Abstract is missing.
- Establishing Relevance of Characteristic Features for Authorship Attribution with ANNUrszula Stanczyk. 1-8 [doi]
- Genetic Programming with Greedy Search for Web Service CompositionAnqi Wang, Hui Ma, Mengjie Zhang. 9-17 [doi]
- Multivariate Prediction Based on the Gamma Classifier: A Data Mining Application to Petroleum EngineeringItzamá López-Yáñez, Leonid Sheremetov, Oscar Camacho Nieto. 18-25 [doi]
- On Preference Order of DRSA Conditional Attributes for Computational StylisticsUrszula Stanczyk. 26-33 [doi]
- Entity Matching Technique for Bibliographic DatabaseSumit Mishra, Samrat Mondal, Sriparna Saha 0001. 34-41 [doi]
- On Efficient Map-Matching According to Intersections You Pass ByYaguang Li, Chengfei Liu, Kuien Liu, Jiajie Xu, Fengcheng He, Zhiming Ding. 42-56 [doi]
- A Linguistic Graph-Based Approach for Web News Sentence SearchingKim Schouten, Flavius Frasincar. 57-64 [doi]
- Composite Patterns for Web API Search in Agile Web Application DevelopmentDevis Bianchini, Valeria De Antonellis, Michele Melchiori. 65-72 [doi]
- Evaluating the Interest of Revamping Past Search ResultsClaudio Gutiérrez-Soto, Gilles Hubert. 73-80 [doi]
- Main Content Extraction from Web Documents Using Text Block ContextMyungwon Kim, Youngjin Kim, Wonmoon Song, Ara Khil. 81-93 [doi]
- A Similarity-Based Approach for Financial Time Series Analysis and ForecastingMarcos Vinicius Naves Bedo, Davi Pereira dos Santos, Daniel S. Kaster, Caetano Traina Jr.. 94-108 [doi]
- Inferring Knowledge from Concise Representations of Both Frequent and Rare Jaccard ItemsetsSouad Bouasker, Sadok Ben Yahia. 109-123 [doi]
- Comparison Queries for Uncertain GraphsDenis Dimitrov, Lisa Singh, Janet Mann. 124-140 [doi]
- Efficient Time Aggregation and Querying of Flashed Streams in Constrained MotesPedro Furtado. 141-155 [doi]
- Approximate OLAP Query Processing over Uncertain and Imprecise Multidimensional Data StreamsAlfredo Cuzzocrea. 156-173 [doi]
- Data Value Storage for Compressed Semi-structured DataBrian G. Tripney, Isla Ross, Francis A. Wilson, John N. Wilson. 174-188 [doi]
- Implementing Efficient Updates in Compressed Big Text DatabasesStefan Böttcher, Alexander Bültmann, Rita Hartel, Jonathan Schlüßler. 189-202 [doi]
- MXML Path-Based Storage and Ordered-Based Context ManipulationNikolaos Fousteris, Manolis Gergatsoulis, Yannis Stavrakas. 203-212 [doi]
- Processing k Nearest Neighbor Queries for Location-Dependent Data in MANETsYuka Komai, Yuya Sasaki, Takahiro Hara, Shojiro Nishio. 213-227 [doi]
- Continuous Predictive Line Queries under Road-Network ConstraintsLasanthi Heendaliya, Dan Lin, Ali R. Hurson. 228-242 [doi]
- Sensitivity Analysis of Answer Ordering from Probabilistic DatabasesJianwen Chen, Yiping Li, Ling Feng. 243-258 [doi]
- User Location Anonymization Method for Wide Distribution of DummiesRyo Kato, Mayu Iwata, Takahiro Hara, Yuki Arase, Xing Xie, Shojiro Nishio. 259-273 [doi]
- An XML-Based Policy Model for Access Control in Web ApplicationsTânia Basso, Nuno Antunes, Regina Moraes, Marco Vieira. 274-288 [doi]
- Behavioral Tendency Obfuscation Framework for Personalization ServicesRyo Furukawa, Takao Takenouchi, Takuya Mori. 289-303 [doi]
- A Framework for Data Processing at the Edges of NetworksIchiro Satoh. 304-318 [doi]
- STRING: Social-Transaction Routing over a RingIdrissa Sarr, Hubert Naacke, Abderrahmane Ould Mohamed Moctar. 319-333 [doi]
- FOPA: A Final Object Pruning Algorithm to Efficiently Produce Skyline PointsAna Alvarado, Oriana Baldizan, Marlene Goncalves, Maria-Esther Vidal. 334-348 [doi]
- UMAP: A Universal Layer for Schema Mapping LanguagesFlorin Chertes, Ingo Feinerer. 349-363 [doi]
- GCAPM: A Generic Context-Aware Model in Peer-to-Peer EnvironmentSaloua Zammali, Khedija Arour, Amel Bouzeghoub. 364-371 [doi]
- Metadata Anchoring for Source Code: Robust Location Descriptor Definition, Building and InterpretingKarol Rástocný, Mária Bieliková. 372-379 [doi]
- The Price Is Right - Models and Algorithms for Pricing DataRuiming Tang, Huayu Wu, Zhifeng Bao, Stéphane Bressan, Patrick Valduriez. 380-394 [doi]
- What You Pay for Is What You GetRuiming Tang, Dongxu Shao, Stéphane Bressan, Patrick Valduriez. 395-409 [doi]
- A File Recommendation Method Based on Task Workflow Patterns Using File-Access LogsQiang Song, Takayuki Kawabata, Fumiaki Itoh, Yousuke Watanabe, Haruo Yokota. 410-417 [doi]
- Towards Addressing the Coverage Problem in Association Rule-Based Recommender SystemsR. Uday Kiran, Masaru Kitsuregawa. 418-425 [doi]
- Opinion-Based Collaborative Filtering to Solve Popularity Bias in Recommender SystemsXiangyu Zhao, Zhendong Niu, Wei Chen. 426-433 [doi]
- Exploring Trust to Rank Reputation in MicrobloggingLeila Weitzel, José Palazzo Moreira de Oliveira, Paulo Quaresma. 434-441 [doi]
- Reverse Engineering of Database Security PoliciesSalvador Martínez Perez, Valerio Cosentino, Jordi Cabot, Frédéric Cuppens. 442-449 [doi]
- Discovering Multi-stage Attacks Using Closed Multi-dimensional Sequential Pattern MiningHanen Brahmi, Sadok Ben Yahia. 450-457 [doi]
- CiDHouse: Contextual SemantIc Data WareHousesSelma Khouri, Lama El Saraj, Ladjel Bellatreche, Bernard Espinasse, Nabila Berkani, Sophie Rodier, Thérèse Libourel. 458-465 [doi]
- Analysis of Clinical Documents to Enable Semantic InteroperabilityBarbara Franz, Andreas Schuler, Emmanuel Helm. 466-473 [doi]