Abstract is missing.
- Principles of Distributed Data Management in 2020?Patrick Valduriez. 1-11 [doi]
- The Science of Conceptual ModellingBernhard Thalheim. 12-26 [doi]
- Probabilistic Logics in Expert Systems: Approaches, Implementations, and ApplicationsGabriele Kern-Isberner, Christoph Beierle, Marc Finthammer, Matthias Thimm. 27-46 [doi]
- Multi-objective Optimal Combination QueriesXi Guo, Yoshiharu Ishikawa. 47-61 [doi]
- NEFOS: Rapid Cache-Aware Range Query Processing with Probabilistic GuaranteesSpyros Sioutas, Kostas Tsichlas, Ioannis Karydis, Yannis Manolopoulos, Yannis Theodoridis. 62-77 [doi]
- Reuse-Oriented Mapping Discovery for Meta-querier CustomizationXiao Li, Randy Chow. 78-93 [doi]
- Attribute Grammar for XML Integrity Constraint ValidationBéatrice Bouchou, Mirian Halfeld Ferrari Alves, Maria Adriana Vidigal de Lima. 94-109 [doi]
- Extracting Temporal Equivalence Relationships among Keywords from Time-Stamped DocumentsParvathi Chundi, Mahadevan Subramaniam, R. M. Aruna Weerakoon. 110-124 [doi]
- Codd Table Representations under Weak Possible World SemanticsFlavio Ferrarotti, Sven Hartmann, Van Bao Tran Le, Sebastian Link. 125-139 [doi]
- Efficient Early Top-k Query Processing in Overloaded P2P SystemsWilliam Kokou Dedzoe, Philippe Lamarre, Reza Akbarinia, Patrick Valduriez. 140-155 [doi]
- Top-k Query Evaluation in Sensor Networks with the Guaranteed Accuracy of Query ResultsBaichen Chen, Weifa Liang, Geyong Min. 156-171 [doi]
- Learning Top-k Transformation RulesSunanda Patro, Wei Wang. 172-186 [doi]
- Privacy beyond Single Sensitive AttributeYuan Fang, Mafruz Zaman Ashrafi, See-Kiong Ng. 187-201 [doi]
- Privacy-Aware DaaS Services CompositionSalah-Eddine Tbahriti, Michael Mrissa, Brahim Medjahed, Chirine Ghedira, Mahmoud Barhamgi, Jocelyne Fayn. 202-216 [doi]
- An Empirical Study on Using the National Vulnerability Database to Predict Software VulnerabilitiesSu Zhang, Doina Caragea, Xinming Ou. 217-231 [doi]
- Similar Subsequence Search in Time Series DatabasesShrikant Kashyap, Mong-Li Lee, Wynne Hsu. 232-246 [doi]
- Optimizing Predictive Queries on Moving Objects under Road-Network ConstraintsLasanthi Heendaliya, Dan Lin, Ali R. Hurson. 247-261 [doi]
- Real-Time Capable Data Management Architecture for Database-Driven 3D Simulation SystemsJürgen Roßmann, Michael Schluse, Ralf Waspe, Martin Hoppen. 262-269 [doi]
- Collecting and Managing Network-Matched Trajectories of Moving Objects in DatabasesZhiming Ding, Ke Deng. 270-279 [doi]
- On Guaranteeing k-Anonymity in Location DatabasesAnh Tuan Truong, Tran Khanh Dang, Josef Küng. 280-287 [doi]
- Smeagol: A Specific-to-General Semantic Web Query Interface Paradigm for NovicesAaron Clemmer, Stephen Davies. 288-302 [doi]
- Browsing-Oriented Semantic Faceted SearchAndreas Wagner, Günter Ladwig, Thanh Tran. 303-319 [doi]
- An Efficient Algorithm for Topic Ranking and Modeling Topic EvolutionKumar Shubhankar, Aditya Pratap Singh, Vikram Pudi. 320-330 [doi]
- Sampling the National Deep WebDenis Shestakov. 331-340 [doi]
- A Bipartite Graph Model and Mutually Reinforcing Analysis for Review SitesKazuki Tawaramoto, Junpei Kawamoto, Yasuhito Asano, Masatoshi Yoshikawa. 341-348 [doi]
- Genetic Algorithm for Finding Cluster HierarchiesChristian Böhm, Annahita Oswald, Christian Richter, Bianca Wackersreuther, Peter Wackersreuther. 349-363 [doi]
- A File Search Method Based on Intertask Relationships Derived from Access Frequency and RMC Operations on FilesYi Wu, Kenichi Otagiri, Yousuke Watanabe, Haruo Yokota. 364-378 [doi]
- A General Top-k Algorithm for Web Data SourcesMehdi Badr, Dan Vodislav. 379-393 [doi]
- Improving the Quality of Web Archives through the Importance of ChangesMyriam Ben Saad, Stéphane Gançarski. 394-409 [doi]
- Alternative Query Generation for XML Keyword Search and Its OptimizationTetsutaro Motomura, Toshiyuki Shimizu, Masatoshi Yoshikawa. 410-424 [doi]
- K-Graphs: Selecting Top-k Data Sources for XML Keyword QueriesKhanh Nguyen, Jinli Cao. 425-439 [doi]
- Detecting Economic Events Using a Semantics-Based PipelineAlexander Hogenboom, Frederik Hogenboom, Flavius Frasincar, Uzay Kaymak, Otto van der Meer, Kim Schouten. 440-447 [doi]
- Edit Distance between XML and Probabilistic XML DocumentsRuiming Tang, Huayu Wu, Sadegh Nobari, Stéphane Bressan. 448-456 [doi]
- Towards an Automatic Characterization of CriteriaBenjamin Duthil, François Trousset, Mathieu Roche, Gérard Dray, Michel Plantié, Jacky Montmain, Pascal Poncelet. 457-465 [doi]
- A Theoretical and Experimental Comparison of Algorithms for the Containment of Conjunctive Queries with NegationKhalil Ben Mohamed, Michel Leclère, Marie-Laure Mugnier. 466-480 [doi]
- Data Integration over NoSQL Stores Using Access Path Based MappingsOlivier Curé, Robin Hecht, Chan Le Duc, Myriam Lamolle. 481-495 [doi]
- An Energy-Efficient Concurrency Control Algorithm for Mobile Ad-Hoc Network DatabasesZhaowen Xing, Le Gruenwald. 496-510 [doi]
- An Ontology-Based Method for Duplicate Detection in Web Data TablesPatrice Buche, Juliette Dibie-Barthélemy, Rania Khefifi, Fatiha Saïs. 511-525 [doi]
- Approaches for Semantically Annotating and Discovering Scientific Observational DataHuiping Cao, Shawn Bowers, Mark P. Schildhauer. 526-541 [doi]
- A Scalable Tag-Based Recommender System for New Users of the Social WebValentina Zanardi, Licia Capra. 542-557 [doi]