Posing for 3D Animation.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/GouvatsosX19","doi":"10.1007/978-3-319-08234-9_47-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_47-1","url":"https://dblp.org/rec/reference/ecgg/GouvatsosX19"}, "url":"URL#2300072" }, { "@score":"1", "@id":"2300073", "info":{"authors":{"author":[{"@pid":"49/5795","text":"Chen Guo"},{"@pid":"59/6154","text":"Shuang Wei"},{"@pid":"12/5359","text":"Yingjie Victor Chen"}]},"title":"Cognitive Processing of Information Visualization.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/GuoWC19","doi":"10.1007/978-3-319-08234-9_95-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_95-1","url":"https://dblp.org/rec/reference/ecgg/GuoWC19"}, "url":"URL#2300073" }, { "@score":"1", "@id":"2300074", "info":{"authors":{"author":[{"@pid":"49/5795","text":"Chen Guo"},{"@pid":"59/6154","text":"Shuang Wei"},{"@pid":"12/5359","text":"Yingjie Victor Chen"}]},"title":"Scalable Techniques to Visualize Spatiotemporal Data.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/GuoWC19a","doi":"10.1007/978-3-319-08234-9_94-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_94-1","url":"https://dblp.org/rec/reference/ecgg/GuoWC19a"}, "url":"URL#2300074" }, { "@score":"1", "@id":"2300075", "info":{"authors":{"author":[{"@pid":"53/10461","text":"Benjamin Hebgen"},{"@pid":"42/5039","text":"Hanno Hildmann"}]},"title":"Social-, Mobile- and Multi-Player-Games and their Impact on Today's Online Entertainment Industry.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/HebgenH19","doi":"10.1007/978-3-319-08234-9_233-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_233-1","url":"https://dblp.org/rec/reference/ecgg/HebgenH19"}, "url":"URL#2300075" }, { "@score":"1", "@id":"2300076", "info":{"authors":{"author":{"@pid":"42/5039","text":"Hanno Hildmann"}},"title":"Computer Games and Artificial Intelligence.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Hildmann19","doi":"10.1007/978-3-319-08234-9_234-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_234-1","url":"https://dblp.org/rec/reference/ecgg/Hildmann19"}, "url":"URL#2300076" }, { "@score":"1", "@id":"2300077", "info":{"authors":{"author":[{"@pid":"42/5039","text":"Hanno Hildmann"},{"@pid":"53/10461","text":"Benjamin Hebgen"}]},"title":"Computer Games and the Evolution of Digital Rights.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/HildmannH19","doi":"10.1007/978-3-319-08234-9_232-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_232-1","url":"https://dblp.org/rec/reference/ecgg/HildmannH19"}, "url":"URL#2300077" }, { "@score":"1", "@id":"2300078", "info":{"authors":{"author":[{"@pid":"36/10981","text":"Jule Hildmann"},{"@pid":"42/5039","text":"Hanno Hildmann"}]},"title":"Computer Games in Education.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/HildmannH19a","doi":"10.1007/978-3-319-08234-9_278-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_278-1","url":"https://dblp.org/rec/reference/ecgg/HildmannH19a"}, "url":"URL#2300078" }, { "@score":"1", "@id":"2300079", "info":{"authors":{"author":[{"@pid":"42/5039","text":"Hanno Hildmann"},{"@pid":"36/10981","text":"Jule Hildmann"}]},"title":"Origin of Games.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/HildmannH19b","doi":"10.1007/978-3-319-08234-9_231-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_231-1","url":"https://dblp.org/rec/reference/ecgg/HildmannH19b"}, "url":"URL#2300079" }, { "@score":"1", "@id":"2300080", "info":{"authors":{"author":[{"@pid":"42/5039","text":"Hanno Hildmann"},{"@pid":"16/951","text":"Benjamin Hirsch"}]},"title":"Overview of Artificial Intelligence.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/HildmannH19c","doi":"10.1007/978-3-319-08234-9_228-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_228-1","url":"https://dblp.org/rec/reference/ecgg/HildmannH19c"}, "url":"URL#2300080" }, { "@score":"1", "@id":"2300081", "info":{"authors":{"author":[{"@pid":"230/8230","text":"Aaron Hitchcock"},{"@pid":"43/4695","text":"Kelvin Sung"}]},"title":"Game Loop and Typical Implementation.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/HitchcockS19","doi":"10.1007/978-3-319-08234-9_224-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_224-1","url":"https://dblp.org/rec/reference/ecgg/HitchcockS19"}, "url":"URL#2300081" }, { "@score":"1", "@id":"2300082", "info":{"authors":{"author":[{"@pid":"230/8230","text":"Aaron Hitchcock"},{"@pid":"43/4695","text":"Kelvin Sung"}]},"title":"Game Physics Engine, Overview.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/HitchcockS19a","doi":"10.1007/978-3-319-08234-9_225-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_225-1","url":"https://dblp.org/rec/reference/ecgg/HitchcockS19a"}, "url":"URL#2300082" }, { "@score":"1", "@id":"2300083", "info":{"authors":{"author":[{"@pid":"230/8230","text":"Aaron Hitchcock"},{"@pid":"43/4695","text":"Kelvin Sung"}]},"title":"Interactive Computer Graphics and Model-View-Controller Architecture.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/HitchcockS19b","doi":"10.1007/978-3-319-08234-9_223-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_223-1","url":"https://dblp.org/rec/reference/ecgg/HitchcockS19b"}, "url":"URL#2300083" }, { "@score":"1", "@id":"2300084", "info":{"authors":{"author":{"@pid":"238/9316","text":"Celia Hodent"}},"title":"Cognitive Psychology Applied to User Experience in Video Games.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Hodent19","doi":"10.1007/978-3-319-08234-9_53-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_53-1","url":"https://dblp.org/rec/reference/ecgg/Hodent19"}, "url":"URL#2300084" }, { "@score":"1", "@id":"2300085", "info":{"authors":{"author":{"@pid":"04/10630","text":"Eric Hodgson"}},"title":"Spatial Perception in Virtual Environments.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Hodgson19","doi":"10.1007/978-3-319-08234-9_255-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_255-1","url":"https://dblp.org/rec/reference/ecgg/Hodgson19"}, "url":"URL#2300085" }, { "@score":"1", "@id":"2300086", "info":{"authors":{"author":{"@pid":"49/2488","text":"Jin Huang"}},"title":"Modeling and Mesh Processing for Games.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Huang19","doi":"10.1007/978-3-319-08234-9_1-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_1-1","url":"https://dblp.org/rec/reference/ecgg/Huang19"}, "url":"URL#2300086" }, { "@score":"1", "@id":"2300087", "info":{"authors":{"author":[{"@pid":"h/PCKHung","text":"Patrick C. K. Hung"},{"@pid":"83/468","text":"Marcelo Fantinato"},{"@pid":"81/7976","text":"Jorge Roa"}]},"title":"Children Privacy Protection.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/HungFR19","doi":"10.1007/978-3-319-08234-9_198-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_198-1","url":"https://dblp.org/rec/reference/ecgg/HungFR19"}, "url":"URL#2300087" }, { "@score":"1", "@id":"2300088", "info":{"authors":{"author":[{"@pid":"h/PCKHung","text":"Patrick C. K. Hung"},{"@pid":"47/477","text":"Farkhund Iqbal"},{"@pid":"209/8909","text":"Benjamin Yankson"}]},"title":"Smart Toys.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/HungIY19","doi":"10.1007/978-3-319-08234-9_196-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_196-1","url":"https://dblp.org/rec/reference/ecgg/HungIY19"}, "url":"URL#2300088" }, { "@score":"1", "@id":"2300089", "info":{"authors":{"author":[{"@pid":"h/PCKHung","text":"Patrick C. K. Hung"},{"@pid":"18/6815","text":"Laura Rafferty"},{"@pid":"83/468","text":"Marcelo Fantinato"}]},"title":"Toy Computing.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/HungRF19","doi":"10.1007/978-3-319-08234-9_197-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_197-1","url":"https://dblp.org/rec/reference/ecgg/HungRF19"}, "url":"URL#2300089" }, { "@score":"1", "@id":"2300090", "info":{"authors":{"author":[{"@pid":"75/10160","text":"Sami Hyrynsalmi"},{"@pid":"53/4255","text":"Kai K. Kimppa"},{"@pid":"93/1207","text":"Jouni Smed"}]},"title":"Gamification Ethics.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/HyrynsalmiKS19","doi":"10.1007/978-3-319-08234-9_138-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_138-1","url":"https://dblp.org/rec/reference/ecgg/HyrynsalmiKS19"}, "url":"URL#2300090" }, { "@score":"1", "@id":"2300091", "info":{"authors":{"author":{"@pid":"67/5207","text":"Kokolo Ikeda"}},"title":"Puyo Puyo.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Ikeda19","doi":"10.1007/978-3-319-08234-9_23-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_23-1","url":"https://dblp.org/rec/reference/ecgg/Ikeda19"}, "url":"URL#2300091" }, { "@score":"1", "@id":"2300092", "info":{"authors":{"author":{"@pid":"23/713","text":"Jouni Ikonen"}},"title":"Distributed Simulation and Games.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Ikonen19","doi":"10.1007/978-3-319-08234-9_226-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_226-1","url":"https://dblp.org/rec/reference/ecgg/Ikonen19"}, "url":"URL#2300092" }, { "@score":"1", "@id":"2300093", "info":{"authors":{"author":{"@pid":"238/9363","text":"Setsuko Ishii"}},"title":"Holography as an Architectural Decoration.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Ishii19","doi":"10.1007/978-3-319-08234-9_276-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_276-1","url":"https://dblp.org/rec/reference/ecgg/Ishii19"}, "url":"URL#2300093" }, { "@score":"1", "@id":"2300094", "info":{"authors":{"author":{"@pid":"06/5419","text":"Masahiko Itoh"}},"title":"3D Visualization Interface for Temporal Analysis of Social Media.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Itoh19","doi":"10.1007/978-3-319-08234-9_42-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_42-1","url":"https://dblp.org/rec/reference/ecgg/Itoh19"}, "url":"URL#2300094" }, { "@score":"1", "@id":"2300095", "info":{"authors":{"author":[{"@pid":"88/340","text":"G. Stewart Von Itzstein"},{"@pid":"b/MarkBillinghurst","text":"Mark Billinghurst"},{"@pid":"85/213","text":"Ross T. Smith"},{"@pid":"09/6739","text":"Bruce H. Thomas"}]},"title":"Augmented Reality Entertainment: Taking Gaming Out of the Box.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/ItzsteinBST19","doi":"10.1007/978-3-319-08234-9_81-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_81-1","url":"https://dblp.org/rec/reference/ecgg/ItzsteinBST19"}, "url":"URL#2300095" }, { "@score":"1", "@id":"2300096", "info":{"authors":{"author":{"@pid":"238/9311","text":"Susan Johnston"}},"title":"Virtual Reality as New Media.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Johnston19","doi":"10.1007/978-3-319-08234-9_87-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_87-1","url":"https://dblp.org/rec/reference/ecgg/Johnston19"}, "url":"URL#2300096" }, { "@score":"1", "@id":"2300097", "info":{"authors":{"author":{"@pid":"83/7996","text":"Sicilia Ferreira Judice"}},"title":"Cellular Automata Methods.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Judice19","doi":"10.1007/978-3-319-08234-9_183-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_183-1","url":"https://dblp.org/rec/reference/ecgg/Judice19"}, "url":"URL#2300097" }, { "@score":"1", "@id":"2300098", "info":{"authors":{"author":{"@pid":"83/7996","text":"Sicilia Ferreira Judice"}},"title":"Lattice Boltzmann Method for Diffusion-Reaction Problems.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Judice19a","doi":"10.1007/978-3-319-08234-9_108-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_108-1","url":"https://dblp.org/rec/reference/ecgg/Judice19a"}, "url":"URL#2300098" }, { "@score":"1", "@id":"2300099", "info":{"authors":{"author":{"@pid":"83/7996","text":"Sicilia Ferreira Judice"}},"title":"Lattice Boltzmann Method for Fluid Simulation.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Judice19b","doi":"10.1007/978-3-319-08234-9_107-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_107-1","url":"https://dblp.org/rec/reference/ecgg/Judice19b"}, "url":"URL#2300099" }, { "@score":"1", "@id":"2300100", "info":{"authors":{"author":{"@pid":"83/7996","text":"Sicilia Ferreira Judice"}},"title":"Lattice Gas Cellular Automata for Fluid Simulation.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Judice19c","doi":"10.1007/978-3-319-08234-9_184-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_184-1","url":"https://dblp.org/rec/reference/ecgg/Judice19c"}, "url":"URL#2300100" }, { "@score":"1", "@id":"2300101", "info":{"authors":{"author":[{"@pid":"83/7996","text":"Sicilia Ferreira Judice"},{"@pid":"05/6423","text":"Gilson A. Giraldi"},{"@pid":"238/9335","text":"José Karam-Filho"}]},"title":"Rendering Equation.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/JudiceGK19","doi":"10.1007/978-3-319-08234-9_106-2","ee":"https://doi.org/10.1007/978-3-319-08234-9_106-2","url":"https://dblp.org/rec/reference/ecgg/JudiceGK19"}, "url":"URL#2300101" }, { "@score":"1", "@id":"2300102", "info":{"authors":{"author":[{"@pid":"238/9338","text":"Oytun Kal"},{"@pid":"170/2347","text":"Yavuz Samur"}]},"title":"Educational Virtual Reality Game Design for Film and Animation.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/KalS19","doi":"10.1007/978-3-319-08234-9_168-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_168-1","url":"https://dblp.org/rec/reference/ecgg/KalS19"}, "url":"URL#2300102" }, { "@score":"1", "@id":"2300103", "info":{"authors":{"author":[{"@pid":"40/6375","text":"Kosuke Kaneko"},{"@pid":"83/198","text":"Yoshihiro Okada"}]},"title":"Emotion-Based 3D CG Character Behaviors.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/KanekoO19","doi":"10.1007/978-3-319-08234-9_35-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_35-1","url":"https://dblp.org/rec/reference/ecgg/KanekoO19"}, "url":"URL#2300103" }, { "@score":"1", "@id":"2300104", "info":{"authors":{"author":[{"@pid":"220/7843","text":"Howard Kaplan"},{"@pid":"07/10088","text":"Anna Pyayt"}]},"title":"Tactile Visualization and 3D Printing for Education.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/KaplanP19","doi":"10.1007/978-3-319-08234-9_57-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_57-1","url":"https://dblp.org/rec/reference/ecgg/KaplanP19"}, "url":"URL#2300104" }, { "@score":"1", "@id":"2300105", "info":{"authors":{"author":[{"@pid":"97/3043","text":"Bill Kapralos"},{"@pid":"131/3904","text":"Alvaro Uribe-Quevedo"},{"@pid":"54/5700","text":"Adam Dubrowski"}]},"title":"Immersive Technologies for Medical Education.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/KapralosUD19","doi":"10.1007/978-3-319-08234-9_130-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_130-1","url":"https://dblp.org/rec/reference/ecgg/KapralosUD19"}, "url":"URL#2300105" }, { "@score":"1", "@id":"2300106", "info":{"authors":{"author":[{"@pid":"133/7681","text":"Vlasios Kasapakis"},{"@pid":"41/308","text":"Damianos Gavalas"},{"@pid":"205/5563","text":"Elena Dzardanova"}]},"title":"3D Modelling Through Photogrammetry in Cultural Heritage.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/KasapakisGD19","doi":"10.1007/978-3-319-08234-9_206-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_206-1","url":"https://dblp.org/rec/reference/ecgg/KasapakisGD19"}, "url":"URL#2300106" }, { "@score":"1", "@id":"2300107", "info":{"authors":{"author":[{"@pid":"133/7681","text":"Vlasios Kasapakis"},{"@pid":"41/308","text":"Damianos Gavalas"},{"@pid":"205/5563","text":"Elena Dzardanova"}]},"title":"Mixed Reality.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/KasapakisGD19a","doi":"10.1007/978-3-319-08234-9_205-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_205-1","url":"https://dblp.org/rec/reference/ecgg/KasapakisGD19a"}, "url":"URL#2300107" }, { "@score":"1", "@id":"2300108", "info":{"authors":{"author":[{"@pid":"163/1681","text":"Umair Azfar Khan"},{"@pid":"83/198","text":"Yoshihiro Okada"}]},"title":"Genetic Algorithm (GA)-Based NPC Making.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/KhanO19","doi":"10.1007/978-3-319-08234-9_33-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_33-1","url":"https://dblp.org/rec/reference/ecgg/KhanO19"}, "url":"URL#2300108" }, { "@score":"1", "@id":"2300109", "info":{"authors":{"author":[{"@pid":"82/7427","text":"Huy Kang Kim"},{"@pid":"119/3771","text":"Jiyoung Woo"}]},"title":"Detecting and Preventing Online Game Bots in MMORPGs.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/KimW19","doi":"10.1007/978-3-319-08234-9_13-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_13-1","url":"https://dblp.org/rec/reference/ecgg/KimW19"}, "url":"URL#2300109" }, { "@score":"1", "@id":"2300110", "info":{"authors":{"author":{"@pid":"144/0267","text":"Antti Knutas"}},"title":"Gamification.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Knutas19","doi":"10.1007/978-3-319-08234-9_219-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_219-1","url":"https://dblp.org/rec/reference/ecgg/Knutas19"}, "url":"URL#2300110" }, { "@score":"1", "@id":"2300111", "info":{"authors":{"author":{"@pid":"00/7560","text":"Hartmut Koenitz"}},"title":"Narrative in Video Games.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Koenitz19","doi":"10.1007/978-3-319-08234-9_154-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_154-1","url":"https://dblp.org/rec/reference/ecgg/Koenitz19"}, "url":"URL#2300111" }, { "@score":"1", "@id":"2300112", "info":{"authors":{"author":[{"@pid":"168/2617","text":"Mehmet Kosa"},{"@pid":"180/9124","text":"Ahmet Uysal"}]},"title":"Mindfulness, Virtual Reality, and Video Games.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/KosaU19","doi":"10.1007/978-3-319-08234-9_164-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_164-1","url":"https://dblp.org/rec/reference/ecgg/KosaU19"}, "url":"URL#2300112" }, { "@score":"1", "@id":"2300113", "info":{"authors":{"author":[{"@pid":"39/393","text":"Fabrizio Lamberti"},{"@pid":"120/6222","text":"Federico Manuri"},{"@pid":"07/5983","text":"Andrea Sanna"}]},"title":"Multivariate Visualization Using Scatterplots.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/LambertiMS19","doi":"10.1007/978-3-319-08234-9_84-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_84-1","url":"https://dblp.org/rec/reference/ecgg/LambertiMS19"}, "url":"URL#2300113" }, { "@score":"1", "@id":"2300114", "info":{"authors":{"author":[{"@pid":"179/2818","text":"Eike Langbehn"},{"@pid":"09/6285","text":"Frank Steinicke"}]},"title":"Redirected Walking in Virtual Reality.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/LangbehnS19","doi":"10.1007/978-3-319-08234-9_253-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_253-1","url":"https://dblp.org/rec/reference/ecgg/LangbehnS19"}, "url":"URL#2300114" }, { "@score":"1", "@id":"2300115", "info":{"authors":{"author":{"@pid":"33/2316","text":"Andrea Lanzi"}},"title":"Game Bot Detection on Massive Multiplayer Online Role-Playing Games (MMORPGs) Systems.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Lanzi19","doi":"10.1007/978-3-319-08234-9_237-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_237-1","url":"https://dblp.org/rec/reference/ecgg/Lanzi19"}, "url":"URL#2300115" }, { "@score":"1", "@id":"2300116", "info":{"authors":{"author":{"@pid":"238/9321","text":"Vicki Lau"}},"title":"Virtual Reality Game Engines.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Lau19","doi":"10.1007/978-3-319-08234-9_265-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_265-1","url":"https://dblp.org/rec/reference/ecgg/Lau19"}, "url":"URL#2300116" }, { "@score":"1", "@id":"2300117", "info":{"authors":{"author":{"@pid":"238/9321","text":"Vicki Lau"}},"title":"Virtual Reality Stereo Post-Conversion After Effects Workflow.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Lau19a","doi":"10.1007/978-3-319-08234-9_264-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_264-1","url":"https://dblp.org/rec/reference/ecgg/Lau19a"}, "url":"URL#2300117" }, { "@score":"1", "@id":"2300118", "info":{"authors":{"author":{"@pid":"238/9342","text":"Jaci Lee Lederman"}},"title":"STEM Learning Through Video Games.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Lederman19","doi":"10.1007/978-3-319-08234-9_328-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_328-1","url":"https://dblp.org/rec/reference/ecgg/Lederman19"}, "url":"URL#2300118" }, { "@score":"1", "@id":"2300119", "info":{"authors":{"author":[{"@pid":"08/7188","text":"Jong Weon Lee 0002"},{"@pid":"145/9906","text":"Han Kyu Yoo"}]},"title":"Interaction with Mobile Augmented Reality Environments.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/LeeY19","doi":"10.1007/978-3-319-08234-9_40-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_40-1","url":"https://dblp.org/rec/reference/ecgg/LeeY19"}, "url":"URL#2300119" }, { "@score":"1", "@id":"2300120", "info":{"authors":{"author":{"@pid":"79/5271","text":"Krystina S. Madej"}},"title":"Children's Games, from Turtle to Squirtle.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Madej19","doi":"10.1007/978-3-319-08234-9_103-2","ee":"https://doi.org/10.1007/978-3-319-08234-9_103-2","url":"https://dblp.org/rec/reference/ecgg/Madej19"}, "url":"URL#2300120" }, { "@score":"1", "@id":"2300121", "info":{"authors":{"author":[{"@pid":"141/6156","text":"Adnan Mahmood"},{"@pid":"69/3425","text":"Bernard Butler"},{"@pid":"72/5075","text":"Brendan Jennings"}]},"title":"Potential of Augmented Reality for Intelligent Transportation Systems.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/MahmoodBJ19","doi":"10.1007/978-3-319-08234-9_274-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_274-1","url":"https://dblp.org/rec/reference/ecgg/MahmoodBJ19"}, "url":"URL#2300121" }, { "@score":"1", "@id":"2300122", "info":{"authors":{"author":[{"@pid":"141/6156","text":"Adnan Mahmood"},{"@pid":"69/3425","text":"Bernard Butler"},{"@pid":"41/7825","text":"Hushairi Zen"},{"@pid":"72/5075","text":"Brendan Jennings"}]},"title":"Key Early Verticals, Challenges and Limitations in Implementation of Augmented Reality.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/MahmoodBZJ19","doi":"10.1007/978-3-319-08234-9_273-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_273-1","url":"https://dblp.org/rec/reference/ecgg/MahmoodBZJ19"}, "url":"URL#2300122" }, { "@score":"1", "@id":"2300123", "info":{"authors":{"author":{"@pid":"m/ADMali","text":"Amol Dattatraya Mali"}},"title":"Motion Planning in Computer Games.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Mali19","doi":"10.1007/978-3-319-08234-9_266-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_266-1","url":"https://dblp.org/rec/reference/ecgg/Mali19"}, "url":"URL#2300123" }, { "@score":"1", "@id":"2300124", "info":{"authors":{"author":{"@pid":"m/ADMali","text":"Amol Dattatraya Mali"}},"title":"Public Health Education Via Computer Games.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Mali19a","doi":"10.1007/978-3-319-08234-9_270-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_270-1","url":"https://dblp.org/rec/reference/ecgg/Mali19a"}, "url":"URL#2300124" }, { "@score":"1", "@id":"2300125", "info":{"authors":{"author":[{"@pid":"120/6222","text":"Federico Manuri"},{"@pid":"201/0514","text":"Francesco De Pace"},{"@pid":"07/5983","text":"Andrea Sanna"}]},"title":"Augmented Reality for Human-Robot Interaction in Industry.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/ManuriPS19","doi":"10.1007/978-3-319-08234-9_329-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_329-1","url":"https://dblp.org/rec/reference/ecgg/ManuriPS19"}, "url":"URL#2300125" }, { "@score":"1", "@id":"2300126", "info":{"authors":{"author":{"@pid":"187/2850","text":"Ilaria Mariani"}},"title":"Online Players: Engagement, Immersion, and Absorption Across Secondary Worlds.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Mariani19","doi":"10.1007/978-3-319-08234-9_235-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_235-1","url":"https://dblp.org/rec/reference/ecgg/Mariani19"}, "url":"URL#2300126" }, { "@score":"1", "@id":"2300127", "info":{"authors":{"author":{"@pid":"57/804","text":"Tim McGraw"}},"title":"Tensor Field Visualization.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/McGraw19","doi":"10.1007/978-3-319-08234-9_96-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_96-1","url":"https://dblp.org/rec/reference/ecgg/McGraw19"}, "url":"URL#2300127" }, { "@score":"1", "@id":"2300128", "info":{"authors":{"author":{"@pid":"35/6470","text":"Ryan P. McMahan"}},"title":"Virtual Reality System Fidelity.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/McMahan19","doi":"10.1007/978-3-319-08234-9_251-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_251-1","url":"https://dblp.org/rec/reference/ecgg/McMahan19"}, "url":"URL#2300128" }, { "@score":"1", "@id":"2300129", "info":{"authors":{"author":{"@pid":"213/9157","text":"Michael Mcloughlin"}},"title":"Overview of Virtual Ambisonic Systems.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Mcloughlin19","doi":"10.1007/978-3-319-08234-9_275-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_275-1","url":"https://dblp.org/rec/reference/ecgg/Mcloughlin19"}, "url":"URL#2300129" }, { "@score":"1", "@id":"2300130", "info":{"authors":{"author":[{"@pid":"238/9355","text":"Brooke Morrill"},{"@pid":"238/9365","text":"Sabrina Culyba"}]},"title":"Transformational Games.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/MorrillC19","doi":"10.1007/978-3-319-08234-9_185-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_185-1","url":"https://dblp.org/rec/reference/ecgg/MorrillC19"}, "url":"URL#2300130" }, { "@score":"1", "@id":"2300131", "info":{"authors":{"author":[{"@pid":"119/9562","text":"Christos Mousas"},{"@pid":"82/11276","text":"Christos-Nikolaos Anagnostopoulos"}]},"title":"Character Animation Scripting Environment.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/MousasA19","doi":"10.1007/978-3-319-08234-9_43-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_43-1","url":"https://dblp.org/rec/reference/ecgg/MousasA19"}, "url":"URL#2300131" }, { "@score":"1", "@id":"2300132", "info":{"authors":{"author":{"@pid":"238/9326","text":"Nicusor Nedelcu"}},"title":"Decoupling Game Tool GUIs from Core Editing Operations.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Nedelcu19","doi":"10.1007/978-3-319-08234-9_2-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_2-1","url":"https://dblp.org/rec/reference/ecgg/Nedelcu19"}, "url":"URL#2300132" }, { "@score":"1", "@id":"2300133", "info":{"authors":{"author":{"@pid":"238/9326","text":"Nicusor Nedelcu"}},"title":"Plug-in-Based Asset Compiler Architecture.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Nedelcu19a","doi":"10.1007/978-3-319-08234-9_3-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_3-1","url":"https://dblp.org/rec/reference/ecgg/Nedelcu19a"}, "url":"URL#2300133" }, { "@score":"1", "@id":"2300134", "info":{"authors":{"author":[{"@pid":"83/1300","text":"Keith Nesbitt"},{"@pid":"18/10396","text":"Eugene Nalivaiko"}]},"title":"Cybersickness.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/NesbittN19","doi":"10.1007/978-3-319-08234-9_252-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_252-1","url":"https://dblp.org/rec/reference/ecgg/NesbittN19"}, "url":"URL#2300134" }, { "@score":"1", "@id":"2300135", "info":{"authors":{"author":{"@pid":"154/6327","text":"Kim J. L. Nevelsteen"}},"title":"Pervasive Games.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Nevelsteen19","doi":"10.1007/978-3-319-08234-9_73-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_73-1","url":"https://dblp.org/rec/reference/ecgg/Nevelsteen19"}, "url":"URL#2300135" }, { "@score":"1", "@id":"2300136", "info":{"authors":{"author":{"@pid":"154/6327","text":"Kim J. L. Nevelsteen"}},"title":"Physical, Virtual, and Game World Persistence.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Nevelsteen19a","doi":"10.1007/978-3-319-08234-9_72-2","ee":"https://doi.org/10.1007/978-3-319-08234-9_72-2","url":"https://dblp.org/rec/reference/ecgg/Nevelsteen19a"}, "url":"URL#2300136" }, { "@score":"1", "@id":"2300137", "info":{"authors":{"author":{"@pid":"154/6327","text":"Kim J. L. Nevelsteen"}},"title":"Virtual World, a Definition Incorporating Distributed Computing and Instances.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Nevelsteen19b","doi":"10.1007/978-3-319-08234-9_44-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_44-1","url":"https://dblp.org/rec/reference/ecgg/Nevelsteen19b"}, "url":"URL#2300137" }, { "@score":"1", "@id":"2300138", "info":{"authors":{"author":[{"@pid":"92/6661","text":"Andrés Adolfo Navarro Newball"},{"@pid":"238/9336","text":"Borja Barinaga López"},{"@pid":"238/9324","text":"Isidro Moreno Sánchez"}]},"title":"Hypermedia Narrative as a Tool for Serious Games.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/NewballLS19","doi":"10.1007/978-3-319-08234-9_202-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_202-1","url":"https://dblp.org/rec/reference/ecgg/NewballLS19"}, "url":"URL#2300138" }, { "@score":"1", "@id":"2300139", "info":{"authors":{"author":{"@pid":"26/11181","text":"Niels Christian Nilsson"}},"title":"Natural Walking in Virtual Reality.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Nilsson19","doi":"10.1007/978-3-319-08234-9_201-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_201-1","url":"https://dblp.org/rec/reference/ecgg/Nilsson19"}, "url":"URL#2300139" }, { "@score":"1", "@id":"2300140", "info":{"authors":{"author":{"@pid":"26/11181","text":"Niels Christian Nilsson"}},"title":"Perceptual Illusions and Distortions in Virtual Reality.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Nilsson19a","doi":"10.1007/978-3-319-08234-9_245-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_245-1","url":"https://dblp.org/rec/reference/ecgg/Nilsson19a"}, "url":"URL#2300140" }, { "@score":"1", "@id":"2300141", "info":{"authors":{"author":{"@pid":"58/4516","text":"Chris North 0001"}},"title":"Postproduction in Game Cinematics.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/North19","doi":"10.1007/978-3-319-08234-9_27-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_27-1","url":"https://dblp.org/rec/reference/ecgg/North19"}, "url":"URL#2300141" }, { "@score":"1", "@id":"2300142", "info":{"authors":{"author":[{"@pid":"181/5282","text":"Danielle Marie Olson"},{"@pid":"181/5426","text":"Elisabeth Ainsley Sutherland"},{"@pid":"161/9455","text":"Cagri Hakan Zaman"},{"@pid":"95/1669","text":"D. Fox Harrell"}]},"title":"Foundations of Interaction in the Virtual Reality Medium.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/OlsonSZH19","doi":"10.1007/978-3-319-08234-9_174-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_174-1","url":"https://dblp.org/rec/reference/ecgg/OlsonSZH19"}, "url":"URL#2300142" }, { "@score":"1", "@id":"2300143", "info":{"authors":{"author":[{"@pid":"o/SantiagoOntanon","text":"Santiago Ontañón"},{"@pid":"65/8774","text":"Gabriel Synnaeve"},{"@pid":"135/8789","text":"Alberto Uriarte"},{"@pid":"45/1799","text":"Florian Richoux"},{"@pid":"41/6476","text":"David Churchill"},{"@pid":"p/MikePreuss","text":"Mike Preuss"}]},"title":"RTS AI Problems and Techniques.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/OntanonSURCP19","doi":"10.1007/978-3-319-08234-9_17-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_17-1","url":"https://dblp.org/rec/reference/ecgg/OntanonSURCP19"}, "url":"URL#2300143" }, { "@score":"1", "@id":"2300144", "info":{"authors":{"author":[{"@pid":"10/8661","text":"Ozan Özkan"},{"@pid":"238/9332","text":"Özhan Tingöy"}]},"title":"Collaborative Engineering and Virtual Prototyping Within Virtual Reality.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/OzkanT19","doi":"10.1007/978-3-319-08234-9_171-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_171-1","url":"https://dblp.org/rec/reference/ecgg/OzkanT19"}, "url":"URL#2300144" }, { "@score":"1", "@id":"2300145", "info":{"authors":{"author":{"@pid":"205/6165","text":"Selcen Ozturkcan"}},"title":"Game Prosumption.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Ozturkcan19","doi":"10.1007/978-3-319-08234-9_133-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_133-1","url":"https://dblp.org/rec/reference/ecgg/Ozturkcan19"}, "url":"URL#2300145" }, { "@score":"1", "@id":"2300146", "info":{"authors":{"author":{"@pid":"205/6165","text":"Selcen Ozturkcan"}},"title":"Virtual Reality Retailing.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Ozturkcan19a","doi":"10.1007/978-3-319-08234-9_163-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_163-1","url":"https://dblp.org/rec/reference/ecgg/Ozturkcan19a"}, "url":"URL#2300146" }, { "@score":"1", "@id":"2300147", "info":{"authors":{"author":[{"@pid":"04/36","text":"George Papagiannakis"},{"@pid":"219/7418","text":"Efstratios Geronikolakis"},{"@pid":"20/7735","text":"Maria Pateraki"},{"@pid":"202/1431","text":"Víctor M. López-Menchero"},{"@pid":"153/8188","text":"Michael Tsioumas"},{"@pid":"62/3474","text":"Stella Sylaiou"},{"@pid":"41/3843","text":"Fotis Liarokapis"},{"@pid":"76/9870","text":"Athina Grammatikopoulou"},{"@pid":"86/6114","text":"Kosmas Dimitropoulos"},{"@pid":"g/NGrammalidis","text":"Nikolaos Grammalidis"},{"@pid":"49/4915","text":"Nikolaos Partarakis"},{"@pid":"97/6567","text":"George Margetis"},{"@pid":"45/8737","text":"Giannis Drossis"},{"@pid":"227/8758","text":"Martha Vassiliadi"},{"@pid":"10/2540","text":"Alan Chalmers"},{"@pid":"s/ConstantineStephanidis","text":"Constantine Stephanidis"},{"@pid":"t/NadiaMagnenatThalmann","text":"Nadia Magnenat-Thalmann"}]},"title":"Mixed Reality, Gamified Presence, and Storytelling for Virtual Museums.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/PapagiannakisGPLTSLGDGPMDVCSM19","doi":"10.1007/978-3-319-08234-9_249-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_249-1","url":"https://dblp.org/rec/reference/ecgg/PapagiannakisGPLTSLGDGPMDVCSM19"}, "url":"URL#2300147" }, { "@score":"1", "@id":"2300148", "info":{"authors":{"author":{"@pid":"70/7076","text":"Gianluca Paravati"}},"title":"Augmented Reality for Maintenance.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Paravati19","doi":"10.1007/978-3-319-08234-9_91-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_91-1","url":"https://dblp.org/rec/reference/ecgg/Paravati19"}, "url":"URL#2300148" }, { "@score":"1", "@id":"2300149", "info":{"authors":{"author":[{"@pid":"195/3755","text":"Emily Peed"},{"@pid":"21/5955","text":"Newton Lee"}]},"title":"3D Printing, History of.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/PeedL19","doi":"10.1007/978-3-319-08234-9_279-2","ee":"https://doi.org/10.1007/978-3-319-08234-9_279-2","url":"https://dblp.org/rec/reference/ecgg/PeedL19"}, "url":"URL#2300149" }, { "@score":"1", "@id":"2300150", "info":{"authors":{"author":[{"@pid":"195/3755","text":"Emily Peed"},{"@pid":"21/5955","text":"Newton Lee"}]},"title":"History of Augmented Reality.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/PeedL19a","doi":"10.1007/978-3-319-08234-9_282-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_282-1","url":"https://dblp.org/rec/reference/ecgg/PeedL19a"}, "url":"URL#2300150" }, { "@score":"1", "@id":"2300151", "info":{"authors":{"author":[{"@pid":"195/3755","text":"Emily Peed"},{"@pid":"21/5955","text":"Newton Lee"}]},"title":"Open Source 3D Printing, History of.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/PeedL19b","doi":"10.1007/978-3-319-08234-9_280-2","ee":"https://doi.org/10.1007/978-3-319-08234-9_280-2","url":"https://dblp.org/rec/reference/ecgg/PeedL19b"}, "url":"URL#2300151" }, { "@score":"1", "@id":"2300152", "info":{"authors":{"author":[{"@pid":"195/3755","text":"Emily Peed"},{"@pid":"21/5955","text":"Newton Lee"}]},"title":"Origin of Virtual Reality.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/PeedL19c","doi":"10.1007/978-3-319-08234-9_281-2","ee":"https://doi.org/10.1007/978-3-319-08234-9_281-2","url":"https://dblp.org/rec/reference/ecgg/PeedL19c"}, "url":"URL#2300152" }, { "@score":"1", "@id":"2300153", "info":{"authors":{"author":[{"@pid":"238/9358","text":"Ulka Chandini Pendit"},{"@pid":"66/4718","text":"Syamsul Bahrin Zaibon"},{"@pid":"238/9346","text":"Juliana Aida Abu Bakar"}]},"title":"Conceptual Model of Mobile Augmented Reality for Cultural Heritage.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/PenditZB19","doi":"10.1007/978-3-319-08234-9_79-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_79-1","url":"https://dblp.org/rec/reference/ecgg/PenditZB19"}, "url":"URL#2300153" }, { "@score":"1", "@id":"2300154", "info":{"authors":{"author":[{"@pid":"187/5496","text":"Giani Petri"},{"@pid":"w/ChristianeGressevonWangenheim","text":"Christiane Gresse von Wangenheim"},{"@pid":"12/10539","text":"Adriano Ferreti Borgatto"}]},"title":"MEEGA+, Systematic Model to Evaluate Educational Games.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/PetriWB19","doi":"10.1007/978-3-319-08234-9_214-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_214-1","url":"https://dblp.org/rec/reference/ecgg/PetriWB19"}, "url":"URL#2300154" }, { "@score":"1", "@id":"2300155", "info":{"authors":{"author":{"@pid":"29/4035","text":"Krzysztof Pietroszek"}},"title":"Raycasting in Virtual Reality.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Pietroszek19","doi":"10.1007/978-3-319-08234-9_180-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_180-1","url":"https://dblp.org/rec/reference/ecgg/Pietroszek19"}, "url":"URL#2300155" }, { "@score":"1", "@id":"2300156", "info":{"authors":{"author":{"@pid":"29/4035","text":"Krzysztof Pietroszek"}},"title":"Virtual Hand Metaphor in Virtual Reality.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Pietroszek19a","doi":"10.1007/978-3-319-08234-9_178-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_178-1","url":"https://dblp.org/rec/reference/ecgg/Pietroszek19a"}, "url":"URL#2300156" }, { "@score":"1", "@id":"2300157", "info":{"authors":{"author":{"@pid":"29/4035","text":"Krzysztof Pietroszek"}},"title":"Virtual Pointing Metaphor in Virtual Reality.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Pietroszek19b","doi":"10.1007/978-3-319-08234-9_179-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_179-1","url":"https://dblp.org/rec/reference/ecgg/Pietroszek19b"}, "url":"URL#2300157" }, { "@score":"1", "@id":"2300158", "info":{"authors":{"author":[{"@pid":"31/9459","text":"Catia Prandi"},{"@pid":"82/2986","text":"Paola Salomoni"},{"@pid":"83/4258","text":"Silvia Mirri"}]},"title":"Gamification in Crowdsourcing Applications.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/PrandiSM19","doi":"10.1007/978-3-319-08234-9_46-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_46-1","url":"https://dblp.org/rec/reference/ecgg/PrandiSM19"}, "url":"URL#2300158" }, { "@score":"1", "@id":"2300159", "info":{"authors":{"author":{"@pid":"52/1010","text":"John Quarles"}},"title":"Accessibility of Virtual Reality for Persons with Disabilities.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Quarles19","doi":"10.1007/978-3-319-08234-9_68-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_68-1","url":"https://dblp.org/rec/reference/ecgg/Quarles19"}, "url":"URL#2300159" }, { "@score":"1", "@id":"2300160", "info":{"authors":{"author":[{"@pid":"195/8489","text":"Werner Ravyse"},{"@pid":"35/2043","text":"Kimmo Tarkkanen"},{"@pid":"00/7194","text":"A. Seugnet Blignaut"},{"@pid":"s/ErkkiSutinen","text":"Erkki Sutinen"},{"@pid":"93/1207","text":"Jouni Smed"}]},"title":"Rehabilitation Games.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/RavyseTBSS19","doi":"10.1007/978-3-319-08234-9_148-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_148-1","url":"https://dblp.org/rec/reference/ecgg/RavyseTBSS19"}, "url":"URL#2300160" }, { "@score":"1", "@id":"2300161", "info":{"authors":{"author":{"@pid":"79/8897","text":"Carol Luckhardt Redfield"}},"title":"Teaching Computer Graphics by Application.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Redfield19","doi":"10.1007/978-3-319-08234-9_61-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_61-1","url":"https://dblp.org/rec/reference/ecgg/Redfield19"}, "url":"URL#2300161" }, { "@score":"1", "@id":"2300162", "info":{"authors":{"author":[{"@pid":"84/14","text":"Laura Ricci"},{"@pid":"96/8282","text":"Emanuele Carlini"}]},"title":"Area of Interest Management in Massively Multiplayer Online Games.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/RicciC19","doi":"10.1007/978-3-319-08234-9_239-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_239-1","url":"https://dblp.org/rec/reference/ecgg/RicciC19"}, "url":"URL#2300162" }, { "@score":"1", "@id":"2300163", "info":{"authors":{"author":[{"@pid":"238/9350","text":"David W. Rick"},{"@pid":"115/6225","text":"Ken S. McAllister"},{"@pid":"184/6122","text":"Judd Ethan Ruggill"}]},"title":"Vector Graphics.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/RickMR19","doi":"10.1007/978-3-319-08234-9_54-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_54-1","url":"https://dblp.org/rec/reference/ecgg/RickMR19"}, "url":"URL#2300163" }, { "@score":"1", "@id":"2300164", "info":{"authors":{"author":[{"@pid":"170/4397","text":"Nina Rosa"},{"@pid":"49/5345","text":"Wolfgang Hürst"},{"@pid":"v/RemcoCVeltkamp","text":"Remco C. Veltkamp"},{"@pid":"04/1705","text":"Peter J. Werkhoven"}]},"title":"Player-Avatar Link: Interdisciplinary Embodiment Perspectives.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/RosaHVW19","doi":"10.1007/978-3-319-08234-9_110-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_110-1","url":"https://dblp.org/rec/reference/ecgg/RosaHVW19"}, "url":"URL#2300164" }, { "@score":"1", "@id":"2300165", "info":{"authors":{"author":[{"@pid":"194/4043","text":"Satyaki Roy"},{"@pid":"194/1949","text":"Pratiti Sarkar"},{"@pid":"194/1914","text":"Surojit Dey"}]},"title":"Augmented Learning Experience for School Education.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/RoySD19","doi":"10.1007/978-3-319-08234-9_88-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_88-1","url":"https://dblp.org/rec/reference/ecgg/RoySD19"}, "url":"URL#2300165" }, { "@score":"1", "@id":"2300166", "info":{"authors":{"author":[{"@pid":"93/7192","text":"William Russell Pensyl"},{"@pid":"61/4865","text":"Xiaoping Min"},{"@pid":"238/9339","text":"Song Shuli Lily"}]},"title":"Facial Recognition and Emotion Detection in Environmental Installation and Social Media Applications.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/RussellML19","doi":"10.1007/978-3-319-08234-9_59-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_59-1","url":"https://dblp.org/rec/reference/ecgg/RussellML19"}, "url":"URL#2300166" }, { "@score":"1", "@id":"2300167", "info":{"authors":{"author":[{"@pid":"41/1299","text":"Manuel Schmidt"},{"@pid":"00/8235","text":"Yann Savoye"}]},"title":"Fluid Simulation.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/SchmidtS19","doi":"10.1007/978-3-319-08234-9_55-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_55-1","url":"https://dblp.org/rec/reference/ecgg/SchmidtS19"}, "url":"URL#2300167" }, { "@score":"1", "@id":"2300168", "info":{"authors":{"author":{"@pid":"238/9313","text":"Ferdinand Schober"}},"title":"Secure Gaming: Cheat-Resistant Protocols and Game History Validation.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Schober19","doi":"10.1007/978-3-319-08234-9_51-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_51-1","url":"https://dblp.org/rec/reference/ecgg/Schober19"}, "url":"URL#2300168" }, { "@score":"1", "@id":"2300169", "info":{"authors":{"author":[{"@pid":"40/4193","text":"Jacob Schrum"},{"@pid":"m/RistoMiikkulainen","text":"Risto Miikkulainen"}]},"title":"Constructing Game Agents Through Simulated Evolution.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/SchrumM19","doi":"10.1007/978-3-319-08234-9_15-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_15-1","url":"https://dblp.org/rec/reference/ecgg/SchrumM19"}, "url":"URL#2300169" }, { "@score":"1", "@id":"2300170", "info":{"authors":{"author":{"@pid":"137/2797","text":"Sercan Sengün"}},"title":"Videogame Engagement: Psychological Frameworks.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Sengun19","doi":"10.1007/978-3-319-08234-9_158-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_158-1","url":"https://dblp.org/rec/reference/ecgg/Sengun19"}, "url":"URL#2300170" }, { "@score":"1", "@id":"2300171", "info":{"authors":{"author":{"@pid":"96/2369","text":"Stefania Serafin"}},"title":"Sonic Interactions in Virtual Environments.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Serafin19","doi":"10.1007/978-3-319-08234-9_243-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_243-1","url":"https://dblp.org/rec/reference/ecgg/Serafin19"}, "url":"URL#2300171" }, { "@score":"1", "@id":"2300172", "info":{"authors":{"author":{"@pid":"08/7560","text":"Tonguc Ibrahim Sezen"}},"title":"Analog Prototyping for Digital Game Design.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Sezen19","doi":"10.1007/978-3-319-08234-9_135-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_135-1","url":"https://dblp.org/rec/reference/ecgg/Sezen19"}, "url":"URL#2300172" }, { "@score":"1", "@id":"2300173", "info":{"authors":{"author":{"@pid":"120/2249","text":"Digdem Sezen"}},"title":"Political Game Design.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Sezen19a","doi":"10.1007/978-3-319-08234-9_136-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_136-1","url":"https://dblp.org/rec/reference/ecgg/Sezen19a"}, "url":"URL#2300173" }, { "@score":"1", "@id":"2300174", "info":{"authors":{"author":{"@pid":"00/10536","text":"Isabel Cristina Siqueira da Silva"}},"title":"Mixed Reality and Immersive Data Visualization.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Silva19","doi":"10.1007/978-3-319-08234-9_290-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_290-1","url":"https://dblp.org/rec/reference/ecgg/Silva19"}, "url":"URL#2300174" }, { "@score":"1", "@id":"2300175", "info":{"authors":{"author":[{"@pid":"00/10536","text":"Isabel Cristina Siqueira da Silva"},{"@pid":"16/1737","text":"João Ricardo Bittencourt"}]},"title":"Game Thinking X Game Design Thinking.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/SilvaB19","doi":"10.1007/978-3-319-08234-9_289-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_289-1","url":"https://dblp.org/rec/reference/ecgg/SilvaB19"}, "url":"URL#2300175" }, { "@score":"1", "@id":"2300176", "info":{"authors":{"author":[{"@pid":"00/10536","text":"Isabel Cristina Siqueira da Silva"},{"@pid":"238/9327","text":"Felipe Oviedo Frosi"}]},"title":"Game Interface: Influence of Diegese Theory on the User Experience.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/SilvaF19","doi":"10.1007/978-3-319-08234-9_288-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_288-1","url":"https://dblp.org/rec/reference/ecgg/SilvaF19"}, "url":"URL#2300176" }, { "@score":"1", "@id":"2300177", "info":{"authors":{"author":{"@pid":"02/4044","text":"Adalberto L. Simeone"}},"title":"Substitutional Reality.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Simeone19","doi":"10.1007/978-3-319-08234-9_254-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_254-1","url":"https://dblp.org/rec/reference/ecgg/Simeone19"}, "url":"URL#2300177" }, { "@score":"1", "@id":"2300178", "info":{"authors":{"author":{"@pid":"19/8919","text":"Christian Stein"}},"title":"Uncanny Valley in Virtual Reality.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Stein19","doi":"10.1007/978-3-319-08234-9_177-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_177-1","url":"https://dblp.org/rec/reference/ecgg/Stein19"}, "url":"URL#2300178" }, { "@score":"1", "@id":"2300179", "info":{"authors":{"author":[{"@pid":"19/8919","text":"Christian Stein"},{"@pid":"238/9341","text":"Thomas Lilge"}]},"title":"Games in Science.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/SteinL19","doi":"10.1007/978-3-319-08234-9_152-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_152-1","url":"https://dblp.org/rec/reference/ecgg/SteinL19"}, "url":"URL#2300179" }, { "@score":"1", "@id":"2300180", "info":{"authors":{"author":[{"@pid":"211/4636","text":"Ruoqi Sun"},{"@pid":"238/9362","text":"Lizhaung Ma"}]},"title":"Face Beautification in Antiage.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/SunM19","doi":"10.1007/978-3-319-08234-9_99-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_99-1","url":"https://dblp.org/rec/reference/ecgg/SunM19"}, "url":"URL#2300180" }, { "@score":"1", "@id":"2300181", "info":{"authors":{"author":[{"@pid":"05/3434","text":"Takenobu Takizawa"},{"@pid":"09/1774","text":"Takeshi Ito"},{"@pid":"31/977","text":"Takuya Hiraoka"},{"@pid":"77/9055","text":"Kunihito Hoki"}]},"title":"Contemporary Computer Shogi.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/TakizawaIHH19","doi":"10.1007/978-3-319-08234-9_22-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_22-1","url":"https://dblp.org/rec/reference/ecgg/TakizawaIHH19"}, "url":"URL#2300181" }, { "@score":"1", "@id":"2300182", "info":{"authors":{"author":[{"@pid":"238/9361","text":"Tansel Tepe"},{"@pid":"184/3301","text":"Devkan Kaleci"},{"@pid":"31/7200","text":"Hakan Tüzün"}]},"title":"Virtual Reality Applications in Education.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/TepeKT19","doi":"10.1007/978-3-319-08234-9_166-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_166-1","url":"https://dblp.org/rec/reference/ecgg/TepeKT19"}, "url":"URL#2300182" }, { "@score":"1", "@id":"2300183", "info":{"authors":{"author":{"@pid":"t/DanielThalmann","text":"Daniel Thalmann"}},"title":"Crowd Simulation.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Thalmann19","doi":"10.1007/978-3-319-08234-9_69-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_69-1","url":"https://dblp.org/rec/reference/ecgg/Thalmann19"}, "url":"URL#2300183" }, { "@score":"1", "@id":"2300184", "info":{"authors":{"author":{"@pid":"228/3187","text":"Mattia Thibault"}},"title":"Post-Digital Graphics in Computer Games.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Thibault19","doi":"10.1007/978-3-319-08234-9_143-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_143-1","url":"https://dblp.org/rec/reference/ecgg/Thibault19"}, "url":"URL#2300184" }, { "@score":"1", "@id":"2300185", "info":{"authors":{"author":{"@pid":"228/3187","text":"Mattia Thibault"}},"title":"Semiotics of Computer Games.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Thibault19a","doi":"10.1007/978-3-319-08234-9_142-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_142-1","url":"https://dblp.org/rec/reference/ecgg/Thibault19a"}, "url":"URL#2300185" }, { "@score":"1", "@id":"2300186", "info":{"authors":{"author":[{"@pid":"84/597","text":"Rodrigo Torres"},{"@pid":"238/9330","text":"Marlene Palafox"}]},"title":"Interactive Virtual Reality Navigation Using Cave Automatic Virtual Environment Technology.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/TorresP19","doi":"10.1007/978-3-319-08234-9_66-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_66-1","url":"https://dblp.org/rec/reference/ecgg/TorresP19"}, "url":"URL#2300186" }, { "@score":"1", "@id":"2300187", "info":{"authors":{"author":[{"@pid":"07/166","text":"Jolanda G. Tromp"},{"@pid":"238/9315","text":"Chung V. Le"},{"@pid":"238/9318","text":"Tho L. Nguyen"}]},"title":"User-Centered Design and Evaluation Methodology for Virtual Environments.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/TrompLN19","doi":"10.1007/978-3-319-08234-9_167-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_167-1","url":"https://dblp.org/rec/reference/ecgg/TrompLN19"}, "url":"URL#2300187" }, { "@score":"1", "@id":"2300188", "info":{"authors":{"author":[{"@pid":"238/9348","text":"Natasha Bulatovic Trygg"},{"@pid":"238/9312","text":"Petter Skult"},{"@pid":"93/1207","text":"Jouni Smed"}]},"title":"Narrative Design.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/TryggSS19","doi":"10.1007/978-3-319-08234-9_140-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_140-1","url":"https://dblp.org/rec/reference/ecgg/TryggSS19"}, "url":"URL#2300188" }, { "@score":"1", "@id":"2300189", "info":{"authors":{"author":{"@pid":"80/7874","text":"Tsung-Chih Tsai"}},"title":"Position Based Dynamics.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Tsai19","doi":"10.1007/978-3-319-08234-9_92-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_92-1","url":"https://dblp.org/rec/reference/ecgg/Tsai19"}, "url":"URL#2300189" }, { "@score":"1", "@id":"2300190", "info":{"authors":{"author":{"@pid":"238/9323","text":"Cetin Tuker"}},"title":"Redesigning Games for New Interfaces and Platforms.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Tuker19","doi":"10.1007/978-3-319-08234-9_145-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_145-1","url":"https://dblp.org/rec/reference/ecgg/Tuker19"}, "url":"URL#2300190" }, { "@score":"1", "@id":"2300191", "info":{"authors":{"author":{"@pid":"238/9323","text":"Cetin Tuker"}},"title":"Training Spatial Skills with Virtual Reality and Augmented Reality.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Tuker19a","doi":"10.1007/978-3-319-08234-9_173-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_173-1","url":"https://dblp.org/rec/reference/ecgg/Tuker19a"}, "url":"URL#2300191" }, { "@score":"1", "@id":"2300192", "info":{"authors":{"author":[{"@pid":"180/9124","text":"Ahmet Uysal"},{"@pid":"168/2617","text":"Mehmet Kosa"}]},"title":"Psychological Game Design.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/UysalK19","doi":"10.1007/978-3-319-08234-9_134-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_134-1","url":"https://dblp.org/rec/reference/ecgg/UysalK19"}, "url":"URL#2300192" }, { "@score":"1", "@id":"2300193", "info":{"authors":{"author":[{"@pid":"198/2276","text":"Jukka Vahlo"},{"@pid":"168/4809","text":"Aki Koponen"}]},"title":"Player Personas and Game Choice.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/VahloK19","doi":"10.1007/978-3-319-08234-9_149-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_149-1","url":"https://dblp.org/rec/reference/ecgg/VahloK19"}, "url":"URL#2300193" }, { "@score":"1", "@id":"2300194", "info":{"authors":{"author":{"@pid":"238/9364","text":"Sergio Rodríguez Valdunciel"}},"title":"Pipeline of 2D Vector Animation in Television Series.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Valdunciel19","doi":"10.1007/978-3-319-08234-9_263-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_263-1","url":"https://dblp.org/rec/reference/ecgg/Valdunciel19"}, "url":"URL#2300194" }, { "@score":"1", "@id":"2300195", "info":{"authors":{"author":[{"@pid":"121/4944","text":"Rojin Vishkaie"},{"@pid":"141/3961","text":"Richard M. Levy"}]},"title":"Technologies for the Design Review Process.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/VishkaieL19","doi":"10.1007/978-3-319-08234-9_203-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_203-1","url":"https://dblp.org/rec/reference/ecgg/VishkaieL19"}, "url":"URL#2300195" }, { "@score":"1", "@id":"2300196", "info":{"authors":{"author":[{"@pid":"181/2695-24","text":"Min Wang 0024"},{"@pid":"10/4950","text":"Lizhuang Ma"}]},"title":"UV Map Generation on Triangular Mesh.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/WangM19","doi":"10.1007/978-3-319-08234-9_98-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_98-1","url":"https://dblp.org/rec/reference/ecgg/WangM19"}, "url":"URL#2300196" }, { "@score":"1", "@id":"2300197", "info":{"authors":{"author":[{"@pid":"238/9356","text":"Duncan A. H. Williams"},{"@pid":"86/1424","text":"Peter I. Cowling"},{"@pid":"33/3578","text":"Damian T. Murphy"}]},"title":"Emotional Congruence in Video Game Audio.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/WilliamsCM19","doi":"10.1007/978-3-319-08234-9_199-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_199-1","url":"https://dblp.org/rec/reference/ecgg/WilliamsCM19"}, "url":"URL#2300197" }, { "@score":"1", "@id":"2300198", "info":{"authors":{"author":{"@pid":"32/436","text":"Mark H. M. Winands"}},"title":"Monte-Carlo Tree Search.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Winands19","doi":"10.1007/978-3-319-08234-9_12-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_12-1","url":"https://dblp.org/rec/reference/ecgg/Winands19"}, "url":"URL#2300198" }, { "@score":"1", "@id":"2300199", "info":{"authors":{"author":{"@pid":"70/10398","text":"Sai-Keung Wong"}},"title":"Crowd Evacuation Using Simulation Techniques.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Wong19","doi":"10.1007/978-3-319-08234-9_104-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_104-1","url":"https://dblp.org/rec/reference/ecgg/Wong19"}, "url":"URL#2300199" }, { "@score":"1", "@id":"2300200", "info":{"authors":{"author":{"@pid":"162/4761","text":"Rebecca Ruige Xu"}},"title":"Artistic Data Visualization in the Making.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Xu19","doi":"10.1007/978-3-319-08234-9_60-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_60-1","url":"https://dblp.org/rec/reference/ecgg/Xu19"}, "url":"URL#2300200" }, { "@score":"1", "@id":"2300201", "info":{"authors":{"author":[{"@pid":"77/2280","text":"Kenneth C. C. Yang"},{"@pid":"27/4200","text":"Yowei Kang"}]},"title":"Integrating Virtual Reality and Augmented Reality into Advertising Campaigns: History, Technology, and Future Trends.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/YangK19","doi":"10.1007/978-3-319-08234-9_132-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_132-1","url":"https://dblp.org/rec/reference/ecgg/YangK19"}, "url":"URL#2300201" }, { "@score":"1", "@id":"2300202", "info":{"authors":{"author":{"@pid":"08/4904","text":"Anna E. Yankovskaya"}},"title":"2-Simplex Prism as a Cognitive Graphics Tool for Decision-Making.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Yankovskaya19","doi":"10.1007/978-3-319-08234-9_285-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_285-1","url":"https://dblp.org/rec/reference/ecgg/Yankovskaya19"}, "url":"URL#2300202" }, { "@score":"1", "@id":"2300203", "info":{"authors":{"author":{"@pid":"130/9496","text":"Masasuke Yasumoto"}},"title":"Shadow Shooter: All-Around Game with e-Yumi 3D.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Yasumoto19","doi":"10.1007/978-3-319-08234-9_63-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_63-1","url":"https://dblp.org/rec/reference/ecgg/Yasumoto19"}, "url":"URL#2300203" }, { "@score":"1", "@id":"2300204", "info":{"authors":{"author":[{"@pid":"120/1910","text":"Matthew Yee-King"},{"@pid":"238/9353","text":"Igor Dall'Avanzi"}]},"title":"Procedural Audio in Video Games.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Yee-KingD19","doi":"10.1007/978-3-319-08234-9_271-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_271-1","url":"https://dblp.org/rec/reference/ecgg/Yee-KingD19"}, "url":"URL#2300204" }, { "@score":"1", "@id":"2300205", "info":{"authors":{"author":{"@pid":"07/4809-1","text":"Murat Yilmaz 0001"}},"title":"Virtual Reality-Based Daily Scrum Meetings.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Yilmaz19","doi":"10.1007/978-3-319-08234-9_160-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_160-1","url":"https://dblp.org/rec/reference/ecgg/Yilmaz19"}, "url":"URL#2300205" }, { "@score":"1", "@id":"2300206", "info":{"authors":{"author":{"@pid":"76/6727","text":"Hiroshi Yoshikawa"}},"title":"Image Quality Evaluation of a Computer-Generated Phase Hologram.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Yoshikawa19","doi":"10.1007/978-3-319-08234-9_277-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_277-1","url":"https://dblp.org/rec/reference/ecgg/Yoshikawa19"}, "url":"URL#2300206" }, { "@score":"1", "@id":"2300207", "info":{"authors":{"author":[{"@pid":"19/5077","text":"Kazuki Yoshizoe"},{"@pid":"m/MartinMuller3","text":"Martin Müller 0003"}]},"title":"Computer Go.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Yoshizoe019","doi":"10.1007/978-3-319-08234-9_20-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_20-1","url":"https://dblp.org/rec/reference/ecgg/Yoshizoe019"}, "url":"URL#2300207" }, { "@score":"1", "@id":"2300208", "info":{"authors":{"author":{"@pid":"238/9329","text":"Paulo Zaffari"}},"title":"Game Development Leadership Tips.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/Zaffari19","doi":"10.1007/978-3-319-08234-9_5-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_5-1","url":"https://dblp.org/rec/reference/ecgg/Zaffari19"}, "url":"URL#2300208" }, { "@score":"1", "@id":"2300209", "info":{"authors":{"author":[{"@pid":"117/0075-1","text":"Yanxiang Zhang 0001"},{"@pid":"174/0805","text":"Qingqing Zhao"}]},"title":"Interactive Augmented Reality to Support Education.","venue":"Encyclopedia of Computer Graphics and Games","year":"2019","type":"Reference Works","access":"closed","key":"reference/ecgg/ZhangZ19","doi":"10.1007/978-3-319-08234-9_82-1","ee":"https://doi.org/10.1007/978-3-319-08234-9_82-1","url":"https://dblp.org/rec/reference/ecgg/ZhangZ19"}, "url":"URL#2300209" }, { "@score":"1", "@id":"2686929", "info":{"authors":{"author":{"@pid":"h/JiaweiHan","text":"Jiawei Han 0001"}},"title":"Data Mining.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/000118","doi":"10.1007/978-1-4614-8265-9_104","ee":"https://doi.org/10.1007/978-1-4614-8265-9_104","url":"https://dblp.org/rec/reference/db/000118"}, "url":"URL#2686929" }, { "@score":"1", "@id":"2686930", "info":{"authors":{"author":{"@pid":"k/ChristophKoch","text":"Christoph Koch 0001"}},"title":"Logical Foundations of Web Data Extraction.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/000118a","doi":"10.1007/978-1-4614-8265-9_1155","ee":"https://doi.org/10.1007/978-1-4614-8265-9_1155","url":"https://dblp.org/rec/reference/db/000118a"}, "url":"URL#2686930" }, { "@score":"1", "@id":"2686931", "info":{"authors":{"author":{"@pid":"s/MarcShapiro","text":"Marc Shapiro 0001"}},"title":"Optimistic Replication and Resolution.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/000118b","doi":"10.1007/978-1-4614-8265-9_258","ee":"https://doi.org/10.1007/978-1-4614-8265-9_258","url":"https://dblp.org/rec/reference/db/000118b"}, "url":"URL#2686931" }, { "@score":"1", "@id":"2686932", "info":{"authors":{"author":{"@pid":"k/ChristophKoch","text":"Christoph Koch 0001"}},"title":"Parameterized Complexity of Queries.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/000118c","doi":"10.1007/978-1-4614-8265-9_1244","ee":"https://doi.org/10.1007/978-1-4614-8265-9_1244","url":"https://dblp.org/rec/reference/db/000118c"}, "url":"URL#2686932" }, { "@score":"1", "@id":"2686933", "info":{"authors":{"author":{"@pid":"s/MarcShapiro","text":"Marc Shapiro 0001"}},"title":"Replicated Data Types.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/000118d","doi":"10.1007/978-1-4614-8265-9_80813","ee":"https://doi.org/10.1007/978-1-4614-8265-9_80813","url":"https://dblp.org/rec/reference/db/000118d"}, "url":"URL#2686933" }, { "@score":"1", "@id":"2686934", "info":{"authors":{"author":{"@pid":"s/MarkusSchneider1","text":"Markus Schneider 0001"}},"title":"Spatial and Spatiotemporal Data Models and Languages.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/000118e","doi":"10.1007/978-1-4614-8265-9_360","ee":"https://doi.org/10.1007/978-1-4614-8265-9_360","url":"https://dblp.org/rec/reference/db/000118e"}, "url":"URL#2686934" }, { "@score":"1", "@id":"2686935", "info":{"authors":{"author":{"@pid":"s/MarkusSchneider1","text":"Markus Schneider 0001"}},"title":"Spatial Data Types.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/000118f","doi":"10.1007/978-1-4614-8265-9_354","ee":"https://doi.org/10.1007/978-1-4614-8265-9_354","url":"https://dblp.org/rec/reference/db/000118f"}, "url":"URL#2686935" }, { "@score":"1", "@id":"2686936", "info":{"authors":{"author":{"@pid":"89/5901-1","text":"Jun Yan 0001"}},"title":"Text Representation.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/000118g","doi":"10.1007/978-1-4614-8265-9_420","ee":"https://doi.org/10.1007/978-1-4614-8265-9_420","url":"https://dblp.org/rec/reference/db/000118g"}, "url":"URL#2686936" }, { "@score":"1", "@id":"2686937", "info":{"authors":{"author":{"@pid":"k/ChristophKoch","text":"Christoph Koch 0001"}},"title":"XML Stream Processing.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/000118h","doi":"10.1007/978-1-4614-8265-9_473","ee":"https://doi.org/10.1007/978-1-4614-8265-9_473","url":"https://dblp.org/rec/reference/db/000118h"}, "url":"URL#2686937" }, { "@score":"1", "@id":"2686938", "info":{"authors":{"author":[{"@pid":"h/JiaweiHan","text":"Jiawei Han 0001"},{"@pid":"46/3522","text":"Bolin Ding"}]},"title":"Stream Mining.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/0001D18","doi":"10.1007/978-1-4614-8265-9_369","ee":"https://doi.org/10.1007/978-1-4614-8265-9_369","url":"https://dblp.org/rec/reference/db/0001D18"}, "url":"URL#2686938" }, { "@score":"1", "@id":"2686939", "info":{"authors":{"author":[{"@pid":"11/1097","text":"Carlos Blanco 0001"},{"@pid":"f/EduardoFernandezMedina","text":"Eduardo Fernández-Medina"},{"@pid":"50/2311","text":"Juan Trujillo 0001"}]},"title":"Data Warehouse Security.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/0001FT18","doi":"10.1007/978-1-4614-8265-9_333","ee":"https://doi.org/10.1007/978-1-4614-8265-9_333","url":"https://dblp.org/rec/reference/db/0001FT18"}, "url":"URL#2686939" }, { "@score":"1", "@id":"2686940", "info":{"authors":{"author":[{"@pid":"89/5901-1","text":"Jun Yan 0001"},{"@pid":"61/5788","text":"Jian Hu"}]},"title":"Text Semantic Representation.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/0001H18","doi":"10.1007/978-1-4614-8265-9_422","ee":"https://doi.org/10.1007/978-1-4614-8265-9_422","url":"https://dblp.org/rec/reference/db/0001H18"}, "url":"URL#2686940" }, { "@score":"1", "@id":"2686941", "info":{"authors":{"author":[{"@pid":"a/ColinAtkinson","text":"Colin Atkinson 0001"},{"@pid":"k/ThomasKuhne","text":"Thomas Kühne 0001"}]},"title":"Deep Instantiation.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/0001K18","doi":"10.1007/978-1-4614-8265-9_80608","ee":"https://doi.org/10.1007/978-1-4614-8265-9_80608","url":"https://dblp.org/rec/reference/db/0001K18"}, "url":"URL#2686941" }, { "@score":"1", "@id":"2686942", "info":{"authors":{"author":[{"@pid":"s/MarcShapiro","text":"Marc Shapiro 0001"},{"@pid":"k/BettinaKemme","text":"Bettina Kemme"}]},"title":"Eventual Consistency.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/0001K18a","doi":"10.1007/978-1-4614-8265-9_1366","ee":"https://doi.org/10.1007/978-1-4614-8265-9_1366","url":"https://dblp.org/rec/reference/db/0001K18a"}, "url":"URL#2686942" }, { "@score":"1", "@id":"2686943", "info":{"authors":{"author":[{"@pid":"48/2626-1","text":"Arnab Bhattacharya 0001"},{"@pid":"58/632","text":"Vebjorn Ljosa"}]},"title":"Image Management for Biological Data.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/0001L18","doi":"10.1007/978-1-4614-8265-9_629","ee":"https://doi.org/10.1007/978-1-4614-8265-9_629","url":"https://dblp.org/rec/reference/db/0001L18"}, "url":"URL#2686943" }, { "@score":"1", "@id":"2686944", "info":{"authors":{"author":[{"@pid":"s/RobertStevens","text":"Robert Stevens 0001"},{"@pid":"19/6031","text":"Phillip Lord"}]},"title":"Ontologies and Life Science Data Management.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/0001L18a","doi":"10.1007/978-1-4614-8265-9_631","ee":"https://doi.org/10.1007/978-1-4614-8265-9_631","url":"https://dblp.org/rec/reference/db/0001L18a"}, "url":"URL#2686944" }, { "@score":"1", "@id":"2686945", "info":{"authors":{"author":[{"@pid":"61/2115-1","text":"Lin Liu 0001"},{"@pid":"86/7123","text":"Victor E. Lee"},{"@pid":"72/4662","text":"Ruoming Jin"}]},"title":"Uncertain Graph Data Management.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/0001LJ18","doi":"10.1007/978-1-4614-8265-9_80761","ee":"https://doi.org/10.1007/978-1-4614-8265-9_80761","url":"https://dblp.org/rec/reference/db/0001LJ18"}, "url":"URL#2686945" }, { "@score":"1", "@id":"2686946", "info":{"authors":{"author":[{"@pid":"y/JunYang1","text":"Jun Yang 0001"},{"@pid":"m/KameshMunagala","text":"Kamesh Munagala"},{"@pid":"s/AdamSilberstein","text":"Adam Silberstein"}]},"title":"Data Aggregation in Sensor Networks.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/0001MS18","doi":"10.1007/978-1-4614-8265-9_93","ee":"https://doi.org/10.1007/978-1-4614-8265-9_93","url":"https://dblp.org/rec/reference/db/0001MS18"}, "url":"URL#2686946" }, { "@score":"1", "@id":"2686947", "info":{"authors":{"author":[{"@pid":"28/2073-1","text":"Wei Gao 0001"},{"@pid":"48/2002","text":"Cheng Niu"}]},"title":"Cross-Language Mining and Retrieval.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/0001N18","doi":"10.1007/978-1-4614-8265-9_89","ee":"https://doi.org/10.1007/978-1-4614-8265-9_89","url":"https://dblp.org/rec/reference/db/0001N18"}, "url":"URL#2686947" }, { "@score":"1", "@id":"2686948", "info":{"authors":{"author":[{"@pid":"k/ChristophKoch","text":"Christoph Koch 0001"},{"@pid":"o/DanOlteanu","text":"Dan Olteanu"}]},"title":"Uncertain Data Models.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/0001O18","doi":"10.1007/978-1-4614-8265-9_80739","ee":"https://doi.org/10.1007/978-1-4614-8265-9_80739","url":"https://dblp.org/rec/reference/db/0001O18"}, "url":"URL#2686948" }, { "@score":"1", "@id":"2686949", "info":{"authors":{"author":[{"@pid":"48/1224","text":"Christian Thomsen 0001"},{"@pid":"p/TorbenBachPedersen","text":"Torben Bach Pedersen"}]},"title":"Data Warehousing in Cloud Environments.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/0001P18","doi":"10.1007/978-1-4614-8265-9_80623","ee":"https://doi.org/10.1007/978-1-4614-8265-9_80623","url":"https://dblp.org/rec/reference/db/0001P18"}, "url":"URL#2686949" }, { "@score":"1", "@id":"2686950", "info":{"authors":{"author":[{"@pid":"m/DavidMaier","text":"David Maier 0001"},{"@pid":"65/2045","text":"Peter A. Tucker"}]},"title":"Punctuations.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/0001T18","doi":"10.1007/978-1-4614-8265-9_285","ee":"https://doi.org/10.1007/978-1-4614-8265-9_285","url":"https://dblp.org/rec/reference/db/0001T18"}, "url":"URL#2686950" }, { "@score":"1", "@id":"2686951", "info":{"authors":{"author":[{"@pid":"03/2511-1","text":"Hui Fang 0001"},{"@pid":"z/ChengXiangZhai","text":"ChengXiang Zhai"}]},"title":"Web Search Relevance Feedback.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/0001Z18","doi":"10.1007/978-1-4614-8265-9_462","ee":"https://doi.org/10.1007/978-1-4614-8265-9_462","url":"https://dblp.org/rec/reference/db/0001Z18"}, "url":"URL#2686951" }, { "@score":"1", "@id":"2686952", "info":{"authors":{"author":{"@pid":"c/LeiChen0002","text":"Lei Chen 0002"}},"title":"Cost and Quality Trade-Offs in Crowdsourcing.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/000218","doi":"10.1007/978-1-4614-8265-9_80658","ee":"https://doi.org/10.1007/978-1-4614-8265-9_80658","url":"https://dblp.org/rec/reference/db/000218"}, "url":"URL#2686952" }, { "@score":"1", "@id":"2686953", "info":{"authors":{"author":{"@pid":"c/LeiChen0002","text":"Lei Chen 0002"}},"title":"Curse of Dimensionality.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/000218a","doi":"10.1007/978-1-4614-8265-9_133","ee":"https://doi.org/10.1007/978-1-4614-8265-9_133","url":"https://dblp.org/rec/reference/db/000218a"}, "url":"URL#2686953" }, { "@score":"1", "@id":"2686954", "info":{"authors":{"author":{"@pid":"c/LeiChen0002","text":"Lei Chen 0002"}},"title":"Video Content Modeling.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/000218b","doi":"10.1007/978-1-4614-8265-9_1028","ee":"https://doi.org/10.1007/978-1-4614-8265-9_1028","url":"https://dblp.org/rec/reference/db/000218b"}, "url":"URL#2686954" }, { "@score":"1", "@id":"2686955", "info":{"authors":{"author":[{"@pid":"47/722-2","text":"Yue Zhang 0002"},{"@pid":"j/JamesJoshi","text":"James B. D. Joshi"}]},"title":"Administration Model for RBAC.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/0002J18","doi":"10.1007/978-1-4614-8265-9_1507","ee":"https://doi.org/10.1007/978-1-4614-8265-9_1507","url":"https://dblp.org/rec/reference/db/0002J18"}, "url":"URL#2686955" }, { "@score":"1", "@id":"2686956", "info":{"authors":{"author":[{"@pid":"47/722-2","text":"Yue Zhang 0002"},{"@pid":"j/JamesJoshi","text":"James B. D. Joshi"}]},"title":"ANSI/INCITS RBAC Standard.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/0002J18a","doi":"10.1007/978-1-4614-8265-9_1508","ee":"https://doi.org/10.1007/978-1-4614-8265-9_1508","url":"https://dblp.org/rec/reference/db/0002J18a"}, "url":"URL#2686956" }, { "@score":"1", "@id":"2686957", "info":{"authors":{"author":[{"@pid":"47/722-2","text":"Yue Zhang 0002"},{"@pid":"j/JamesJoshi","text":"James B. D. Joshi"}]},"title":"GEO-RBAC Model.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/0002J18b","doi":"10.1007/978-1-4614-8265-9_1509","ee":"https://doi.org/10.1007/978-1-4614-8265-9_1509","url":"https://dblp.org/rec/reference/db/0002J18b"}, "url":"URL#2686957" }, { "@score":"1", "@id":"2686958", "info":{"authors":{"author":[{"@pid":"47/722-2","text":"Yue Zhang 0002"},{"@pid":"j/JamesJoshi","text":"James B. D. Joshi"}]},"title":"Role-Based Access Control.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/0002J18c","doi":"10.1007/978-1-4614-8265-9_320","ee":"https://doi.org/10.1007/978-1-4614-8265-9_320","url":"https://dblp.org/rec/reference/db/0002J18c"}, "url":"URL#2686958" }, { "@score":"1", "@id":"2686959", "info":{"authors":{"author":[{"@pid":"47/722-2","text":"Yue Zhang 0002"},{"@pid":"j/JamesJoshi","text":"James B. D. Joshi"}]},"title":"Temporal Access Control.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/0002J18d","doi":"10.1007/978-1-4614-8265-9_385","ee":"https://doi.org/10.1007/978-1-4614-8265-9_385","url":"https://dblp.org/rec/reference/db/0002J18d"}, "url":"URL#2686959" }, { "@score":"1", "@id":"2686960", "info":{"authors":{"author":[{"@pid":"49/683-2","text":"Peng Peng 0002"},{"@pid":"w/RaymondChiWingWong","text":"Raymond Chi-Wing Wong"}]},"title":"Skyline Queries and Pareto Optimality.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/0002W18","doi":"10.1007/978-1-4614-8265-9_80684","ee":"https://doi.org/10.1007/978-1-4614-8265-9_80684","url":"https://dblp.org/rec/reference/db/0002W18"}, "url":"URL#2686960" }, { "@score":"1", "@id":"2686961", "info":{"authors":{"author":[{"@pid":"c/LeiChen0002","text":"Lei Chen 0002"},{"@pid":"z/XiaofangZhou","text":"Xiaofang Zhou 0001"}]},"title":"Two-Dimensional Shape Retrieval.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/0002Z18","doi":"10.1007/978-1-4614-8265-9_3","ee":"https://doi.org/10.1007/978-1-4614-8265-9_3","url":"https://dblp.org/rec/reference/db/0002Z18"}, "url":"URL#2686961" }, { "@score":"1", "@id":"2686962", "info":{"authors":{"author":[{"@pid":"b/JieBao3","text":"Jie Bao 0003"},{"@pid":"87/1585-4","text":"Yu Zheng 0004"}]},"title":"Location-Based Recommendation.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/0003Z18","doi":"10.1007/978-1-4614-8265-9_80700","ee":"https://doi.org/10.1007/978-1-4614-8265-9_80700","url":"https://dblp.org/rec/reference/db/0003Z18"}, "url":"URL#2686962" }, { "@score":"1", "@id":"2686963", "info":{"authors":{"author":{"@pid":"43/6657-10","text":"Jin Zhang 0010"}},"title":"Visualization for Information Retrieval.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/001018","doi":"10.1007/978-1-4614-8265-9_954","ee":"https://doi.org/10.1007/978-1-4614-8265-9_954","url":"https://dblp.org/rec/reference/db/001018"}, "url":"URL#2686963" }, { "@score":"1", "@id":"2686964", "info":{"authors":{"author":{"@pid":"a/WilMPvanderAalst","text":"Wil M. P. van der Aalst"}},"title":"Business Process Execution Language.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Aalst18","doi":"10.1007/978-1-4614-8265-9_1194","ee":"https://doi.org/10.1007/978-1-4614-8265-9_1194","url":"https://dblp.org/rec/reference/db/Aalst18"}, "url":"URL#2686964" }, { "@score":"1", "@id":"2686965", "info":{"authors":{"author":{"@pid":"a/WilMPvanderAalst","text":"Wil M. P. van der Aalst"}},"title":"Business Process Management.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Aalst18a","doi":"10.1007/978-1-4614-8265-9_1179","ee":"https://doi.org/10.1007/978-1-4614-8265-9_1179","url":"https://dblp.org/rec/reference/db/Aalst18a"}, "url":"URL#2686965" }, { "@score":"1", "@id":"2686966", "info":{"authors":{"author":{"@pid":"a/WilMPvanderAalst","text":"Wil M. P. van der Aalst"}},"title":"Business Process Modeling Notation.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Aalst18b","doi":"10.1007/978-1-4614-8265-9_1195","ee":"https://doi.org/10.1007/978-1-4614-8265-9_1195","url":"https://dblp.org/rec/reference/db/Aalst18b"}, "url":"URL#2686966" }, { "@score":"1", "@id":"2686967", "info":{"authors":{"author":{"@pid":"a/WilMPvanderAalst","text":"Wil M. P. van der Aalst"}},"title":"Choreography.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Aalst18c","doi":"10.1007/978-1-4614-8265-9_1198","ee":"https://doi.org/10.1007/978-1-4614-8265-9_1198","url":"https://dblp.org/rec/reference/db/Aalst18c"}, "url":"URL#2686967" }, { "@score":"1", "@id":"2686968", "info":{"authors":{"author":{"@pid":"a/WilMPvanderAalst","text":"Wil M. P. van der Aalst"}},"title":"Composition.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Aalst18d","doi":"10.1007/978-1-4614-8265-9_1196","ee":"https://doi.org/10.1007/978-1-4614-8265-9_1196","url":"https://dblp.org/rec/reference/db/Aalst18d"}, "url":"URL#2686968" }, { "@score":"1", "@id":"2686969", "info":{"authors":{"author":{"@pid":"a/WilMPvanderAalst","text":"Wil M. P. van der Aalst"}},"title":"Coordination.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Aalst18e","doi":"10.1007/978-1-4614-8265-9_1199","ee":"https://doi.org/10.1007/978-1-4614-8265-9_1199","url":"https://dblp.org/rec/reference/db/Aalst18e"}, "url":"URL#2686969" }, { "@score":"1", "@id":"2686970", "info":{"authors":{"author":{"@pid":"a/WilMPvanderAalst","text":"Wil M. P. van der Aalst"}},"title":"Orchestration.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Aalst18f","doi":"10.1007/978-1-4614-8265-9_1197","ee":"https://doi.org/10.1007/978-1-4614-8265-9_1197","url":"https://dblp.org/rec/reference/db/Aalst18f"}, "url":"URL#2686970" }, { "@score":"1", "@id":"2686971", "info":{"authors":{"author":{"@pid":"a/WilMPvanderAalst","text":"Wil M. P. van der Aalst"}},"title":"Petri Nets.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Aalst18g","doi":"10.1007/978-1-4614-8265-9_817","ee":"https://doi.org/10.1007/978-1-4614-8265-9_817","url":"https://dblp.org/rec/reference/db/Aalst18g"}, "url":"URL#2686971" }, { "@score":"1", "@id":"2686972", "info":{"authors":{"author":{"@pid":"a/WilMPvanderAalst","text":"Wil M. P. van der Aalst"}},"title":"Process Mining.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Aalst18h","doi":"10.1007/978-1-4614-8265-9_1477","ee":"https://doi.org/10.1007/978-1-4614-8265-9_1477","url":"https://dblp.org/rec/reference/db/Aalst18h"}, "url":"URL#2686972" }, { "@score":"1", "@id":"2686973", "info":{"authors":{"author":{"@pid":"a/WilMPvanderAalst","text":"Wil M. P. van der Aalst"}},"title":"Workflow Model Analysis.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Aalst18i","doi":"10.1007/978-1-4614-8265-9_1476","ee":"https://doi.org/10.1007/978-1-4614-8265-9_1476","url":"https://dblp.org/rec/reference/db/Aalst18i"}, "url":"URL#2686973" }, { "@score":"1", "@id":"2686974", "info":{"authors":{"author":{"@pid":"a/WilMPvanderAalst","text":"Wil M. P. van der Aalst"}},"title":"Workflow Patterns.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Aalst18j","doi":"10.1007/978-1-4614-8265-9_826","ee":"https://doi.org/10.1007/978-1-4614-8265-9_826","url":"https://dblp.org/rec/reference/db/Aalst18j"}, "url":"URL#2686974" }, { "@score":"1", "@id":"2686975", "info":{"authors":{"author":{"@pid":"a/DJAbadi","text":"Daniel Abadi"}},"title":"Data Partitioning.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Abadi18","doi":"10.1007/978-1-4614-8265-9_688","ee":"https://doi.org/10.1007/978-1-4614-8265-9_688","url":"https://dblp.org/rec/reference/db/Abadi18"}, "url":"URL#2686975" }, { "@score":"1", "@id":"2686976", "info":{"authors":{"author":[{"@pid":"88/2053","text":"Alberto Abelló"},{"@pid":"r/OscarRomero","text":"Oscar Romero 0001"}]},"title":"Online Analytical Processing.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Abello018","doi":"10.1007/978-1-4614-8265-9_252","ee":"https://doi.org/10.1007/978-1-4614-8265-9_252","url":"https://dblp.org/rec/reference/db/Abello018"}, "url":"URL#2686976" }, { "@score":"1", "@id":"2686977", "info":{"authors":{"author":{"@pid":"a/SergeAbiteboul","text":"Serge Abiteboul"}},"title":"Semi-structured Data.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Abiteboul18","doi":"10.1007/978-1-4614-8265-9_799","ee":"https://doi.org/10.1007/978-1-4614-8265-9_799","url":"https://dblp.org/rec/reference/db/Abiteboul18"}, "url":"URL#2686977" }, { "@score":"1", "@id":"2686978", "info":{"authors":{"author":[{"@pid":"a/SergeAbiteboul","text":"Serge Abiteboul"},{"@pid":"b/OmarBenjelloun","text":"Omar Benjelloun"},{"@pid":"m/TovaMilo","text":"Tova Milo"}]},"title":"Active XML.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/AbiteboulBM18","doi":"10.1007/978-1-4614-8265-9_782","ee":"https://doi.org/10.1007/978-1-4614-8265-9_782","url":"https://dblp.org/rec/reference/db/AbiteboulBM18"}, "url":"URL#2686978" }, { "@score":"1", "@id":"2686979", "info":{"authors":{"author":[{"@pid":"21/10280","text":"Maribel Acosta"},{"@pid":"116/1686","text":"Fabian Flöck"}]},"title":"Semantic Social Web.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/AcostaF18","doi":"10.1007/978-1-4614-8265-9_80604","ee":"https://doi.org/10.1007/978-1-4614-8265-9_80604","url":"https://dblp.org/rec/reference/db/AcostaF18"}, "url":"URL#2686979" }, { "@score":"1", "@id":"2686980", "info":{"authors":{"author":[{"@pid":"88/2883","text":"Ioannis Aekaterinidis"},{"@pid":"t/PeterTriantafillou","text":"Peter Triantafillou"}]},"title":"Peer-to-Peer Publish-Subscribe Systems.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/AekaterinidisT18","doi":"10.1007/978-1-4614-8265-9_1221","ee":"https://doi.org/10.1007/978-1-4614-8265-9_1221","url":"https://dblp.org/rec/reference/db/AekaterinidisT18"}, "url":"URL#2686980" }, { "@score":"1", "@id":"2686981", "info":{"authors":{"author":[{"@pid":"72/1395","text":"Nitin Agarwal"},{"@pid":"92/309-1","text":"Huan Liu 0001"}]},"title":"Trust in Blogosphere.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Agarwal018","doi":"10.1007/978-1-4614-8265-9_438","ee":"https://doi.org/10.1007/978-1-4614-8265-9_438","url":"https://dblp.org/rec/reference/db/Agarwal018"}, "url":"URL#2686981" }, { "@score":"1", "@id":"2686982", "info":{"authors":{"author":{"@pid":"a/CharuCAggarwal","text":"Charu C. Aggarwal"}},"title":"Classification in Streams.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Aggarwal18","doi":"10.1007/978-1-4614-8265-9_52","ee":"https://doi.org/10.1007/978-1-4614-8265-9_52","url":"https://dblp.org/rec/reference/db/Aggarwal18"}, "url":"URL#2686982" }, { "@score":"1", "@id":"2686983", "info":{"authors":{"author":{"@pid":"10/553","text":"Marcos K. Aguilera"}},"title":"Multi-data Center Replication Protocols.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Aguilera18","doi":"10.1007/978-1-4614-8265-9_80641","ee":"https://doi.org/10.1007/978-1-4614-8265-9_80641","url":"https://dblp.org/rec/reference/db/Aguilera18"}, "url":"URL#2686983" }, { "@score":"1", "@id":"2686984", "info":{"authors":{"author":[{"@pid":"99/770","text":"Yanif Ahmad"},{"@pid":"c/UgurCetintemel","text":"Ugur Çetintemel"}]},"title":"Streaming Applications.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/AhmadC18","doi":"10.1007/978-1-4614-8265-9_374","ee":"https://doi.org/10.1007/978-1-4614-8265-9_374","url":"https://dblp.org/rec/reference/db/AhmadC18"}, "url":"URL#2686984" }, { "@score":"1", "@id":"2686985", "info":{"authors":{"author":[{"@pid":"99/770","text":"Yanif Ahmad"},{"@pid":"c/UgurCetintemel","text":"Ugur Çetintemel"}]},"title":"Data Stream Management Architectures and Prototypes.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/AhmadC18a","doi":"10.1007/978-1-4614-8265-9_24","ee":"https://doi.org/10.1007/978-1-4614-8265-9_24","url":"https://dblp.org/rec/reference/db/AhmadC18a"}, "url":"URL#2686985" }, { "@score":"1", "@id":"2686986", "info":{"authors":{"author":{"@pid":"a/GailJoonAhn","text":"Gail-Joon Ahn"}},"title":"Discretionary Access Control.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Ahn18","doi":"10.1007/978-1-4614-8265-9_135","ee":"https://doi.org/10.1007/978-1-4614-8265-9_135","url":"https://dblp.org/rec/reference/db/Ahn18"}, "url":"URL#2686986" }, { "@score":"1", "@id":"2686987", "info":{"authors":{"author":[{"@pid":"a/AnastassiaAilamaki","text":"Anastasia Ailamaki"},{"@pid":"p/IppokratisPandis","text":"Ippokratis Pandis"}]},"title":"Query Processor.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/AilamakiP18","doi":"10.1007/978-1-4614-8265-9_676","ee":"https://doi.org/10.1007/978-1-4614-8265-9_676","url":"https://dblp.org/rec/reference/db/AilamakiP18"}, "url":"URL#2686987" }, { "@score":"1", "@id":"2686988", "info":{"authors":{"author":[{"@pid":"14/7974","text":"Ablimit Aji"},{"@pid":"135/4678","text":"Hoang Vo"},{"@pid":"69/3405-1","text":"Fusheng Wang 0001"}]},"title":"Spatial Queries in the Cloud.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/AjiVW18","doi":"10.1007/978-1-4614-8265-9_80713","ee":"https://doi.org/10.1007/978-1-4614-8265-9_80713","url":"https://dblp.org/rec/reference/db/AjiVW18"}, "url":"URL#2686988" }, { "@score":"1", "@id":"2686989", "info":{"authors":{"author":[{"@pid":"36/5628","text":"Yousef J. Al-Houmaily"},{"@pid":"s/GeorgeSamaras","text":"George Samaras"}]},"title":"Three-Phase Commit.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Al-HoumailyS18","doi":"10.1007/978-1-4614-8265-9_714","ee":"https://doi.org/10.1007/978-1-4614-8265-9_714","url":"https://dblp.org/rec/reference/db/Al-HoumailyS18"}, "url":"URL#2686989" }, { "@score":"1", "@id":"2686990", "info":{"authors":{"author":[{"@pid":"36/5628","text":"Yousef J. Al-Houmaily"},{"@pid":"s/GeorgeSamaras","text":"George Samaras"}]},"title":"Two-Phase Commit.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Al-HoumailyS18a","doi":"10.1007/978-1-4614-8265-9_713","ee":"https://doi.org/10.1007/978-1-4614-8265-9_713","url":"https://dblp.org/rec/reference/db/Al-HoumailyS18a"}, "url":"URL#2686990" }, { "@score":"1", "@id":"2686991", "info":{"authors":{"author":{"@pid":"a/RobertBAllen","text":"Robert B. Allen"}},"title":"Electronic Newspapers.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Allen18","doi":"10.1007/978-1-4614-8265-9_144","ee":"https://doi.org/10.1007/978-1-4614-8265-9_144","url":"https://dblp.org/rec/reference/db/Allen18"}, "url":"URL#2686991" }, { "@score":"1", "@id":"2686992", "info":{"authors":{"author":{"@pid":"a/GustavoAlonso","text":"Gustavo Alonso"}},"title":"Transactional Middleware.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Alonso18","doi":"10.1007/978-1-4614-8265-9_1541","ee":"https://doi.org/10.1007/978-1-4614-8265-9_1541","url":"https://dblp.org/rec/reference/db/Alonso18"}, "url":"URL#2686992" }, { "@score":"1", "@id":"2686993", "info":{"authors":{"author":[{"@pid":"a/OmarAlonso","text":"Omar Alonso"},{"@pid":"g/MichaelGertz","text":"Michael Gertz 0001"}]},"title":"Time and Information Retrieval.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/AlonsoG18","doi":"10.1007/978-1-4614-8265-9_929","ee":"https://doi.org/10.1007/978-1-4614-8265-9_929","url":"https://dblp.org/rec/reference/db/AlonsoG18"}, "url":"URL#2686993" }, { "@score":"1", "@id":"2686994", "info":{"authors":{"author":{"@pid":"a/BAmann","text":"Bernd Amann"}},"title":"XSL/XSLT.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Amann18","doi":"10.1007/978-1-4614-8265-9_773","ee":"https://doi.org/10.1007/978-1-4614-8265-9_773","url":"https://dblp.org/rec/reference/db/Amann18"}, "url":"URL#2686994" }, { "@score":"1", "@id":"2686995", "info":{"authors":{"author":{"@pid":"a/GianniAmati","text":"Giambattista Amati"}},"title":"BM25.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Amati18","doi":"10.1007/978-1-4614-8265-9_921","ee":"https://doi.org/10.1007/978-1-4614-8265-9_921","url":"https://dblp.org/rec/reference/db/Amati18"}, "url":"URL#2686995" }, { "@score":"1", "@id":"2686996", "info":{"authors":{"author":{"@pid":"a/GianniAmati","text":"Giambattista Amati"}},"title":"Divergence-from-Randomness Models.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Amati18a","doi":"10.1007/978-1-4614-8265-9_924","ee":"https://doi.org/10.1007/978-1-4614-8265-9_924","url":"https://dblp.org/rec/reference/db/Amati18a"}, "url":"URL#2686996" }, { "@score":"1", "@id":"2686997", "info":{"authors":{"author":{"@pid":"a/GianniAmati","text":"Giambattista Amati"}},"title":"Information Retrieval.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Amati18b","doi":"10.1007/978-1-4614-8265-9_915","ee":"https://doi.org/10.1007/978-1-4614-8265-9_915","url":"https://dblp.org/rec/reference/db/Amati18b"}, "url":"URL#2686997" }, { "@score":"1", "@id":"2686998", "info":{"authors":{"author":{"@pid":"a/GianniAmati","text":"Giambattista Amati"}},"title":"Information Retrieval Models.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Amati18c","doi":"10.1007/978-1-4614-8265-9_916","ee":"https://doi.org/10.1007/978-1-4614-8265-9_916","url":"https://dblp.org/rec/reference/db/Amati18c"}, "url":"URL#2686998" }, { "@score":"1", "@id":"2686999", "info":{"authors":{"author":{"@pid":"a/GianniAmati","text":"Giambattista Amati"}},"title":"Two-Poisson Model.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Amati18d","doi":"10.1007/978-1-4614-8265-9_920","ee":"https://doi.org/10.1007/978-1-4614-8265-9_920","url":"https://dblp.org/rec/reference/db/Amati18d"}, "url":"URL#2686999" }, { "@score":"1", "@id":"2687000", "info":{"authors":{"author":[{"@pid":"a/SihemAmerYahia","text":"Sihem Amer-Yahia"},{"@pid":"07/225","text":"Sofiane Abbar"},{"@pid":"54/5172","text":"Noha Ibrahim"}]},"title":"Text Analytics in Social Media.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Amer-YahiaAI18","doi":"10.1007/978-1-4614-8265-9_80672","ee":"https://doi.org/10.1007/978-1-4614-8265-9_80672","url":"https://dblp.org/rec/reference/db/Amer-YahiaAI18"}, "url":"URL#2687000" }, { "@score":"1", "@id":"2687001", "info":{"authors":{"author":[{"@pid":"a/SihemAmerYahia","text":"Sihem Amer-Yahia"},{"@pid":"21/7445","text":"Mahashweta Das"},{"@pid":"07/1181","text":"Gautam Das 0001"},{"@pid":"57/10514","text":"Saravanan Thirumuruganathan"},{"@pid":"58/3771","text":"Cong Yu 0001"}]},"title":"Structure Analytics in Social Media.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Amer-YahiaD0T018","doi":"10.1007/978-1-4614-8265-9_80709","ee":"https://doi.org/10.1007/978-1-4614-8265-9_80709","url":"https://dblp.org/rec/reference/db/Amer-YahiaD0T018"}, "url":"URL#2687001" }, { "@score":"1", "@id":"2687002", "info":{"authors":{"author":[{"@pid":"a/SihemAmerYahia","text":"Sihem Amer-Yahia"},{"@pid":"p/ThemisPalpanas","text":"Themis Palpanas"},{"@pid":"09/8024","text":"Mikalai Tsytsarau"},{"@pid":"140/0203","text":"Sofia Kleisarchaki"},{"@pid":"d/AhlameDouzalChouakria","text":"Ahlame Douzal"},{"@pid":"c/VassilisChristophides","text":"Vassilis Christophides"}]},"title":"Temporal Analytics in Social Media.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Amer-YahiaPTKDC18","doi":"10.1007/978-1-4614-8265-9_80708","ee":"https://doi.org/10.1007/978-1-4614-8265-9_80708","url":"https://dblp.org/rec/reference/db/Amer-YahiaPTKDC18"}, "url":"URL#2687002" }, { "@score":"1", "@id":"2687003", "info":{"authors":{"author":[{"@pid":"a/SihemAmerYahia","text":"Sihem Amer-Yahia"},{"@pid":"97/3301","text":"Senjuti Basu Roy"},{"@pid":"07/1181","text":"Gautam Das 0001"},{"@pid":"27/5065","text":"Ioanna Lykourentzou"},{"@pid":"121/4151-1","text":"Habibur Rahman 0001"},{"@pid":"57/10514","text":"Saravanan Thirumuruganathan"}]},"title":"Human Factors Modeling in Crowdsourcing.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Amer-YahiaR0LRT18","doi":"10.1007/978-1-4614-8265-9_80659","ee":"https://doi.org/10.1007/978-1-4614-8265-9_80659","url":"https://dblp.org/rec/reference/db/Amer-YahiaR0LRT18"}, "url":"URL#2687003" }, { "@score":"1", "@id":"2687004", "info":{"authors":{"author":[{"@pid":"a/SihemAmerYahia","text":"Sihem Amer-Yahia"},{"@pid":"57/1585","text":"Alexandre Termier"},{"@pid":"200/8321","text":"Behrooz Omidvar-Tehrani"}]},"title":"Interactive Analytics in Social Media.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Amer-YahiaTO18","doi":"10.1007/978-1-4614-8265-9_80710","ee":"https://doi.org/10.1007/978-1-4614-8265-9_80710","url":"https://dblp.org/rec/reference/db/Amer-YahiaTO18"}, "url":"URL#2687004" }, { "@score":"1", "@id":"2687005", "info":{"authors":{"author":[{"@pid":"a/SihemAmerYahia","text":"Sihem Amer-Yahia"},{"@pid":"57/1585","text":"Alexandre Termier"},{"@pid":"200/8321","text":"Behrooz Omidvar-Tehrani"}]},"title":"Social Media Analytics.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Amer-YahiaTO18a","doi":"10.1007/978-1-4614-8265-9_80671","ee":"https://doi.org/10.1007/978-1-4614-8265-9_80671","url":"https://dblp.org/rec/reference/db/Amer-YahiaTO18a"}, "url":"URL#2687005" }, { "@score":"1", "@id":"2687006", "info":{"authors":{"author":{"@pid":"57/6596","text":"Rainer von Ammon"}},"title":"Event-Driven Business Process Management.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Ammon18","doi":"10.1007/978-1-4614-8265-9_577","ee":"https://doi.org/10.1007/978-1-4614-8265-9_577","url":"https://dblp.org/rec/reference/db/Ammon18"}, "url":"URL#2687006" }, { "@score":"1", "@id":"2687007", "info":{"authors":{"author":{"@pid":"30/3683","text":"Robert A. Amsler"}},"title":"Electronic Dictionary.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Amsler18","doi":"10.1007/978-1-4614-8265-9_809","ee":"https://doi.org/10.1007/978-1-4614-8265-9_809","url":"https://dblp.org/rec/reference/db/Amsler18"}, "url":"URL#2687007" }, { "@score":"1", "@id":"2687008", "info":{"authors":{"author":{"@pid":"30/3683","text":"Robert A. Amsler"}},"title":"Electronic Encyclopedia.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Amsler18a","doi":"10.1007/978-1-4614-8265-9_808","ee":"https://doi.org/10.1007/978-1-4614-8265-9_808","url":"https://dblp.org/rec/reference/db/Amsler18a"}, "url":"URL#2687008" }, { "@score":"1", "@id":"2687009", "info":{"authors":{"author":[{"@pid":"88/9060","text":"Yael Amsterdamer"},{"@pid":"m/TovaMilo","text":"Tova Milo"}]},"title":"Crowd Mining and Analysis.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/AmsterdamerM18","doi":"10.1007/978-1-4614-8265-9_80657","ee":"https://doi.org/10.1007/978-1-4614-8265-9_80657","url":"https://dblp.org/rec/reference/db/AmsterdamerM18"}, "url":"URL#2687009" }, { "@score":"1", "@id":"2687010", "info":{"authors":{"author":{"@pid":"a/CristianaAmza","text":"Cristiana Amza"}},"title":"Database Middleware.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Amza18","doi":"10.1007/978-1-4614-8265-9_689","ee":"https://doi.org/10.1007/978-1-4614-8265-9_689","url":"https://dblp.org/rec/reference/db/Amza18"}, "url":"URL#2687010" }, { "@score":"1", "@id":"2687011", "info":{"authors":{"author":[{"@pid":"a/CristianaAmza","text":"Cristiana Amza"},{"@pid":"03/5287-6","text":"Jin Chen 0006"}]},"title":"Autonomous Replication.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/AmzaC18","doi":"10.1007/978-1-4614-8265-9_34","ee":"https://doi.org/10.1007/978-1-4614-8265-9_34","url":"https://dblp.org/rec/reference/db/AmzaC18"}, "url":"URL#2687011" }, { "@score":"1", "@id":"2687012", "info":{"authors":{"author":[{"@pid":"62/2401","text":"George Anadiotis"},{"@pid":"24/5546","text":"Spyros Kotoulas"},{"@pid":"83/5865","text":"Ronny Siebes"}]},"title":"Semantic Overlay Networks.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/AnadiotisKS18","doi":"10.1007/978-1-4614-8265-9_1224","ee":"https://doi.org/10.1007/978-1-4614-8265-9_1224","url":"https://dblp.org/rec/reference/db/AnadiotisKS18"}, "url":"URL#2687012" }, { "@score":"1", "@id":"2687013", "info":{"authors":{"author":{"@pid":"a/MAnkerst","text":"Mihael Ankerst"}},"title":"Visual Classification.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Ankerst18","doi":"10.1007/978-1-4614-8265-9_1123","ee":"https://doi.org/10.1007/978-1-4614-8265-9_1123","url":"https://dblp.org/rec/reference/db/Ankerst18"}, "url":"URL#2687013" }, { "@score":"1", "@id":"2687014", "info":{"authors":{"author":{"@pid":"01/1603","text":"Sameer K. Antani"}},"title":"Biomedical Image Data Types and Processing.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Antani18","doi":"10.1007/978-1-4614-8265-9_39","ee":"https://doi.org/10.1007/978-1-4614-8265-9_39","url":"https://dblp.org/rec/reference/db/Antani18"}, "url":"URL#2687014" }, { "@score":"1", "@id":"2687015", "info":{"authors":{"author":[{"@pid":"a/GrigorisAntoniou","text":"Grigoris Antoniou"},{"@pid":"89/6058","text":"Dimitris Plexousakis"}]},"title":"Semantic Web.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/AntoniouP18","doi":"10.1007/978-1-4614-8265-9_1320","ee":"https://doi.org/10.1007/978-1-4614-8265-9_1320","url":"https://dblp.org/rec/reference/db/AntoniouP18"}, "url":"URL#2687015" }, { "@score":"1", "@id":"2687016", "info":{"authors":{"author":[{"@pid":"a/ArvindArasu","text":"Arvind Arasu"},{"@pid":"d/JDomingoFerrer","text":"Josep Domingo-Ferrer"}]},"title":"Record Matching.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/ArasuD18","doi":"10.1007/978-1-4614-8265-9_594","ee":"https://doi.org/10.1007/978-1-4614-8265-9_594","url":"https://dblp.org/rec/reference/db/ArasuD18"}, "url":"URL#2687016" }, { "@score":"1", "@id":"2687017", "info":{"authors":{"author":{"@pid":"13/1991","text":"Danilo Ardagna"}},"title":"Process Optimization.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Ardagna18","doi":"10.1007/978-1-4614-8265-9_278","ee":"https://doi.org/10.1007/978-1-4614-8265-9_278","url":"https://dblp.org/rec/reference/db/Ardagna18"}, "url":"URL#2687017" }, { "@score":"1", "@id":"2687018", "info":{"authors":{"author":{"@pid":"a/WGAref","text":"Walid G. Aref"}},"title":"Electronic Ink Indexing.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Aref18","doi":"10.1007/978-1-4614-8265-9_143","ee":"https://doi.org/10.1007/978-1-4614-8265-9_143","url":"https://dblp.org/rec/reference/db/Aref18"}, "url":"URL#2687018" }, { "@score":"1", "@id":"2687019", "info":{"authors":{"author":{"@pid":"a/WGAref","text":"Walid G. Aref"}},"title":"Window-Based Query Processing.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Aref18a","doi":"10.1007/978-1-4614-8265-9_468","ee":"https://doi.org/10.1007/978-1-4614-8265-9_468","url":"https://dblp.org/rec/reference/db/Aref18a"}, "url":"URL#2687019" }, { "@score":"1", "@id":"2687020", "info":{"authors":{"author":{"@pid":"76/6735","text":"Marcelo Arenas"}},"title":"Boyce-Codd Normal Form.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Arenas18","doi":"10.1007/978-1-4614-8265-9_1245","ee":"https://doi.org/10.1007/978-1-4614-8265-9_1245","url":"https://dblp.org/rec/reference/db/Arenas18"}, "url":"URL#2687020" }, { "@score":"1", "@id":"2687021", "info":{"authors":{"author":{"@pid":"76/6735","text":"Marcelo Arenas"}},"title":"Fourth Normal Form.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Arenas18a","doi":"10.1007/978-1-4614-8265-9_9002","ee":"https://doi.org/10.1007/978-1-4614-8265-9_9002","url":"https://dblp.org/rec/reference/db/Arenas18a"}, "url":"URL#2687021" }, { "@score":"1", "@id":"2687022", "info":{"authors":{"author":{"@pid":"76/6735","text":"Marcelo Arenas"}},"title":"Normal Forms and Normalization.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Arenas18b","doi":"10.1007/978-1-4614-8265-9_1237","ee":"https://doi.org/10.1007/978-1-4614-8265-9_1237","url":"https://dblp.org/rec/reference/db/Arenas18b"}, "url":"URL#2687022" }, { "@score":"1", "@id":"2687023", "info":{"authors":{"author":{"@pid":"76/6735","text":"Marcelo Arenas"}},"title":"Second Normal Form (2NF).","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Arenas18c","doi":"10.1007/978-1-4614-8265-9_1263","ee":"https://doi.org/10.1007/978-1-4614-8265-9_1263","url":"https://dblp.org/rec/reference/db/Arenas18c"}, "url":"URL#2687023" }, { "@score":"1", "@id":"2687024", "info":{"authors":{"author":{"@pid":"76/6735","text":"Marcelo Arenas"}},"title":"Third Normal Form.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Arenas18d","doi":"10.1007/978-1-4614-8265-9_1264","ee":"https://doi.org/10.1007/978-1-4614-8265-9_1264","url":"https://dblp.org/rec/reference/db/Arenas18d"}, "url":"URL#2687024" }, { "@score":"1", "@id":"2687025", "info":{"authors":{"author":{"@pid":"76/6735","text":"Marcelo Arenas"}},"title":"XML Integrity Constraints.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Arenas18e","doi":"10.1007/978-1-4614-8265-9_787","ee":"https://doi.org/10.1007/978-1-4614-8265-9_787","url":"https://dblp.org/rec/reference/db/Arenas18e"}, "url":"URL#2687025" }, { "@score":"1", "@id":"2687026", "info":{"authors":{"author":[{"@pid":"58/1327","text":"Nikos Armenatzoglou"},{"@pid":"p/DimitrisPapadias","text":"Dimitris Papadias"}]},"title":"Geo-Social Networks.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/ArmenatzoglouP18","doi":"10.1007/978-1-4614-8265-9_80714","ee":"https://doi.org/10.1007/978-1-4614-8265-9_80714","url":"https://dblp.org/rec/reference/db/ArmenatzoglouP18"}, "url":"URL#2687026" }, { "@score":"1", "@id":"2687027", "info":{"authors":{"author":[{"@pid":"43/2690","text":"Noboru Babaguchi"},{"@pid":"47/6775","text":"Naoko Nitta"}]},"title":"Video Scene and Event Detection.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/BabaguchiN18","doi":"10.1007/978-1-4614-8265-9_1022","ee":"https://doi.org/10.1007/978-1-4614-8265-9_1022","url":"https://dblp.org/rec/reference/db/BabaguchiN18"}, "url":"URL#2687027" }, { "@score":"1", "@id":"2687028", "info":{"authors":{"author":{"@pid":"b/ShivnathBabu","text":"Shivnath Babu"}},"title":"Continuous Query.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Babu18","doi":"10.1007/978-1-4614-8265-9_85","ee":"https://doi.org/10.1007/978-1-4614-8265-9_85","url":"https://dblp.org/rec/reference/db/Babu18"}, "url":"URL#2687028" }, { "@score":"1", "@id":"2687029", "info":{"authors":{"author":{"@pid":"175/6454","text":"Nathan Backman"}},"title":"Big Stream Systems.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Backman18","doi":"10.1007/978-1-4614-8265-9_80702","ee":"https://doi.org/10.1007/978-1-4614-8265-9_80702","url":"https://dblp.org/rec/reference/db/Backman18"}, "url":"URL#2687029" }, { "@score":"1", "@id":"2687030", "info":{"authors":{"author":[{"@pid":"b/JamesBailey","text":"James Bailey 0001"},{"@pid":"b/FrancoisBry","text":"François Bry"},{"@pid":"f/TimFurche","text":"Tim Furche"},{"@pid":"s/SebastianSchaffert","text":"Sebastian Schaffert"}]},"title":"Semantic Web Query Languages.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/BaileyBFS18","doi":"10.1007/978-1-4614-8265-9_1317","ee":"https://doi.org/10.1007/978-1-4614-8265-9_1317","url":"https://dblp.org/rec/reference/db/BaileyBFS18"}, "url":"URL#2687030" }, { "@score":"1", "@id":"2687031", "info":{"authors":{"author":{"@pid":"47/8816","text":"Peter Bailis"}},"title":"Multi-datacenter Consistency Properties.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Bailis18","doi":"10.1007/978-1-4614-8265-9_80643","ee":"https://doi.org/10.1007/978-1-4614-8265-9_80643","url":"https://dblp.org/rec/reference/db/Bailis18"}, "url":"URL#2687031" }, { "@score":"1", "@id":"2687032", "info":{"authors":{"author":[{"@pid":"b/MagdalenaBalazinska","text":"Magdalena Balazinska"},{"@pid":"97/5585","text":"Jeong-Hyon Hwang"},{"@pid":"s/MehulAShah","text":"Mehul A. Shah"}]},"title":"Fault Tolerance and High Availability in Data Stream Management Systems.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/BalazinskaHS18","doi":"10.1007/978-1-4614-8265-9_160","ee":"https://doi.org/10.1007/978-1-4614-8265-9_160","url":"https://dblp.org/rec/reference/db/BalazinskaHS18"}, "url":"URL#2687032" }, { "@score":"1", "@id":"2687033", "info":{"authors":{"author":{"@pid":"85/4125","text":"Krisztian Balog"}},"title":"Entity Retrieval.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Balog18","doi":"10.1007/978-1-4614-8265-9_80724","ee":"https://doi.org/10.1007/978-1-4614-8265-9_80724","url":"https://dblp.org/rec/reference/db/Balog18"}, "url":"URL#2687033" }, { "@score":"1", "@id":"2687034", "info":{"authors":{"author":[{"@pid":"20/3657","text":"Stefano Baraldi"},{"@pid":"b/AlbertoDelBimbo","text":"Alberto Del Bimbo"},{"@pid":"74/5699","text":"Lea Landucci"},{"@pid":"76/2852","text":"Nicola Torpei"}]},"title":"Natural Interaction.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/BaraldiBLT18","doi":"10.1007/978-1-4614-8265-9_243","ee":"https://doi.org/10.1007/978-1-4614-8265-9_243","url":"https://dblp.org/rec/reference/db/BaraldiBLT18"}, "url":"URL#2687034" }, { "@score":"1", "@id":"2687035", "info":{"authors":{"author":[{"@pid":"b/DBarbosa","text":"Denilson Barbosa 0001"},{"@pid":"b/PBohannon","text":"Philip Bohannon"},{"@pid":"f/JulianaFreire","text":"Juliana Freire"},{"@pid":"k/CarlChristianKanne","text":"Carl-Christian Kanne"},{"@pid":"m/IoanaManolescu","text":"Ioana Manolescu"},{"@pid":"v/VVassalos","text":"Vasilis Vassalos"},{"@pid":"y/MasatoshiYoshikawa","text":"Masatoshi Yoshikawa"}]},"title":"XML Storage.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/BarbosaBFKMVY18","doi":"10.1007/978-1-4614-8265-9_771","ee":"https://doi.org/10.1007/978-1-4614-8265-9_771","url":"https://dblp.org/rec/reference/db/BarbosaBFKMVY18"}, "url":"URL#2687035" }, { "@score":"1", "@id":"2687036", "info":{"authors":{"author":[{"@pid":"b/DBarbosa","text":"Denilson Barbosa 0001"},{"@pid":"m/IoanaManolescu","text":"Ioana Manolescu"},{"@pid":"y/JXuYu","text":"Jeffrey Xu Yu"}]},"title":"Application Benchmark.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/BarbosaMY18","doi":"10.1007/978-1-4614-8265-9_5055","ee":"https://doi.org/10.1007/978-1-4614-8265-9_5055","url":"https://dblp.org/rec/reference/db/BarbosaMY18"}, "url":"URL#2687036" }, { "@score":"1", "@id":"2687037", "info":{"authors":{"author":[{"@pid":"b/DBarbosa","text":"Denilson Barbosa 0001"},{"@pid":"m/IoanaManolescu","text":"Ioana Manolescu"},{"@pid":"y/JXuYu","text":"Jeffrey Xu Yu"}]},"title":"Microbenchmark.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/BarbosaMY18a","doi":"10.1007/978-1-4614-8265-9_5054","ee":"https://doi.org/10.1007/978-1-4614-8265-9_5054","url":"https://dblp.org/rec/reference/db/BarbosaMY18a"}, "url":"URL#2687037" }, { "@score":"1", "@id":"2687038", "info":{"authors":{"author":[{"@pid":"b/DBarbosa","text":"Denilson Barbosa 0001"},{"@pid":"m/IoanaManolescu","text":"Ioana Manolescu"},{"@pid":"y/JXuYu","text":"Jeffrey Xu Yu"}]},"title":"XML Benchmarks.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/BarbosaMY18b","doi":"10.1007/978-1-4614-8265-9_789","ee":"https://doi.org/10.1007/978-1-4614-8265-9_789","url":"https://dblp.org/rec/reference/db/BarbosaMY18b"}, "url":"URL#2687038" }, { "@score":"1", "@id":"2687039", "info":{"authors":{"author":{"@pid":"29/5169","text":"Pablo Barceló"}},"title":"Locality of Queries.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Barcelo18","doi":"10.1007/978-1-4614-8265-9_1270","ee":"https://doi.org/10.1007/978-1-4614-8265-9_1270","url":"https://dblp.org/rec/reference/db/Barcelo18"}, "url":"URL#2687039" }, { "@score":"1", "@id":"2687040", "info":{"authors":{"author":{"@pid":"b/LucianoBaresi","text":"Luciano Baresi"}},"title":"Activity Diagrams.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Baresi18","doi":"10.1007/978-1-4614-8265-9_9","ee":"https://doi.org/10.1007/978-1-4614-8265-9_9","url":"https://dblp.org/rec/reference/db/Baresi18"}, "url":"URL#2687040" }, { "@score":"1", "@id":"2687041", "info":{"authors":{"author":{"@pid":"b/IlariaBartolini","text":"Ilaria Bartolini"}},"title":"Image Querying.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Bartolini18","doi":"10.1007/978-1-4614-8265-9_1440","ee":"https://doi.org/10.1007/978-1-4614-8265-9_1440","url":"https://dblp.org/rec/reference/db/Bartolini18"}, "url":"URL#2687041" }, { "@score":"1", "@id":"2687042", "info":{"authors":{"author":{"@pid":"76/5024","text":"Sugato Basu"}},"title":"Semi-supervised Learning.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Basu18","doi":"10.1007/978-1-4614-8265-9_609","ee":"https://doi.org/10.1007/978-1-4614-8265-9_609","url":"https://dblp.org/rec/reference/db/Basu18"}, "url":"URL#2687042" }, { "@score":"1", "@id":"2687043", "info":{"authors":{"author":{"@pid":"69/1334","text":"Carlo Batini"}},"title":"Data Quality Assessment.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Batini18","doi":"10.1007/978-1-4614-8265-9_107","ee":"https://doi.org/10.1007/978-1-4614-8265-9_107","url":"https://dblp.org/rec/reference/db/Batini18"}, "url":"URL#2687043" }, { "@score":"1", "@id":"2687044", "info":{"authors":{"author":{"@pid":"69/1334","text":"Carlo Batini"}},"title":"Diagram.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Batini18a","doi":"10.1007/978-1-4614-8265-9_814","ee":"https://doi.org/10.1007/978-1-4614-8265-9_814","url":"https://dblp.org/rec/reference/db/Batini18a"}, "url":"URL#2687044" }, { "@score":"1", "@id":"2687045", "info":{"authors":{"author":[{"@pid":"69/1334","text":"Carlo Batini"},{"@pid":"41/3166","text":"Andrea Maurino"}]},"title":"Design for Data Quality.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/BatiniM18","doi":"10.1007/978-1-4614-8265-9_649","ee":"https://doi.org/10.1007/978-1-4614-8265-9_649","url":"https://dblp.org/rec/reference/db/BatiniM18"}, "url":"URL#2687045" }, { "@score":"1", "@id":"2687046", "info":{"authors":{"author":{"@pid":"182/7045","text":"Peter Baumann"}},"title":"Array Databases.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Baumann18","doi":"10.1007/978-1-4614-8265-9_2061","ee":"https://doi.org/10.1007/978-1-4614-8265-9_2061","url":"https://dblp.org/rec/reference/db/Baumann18"}, "url":"URL#2687046" }, { "@score":"1", "@id":"2687047", "info":{"authors":{"author":{"@pid":"182/7045","text":"Peter Baumann"}},"title":"Geo Raster Data Management.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Baumann18a","doi":"10.1007/978-1-4614-8265-9_80815","ee":"https://doi.org/10.1007/978-1-4614-8265-9_80815","url":"https://dblp.org/rec/reference/db/Baumann18a"}, "url":"URL#2687047" }, { "@score":"1", "@id":"2687048", "info":{"authors":{"author":[{"@pid":"b/RobertBaumgartner","text":"Robert Baumgartner"},{"@pid":"36/5673","text":"Wolfgang Gatterbauer"},{"@pid":"g/GeorgGottlob","text":"Georg Gottlob"}]},"title":"Web Data Extraction System.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/BaumgartnerGG18","doi":"10.1007/978-1-4614-8265-9_1154","ee":"https://doi.org/10.1007/978-1-4614-8265-9_1154","url":"https://dblp.org/rec/reference/db/BaumgartnerGG18"}, "url":"URL#2687048" }, { "@score":"1", "@id":"2687049", "info":{"authors":{"author":{"@pid":"78/5866","text":"Sean Bechhofer"}},"title":"OWL: Web Ontology Language.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Bechhofer18","doi":"10.1007/978-1-4614-8265-9_1073","ee":"https://doi.org/10.1007/978-1-4614-8265-9_1073","url":"https://dblp.org/rec/reference/db/Bechhofer18"}, "url":"URL#2687049" }, { "@score":"1", "@id":"2687050", "info":{"authors":{"author":[{"@pid":"78/5866","text":"Sean Bechhofer"},{"@pid":"p/NWPaton","text":"Norman W. Paton"}]},"title":"Ontology Visual Querying.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/BechhoferP18","doi":"10.1007/978-1-4614-8265-9_256","ee":"https://doi.org/10.1007/978-1-4614-8265-9_256","url":"https://dblp.org/rec/reference/db/BechhoferP18"}, "url":"URL#2687050" }, { "@score":"1", "@id":"2687051", "info":{"authors":{"author":[{"@pid":"20/3078","text":"Steven M. Beitzel"},{"@pid":"69/6635","text":"Eric C. Jensen"},{"@pid":"f/OphirFrieder","text":"Ophir Frieder"}]},"title":"Average Precision Histogram.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/BeitzelJF18","doi":"10.1007/978-1-4614-8265-9_490","ee":"https://doi.org/10.1007/978-1-4614-8265-9_490","url":"https://dblp.org/rec/reference/db/BeitzelJF18"}, "url":"URL#2687051" }, { "@score":"1", "@id":"2687052", "info":{"authors":{"author":[{"@pid":"20/3078","text":"Steven M. Beitzel"},{"@pid":"69/6635","text":"Eric C. Jensen"},{"@pid":"f/OphirFrieder","text":"Ophir Frieder"}]},"title":"Average R-Precision.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/BeitzelJF18a","doi":"10.1007/978-1-4614-8265-9_491","ee":"https://doi.org/10.1007/978-1-4614-8265-9_491","url":"https://dblp.org/rec/reference/db/BeitzelJF18a"}, "url":"URL#2687052" }, { "@score":"1", "@id":"2687053", "info":{"authors":{"author":[{"@pid":"20/3078","text":"Steven M. Beitzel"},{"@pid":"69/6635","text":"Eric C. Jensen"},{"@pid":"f/OphirFrieder","text":"Ophir Frieder"}]},"title":"GMAP.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/BeitzelJF18b","doi":"10.1007/978-1-4614-8265-9_493","ee":"https://doi.org/10.1007/978-1-4614-8265-9_493","url":"https://dblp.org/rec/reference/db/BeitzelJF18b"}, "url":"URL#2687053" }, { "@score":"1", "@id":"2687054", "info":{"authors":{"author":[{"@pid":"20/3078","text":"Steven M. Beitzel"},{"@pid":"69/6635","text":"Eric C. Jensen"},{"@pid":"f/OphirFrieder","text":"Ophir Frieder"}]},"title":"Index Creation and File Structures.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/BeitzelJF18c","doi":"10.1007/978-1-4614-8265-9_944","ee":"https://doi.org/10.1007/978-1-4614-8265-9_944","url":"https://dblp.org/rec/reference/db/BeitzelJF18c"}, "url":"URL#2687054" }, { "@score":"1", "@id":"2687055", "info":{"authors":{"author":[{"@pid":"20/3078","text":"Steven M. Beitzel"},{"@pid":"69/6635","text":"Eric C. Jensen"},{"@pid":"f/OphirFrieder","text":"Ophir Frieder"}]},"title":"MAP.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/BeitzelJF18d","doi":"10.1007/978-1-4614-8265-9_492","ee":"https://doi.org/10.1007/978-1-4614-8265-9_492","url":"https://dblp.org/rec/reference/db/BeitzelJF18d"}, "url":"URL#2687055" }, { "@score":"1", "@id":"2687056", "info":{"authors":{"author":{"@pid":"b/LadjelBellatreche","text":"Ladjel Bellatreche"}},"title":"Optimization and Tuning in Data Warehouses.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Bellatreche18","doi":"10.1007/978-1-4614-8265-9_259","ee":"https://doi.org/10.1007/978-1-4614-8265-9_259","url":"https://dblp.org/rec/reference/db/Bellatreche18"}, "url":"URL#2687056" }, { "@score":"1", "@id":"2687057", "info":{"authors":{"author":[{"@pid":"b/LadjelBellatreche","text":"Ladjel Bellatreche"},{"@pid":"19/196","text":"Todd Davis"},{"@pid":"193/6307","text":"Belayadi Djahida"}]},"title":"Parallel and Distributed Data Warehouses.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/BellatrecheDD18","doi":"10.1007/978-1-4614-8265-9_261","ee":"https://doi.org/10.1007/978-1-4614-8265-9_261","url":"https://dblp.org/rec/reference/db/BellatrecheDD18"}, "url":"URL#2687057" }, { "@score":"1", "@id":"2687058", "info":{"authors":{"author":[{"@pid":"b/VBenzaken","text":"Véronique Benzaken"},{"@pid":"c/GiuseppeCastagna","text":"Giuseppe Castagna"},{"@pid":"13/6560","text":"Haruo Hosoya"},{"@pid":"p/BenjaminCPierce","text":"Benjamin C. Pierce"},{"@pid":"28/3797","text":"Stijn Vansummeren"}]},"title":"XML Typechecking.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/BenzakenCHPV18","doi":"10.1007/978-1-4614-8265-9_788","ee":"https://doi.org/10.1007/978-1-4614-8265-9_788","url":"https://dblp.org/rec/reference/db/BenzakenCHPV18"}, "url":"URL#2687058" }, { "@score":"1", "@id":"2687059", "info":{"authors":{"author":[{"@pid":"b/MBerndtsson","text":"Mikael Berndtsson"},{"@pid":"m/JonasMellin","text":"Jonas Mellin"}]},"title":"Active Database Coupling Modes.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/BerndtssonM18","doi":"10.1007/978-1-4614-8265-9_503","ee":"https://doi.org/10.1007/978-1-4614-8265-9_503","url":"https://dblp.org/rec/reference/db/BerndtssonM18"}, "url":"URL#2687059" }, { "@score":"1", "@id":"2687060", "info":{"authors":{"author":[{"@pid":"b/MBerndtsson","text":"Mikael Berndtsson"},{"@pid":"m/JonasMellin","text":"Jonas Mellin"}]},"title":"Active Database Execution Model.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/BerndtssonM18a","doi":"10.1007/978-1-4614-8265-9_509","ee":"https://doi.org/10.1007/978-1-4614-8265-9_509","url":"https://dblp.org/rec/reference/db/BerndtssonM18a"}, "url":"URL#2687060" }, { "@score":"1", "@id":"2687061", "info":{"authors":{"author":[{"@pid":"b/MBerndtsson","text":"Mikael Berndtsson"},{"@pid":"m/JonasMellin","text":"Jonas Mellin"}]},"title":"Active Database Knowledge Model.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/BerndtssonM18b","doi":"10.1007/978-1-4614-8265-9_508","ee":"https://doi.org/10.1007/978-1-4614-8265-9_508","url":"https://dblp.org/rec/reference/db/BerndtssonM18b"}, "url":"URL#2687061" }, { "@score":"1", "@id":"2687062", "info":{"authors":{"author":[{"@pid":"b/MBerndtsson","text":"Mikael Berndtsson"},{"@pid":"m/JonasMellin","text":"Jonas Mellin"}]},"title":"Active Database, Active Database (Management) System.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/BerndtssonM18c","doi":"10.1007/978-1-4614-8265-9_502","ee":"https://doi.org/10.1007/978-1-4614-8265-9_502","url":"https://dblp.org/rec/reference/db/BerndtssonM18c"}, "url":"URL#2687062" }, { "@score":"1", "@id":"2687063", "info":{"authors":{"author":[{"@pid":"b/MBerndtsson","text":"Mikael Berndtsson"},{"@pid":"m/JonasMellin","text":"Jonas Mellin"}]},"title":"Database Trigger.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/BerndtssonM18d","doi":"10.1007/978-1-4614-8265-9_511","ee":"https://doi.org/10.1007/978-1-4614-8265-9_511","url":"https://dblp.org/rec/reference/db/BerndtssonM18d"}, "url":"URL#2687063" }, { "@score":"1", "@id":"2687064", "info":{"authors":{"author":[{"@pid":"b/MBerndtsson","text":"Mikael Berndtsson"},{"@pid":"m/JonasMellin","text":"Jonas Mellin"}]},"title":"ECA Rule Condition.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/BerndtssonM18e","doi":"10.1007/978-1-4614-8265-9_517","ee":"https://doi.org/10.1007/978-1-4614-8265-9_517","url":"https://dblp.org/rec/reference/db/BerndtssonM18e"}, "url":"URL#2687064" }, { "@score":"1", "@id":"2687065", "info":{"authors":{"author":[{"@pid":"b/MBerndtsson","text":"Mikael Berndtsson"},{"@pid":"m/JonasMellin","text":"Jonas Mellin"}]},"title":"ECA Rules.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/BerndtssonM18f","doi":"10.1007/978-1-4614-8265-9_504","ee":"https://doi.org/10.1007/978-1-4614-8265-9_504","url":"https://dblp.org/rec/reference/db/BerndtssonM18f"}, "url":"URL#2687065" }, { "@score":"1", "@id":"2687066", "info":{"authors":{"author":{"@pid":"b/PhilipABernstein","text":"Philip A. Bernstein"}},"title":"SQL Isolation Levels.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Bernstein18","doi":"10.1007/978-1-4614-8265-9_366","ee":"https://doi.org/10.1007/978-1-4614-8265-9_366","url":"https://dblp.org/rec/reference/db/Bernstein18"}, "url":"URL#2687066" }, { "@score":"1", "@id":"2687067", "info":{"authors":{"author":{"@pid":"b/LEBertossi","text":"Leopoldo E. Bertossi"}},"title":"Consistent Query Answering.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Bertossi18","doi":"10.1007/978-1-4614-8265-9_5021","ee":"https://doi.org/10.1007/978-1-4614-8265-9_5021","url":"https://dblp.org/rec/reference/db/Bertossi18"}, "url":"URL#2687067" }, { "@score":"1", "@id":"2687068", "info":{"authors":{"author":{"@pid":"b/LEBertossi","text":"Leopoldo E. Bertossi"}},"title":"Database Repair.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Bertossi18a","doi":"10.1007/978-1-4614-8265-9_1266","ee":"https://doi.org/10.1007/978-1-4614-8265-9_1266","url":"https://dblp.org/rec/reference/db/Bertossi18a"}, "url":"URL#2687068" }, { "@score":"1", "@id":"2687069", "info":{"authors":{"author":{"@pid":"b/LEBertossi","text":"Leopoldo E. Bertossi"}},"title":"Inconsistent Databases.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Bertossi18b","doi":"10.1007/978-1-4614-8265-9_1242","ee":"https://doi.org/10.1007/978-1-4614-8265-9_1242","url":"https://dblp.org/rec/reference/db/Bertossi18b"}, "url":"URL#2687069" }, { "@score":"1", "@id":"2687070", "info":{"authors":{"author":{"@pid":"b/LEBertossi","text":"Leopoldo E. Bertossi"}},"title":"Null Values.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Bertossi18c","doi":"10.1007/978-1-4614-8265-9_1267","ee":"https://doi.org/10.1007/978-1-4614-8265-9_1267","url":"https://dblp.org/rec/reference/db/Bertossi18c"}, "url":"URL#2687070" }, { "@score":"1", "@id":"2687071", "info":{"authors":{"author":[{"@pid":"b/CBettini","text":"Claudio Bettini"},{"@pid":"w/XiaoyangSeanWang","text":"X. Sean Wang"},{"@pid":"j/SushilJajodia","text":"Sushil Jajodia"}]},"title":"Temporal Granularity.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/BettiniWJ18","doi":"10.1007/978-1-4614-8265-9_397","ee":"https://doi.org/10.1007/978-1-4614-8265-9_397","url":"https://dblp.org/rec/reference/db/BettiniWJ18"}, "url":"URL#2687071" }, { "@score":"1", "@id":"2687072", "info":{"authors":{"author":{"@pid":"18/2339","text":"Nigel Bevan"}},"title":"Usability.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Bevan18","doi":"10.1007/978-1-4614-8265-9_441","ee":"https://doi.org/10.1007/978-1-4614-8265-9_441","url":"https://dblp.org/rec/reference/db/Bevan18"}, "url":"URL#2687072" }, { "@score":"1", "@id":"2687073", "info":{"authors":{"author":[{"@pid":"e/ErnstWBiersack","text":"Ernst W. Biersack"},{"@pid":"f/PascalFelber","text":"Pascal Felber"}]},"title":"Peer-to-Peer Content Distribution.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/BiersackF18","doi":"10.1007/978-1-4614-8265-9_1228","ee":"https://doi.org/10.1007/978-1-4614-8265-9_1228","url":"https://dblp.org/rec/reference/db/BiersackF18"}, "url":"URL#2687073" }, { "@score":"1", "@id":"2687074", "info":{"authors":{"author":{"@pid":"45/1559","text":"Carsten Binnig"}},"title":"Replication with Snapshot Isolation.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Binnig18","doi":"10.1007/978-1-4614-8265-9_80775","ee":"https://doi.org/10.1007/978-1-4614-8265-9_80775","url":"https://dblp.org/rec/reference/db/Binnig18"}, "url":"URL#2687074" }, { "@score":"1", "@id":"2687075", "info":{"authors":{"author":[{"@pid":"b/ChristianBizer","text":"Christian Bizer"},{"@pid":"92/654","text":"Maria-Esther Vidal"},{"@pid":"s/HalaSkaf","text":"Hala Skaf-Molli"}]},"title":"Linked Open Data.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/BizerVS18","doi":"10.1007/978-1-4614-8265-9_80603","ee":"https://doi.org/10.1007/978-1-4614-8265-9_80603","url":"https://dblp.org/rec/reference/db/BizerVS18"}, "url":"URL#2687075" }, { "@score":"1", "@id":"2687076", "info":{"authors":{"author":[{"@pid":"b/ChristianBizer","text":"Christian Bizer"},{"@pid":"92/654","text":"Maria-Esther Vidal"},{"@pid":"223/7945","text":"Michael Weiss"}]},"title":"RDF Technology.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/BizerVW18","doi":"10.1007/978-1-4614-8265-9_80781","ee":"https://doi.org/10.1007/978-1-4614-8265-9_80781","url":"https://dblp.org/rec/reference/db/BizerVW18"}, "url":"URL#2687076" }, { "@score":"1", "@id":"2687077", "info":{"authors":{"author":[{"@pid":"b/ChristianBizer","text":"Christian Bizer"},{"@pid":"92/654","text":"Maria-Esther Vidal"},{"@pid":"223/7945","text":"Michael Weiss"}]},"title":"Resource Description Framework.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/BizerVW18a","doi":"10.1007/978-1-4614-8265-9_905","ee":"https://doi.org/10.1007/978-1-4614-8265-9_905","url":"https://dblp.org/rec/reference/db/BizerVW18a"}, "url":"URL#2687077" }, { "@score":"1", "@id":"2687078", "info":{"authors":{"author":[{"@pid":"54/582","text":"Alan F. Blackwell"},{"@pid":"c/MariaFrancescaCostabile","text":"Maria Francesca Costabile"}]},"title":"Direct Manipulation.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/BlackwellC18","doi":"10.1007/978-1-4614-8265-9_134","ee":"https://doi.org/10.1007/978-1-4614-8265-9_134","url":"https://dblp.org/rec/reference/db/BlackwellC18"}, "url":"URL#2687078" }, { "@score":"1", "@id":"2687079", "info":{"authors":{"author":{"@pid":"b/MBlanton","text":"Marina Blanton"}},"title":"Authentication.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Blanton18","doi":"10.1007/978-1-4614-8265-9_32","ee":"https://doi.org/10.1007/978-1-4614-8265-9_32","url":"https://dblp.org/rec/reference/db/Blanton18"}, "url":"URL#2687079" }, { "@score":"1", "@id":"2687080", "info":{"authors":{"author":{"@pid":"b/MBlanton","text":"Marina Blanton"}},"title":"Hash Functions.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Blanton18a","doi":"10.1007/978-1-4614-8265-9_1482","ee":"https://doi.org/10.1007/978-1-4614-8265-9_1482","url":"https://dblp.org/rec/reference/db/Blanton18a"}, "url":"URL#2687080" }, { "@score":"1", "@id":"2687081", "info":{"authors":{"author":{"@pid":"b/MBlanton","text":"Marina Blanton"}},"title":"Message Authentication Codes.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Blanton18b","doi":"10.1007/978-1-4614-8265-9_1483","ee":"https://doi.org/10.1007/978-1-4614-8265-9_1483","url":"https://dblp.org/rec/reference/db/Blanton18b"}, "url":"URL#2687081" }, { "@score":"1", "@id":"2687082", "info":{"authors":{"author":{"@pid":"b/MichaelHBohlen","text":"Michael H. Böhlen"}},"title":"Temporal Coalescing.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Bohlen18","doi":"10.1007/978-1-4614-8265-9_388","ee":"https://doi.org/10.1007/978-1-4614-8265-9_388","url":"https://dblp.org/rec/reference/db/Bohlen18"}, "url":"URL#2687082" }, { "@score":"1", "@id":"2687083", "info":{"authors":{"author":{"@pid":"b/MichaelHBohlen","text":"Michael H. Böhlen"}},"title":"Temporal Query Processing.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Bohlen18a","doi":"10.1007/978-1-4614-8265-9_408","ee":"https://doi.org/10.1007/978-1-4614-8265-9_408","url":"https://dblp.org/rec/reference/db/Bohlen18a"}, "url":"URL#2687083" }, { "@score":"1", "@id":"2687084", "info":{"authors":{"author":[{"@pid":"b/MichaelHBohlen","text":"Michael H. Böhlen"},{"@pid":"59/6952","text":"Johann Gamper"},{"@pid":"j/ChristianSJensen","text":"Christian S. Jensen"},{"@pid":"s/RichardTSnodgrass","text":"Richard T. Snodgrass"}]},"title":"SQL-Based Temporal Query Languages.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/BohlenGJS18","doi":"10.1007/978-1-4614-8265-9_1525","ee":"https://doi.org/10.1007/978-1-4614-8265-9_1525","url":"https://dblp.org/rec/reference/db/BohlenGJS18"}, "url":"URL#2687084" }, { "@score":"1", "@id":"2687085", "info":{"authors":{"author":[{"@pid":"b/MichaelHBohlen","text":"Michael H. Böhlen"},{"@pid":"j/ChristianSJensen","text":"Christian S. Jensen"}]},"title":"Sequenced Semantics.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/BohlenJ18","doi":"10.1007/978-1-4614-8265-9_1053","ee":"https://doi.org/10.1007/978-1-4614-8265-9_1053","url":"https://dblp.org/rec/reference/db/BohlenJ18"}, "url":"URL#2687085" }, { "@score":"1", "@id":"2687086", "info":{"authors":{"author":[{"@pid":"b/MichaelHBohlen","text":"Michael H. Böhlen"},{"@pid":"j/ChristianSJensen","text":"Christian S. Jensen"},{"@pid":"s/RichardTSnodgrass","text":"Richard T. Snodgrass"}]},"title":"Current Semantics.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/BohlenJS18","doi":"10.1007/978-1-4614-8265-9_1068","ee":"https://doi.org/10.1007/978-1-4614-8265-9_1068","url":"https://dblp.org/rec/reference/db/BohlenJS18"}, "url":"URL#2687086" }, { "@score":"1", "@id":"2687087", "info":{"authors":{"author":[{"@pid":"b/MichaelHBohlen","text":"Michael H. Böhlen"},{"@pid":"j/ChristianSJensen","text":"Christian S. Jensen"},{"@pid":"s/RichardTSnodgrass","text":"Richard T. Snodgrass"}]},"title":"Nonsequenced Semantics.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/BohlenJS18a","doi":"10.1007/978-1-4614-8265-9_1052","ee":"https://doi.org/10.1007/978-1-4614-8265-9_1052","url":"https://dblp.org/rec/reference/db/BohlenJS18a"}, "url":"URL#2687087" }, { "@score":"1", "@id":"2687088", "info":{"authors":{"author":[{"@pid":"b/MichaelHBohlen","text":"Michael H. Böhlen"},{"@pid":"j/ChristianSJensen","text":"Christian S. Jensen"},{"@pid":"s/RichardTSnodgrass","text":"Richard T. Snodgrass"}]},"title":"Temporal Compatibility.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/BohlenJS18b","doi":"10.1007/978-1-4614-8265-9_1059","ee":"https://doi.org/10.1007/978-1-4614-8265-9_1059","url":"https://dblp.org/rec/reference/db/BohlenJS18b"}, "url":"URL#2687088" }, { "@score":"1", "@id":"2687089", "info":{"authors":{"author":[{"@pid":"323/2652-1","text":"Christian Böhm 0001"},{"@pid":"65/3446","text":"Claudia Plant"}]},"title":"High-Dimensional Indexing.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/BohmP18","doi":"10.1007/978-1-4614-8265-9_804","ee":"https://doi.org/10.1007/978-1-4614-8265-9_804","url":"https://dblp.org/rec/reference/db/BohmP18"}, "url":"URL#2687089" }, { "@score":"1", "@id":"2687090", "info":{"authors":{"author":{"@pid":"b/PeterABoncz","text":"Peter A. Boncz"}},"title":"Disk.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Boncz18","doi":"10.1007/978-1-4614-8265-9_685","ee":"https://doi.org/10.1007/978-1-4614-8265-9_685","url":"https://dblp.org/rec/reference/db/Boncz18"}, "url":"URL#2687090" }, { "@score":"1", "@id":"2687091", "info":{"authors":{"author":{"@pid":"b/PeterABoncz","text":"Peter A. Boncz"}},"title":"Main Memory.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Boncz18a","doi":"10.1007/978-1-4614-8265-9_683","ee":"https://doi.org/10.1007/978-1-4614-8265-9_683","url":"https://dblp.org/rec/reference/db/Boncz18a"}, "url":"URL#2687091" }, { "@score":"1", "@id":"2687092", "info":{"authors":{"author":{"@pid":"b/PeterABoncz","text":"Peter A. Boncz"}},"title":"Main Memory DBMS.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Boncz18b","doi":"10.1007/978-1-4614-8265-9_655","ee":"https://doi.org/10.1007/978-1-4614-8265-9_655","url":"https://dblp.org/rec/reference/db/Boncz18b"}, "url":"URL#2687092" }, { "@score":"1", "@id":"2687093", "info":{"authors":{"author":{"@pid":"b/PeterABoncz","text":"Peter A. Boncz"}},"title":"Processor Cache.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/Boncz18c","doi":"10.1007/978-1-4614-8265-9_684","ee":"https://doi.org/10.1007/978-1-4614-8265-9_684","url":"https://dblp.org/rec/reference/db/Boncz18c"}, "url":"URL#2687093" }, { "@score":"1", "@id":"2687094", "info":{"authors":{"author":[{"@pid":"b/PBonnet","text":"Philippe Bonnet"},{"@pid":"s/DennisShasha","text":"Dennis E. Shasha"}]},"title":"Administration Wizards.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/BonnetS18","doi":"10.1007/978-1-4614-8265-9_12","ee":"https://doi.org/10.1007/978-1-4614-8265-9_12","url":"https://dblp.org/rec/reference/db/BonnetS18"}, "url":"URL#2687094" }, { "@score":"1", "@id":"2687095", "info":{"authors":{"author":[{"@pid":"b/PBonnet","text":"Philippe Bonnet"},{"@pid":"s/DennisShasha","text":"Dennis E. Shasha"}]},"title":"Application-Level Tuning.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/BonnetS18a","doi":"10.1007/978-1-4614-8265-9_805","ee":"https://doi.org/10.1007/978-1-4614-8265-9_805","url":"https://dblp.org/rec/reference/db/BonnetS18a"}, "url":"URL#2687095" }, { "@score":"1", "@id":"2687096", "info":{"authors":{"author":[{"@pid":"b/PBonnet","text":"Philippe Bonnet"},{"@pid":"s/DennisShasha","text":"Dennis E. Shasha"}]},"title":"Benchmark Frameworks.","venue":"Encyclopedia of Database Systems","year":"2018","type":"Reference Works","access":"closed","key":"reference/db/BonnetS18b","doi":"10.1007/978-1-4614-8265-9_80798","ee":"https://doi.org/10.1007/978-1-4614-8265-9_80798","url":"https://dblp.org/rec/reference/db/BonnetS18b"}, "url":"URL#2687096" } ] } } } )