Abstract is missing.
- MedRank: Discovering Influential Medical Treatments from Literature by Information Network AnalysisLing Chen, Xue Li, Jiawei Han. 3-13 [doi]
- An E ectiveness Study on Trajectory Similarity MeasuresHaozhou Wang, Han Su, Kai Zheng, Shazia Wasim Sadiq, Xiaofang Zhou. 13-22 [doi]
- Exploiting a Proximity-based Positional Model to Improve the Quality of Information Extraction by Text SegmentationDat T. Huynh, Xiaofang Zhou. 23-32 [doi]
- Concurrent Operations of O2-Tree on Shared Memory Multicore ArchitecturesDaniel Ohene-Kwofie, Ekow J. Otoo, Gideon Nimako. 33-42 [doi]
- An Improved Neighborhood-Restricted Association Rule-based Recommender SystemR. Uday Kiran, Masaru Kitsuregawa. 43-50 [doi]
- Mapping Semantic Knowledge for Unsupervised Text CategorisationXiaohui Tao, Yuefeng Li, Ji Zhang, Jianming Yong. 51-60 [doi]
- Semantic-based Construction of Content and Structure XML IndexNorah Saleh Alghamdi, Wenny Rahayu, Eric Pardede. 61-70 [doi]
- JetXSLT: A Resource-Conscious XSLT ProcessorWilliam M. Shui, Raymond K. Wong. 71-80 [doi]
- Robust Snapshot ReplicationUwe Röhm, Michael J. Cahill, Alan Fekete, Hyungsoo Jung, Seung Woo Baek, Mathew Rodley. 91-92 [doi]
- A Self-Stabilizing Algorithm for Finding a Minimal Positive Influence Dominating Set in Social NetworksGuangyuan Wang, Hua Wang, Xiaohui Tao, Ji Zhang. 93-100 [doi]
- Peer-to-Peer Data Mining Classi ers for Decentralized Detection of Network AttacksWalter Cerroni, Gianluca Moro, Tommaso Pirini, Marco Ramilli. 101-108 [doi]
- Finding Skylines for Incomplete DataRahul Bharuka, P. Sreenivasa Kumar. 109-119 [doi]
- Role-based access control to outsourced data in could computingLili Sun, Hua Wang, Elisa Bertino. 119-128 [doi]