Abstract is missing.
- Protein Data Modelling for Concurrent Sequential PatternsJing Lu, Malcolm Keech, Cuiqing Wang. 5-9 [doi]
- New Online Hierarchical Feature Extraction Algorithm for Classification of ProteinMehdi Kchouk, Faouzi Mhamdi. 10-14 [doi]
- A New Approach for Phylogenetic Tree Construction Based on Minimal Absent WordsSupaporn Chairungsee. 15-19 [doi]
- Protein Motif Retrieval by Secondary Structure Element Geometry and Biological Features SaliencyVirginio Cantoni, Marco Ferretti, Nicola Pellicano, Jennifer Vandoni, Mirto Musci, Nahumi Nugrahaningsih. 23-27 [doi]
- Mining Frequent Patterns for Genetic Variants Associated to DiabetesSofianita Mutalib, Shuzlina Abdul Rahman, Azlinah Mohamed. 28-32 [doi]
- A Consensus Algorithm for Simple Motifs FindingTarek El Falah, Maroua Ghnimi, Mourad Elloumi. 33-37 [doi]
- Toward Efficient Variant Calling Inside Main-Memory Database SystemsSebastian Dorok, Sebastian Breß, Gunter Saake. 41-45 [doi]
- Feature Selection Methods on Biological Knowledge Discovery and Data Mining: A SurveyHanen Mhamdi, Faouzi Mhamdi. 46-50 [doi]
- New Method Combining Feature Weighting and Feature Selection for Protein ClassificationSalma Aouled El Haj Mohamed, Faouzi Mhamdi. 51-55 [doi]
- A Filter Correlation Method for Feature SelectionHanen Hosni, Faouzi Mhamdi. 59-63 [doi]
- An Efficient Algorithm for Hierarchical Classification of Protein and Gene FunctionsFábio Fabris, Alex Alves Freitas. 64-68 [doi]
- Classifying Bacterial Genomes with Compact Logic Formulas on k-Mer FrequenciesEmanuel Weitschek, Fabio Cunial, Giovanni Felici. 69-73 [doi]
- FT-IR Spectra Analysis toward Cancer DetectionSeungJin Lim, Menashi Cohenford. 77-81 [doi]
- A PubMed Meta Search Engine Based on Biomedical Entity MiningAndreas Kanavos, Evangelos Theodoridis, Athanasios K. Tsakalidis. 82-86 [doi]
- Content-Based Search on Time-Series Microarray DatabasesAhmet Hayran, Hasan Ogul, Esma Ozkoc. 89-93 [doi]
- A Light-Weight Visualization Tool for Support Vector MachinesSeungJin Lim. 94-98 [doi]
- Agent-Based Simulation of Interrelated Wholesale Electricity MarketsAndreas Bublitz, Philipp Ringler, Massimo Genoese, Dogan Keles, Wolf Fichtner. 103-108 [doi]
- Realistic Multi-agent Simulation of Competitive Electricity MarketsTiago William Pinto, Gabriel Santos, Zita A. Vale, Isabel Praça, Fernando Lopes, Hugo Algarvio. 109-113 [doi]
- A Trader Portfolio Optimization of Bilateral Contracts in Electricity Retail MarketsHugo Algarvio, Fernando Lopes, Jorge A. M. Sousa, Joao Lagarto. 114-118 [doi]
- Realistic User Behavior Modeling for Energy Saving in Residential BuildingsJorge Martínez Gil, Georgios C. Chasparis, Bernhard Freudenthaler, Thomas Natschläger. 121-125 [doi]
- A Multi-agent Coordination Framework for Smart Building Energy ManagementThanos G. Stavropoulos, Emmanouil S. Rigas, Efstratios Kontopoulos, Nick Bassiliades, Ioannis P. Vlahavas. 126-130 [doi]
- Multi-agent Simulation of Bilateral Contracting in Competitive Electricity MarketsFernando Lopes, Hugo Algarvio, Jorge A. M. Sousa, Helder Coelho, Tiago William Pinto, Gabriel Santos, Zita A. Vale, Isabel Praça. 131-135 [doi]
- Power Producers Trading Electricity in Both Pool and Forward MarketsHugo Algarvio, Fernando Lopes, Jorge A. M. Sousa, Joao Lagarto. 139-143 [doi]
- On the Formalization of Expert Knowledge: A Disaster Management Case StudyMario Pichler, Diethard Leber. 149-153 [doi]
- Situation Awareness and Decision Support Tools for Response Phase of Emergency Management: A Short SurveyBogdan Pavkovic, Lazar Berbakov, Sanja Vrane, Milo Milenkovic. 154-159 [doi]
- Generic Approach for Dynamic Disaster Management System ComponentMarina Tropmann-Frick, Thomas Ziebermayr. 160-164 [doi]
- eXsight: An Analytical Framework for Quantifying Financial Loss in the Aftermath of Catastrophic EventsMatthew Coelho, Andrew Rau-Chaplin. 165-170 [doi]
- Exploiting Process Patterns and Process Instances to Support Adaptability of Dynamic Business ProcessesAndreas Bögl, Christine Natschläger, Michael Karlinger, Michael Schrefl. 173-177 [doi]
- Similarity Search of Human Behavior Processes Using Extended Linked Data Semantic DistanceZhang Zuo, Hung-Hsuan Huang, Kyoji Kawagoe. 178-182 [doi]
- Improving Activity Recognition via Satellite Imagery and Commonsense KnowledgeNicola Bicocchi, Damiano Fontana, Franco Zambonelli. 183-187 [doi]
- Cumulative Citation Recommendation: A Feature-Aware Comparison of ApproachesGebrekirstos G. Gebremeskel, Jiyin He, Arjen P. de Vries, Jimmy Lin. 193-197 [doi]
- Text Retrieval Based on Dyadic Conceptual ProjectionSonia Alouane-Ksouri, Minyar Sassi Hidri, Kamel Barkaoui. 198-202 [doi]
- Random Manhattan IndexingBehrang Q. Zadeh, Siegfried Handschuh. 203-208 [doi]
- On the Use of Reliable-Negatives Selection Strategies in the PU Learning Approach for Quality Flaws Prediction in WikipediaEdgardo Ferretti, Marcelo Luis Errecalde, Maik Anderka, Benno Stein. 211-215 [doi]
- Enhancing Patient Safety through Human-Computer Information Retrieval on the Example of German-Speaking Surgical ReportsChristof Stocker, Leopold-Michael Marzi, Christian Matula, Johannes Schantl, Gottfried Prohaska, Alberto Brabenetz, Andreas Holzinger. 216-220 [doi]
- Investigation of Latent Semantic Analysis for Clustering of Czech News ArticlesMichal Rott, Petr Cerva. 223-227 [doi]
- Robust Language Identification of Noisy Texts: Proposal of Hybrid ApproachesKheireddine Abainia, Siham Ouamour-Sayoud, Halim Sayoud. 228-232 [doi]
- A Pure URL-Based Genre Classification of Web PagesChaker Jebari. 233-237 [doi]
- Keyphrase Extraction Abstracts Instead of Full PapersSvetlana Popova, Vera Danilova. 241-245 [doi]
- Towards an Automated Approach to Extract and Compare Fictional Networks: An Initial EvaluationMarcello Trovati, James Brady. 246-250 [doi]
- Distributed Evaluation of XPath Axes Queries over Large XML Documents Stored in MapReduce ClustersAdam Senk, Michal Valenta, Wolfgang Benn. 253-257 [doi]
- Column-Oriented Data Store for Astrophysical DataJakub Yaghob, David Bednárek, Martin Krulis, Filip Zavoral. 258-262 [doi]
- M2RML: Multidimensional to RDF Mapping LanguageSaleh Ghasemi, Wo-Shun Luk, Norah Alrayes. 263-267 [doi]
- Analyzing Recent Trends in Enterprise Identity ManagementMichael Kunz, Matthias Hummer, Ludwig Fuchs, Michael Netter, Günther Pernul. 273-277 [doi]
- Trust and Big Data: A Roadmap for ResearchJohannes Sänger, Christian Richthammer, Sabri Hassan, Günther Pernul. 278-282 [doi]
- Detectability of Deep Packet Inspection in Common Provider/Consumer RelationsChristian Roth, Rolf Schillinger. 283-287 [doi]
- A Fuzzy Security Investment Decision Support Model for Highly Distributed SystemsEmrah Yasasin, Gerhard Rauchecker, Julian Prester, Guido Schryen. 291-295 [doi]
- Applicability of Prediction Markets in Information Security Risk ManagementPankaj Pandey, Einar Arthur Snekkenes. 296-300 [doi]
- Towards a Flexible Virtualization-Based Architecture for Malware Detection and AnalysisMarius Vlad, Hans P. Reiser. 303-307 [doi]
- Multi-tiered Security Architecture for ARM via the Virtualization and Security ExtensionsTamas K. Lengyel, Thomas Kittel, Jonas Pfoh, Claudia M. Eckert. 308-312 [doi]
- An(other) Exercise in Measuring the Strength of Source Code ObfuscationYan Zhuang, Mykola Protsenko, Tilo Müller, Felix C. Freiling. 313-317 [doi]
- The di.me Trust Approach for Supporting Collaborative ScenariosMarcel Heupel, Mohamed Bourimi, Dogan Kesdogan. 321-325 [doi]
- Specifying IT Security AwarenessNorman Hansch, Zinaida Benenson. 326-330 [doi]
- Honeypot Effectiveness in Different Categories of Attacks on Wireless Sensor NetworksJürgen Markert, Michael Massoth. 331-335 [doi]