Abstract is missing.
- A Tree for All SeasonsGeorge A. Mihaila, Ioana Stanoi. 3-10 [doi]
- A Unit-Test Framework for Database ApplicationsClaus A. Christensen, Steen Gundersborg, Kristian de Linde, Kristian Torp. 11-20 [doi]
- CADRE: A Collaborative replica allocation and deallocation approach for Mobile-P2P networksAnirban Mondal, Sanjay Kumar Madria, Masaru Kitsuregawa. 21-28 [doi]
- Collaborative Filtering Process in a Whole New LightPanagiotis Symeonidis, Alexandros Nanopoulos, Apostolos Papadopoulos, Yannis Manolopoulos. 29-36 [doi]
- Distributed Data Summaries for Approximate Query Processing in PDMSKatja Hose, Daniel Klan, Kai-Uwe Sattler. 37-44 [doi]
- Effective Incremental Clustering for Duplicate Detection in Large DatabasesFrancesco Folino, Giuseppe Manco, Luigi Pontieri. 45-52 [doi]
- Efficient Incremental Subspace Clustering in Data StreamsMaria Kontaki, Apostolos N. Papadopoulos, Yannis Manolopoulos. 53-60 [doi]
- Efficient Mining of Constrained Frequent Patterns from StreamsCarson Kai-Sang Leung, Quamrul I. Khan. 61-68 [doi]
- Efficient Processing of Narrow Range Queries in Multi-dimensional Data StructuresMichal Krátký, Václav Snásel, Jaroslav Pokorný, Pavel Zezula. 69-79 [doi]
- Exploiting Indifference for Customization of Partial Order SkylinesWolf-Tilo Balke, Ulrich Güntzer, Wolf Siberski. 80-88 [doi]
- Generalized Indexing for Energy-Efficient Access to Partially Ordered Broadcast Data inWireless NetworksDimitrios Katsaros, Nikos Dimokas, Yannis Manolopoulos. 89-96 [doi]
- LogicFence: A Framework for Enforcing Global Integrity Constraints at RuntimeShibashis Guha, Srinath Srinivasa, Saikat Mukherjee, Ranajoy Malakar. 97-104 [doi]
- Multi-dimensional Histograms with Tight Bounds for the ErrorLinas Baltrunas, Arturas Mazeika, Michael H. Böhlen. 105-112 [doi]
- PAID: Mining Sequential Patterns by Passed Item Deduction in Large DatabasesZhenglu Yang, Masaru Kitsuregawa, Yitong Wang. 113-120 [doi]
- Privacy preserving Data Mining Algorithms without the use of Secure Computation or PerturbationAlex Gurevich, Ehud Gudes. 121-128 [doi]
- Querying Encrypted XML DocumentsRavi Chandra Jammalamadaka, Sharad Mehrotra. 129-136 [doi]
- Securing the Borealis Data Stream EngineWolfgang Lindner, Jörg Meier. 137-147 [doi]
- Shrinked Data Marts Enabled for Negative CachingMaik Thiele, Wolfgang Lehner. 148-157 [doi]
- SURCH: Distributed Aggregation over Wireless Sensor NetworksXingbo Yu, Sharad Mehrotra, Nalini Venkatasubramanian. 158-165 [doi]
- Towards an Approach forWeb services SubstitutionYehia Taher, Djamal Benslimane, Marie-Christine Fauvet, Zakaria Maamar. 166-173 [doi]
- Towards Traceability across Sovereign, Distributed RFID DatabasesRakesh Agrawal, Alvin Cheung, Karin Kailing, Stefan Schönauer. 174-184 [doi]
- Trajectory Similarity Search in Spatial NetworksEleftherios Tiakas, Apostolos N. Papadopoulos, Alexandros Nanopoulos, Yannis Manolopoulos, Dragan Stojanovic, Slobodanka Djordjevic-Kajan. 185-192 [doi]
- u38: A Framework for Database-Supported Enterprise Document-RetrievalChristoph Mangold, Holger Schwarz, Bernhard Mitschang. 193-200 [doi]
- Visual Keyword-based Image Retrieval using Latent Semantic Indexing, Correlation-enhanced Similarity Matching and Query Expansion in Inverted IndexMd. Mahmudur Rahman, Bipin C. Desai, Prabir Bhattacharya. 201-208 [doi]
- Visual Modeling of Behavioral Properties in the LVM for XML Using XSemantic NetsRajagopal Rajugan, Elizabeth Chang, Ling Feng, Tharam S. Dillon. 209-219 [doi]
- Visualization of Web Usage PatternsSrinidhi Kannappady, Sudhir P. Mudur, Nematollaah Shiri. 220-227 [doi]
- XML Document Correction: Incremental Approach Activated by Schema ValidationBéatrice Bouchou, Ahmed Cheriat, Mirian Halfeld Ferrari Alves, Agata Savary. 228-238 [doi]
- A similarity based approach for integrated Web caching and content replication in CDNsKonstantinos Stamos, George Pallis, Charilaos Thomos, Athena Vakali. 239-242 [doi]
- An Evolutionary Approach to the Selection and Allocation of Distributed CubesJorge Loureiro, Orlando Belo. 243-248 [doi]
- An inside analysis of a genetic-programming based optimizerVictor Muntés-Mulero, Josep-Lluis Larriba-Pey, Josep Aguilar-Saborit, Calisto Zuzarte, Volker Markl. 249-255 [doi]
- ARGUS: Efficient Scalable Continuous Query Optimization for Large-Volume Data StreamsChun Jin, Jaime G. Carbonell. 256-262 [doi]
- Classification of Mammograms Using Decision TreesL. Vibha, G. M. Harshavardhan, K. Pranaw, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik. 263-266 [doi]
- Data-Driven Publication of Relational DatabasesSonia Guehis, Philippe Rigaux, Emmanuel Waller. 267-272 [doi]
- Dependency Sensitive Shadow SWIFTUdai Shanker, Manoj Misra, Anil Kumar Sarje, Rahul Shisondia. 273-276 [doi]
- Exploring the Capabilities of Mobile Agents in Distributed Data MiningUmakanth P. Kulkarni, K. K. Tangod, S. R. Mangalwede, Anil R. Yardi. 277-280 [doi]
- Global Epidemiological Outbreak Surveillance System ArchitectureRicardo Jorge Santos, Jorge Bernardino. 281-284 [doi]
- Integrating and Querying P2P Deductive DatabasesLuciano Caroprese, Cristian Molinaro, Ester Zumpano. 285-290 [doi]
- Parallelizing XQuery In a Cluster EnvironmentXiaogang Li, Gagan Agrawal. 291-294 [doi]
- Towards Integrated Query Processing for Object-Relational and XML Data SourcesIryna Kozlova, Norbert Ritter, Olga Reimer. 295-300 [doi]
- Watermark Based Copyright Protection of Outsourced DatabaseQin Zhu, Ying Yang, Jiajin Le, Yishu Luo. 301-308 [doi]
- An Attribute Based Storage Method for Speeding up CLIQUE Algorithm for Subspace ClusteringJyoti Pawar, P. R. Rao. 309-310 [doi]
- Malafide Intension and its mapping to Privacy Policy Purposes for MasqueradingVikram Goyal, Shyam K. Gupta, Anand Gupta. 311-312 [doi]
- Online Recovery of a Distributed Database from Malicious AttackA. Chakraborty, M. K. Garg, Arun K. Majumdar, Shamik Sural. 313-314 [doi]
- PBIRCH: A Scalable Parallel Clustering algorithm for Incremental DataAshwani Garg, Ashish Mangla, Neelima Gupta, Vasudha Bhatnagar. 315-316 [doi]
- Probabilistic Internal Privacy Intrusion DetectionXiangdong An, Dawn N. Jutla, Nick Cercone. 317-318 [doi]
- Towards a transactional services coordination modelAlberto Portilla, Christine Collet, Genoveva Vargas-Solar. 319-320 [doi]
- Towards a Lightweight Framework for Privacy Preserving P2P XML DatabasesAngela Bonifati, Alfredo Cuzzocrea. 321-324 [doi]