Search Results - "Hewett, Rattikorn"

Refine Results
  1. 1

    Real-Time Tweet Analytics Using Hybrid Hashtags on Twitter Big Data Streams by Gupta, Vibhuti, Hewett, Rattikorn

    Published in Information (Basel) (01-07-2020)
    “…Twitter is a microblogging platform that generates large volumes of data with high velocity. This daily generation of unbounded and continuous data leads to…”
    Get full text
    Journal Article
  2. 2

    Analytics on Anonymity for Privacy Retention in Smart Health Data by Arca, Sevgi, Hewett, Rattikorn

    Published in Future internet (01-11-2021)
    “…Advancements in smart technology, wearable and mobile devices, and Internet of Things, have made smart health an integral part of modern living to better…”
    Get full text
    Journal Article
  3. 3

    On using MapReduce to scale algorithms for Big Data analytics: a case study by Kijsanayothin, Phongphun, Chalumporn, Gantaphon, Hewett, Rattikorn

    Published in Journal of big data (30-11-2019)
    “…Introduction Many data analytics algorithms are originally designed for in-memory data. Parallel and distributed computing is a natural first remedy to scale…”
    Get full text
    Journal Article
  4. 4

    Tumor classification ranking from microarray data by Hewett, Rattikorn, Kijsanayothin, Phongphun

    Published in BMC genomics (16-09-2008)
    “…Gene expression profiles based on microarray data are recognized as potential diagnostic indices of cancer. Molecular tumor classifications resulted from these…”
    Get full text
    Journal Article
  5. 5

    Warning users about cyber threats through sounds by Datta, Prerit, Namin, Akbar Siami, Jones, Keith S., Hewett, Rattikorn

    Published in SN applied sciences (01-07-2021)
    “…This paper reports a formative evaluation of auditory representations of cyber security threat indicators and cues, referred to as sonifications, to warn users…”
    Get full text
    Journal Article
  6. 6

    Mining software defect data to support software testing management by Hewett, Rattikorn

    “…Achieving high quality software would be easier if effective software development practices were known and deployed in appropriate contexts. Because our…”
    Get full text
    Journal Article
  7. 7

    Discovering Opioid Use Patterns From Social Media for Relapse Prevention by Yang, Zhou, Bradshaw, Spencer, Hewett, Rattikorn, Jin, Fang

    Published in Computer (Long Beach, Calif.) (01-02-2022)
    “…The United States is experiencing an unprecedented opioid crisis. Through a multidisciplinary analytic perspective, we characterize opioid addiction behavior…”
    Get full text
    Journal Article
  8. 8

    Towards Visualizing Big Data with Large-Scale Edge Constraint Graph Drawing by Chonbodeechalermroong, Ariyawat, Hewett, Rattikorn

    Published in Big data research (01-12-2017)
    “…Visualization plays an important role in enabling understanding of big data. Graphs are crucial tools for visual analytics of big data networks such as social,…”
    Get full text
    Journal Article
  9. 9

    On modeling software defect repair time by Hewett, Rattikorn, Kijsanayothin, Phongphun

    “…The ability to predict the time required to repair software defects is important for both software quality management and maintenance. Estimated repair times…”
    Get full text
    Journal Article
  10. 10

    Do Warning Message Design Recommendations Address Why Non-Experts Do Not Protect Themselves from Cybersecurity Threats? A Review by Jones, Keith S., Lodinger, Natalie R., Widlus, Benjamin P., Namin, Akbar Siami, Hewett, Rattikorn

    “…We aimed to understand whether warning message design recommendations address the reasons why non-experts choose to not protect themselves from cybersecurity…”
    Get full text
    Journal Article
  11. 11

    Cybersecurity policy verification with declarative programming by Hewett, Rattikorn, Kijsanayothin, Phongphun, Bak, Stephanie, Galbrei, Marry

    “…Cybersecurity is a growing concern in today’s society. Security policies have been developed to ensure that data and assets remain protected for legitimate…”
    Get full text
    Journal Article
  12. 12

    Toward identification of key breakers in social cyber-physical networks by Hewett, R.

    “…Social networks can provide useful information to enhance mobile cyber-physical applications. With advanced sensor and powerful mobile Internet device…”
    Get full text
    Conference Proceeding
  13. 13

    Anonymity-driven Measures for Privacy by Arca, Sevgi, Hewett, Rattikorn

    “…In today's world, digital data are enormous due to technologies that advance data collection, storage, and analyses. As more data are shared or publicly…”
    Get full text
    Conference Proceeding
  14. 14

    Device Identification for IoT Security by Roemsri, Phornsawan, Hewett, Rattikorn

    “…IoT (Internet of things) devices have become integral parts of our everyday life to function especially in smart homes/offices/cities. However, their huge…”
    Get full text
    Conference Proceeding
  15. 15

    Energy Usage of Deep Learning in Smart Cities by Puangpontip, Supadchaya, Hewett, Rattikorn

    “…Deep learning has increasingly become an essential component of many Smart City functions including smart city lightings, emergency rescues, smart drainage,…”
    Get full text
    Conference Proceeding
  16. 16

    Is Entropy enough for measuring Privacy? by Arca, Sevgi, Hewett, Rattikorn

    “…Anonymization is critical to privacy. It helps protect the identity and sensitive information of individuals from their profile data. Knowing the degree of…”
    Get full text
    Conference Proceeding
  17. 17

    Securing Smart Contracts in Blockchain by Kongmanee, Jaturong, Kijsanayothin, Phongphun, Hewett, Rattikorn

    “…Blockchain is an emerging technology that underlies creation and exchange of the digital assets, including cryptocurrency such as Bitcoin and Ether, without…”
    Get full text
    Conference Proceeding
  18. 18

    On Detecting Crypto Ransomware Attacks: Can Simple Strategies be Effective? by Roemsri, Phornsawan, Puangpontip, Supadchaya, Hewett, Rattikorn

    “…Ransomware is a type of malicious software that locks computing services or encrypts data to block its use until ransom demands are met. The latter, known as…”
    Get full text
    Conference Proceeding
  19. 19

    Unleashing the Power of Hashtags in Tweet Analytics with Distributed Framework on Apache Storm by Gupta, Vibhuti, Hewett, Rattikorn

    “…Twitter is a popular social network platform where users can interact and post texts of up to 280 characters called tweets. Hashtags, hyperlinked words in…”
    Get full text
    Conference Proceeding
  20. 20

    Adaptive Normalization in Streaming Data by Gupta, Vibhuti, Hewett, Rattikorn

    Published 17-10-2019
    “…In todays digital era, data are everywhere from Internet of Things to health care or financial applications. This leads to potentially unbounded ever-growing…”
    Get full text
    Journal Article