Abstract is missing.
- On mining association rules with semantic constraints in XMLMd. Sumon Shahriar, Jixue Liu. 1-5 [doi]
- An effective algorithm for mining association rules based on imperialist competitive algorithmFariba Khademolghorani. 6-11 [doi]
- Mining cyclic association rules from multidimensional knowledgeEya Ben Ahmed, Ahlem Nabli, Faïez Gargouri. 12-17 [doi]
- Maintaining imbalance highly dependent medical data using dirichlet process data generationTieta Antaresti, Mohamad Ivan Fanany, Aniati Murni Arymurthy. 18-22 [doi]
- On mining XML integrity constraintsStanislav Fajt, Irena Mlynkova, Martin Necasky. 23-29 [doi]
- A PPDM model using Bayesian Network for hiding sensitive XML Association RulesKhalid Iqbal, Sohail Asghar, Simon Fong. 30-35 [doi]
- The Framy user interface for visually-impaired usersGabriele Di Chiara, Luca Paolino, Marco Romano, Monica Sebillo, Genny Tortora, Giuliana Vitiello, Athula Ginige. 36-41 [doi]
- Evaluation of disaster management portals: Applying knowledge management to digital informationAlton Yeow-Kuan Chua, Radhika Shenoy Balkunje, Dion Hoe-Lian Goh. 42-47 [doi]
- Coconut fields classification using data mining on a large database of high-resolution Ikonos imagesElise Desmier, Frédéric Flouvat, Benoit Stoll, Nazha Selmaoui-Folcher. 48-53 [doi]
- DNS usage mining and its two applicationsJun Wu, Xiaodong Li, Xin Wang, Baoping Yan. 54-60 [doi]
- The effect of user search behaviour on web information gathering tasksAnwar Alhenshiri, Hoda Badesh. 61-66 [doi]
- Weighted hybrid features to resolve mixed entitiesIngyu Lee, Byung-Won On. 67-72 [doi]
- Index-based n-gram extraction from large document collectionsMichal Krátký, Radim Baca, David Bednar, Jirí Walder, Jiri Dvorský, Peter Chovanec. 73-78 [doi]
- Evaluating SPARQL using query federation and link traversalFahad Alahmari. 79-84 [doi]
- Filtering XML content for publication and presentation on the webLiliana Alexandre, Jorge Coelho. 85-89 [doi]
- Comparison of voice features for Arabic speech recognitionMansour Alsulaiman, Muhammad Ghulam, Zulfiqar Ali. 90-95 [doi]
- Converting Myanmar printed document image into machine understandable text formatHtwe Pa Pa Win, Phyo Thu Thu Khine, Khin Nwe Ni Tun. 96-101 [doi]
- Minimizing ambiguity in natural language software requirements specificationAshfa Umber, Imran Sarwar Bajwa. 102-107 [doi]
- Multisensor fusion-based object detection and tracking using Active Shape ModelDongeun Lee, Sunghoon Choi. 108-114 [doi]
- Chart image understanding and numerical data extractionAles Mishchenko, Natalia Vassilieva. 115-120 [doi]
- Keyword searching and browsing system over relational databasesPhyo Thu Thu Khine, Htwe Pa Pa Win, Khin Nwe Ni Tun. 121-126 [doi]
- Technology forecasting in the field of Apnea from online publications: Time series analysis on Latent SemanticAgus Widodo, Mohamad Ivan Fanany, Indra Budi. 127-132 [doi]
- Evaluation of stop word lists in text retrieval using Latent Semantic IndexingA. N. K. Zaman, Pascal Matsakis, Charles Grant Brown. 133-136 [doi]
- Online ngram-enhanced topic model for academic retrievalHan Wang, Bo Lang. 137-142 [doi]
- Automatic text classification and focused crawlingSameendra Samarawickrama, Lakshman Jayaratne. 143-148 [doi]
- Prediction of hotspot in data centric storageZeynab Amiri, Masoud Sabae. 149-153 [doi]
- Bayesian based subgroup discoveryTalha Anwar, Sohail Asghar, Simon Fong. 154-161 [doi]
- Expert finding and query answering for Collaborative Inter-Organizational system by using Rule ResponderTang Rui, Simon Fong, Sababady Sarasvady. 162-167 [doi]
- Minimal dataset for Network Intrusion Detection Systems via dimensionality reductionJean-Pierre Nziga. 168-173 [doi]
- A new perfect hashing based approach for secure stegnographImran Sarwar Bajwa, Rubata Riasat. 174-178 [doi]
- Applying multi-correlation for improving forecasting in cyber securityElvis Pontes, Adilson Eduardo Guelfi, Sergio Takeo Kofuji, Anderson A. A. Silva. 179-186 [doi]
- A new method based on Finite State Machine for detecting misbehaving nodes in ad hoc networksDina Sadat Jalali, Alireza Shahrbanoonezhad. 187-192 [doi]
- PRIS: Image processing tool for dealing with criminal cases using steganography techniqueRosziati Ibrahim, Teoh Suk Kuan. 193-198 [doi]
- BatCave: Adding security to the BATMAN protocolAnne Gabrielle Bowitz, Espen Grannes Graarud, Lawrie Brown, Martin Gilje Jaatun. 199-204 [doi]
- Web service with criteria: Extending WSDLN. Parimala, Anu Saini. 205-210 [doi]
- Private range query by perturbation and matrix based encryptionJunpei Kawamoto, Masatoshi Yoshikawa. 211-216 [doi]
- Strategic government initiatives to promote diffusion of online retailing in Saudi ArabiaRayed AlGhamdi, Steve Drew, Mohammed Alshehri. 217-222 [doi]
- Monitoring eBay auctions by querying RDF streamsSven Groppe, Jinghua Groppe, Stefan Werner, Matthias Samsel, Florian Kalis, Kristina Fell, Peter Kliesch, Markus Nakhlah. 223-228 [doi]
- Programming for evaluating strip layout of progressive diesAlan C. Lin, Ho Minh Tuan, Dean K. Sheu. 229-234 [doi]
- Data management and analysis at the Large Scale Data FacilityA. O. García, Serguei Bourov, Ahmad Hammad, Thomas Jejkal, Jens C. Otte, Sven Pfeiffer, T. Schenker, Christian Schmidt, Jos van Wezel, Bernhard Neumair, Achim Streit. 235-241 [doi]
- When theory meets practice: A case report on conceptual modeling for XMLMartin Necasky, Jakub Klímek, Jakub Malý. 242-251 [doi]
- Area-based communication detectorTakao Shime, Kazuo Kunieda, Keiji Yamada, Hideki Kawai. 252-257 [doi]
- A study of motivations for using mobile content sharing gamesGuanghao Low, Dion Hoe-Lian Goh, Chei Sian Lee. 258-263 [doi]
- Geo-local contents system with mobile devicesKazunari Ishida. 264-269 [doi]
- A method for conversational topic recommendation to appropriate user groupYoshio Ishizawa, Dai Kusui, Hironori Mizuguchi, Yukitaka Kusumura, Yusuke Muraoka. 270-275 [doi]
- Information management in health systems: Considering an organic approachShirlee-ann Knight. 276-281 [doi]
- Discriminating early stage AD patients from healthy controls using synchronization analysis of EEGMahdi Jalili. 282-287 [doi]
- Pattern mining for query answering in marine sensor dataMd. Sumon Shahriar, Paulo de Souza, Greg Timms. 288-293 [doi]
- Predicting software black-box defects using stacked generalizationNing Li, Zhanhuai Li, Yanming Nie, Xiling Sun, Xia Li. 294-299 [doi]
- A heuristic method for forecasting chaotic time series based on economic variablesReza Reyhani, Amir-Masoud Eftekhari-Moghadam. 300-304 [doi]
- MHPSO: A new method to enhance the Particle Swarm OptimizerBafrin Zarei, Reza Ghanbarzadeh, Poorya Khodabande, Hadi Toofani. 305-309 [doi]
- Towards a virtual environment for capturing behavior in cultural crowdsDivesh Lala, Sutasinee Thovutikul, Toyoaki Nishida. 310-315 [doi]
- Improving reliability of user preferences: Comparing instead of ratingNicolas Jones, Armelle Brun, Anne Boyer. 316-321 [doi]
- ICT + PBL = holistic learning solution: UTeM's experienceFaaizah Shahbodin, Mariana Yusoff, Che Ku Nuraini Che Ku Mohd. 322-326 [doi]
- Context-aware SQA e-learning systemNada Bajnaid, Rachid Benlamri, Boris I. Cogan. 327-331 [doi]
- A service-based grid computing model to apply in the universities and institutesFattaneh Mimhashemi, Amir Albadavi, Abbas Asosheh, Mohammad. gh Tajgardoon. 332-336 [doi]
- Classification of Privacy-preserving Distributed Data Mining protocolsZhuojia Xu, Xun Yi. 337-342 [doi]
- Evaluation of P2P streaming systems for webcastYusuke Gotoh, Kentaro Suzuki, Tomoki Yoshihisa, Hideo Taniguchi, Masanori Kanazawa. 343-350 [doi]
- Query optimization in information integration for queries involving aggregation and group byWejdan Alkaldi, Fereidoon Sadri. 351-358 [doi]