I. Savnik, K. Nitta, and .. , Your Paper has been Accepted, Rejected, or Whatever: Automatic Generation of Scientific Paper Reviews

A. Bartoli, A. De-lorenzo, and .. , Eric Medvet, and Fabiano Tarlao Generic UIs for Requesting Complex Products Within Distributed Market Spaces in the Internet of Everything, p.29

M. Hitz, M. Radonjic-simic, J. Reichwald, and D. , Prediction and Machine Learning Diagnosis of Complex Active Systems with Uncertain Temporal Observations, p.45

G. Lamperti, X. Zhao, A. Cloud, and .. , Based Prediction Framework for Analyzing Business Process Performances, p.63

E. Cesario, F. Folino, and .. , Massimo Guarascio, and Luigi Pontieri Towards interactive Machine Learning (iML): Applying Ant Colony Algorithms to Solve the Traveling Salesman Problem with the Human-in-the-Loop Approach, p.81

A. Furfaro, T. Gallo, and D. , Saccà Differentiating Cyber Risk of Insurance Customers: The Insurance Company Perspective, p.175

I. A. Tøndel and F. Seehusen, Erlend Andreas Gjaere, and Marie Elisabeth Gaup Moe Special Session on Privacy Aware Machine Learning for Health Data Science, 2016.

F. Dietze, J. Karoff, A. C. Valdez, M. Ziefle, and .. , 219 Sigal Shaked and Lior Rokach A Peer-to-Peer Protocol and System Architecture for Privacy-Preserving Statistical Analysis, p.236

K. Zamani, A. Charalambidis, and .. , Stasinos Konstantopoulos, Maria Dagioglou, and Vangelis Karkaletsis The Right to Be Forgotten: Towards Machine Learning on Perturbed Knowledge Bases, p.251