International CARDS Journal

Volume 2, Issue 1 2019 Q3

Innovative Design

Golsteijn, Hoven, Frohlich, and Sellen (2014) explore combining physical crafting with digital technologies as a new form of creative expression. Yang, and Xu, and and Li (2016) provide an energy optimization of design space to automatically generate design layouts. Edge et al. (2016) combine three venues for presentation design to develop concepts and recommendations for a hybrid presentation medium.

Golsteijn, C., Hoven, E. v. d., Frohlich, D., & Sellen, A. (2014). Hybrid crafting: Toward an integrated practice of crafting with physical and digital components. Personal and Ubiquitous Computing.

Edge, D., Yang, X., Kotturi, Y., Wang, S., Feng, D., Lee, B., & Drucker, S. (2016). SlideSpace: Heuristic Design of a Hybrid Presentation Medium. ACM Transactions on Computer-Human Interaction, 23(3), 30.

Yang, X., and Xu, Y.-Q., & and Li, S. (2016). Automatic generation of visual-textual presentation layout. ACM Transactions on Multimedia Computing Communications and Applications (TOMM), 12.

NoSQL Databases

Hingant, Zambrano, Pérez, Pérez, and Esteve (2018) describe NoSQL databases as compliant with a critical infrastructure protection system as it provides distributed data sharing and the capability of storing a very large amount of data. Grover and Kar (2017) describe NoSQL databases for graph database management systems that can be implemented in recommendation systems, bioinformatics, and semantics. Angles et al. (2017) explain NoSQL graph databases capable of new types of queries that identify and navigate patterns between nodes that can span various lengths or paths. Angles et al. (2017) describe two graph data models, edge-labelled graphs and property graphs. Property graphs label nodes and edges annotated with metadata (Angles et al., 2017).

Angles, R., Arenas, M., BarcelÓ, P., Hogan, A., Reutter, J., & VrgoČ, D. (2017). Foundations of modern query languages for graph databases. ACM Computing Surveys, 50(5), 68:61-68:40. doi:10.1145/3104031

Grover, P., & Kar, A. (2017). Big data analytics: A review on theoretical contributions and tools used in literature. Global Journal of Flexible Systems Management, 18(3), 203-229. doi:10.1007/s40171-017-0159-3

Hingant, J., Zambrano, M., Pérez, F. J., Pérez, I., & Esteve, M. (2018). HYBINT: A hybrid intelligence system for critical infrastructures protection. Security & Communication Networks, 1-13. doi:10.1155/2018/5625860

Digital Media

Rangaswamy, Challagulla, Young, and Cutrell (2013) conduct qualitative research on the social and cultural influence of social network sites. Jonathan and Marion (2012) explain that libraries can encourage and review mobile device activity to promote digital competencies of patrons. McMillan, Brown, Sellen, Lindley, and Martens (2015) describe the design opportunities in the transition from file-based media to cloud-based streaming services.

Jonathan, D., & Marion, W. (2012). Public access, private mobile: The interplay of shared access and the mobile Internet for teenagers in Cape Town.

McMillan, D., Brown, B., Sellen, A., Lindley, S., & Martens, R. (2015). Pick up and play: Understanding tangibility for cloud media.

Rangaswamy, N., Challagulla, G., Young, M., & Cutrell, E. (2013). Local pocket internet and global social media bridging the digital gap: Facebook and youth sub-stratum in Urban India.

IT Security in Cloud Computing

Srinivasan and Revathy (2018) describe how application programming interfaces for big data clusters require protection from malicious software.
Nastase (2017) list a number of attacks that can affect business continuity such as privacy leaks, denial of service attacks, malicious code, and social engineering. Cox, Yan, Bhattacharjee, and Ganapathy (2018) propose a system for acquiring memory snapshots while minimizing performance impact for security analysis. Zhang and Lee (2018) provide and validate a secure architecture for virtual machines in cloud computing environment.
Jeon, Papalexakis, Faloutsos, Sael, and Kang (2016) explain how tensors, multi-dimensional arrays, can be implemented for analyzing large scale, real world, data. Meng, Qin, Liu, and He (2018) create an alarm system for securing cloud computing alarms that classifies and processes various attacks.

Cox, G., Yan, Z., Bhattacharjee, A., & Ganapathy, V. (2018). Secure, consistent, and high-performance memory snapshotting. Paper presented at the Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy - CODASPY '18.

Jeon, I., Papalexakis, E. E., Faloutsos, C., Sael, L., & Kang, U. (2016). Mining billion-scale tensors: Algorithms and discoveries. The VLDB Journal, 25(4), 519-544. doi:10.1007/s00778-016-0427-4

Meng, Y., Qin, T., Liu, Y., & He, C. (2018). An effective high threating alarm mining method for cloud security management. IEEE Access, 6, 22634-22644. doi:10.1109/access.2018.2823724

Nastase, L. (2017). Security in the Internet of Things: A survey on application layer protocols. Paper presented at the 2017 21st International Conference on Control Systems and Computer Science (CSCS).

Srinivasan, M. K., & Revathy, P. (2018). State-of-the-art big data security taxonomies. Paper presented at the Proceedings of the 11th Innovations in Software Engineering Conference on - ISEC '18.

Zhang, T., & Lee, R. B. (2018). Design, implementation and verification of cloud architecture for monitoring a virtual machine's security health. IEEE Transactions on Computers, 67(6), 799-815. doi:10.1109/tc.2017.2780823

Climate Analysis Systems

Yang, Yu, Hu, Jiang, and Li (2017) explain how cloud computing can support climate analysis such as examining a combination of meteorological, geological, and environmental data with observation and simulation. Vandal et al. (2018) propose measuring uncertainty in climate change with deep learning models. Simpson et al. (2016) describe how integrated climate economy models can implement virtual reality to support visualization of models.

Jänicke (2017) highlights climate change initiatives that increase awareness of renewable energy and energy efficiency. Radu (2017) identifies trends in the development of green data centers, capable of maximizing energy efficiency and minimizing emissions. Kadam, Kanoo, and Zheng (2017) implement linear regression models to measure relationships between CO2 emissions and longitude and latitude locations and observe faster changes in continental areas than coastal areas.

Elia et al. (2016) suggest optimizations for the multidimensional, array-based data of climate change in developing a server capable of scientific climate analysis. Fraile-Jurado et al. (2017) apply probability distribution models to map the hazards of sea level rises. Newman (2017) analyzed data from social media on the topic of climate change and identified that ordinary citizens, mainstream media, and new media gathered the most attention to the topics of climate change with the leading topics discussing the public understanding and legitimacy of climate change.

Elia, D., Fiore, S., D'Anca, A., Palazzo, C., Foster, I., & Williams, D. N. (2016). An in-memory based framework for scientific data analytics. Paper presented at the Proceedings of the ACM International Conference on Computing Frontiers - CF '16.

Fraile-Jurado, P., Álvarez-Francoso, J. I., Guisado-Pintado, E., Sánchez-Carnero, N., Ojeda-Zújar, J., & Leatherman, S. P. (2017). Mapping inundation probability due to increasing sea level rise along El Puerto de Santa María (SW Spain). Natural Hazards, 87(2), 581-598. doi:10.1007/s11069-017-2782-x

Jänicke, M. (2017). The multi-level system of global climate governance - the model and its current state. Environmental Policy and Governance, 27(2), 108-121. doi:10.1002/eet.1747

Kadam, M., Kanoo, N., & Zheng, Y. (2017). Climate change: Relationships to CO2 emission and locations. Paper presented at the Proceedings of the 6th Annual Conference on Research in Information Technology - RIIT '17.

Newman, T. P. (2017). Tracking the release of IPCC AR5 on Twitter: Users, comments, and sources following the release of the Working Group I Summary for Policymakers. Public Underst Sci, 26(7), 815-825. doi:10.1177/0963662516628477

Radu, L.-D. (2017). Green cloud computing: A literature survey. Symmetry, 9(12). doi:10.3390/sym9120295

Simpson, M., Wallgrün, J. O., Klippel, A., Yang, L., Garner, G., Keller, K., . . . Bansal, S. (2016). Immersive analytics for multi-objective Dynamic Integrated Climate-Economy (DICE) models. Paper presented at the Proceedings of the 2016 ACM Companion on Interactive Surfaces and Spaces - ISS Companion '16.

Vandal, T., Kodra, E., Dy, J., Ganguly, S., Nemani, R., & Ganguly, A. R. (2018). Quantifying uncertainty in discrete-continuous and skewed data with Bayesian deep learning. Paper presented at the Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining - KDD '18.

Yang, C., Yu, M., Hu, F., Jiang, Y., & Li, Y. (2017). Utilizing cloud computing to address big geospatial data challenges. Computers, Environment and Urban Systems, 61, 120-128. doi:10.1016/j.compenvurbsys.2016.10.010