Abstract is missing.
- Formal Verification of Systems-on-Chip - Industrial Experiences and Scientific PerspectivesDominik Stoffel. 3 [doi]
- Clustering and Non-clustering Effects in Flash Memory DatabasesDuck-Ho Bae, Ji-Woong Chang, Sang-Wook Kim. 4-8 [doi]
- Specialized Embedded DBMS: Cell Based ApproachSyed Saif ur Rahman, Marko Rosenmüller, Norbert Siegmund, Gunter Saake, Sven Apel. 9-13 [doi]
- Reliable Group Communication for Dynamic and Resource-Constrained EnvironmentsKenneth R. Mayes, Juan Carlos GarcÃa Ortiz, Emili Miedes, Stefan Beyer. 14-18 [doi]
- Pattern Recognition with Embedded Systems Technology: A SurveyJuan Carlos Pérez-Cortes, Jose Luis Guardiola, Alberto J. Pérez Jiménez. 19 [doi]
- Acceleration of RSA Cryptographic Operations Using FPGA TechnologyJan Zutter, Max Thalmaier, Martin Klein, Karsten-Olaf Laux. 20-25 [doi]
- Towards Data-Centric Security in Ubiquitous Computing EnvironmentsStefan Ransom, Christian Werner. 26-30 [doi]
- Collaborative Reputation-based Voice Spam FilteringRuishan Zhang, Andrei Gurtov. 33-37 [doi]
- A Multi-Agent Approach to Testing Anti-Spam SoftwareNathan Friess, Heather Crawford, John Aycock. 38-42 [doi]
- Mail-ShakeMarkus Engelberth, Jan Göbel, Christian Gorecki, Philipp Trinius. 43-47 [doi]
- Trustnet Architecture for E-mail CommunicationDavid Pölz, Wilfried N. Gansterer. 48-52 [doi]
- A Biologically Inspired Method of SPAM DetectionPaul Gardner-Stephen. 53-56 [doi]
- Utilizing Semantic Web Technologies for Efficient Data Lineage and Impact Analyses in Data Warehouse EnvironmentsAndreas Reisser, Torsten Priebe. 59-63 [doi]
- Personalized Handling of Semantic Data with MIGMariano Rico, David Camacho, Óscar Corcho. 64-68 [doi]
- Temporal Semantics Extraction for Improving Web SearchMaria Teresa Vicente-DÃez, Paloma MartÃnez. 69-73 [doi]
- Robust Service-Based Semantic Querying to Distributed Heterogeneous DatabasesCarlos Buil Aranda, Óscar Corcho, Amy Krause. 74-78 [doi]
- RDFStats - An Extensible RDF Statistics Generator and LibraryAndreas Langegger, Wolfram Wöß. 79-83 [doi]
- Matching Semantic Web ResourcesSilvana Castano, Alfio Ferrara, Stefano Montanelli, Gaia Varese. 84-88 [doi]
- DSNotify - Detecting and Fixing Broken Links in Linked Data SetsBernhard Haslhofer, Niko Popitsch. 89-93 [doi]
- Integrating Structural Data into Methods for Labeling Relations in Domain OntologiesGerhard Wohlgenannt, Albert Weichselbraun, Arno Scharl. 94-98 [doi]
- A Heuristic Approach to Generate Good-Quality Linked Data about HydrographyLuis Manuel Vilches Blázquez, Óscar Corcho. 99-103 [doi]
- Multiparty Computation of Fixed-Point Multiplication and ReciprocalOctavian Catrina, Claudiu Dragulin. 107-111 [doi]
- Inter-organizational Processes: Requirements for Securing DataAntonio Zilli, Nicola Sicilia, Angelo Corallo. 112-116 [doi]
- Privacy Against the Business Partner: Issues for Realizing End-to-End Confidentiality in Web Service CompositionsMeiko Jensen, Nils Gruschka. 117-121 [doi]
- Improving Practical Performance on Secure and Private Collaborative Linear ProgrammingRafael Deitos, Florian Kerschbaum. 122-126 [doi]
- A Survey of Scientific Approaches Considering the Integration of Security and Risk Aspects into Business Process ManagementStefan Jakoubi, Simon Tjoa, Gernot Goluch, Gerald Quirchmayr. 127-132 [doi]
- Performance Comparison of Secure Comparison ProtocolsFlorian Kerschbaum, Debmalya Biswas, Sebastiaan de Hoogh. 133-136 [doi]
- Active Rules for Business Value ModelsErnesto Damiani, Stefania Marrara. 137-141 [doi]
- Pattern-Based Approach for Logical Traffic Isolation Forensic ModellingInnocentia Dlamini, Martin Olivier, Sihle Sibiya. 145-149 [doi]
- Integrating Security Patterns into the Electronic Invoicing ProcessMichael Netter, Günther Pernul. 150-154 [doi]
- A Pattern Methodology to Specify Usable Security in WebsitesRicardo Mendoza González, Jaime Muñoz Arteaga, Miguel Vargas Martin, Francisco Ãlvarez RodrÃguez, Juan Manuel González-Calleros. 155-159 [doi]
- Using Misuse Patterns for VoIP SteganalysisJuan C. Pelaez. 160-164 [doi]
- Improving the Classification of Security PatternsHironori Washizaki, Eduardo B. Fernández, Katsuhisa Maruyama, Atsuto Kubo, Nobukazu Yoshioka. 165-170 [doi]
- Towards a Generic Process for Security Pattern IntegrationAndreas Fuchs, Sigrid Gürgens, Carsten Rudolph. 171-175 [doi]
- Embedding Security Patterns into a Domain ModelMiguel Solinas, Eduardo B. Fernandez, Leandro Antonelli. 176-180 [doi]
- The Secure Pipes and Filters PatternEduardo B. Fernandez, Jorge L. Ortega-Arjona. 181-185 [doi]
- A Pattern for Secure Graphical User Interface SystemsThomas Fischer, Ahmad-Reza Sadeghi, Marcel Winandy. 186-190 [doi]
- Mining Biological Sequences with MasksGiovanni Battaglia, Roberto Grossi, Roberto Marangoni, Nadia Pisanti. 193-197 [doi]
- Large Scale Analysis of Small Repeats via Mining of the Human GenomeInge van den Berg, Dragan Bosnacki, Peter A. J. Hilbers. 198-202 [doi]
- Performance Analysis of Algorithms for Protein Structure ClassificationFlorin Leon, Bogdan Ioan Aignatoaiei, Mihai Horia Zaharia. 203-207 [doi]
- Identification of Shadow Exons: Mining for Alternative Exons in Human, Mouse and Rat Comparative DatabasesBahar Taneri, Alexey Novoradovsky, Terry Gaasterland. 208-212 [doi]
- Mining Maximal Frequent Subgraphs in KEGG Reaction NetworksWillem P. A. Ligtenberg, Dragan Bosnacki, Peter A. J. Hilbers. 213-217 [doi]
- Event Detection from Video Surveillance Data Based on Optical Flow Histogram and High-level Feature ExtractionAli Wali, Adel M. Alimi. 221-225 [doi]
- Random Methods for Fast Exploration of the Raw Video MaterialTijana Janjusevic, Sergio Benini, Ebroul Izquierdo, Riccardo Leonardi. 226-230 [doi]
- Motion Based Video Classification for SPRITE GenerationAbhidnya A. Deshpande, Ramazan Savas Aygün. 231-235 [doi]
- Content-Based Image Retrieval Using Gabor FilteringTudor Barbu. 236-240 [doi]
- A Content Based Model for Image CategorizationMohammad Reza Keyvanpour, Nasrollah Moghaddam Charkari. 241-245 [doi]
- A LEGO-like Metadata Architecture for Image Search & RetrievalRubén Tous, Jaime Delgado. 246-250 [doi]
- Enhancing Person Annotation for Personal Photo Management ApplicationsSaman Hemantha Cooray, Noel E. O Connor. 251-255 [doi]
- Music Segmentation With Genetic AlgorithmsBrigitte Rafael, Stefan Oertl, Michael Affenzeller, Stefan Wagner 0002. 256-260 [doi]
- A Method to Estimate Object Existence Based on Temporal Analysis of Web Pages for Digital Map CredibilityDaisuke Kitayama, Ryong Lee, Kazutoshi Sumiya. 261-265 [doi]
- Accessing Libraries of Media Art through MetadataAndree Lüdtke, Björn Gottfried, Otthein Herzog, George T. Ioannidis, Michael Leszczukz, Viliam Simko. 269-273 [doi]
- Multimodal Query Suggestion and Searching for Video SearchLvsong Li, Jing Li. 274-278 [doi]
- Accessible Multimodal Web Pages with Sign Language Translations for Deaf and Hard of Hearing UsersMatjaz Debevc, Primoz Kosec, Milan Rotovnik, Andreas Holzinger. 279-283 [doi]
- A Conceptual Framework for Adaptation and Personalization in Virtual EnvironmentsJohanna Renny Octavia, Chris Raymaekers, Karin Coninx. 284-288 [doi]
- Scene Extraction for Video Clips Based on the Relation of Text, Pointing Region and Temporal Duration of User CommentsShoko Wakamiya, Daisuke Kitayama, Kazutoshi Sumiya. 289-294 [doi]
- TMS for Multimodal Information ProcessingBarbara Rita Barricelli, Marco Padula, Paolo Luigi Scala. 295-299 [doi]
- Use and Modeling of Multi-agent Systems in MedicineMaja Hadzic, Darshan S. Dillon, Tharam S. Dillon. 303-307 [doi]
- A Case Study on the Analysis of the Data Quality of a Large Medical DatabaseMatteo Bertoni, Giuliano Furlini, Gianluca Gozzoli, Maria Paola Landini, Matteo Magnani, Antonio Messina, Danilo Montesi. 308-312 [doi]
- Federated Databases as a Basis for Infrastructure Supporting Epidemiological ResearchRuslan Fomkin, Magnus Stenbeck, Jan-Eric Litton. 313-317 [doi]
- SUT-Miner: A Knowledge Mining and Managing System for Medical DatabasesKittisak Kerdprasop, Nittaya Kerdprasop. 318-322 [doi]
- Identification of Surgery Indicators by Mining Hospital Data: A Preliminary StudyMarie Persson, Niklas Lavesson. 323-327 [doi]
- Motif Discovery in Brain Networks of Patients with Somatoform Pain DisorderAnnahita Oswald, Bianca Wackersreuther. 328-332 [doi]
- Stacked Feature Selection in Liver Disease Using IMR-MS AnalysisMichael Netzer, Gunda Millonig, Bernhard Pfeifer, Kanthida Kusonmano, Siegfried Praun, Johannes Villinger, Wolfgang Vogel, Christian Baumgartner. 333-337 [doi]
- Unveiling Fuzzy Associations Between Breast Cancer Prognostic Factors and Gene Expression DataFrancisco Javier Lopez Domingo, Marta Cuadros Celorrio, Armando Blanco Morón, Angel Concha Lopez. 338-342 [doi]
- Information Visualization and Organization for Participatory Monitoring of Invasive Alien SpeciesAsanobu Kitamoto, Miri Nakahara, Izumi Washitani, Taku Kadoya, Masaki Yasuwaka, Masaru Kitsuregawa. 345-349 [doi]
- A Framework for Supporting the Composition of Biodiversity Informatics ResourcesRussell P. McIver, Andrew C. Jones, Richard J. White. 350-354 [doi]
- Instance-Based Data Management -- Is it Useful for Biodiversity Informatics Applications?Jeffrey Parsons. 355-359 [doi]
- Automatic Cluster Number Selection Using a Split and Merge K-Means ApproachMarkus Muhr, Michael Granitzer. 363-367 [doi]
- Clustering of Short Strings in Large DatabasesMichail Kazimianec, Arturas Mazeika. 368-372 [doi]
- Automatic User Comment Detection in Flat Internet ForaMathias Bank, Michael Mattes. 373-377 [doi]
- Comparison Between Manually and Automatically Assigned Descriptors Based on a German Bibliographic CollectionClaire Fautsch, Jacques Savoy. 378-382 [doi]
- Collection-Relative Representations: A Unifying View to Retrieval ModelsBenno Stein, Maik Anderka. 383-387 [doi]
- Persian Language, Is Stemming Efficient?Ljiljana Dolamic, Jacques Savoy. 388-392 [doi]
- Improving Web Page Retrieval Using Search Context from Clicked Domain NamesRongmei Li. 393-397 [doi]
- Comparing Different Approaches to Treat Translation Ambiguity in CLIR: Structured Queries vs. Target Co-occurrence Based SelectionXabier Saralegi, Maddalen Lopez de Lacalle. 398-404 [doi]
- Cubing Algorithms for XML DataAlfredo Cuzzocrea. 407-411 [doi]
- A Flexible Data Warehousing Approach for One-Stop Querying on Heterogeneous Personal InformationMing Zhong 0002, Mengchi Liu. 412-416 [doi]
- HShreX - A Tool for Design and Evaluation of Hybrid XML StorageLena Strömbäck, Mikael Asberg, David Hall. 417-421 [doi]
- On Different Perspectives of XML Data EvolutionMartin Necasky, Irena Mlynkova. 422-426 [doi]
- Building an Enhanced Syntax-Directed Processing Environment for XML Documents by Combining StAX and CUPAntonio Sarasa-Cabezuelo, Bryan Temprado-Battad, Alberto Martinez-Aviles, José Luis Sierra, Alfredo Fernández-Valmayor. 427-431 [doi]
- The Role of Clustering in Search ComputingAlessandro Campi, Stefania Ronchi. 432-436 [doi]
- Flexible Integrity Checking of Hard and Soft ConstraintsHendrik Decker. 437-441 [doi]
- A New Upgrade to SQLf: Towards a Standard in Fuzzy DatabasesClaudia González, Marlene Goncalves, Leonid Tineo. 442-446 [doi]
- Modeling Trajectories: A Spatio-Temporal Data Type ApproachAli Frihida, Donia Zheni, Henda Hajjami Ben Ghézala, Christophe Claramunt. 447-451 [doi]
- DAMSEL: A System for Progressive Querying and Reasoning on Movement DataRoberto Trasarti, Miriam Baglioni, Chiara Renso. 452-456 [doi]
- RDF Visualization - Thinking BigJirà Dokulil, Jana Katreniaková. 459-463 [doi]
- Algorithms for Generating Ontology Based Visualization from Semantic Search ResultsFawad Nazir, Victoria S. Uren, Andriy Nikolov. 464-468 [doi]
- Ontology Knowledge Authoring by Natural Language EmpowermentAlfio Ferrara, Stefano Montanelli, Gaia Varese, Silvana Castano. 469-473 [doi]
- A Meta-Framework for Generating Ontologies from Legacy SchemasManuel Wimmer. 474-479 [doi]
- Building Ontologies from XML Data SourcesRaji Ghawi, Nadine Cullot. 480-484 [doi]
- Designing and Maintaining XML Integrity ConstraintsMartin Necasky, Katerina Opocenska. 485-489 [doi]