An end-to-end ranking system based on customers reviews: Integrating semantic mining and MCDM techniques

M Eshkevari, MJ Rezaee, M Saberi… - Expert Systems with …, 2022 - Elsevier
Considering customer reviews is one of the challenges of real-world decision models. These
reviews can be on different platforms and include a large amount of information and may …

Elastic stack and GRAPHYP knowledge graph of web usage: a win–win workflow for semantic interoperability in decision making

O Azeroual, R Fabre, U Störl, R Qi - Future Internet, 2023 - mdpi.com
The use of Elastic Stack (ELK) solutions and Knowledge Graphs (KGs) has attracted a lot of
attention lately, with promises of vastly improving business performance based on new …

Graph neural networks for detecting anomalies in scientific workflows

H Jin, K Raghavan, G Papadimitriou… - … Journal of High …, 2023 - journals.sagepub.com
Identifying and addressing anomalies in complex, distributed systems can be challenging for
reliable execution of scientific workflows. We model these workflows as directed acyclic …

Flow-Bench: A dataset for computational workflow anomaly detection

G Papadimitriou, H Jin, C Wang, R Mayani… - arXiv preprint arXiv …, 2023 - arxiv.org
A computational workflow, also known as workflow, consists of tasks that must be executed
in a specific order to attain a specific goal. Often, in fields such as biology, chemistry …

Advancing anomaly detection in computational workflows with active learning

K Raghavan, G Papadimitriou, H Jin, A Mandal… - Future Generation …, 2025 - Elsevier
A computational workflow, also known as workflow, consists of tasks that are executed in a
certain order to attain a specific computational campaign. Computational workflows are …

Evaluation of Elasticsearch Ecosystem Including Machine Learning Capabilities.

DD Ahir, NF Shaikh - International Journal of Safety & …, 2024 - search.ebscohost.com
Earlier methods of signature based threat detection are no longer enough to detect threats.
Fencing your network and access is also ineffective in stopping malicious actors because …

Low-level I/O monitoring for scientific workflows

J Witzke, A Lößer, V Bountris, F Schintke… - arXiv preprint arXiv …, 2024 - arxiv.org
While detailed resource usage monitoring is possible on the low-level using proper tools,
associating such usage with higher-level abstractions in the application layer that actually …

Workflow anomaly detection with graph neural networks

H Jin, K Raghavan, G Papadimitriou… - 2022 IEEE/ACM …, 2022 - ieeexplore.ieee.org
Reliable execution of scientific workflows is a fundamental concern in computational
campaigns. Therefore, detecting and diagnosing anomalies are both important and …

A Workflow Roofline Model for End-to-End Workflow Performance Analysis

N Ding, B Austin, Y Liu, N Mehta… - … Conference for High …, 2024 - ieeexplore.ieee.org
As next-generation experimental and observational instruments for scientific research are
being deployed with higher resolutions and faster data capture rates, the fundamental …

[PDF][PDF] A Cloud Pub/Sub Architecture to Integrate Google Big Query with Elasticsearch using Cloud Functions

SL Gutiérrez, YP Vera - International Journal of …, 2022 - pdfs.semanticscholar.org
In recent years, the need for analytics on large volumes of data has become increasingly
important. It turns out to be extremely useful in making strategic decisions about different …