Abstract is missing.
- Leveraging Homomorphisms and Bitmaps to Enable the Mining of Embedded Patterns from Large Data TreesXiaoying Wu, Dimitri Theodoratos. 3-20 [doi]
- Cold-Start Expert Finding in Community Question Answering via Graph RegularizationZhou Zhao, Furu Wei, Ming Zhou, Wilfred Ng. 21-38 [doi]
- Mining Itemset-based Distinguishing Sequential Patterns with Gap ConstraintHao Yang, Lei Duan, Guozhu Dong, Jyrki Nummenmaa, Changjie Tang, Xiaosong Li. 39-54 [doi]
- Mining Correlations on Massive Bursty Time Series CollectionsTomasz Kusmierczyk, Kjetil Nørvåg. 55-71 [doi]
- Adaptive Grid-Based k-median Clustering of Streaming Data with Accuracy GuaranteeJianneng Cao, Yongluan Zhou, Min Wu. 75-91 [doi]
- Grouping Methods for Pattern Matching in Probabilistic Data StreamsKento Sugiura, Yoshiharu Ishikawa, Yuya Sasaki. 92-107 [doi]
- Fast Similarity Search of Multi-Dimensional Time Series via Segment RotationXudong Gong, Yan Xiong, Wenchao Huang, Lei Chen, Qiwei Lu, Yiqing Hu. 108-124 [doi]
- Measuring the Influence from User-Generated Content to News via Cross-dependence Topic ModelingLei Hou, Juanzi Li, Xiao-Li Li, Yu Su. 125-141 [doi]
- SASS: A High-Performance Key-Value Store Design for Massive Hybrid StorageJiangtao Wang, Zhiliang Guo, Xiaofeng Meng. 145-159 [doi]
- An Efficient Design and Implementation of Multi-level Cache for Database SystemsJiangtao Wang, Zhiliang Guo, Xiaofeng Meng. 160-174 [doi]
- A Cost-aware Buffer Management Policy for Flash-based Storage DevicesZhiwen Jiang, Yong Zhang, Jin Wang, Chunxiao Xing. 175-190 [doi]
- The Gaussian Bloom FilterMartin Werner 0001, Mirco Schönfeld. 191-206 [doi]
- Detecting Hotspots from Trajectory Data in Indoor SpacesPeiquan Jin, Jiang Du, Chuanglin Huang, Shouhong Wan, Lihua Yue. 209-225 [doi]
- On Efficient Passenger Assignment for Group TransportationJiajie Xu, Guanfeng Liu, Kai Zheng, Chengfei Liu, Haoming Guo, Zhiming Ding. 226-243 [doi]
- Effective and Efficient Predictive Density Queries for Indoor Moving ObjectsMiao Li, Yu Gu 0002, Ge Yu. 244-259 [doi]
- Efficient Trip Planning for Maximizing User SatisfactionChenghao Zhu, Jiajie Xu, Chengfei Liu, Pengpeng Zhao, An Liu, Lei Zhao. 260-276 [doi]
- Accelerating Search of Protein Sequence Databases using CUDA-Enabled GPULin Cheng, Greg Butler. 279-298 [doi]
- Fast Subgraph Matching on Large Graphs using Graphics ProcessorsHa Nguyen Tran, Jung-jae Kim, Bingsheng He. 299-315 [doi]
- On Longest Repeat Queries Using GPUYun Tian, Bojian Xu. 316-333 [doi]
- Process-driven Configuration of Federated Cloud ResourcesDenis Weerasiri, Boualem Benatallah, Moshe Chai Barukh. 334-350 [doi]
- An Integrated Tag Recommendation Algorithm Towards Weibo User ProfilingDeqing Yang, Yanghua Xiao, Hanghang Tong, Junjun Zhang, Wei Wang 0009. 353-373 [doi]
- An Efficient Approach of Overlapping Communities SearchJing Shan, Derong Shen, Tiezheng Nie, Yue Kou, Ge Yu. 374-388 [doi]
- A Comparative Study of Team Formation in Social NetworksXinyu Wang, Zhou Zhao, Wilfred Ng. 389-404 [doi]
- Inferring Diffusion Networks with Sparse Cascades by Structure TransferSenzhang Wang, Honghui Zhang, Jiawei Zhang, Xiaoming Zhang, Philip S. Yu, Zhoujun Li. 405-421 [doi]
- Scalable Inclusion Dependency DiscoveryNuhad Shaabani, Christoph Meinel. 425-440 [doi]
- Repairing Functional Dependency Violations in Distributed DataQing Chen, Zijing Tan, Chu He, Chaofeng Sha, Wei Wang 0009. 441-457 [doi]
- GB-JER: A Graph-Based Model for Joint Entity ResolutionChenchen Sun, Derong Shen, Yue Kou, Tiezheng Nie, Ge Yu. 458-473 [doi]
- Provenance-Aware Entity Resolution: Leveraging Provenance to Improve QualityQing Wang, Klaus-Dieter Schewe, Woods Wang. 474-490 [doi]
- A Chip Off the Old Block - Extracting Typical Attributes for Entities Based on Family ResemblanceSilviu Homoceanu, Wolf-Tilo Balke. 493-509 [doi]
- Tag-Based Paper Retrieval: Minimizing User Effort with Diversity AwarenessNguyen Quoc Viet Hung, Do Son Thanh, Nguyen Thanh Tam, Karl Aberer. 510-528 [doi]
- Feedback Model for Microblog RetrievalZiqi Wang, Ming Zhang. 529-544 [doi]
- Efficient String Similarity Search: A Cross Pivotal Based ApproachFei Bi, Lijun Chang, Wenjie Zhang, Xuemin Lin. 545-564 [doi]
- Authentication of Top-k Spatial Keyword Queries in Outsourced DatabasesSen Su, Han Yan, Xiang Cheng, Peng Tang, Peng Xu, Jianliang Xu. 567-588 [doi]
- Privacy-Preserving Top-k Spatial Keyword Queries over Outsourced DatabaseSen Su, Yiping Teng, Xiang Cheng, Yulong Wang, Guoliang Li. 589-608 [doi]
- Bichromatic Reverse Nearest Neighbor Query without Information LeakageLu Wang, Xiaofeng Meng, Haibo Hu, Jianliang Xu. 609-624 [doi]
- Authentication of Reverse k Nearest Neighbor QueryGuohui Li, Changyin Luo, Jianjun Li. 625-640 [doi]