Abstract is missing.
- Message from program co-chairsReda Alhajj, James B. D. Joshi, Mei-Ling Shyu. [doi]
- Securing and utilizing social dynamicsGail-Joon Ahn. [doi]
- Panel: Converting innovation to commercialization: Information re-use from the research sector to the public sectorGordon K. Lee, Du Zhang, Stuart Harvey Rubin, Shu-Ching Chen, June Massoud, Gongzhu Hu. [doi]
- The concept of a Z-number - A new direction in uncertain computationLotfi A. Zadeh. [doi]
- Protecting information systems from insider threats - concepts and issuesElisa Bertino. [doi]
- ForwardStuart Harvey Rubin, Shu-Ching Chen. [doi]
- On the use of Hamming distance tuning for the generalized adaptive neural network fuzzy inference controller with evolutionary simulated annealingGordon K. Lee. 1-6 [doi]
- Composite event processing in an active rule-based fuzzy XML database systemYing Jin 0001, Hemal J. Mehta. 7-10 [doi]
- A new equation for calculating the weight of fuzzy itemsetsRodrigo Moura Juvenil Ayres, Rafael Garcia Miani, Marilde Terezinha Prado Santos. 11-14 [doi]
- Selection of features for surname classificationLev Rachevsky, Ken Q. Pu. 15-20 [doi]
- Study of definable subsets in covering approximation spaces of rough setsNianbai Fan, Gongzhu Hu, Hui Liu. 21-24 [doi]
- Heuristic approaches for optimizing the performance of rule-based classifiersDanielle Azar, Haidar M. Harmanani. 25-31 [doi]
- Structural-model approach of causal reasoning in problem solving processesHicham Jabrouni, Bernard Kamsu Foguem, Laurent Geneste. 32-35 [doi]
- Web service discovery using semi-supervised Block Value DecompositionAmit Salunke, Minh Nguyen, Xumin Liu, Manjeet Rege. 36-41 [doi]
- A provenance-aware service repository for EAI process modeling toolsJorge Mínguez, Florian Niedermann, Bernhard Mitschang. 42-47 [doi]
- CommunityMashup a flexible social mashup based on a model-driven-approachPeter Lachenmaier, Florian Ott, Antonia Immerz, Alexander Richter. 48-51 [doi]
- Research 2.0: Research-supporting features of World Wide WebJoe Strathern, Samer Awadh, Samir Chokshi, M. Omair Shafiq, Reda Alhajj. 52-57 [doi]
- A survey of methods that transform data models into Ontology modelsKhalid M. Albarrak, Edgar H. Sibley. 58-65 [doi]
- Efficient and effective ranking in Top-k exploration for keyword search on RDFRoberto De Virgilio. 66-70 [doi]
- Mapping OWL ontologies to relational schemasDeise de Brum Saccol, Tobias de Campos Andrade, Eduardo Kessler Piveta. 71-76 [doi]
- A knowledge identification framework for the engineering of ontologies in system composition processesMitchell G. Gillespie, Hlomani Hlomani, Daniel Kotowski, Deborah A. Stacey. 77-82 [doi]
- Extensible Dynamic Form approach for supplier discoveryYan Kang, Jaewook Kim, Yun Peng. 83-87 [doi]
- DRiBAC: Fine-grained dynamic role interaction access control using ontologyYouna Jung, Minsoo Kim 0001, James B. D. Joshi. 88-93 [doi]
- Towards collaborative forensics: Preliminary frameworkMike Mabey, Gail-Joon Ahn. 94-99 [doi]
- Multi-rounds masking method against DPA attacksM. Yoshikawa, M. Sugiyama. 100-103 [doi]
- Information extraction from spam emails using stylistic and semantic features to identify spammersSoma Halder, Richa Tiwari, Alan Sprague. 104-107 [doi]
- Leveraging Service Oriented Architecture: A case study for ocean energy information managementAnte Bosnjak, Shihong Huang, James J. Mulcahy. 108-112 [doi]
- Simulation software as a service and Service-Oriented simulation experimentSong Guo, Fan Bai, Xiaolin Hu. 113-116 [doi]
- Exploiting the symbiotic aspects of process and operational data for optimizing business processesSylvia Radeschütz, Marko Vrhovnik, Holger Schwarz, Bernhard Mitschang. 117-122 [doi]
- Service composition recovery using formal concept analyst & WordNet similarityMohamed Maher, Haitham S. Hamza, Ramadan Moawad Mohamed. 123-128 [doi]
- Unity: Speeding the creation of community vocabularies for information integration and reuseKenneth P. Smith, Peter Mork, Len Seligman, Peter S. Leveille, Beth Yost, Maya Hao Li, Chris Wolf. 129-135 [doi]
- Unraveling complex relationships between heterogeneous omics datasets using local principal componentsNoor Alaydie, Farshad Fotouhi. 136-141 [doi]
- Automatic annotation of drosophila developmental stages using association classification and information integrationTao Meng, Mei-Ling Shyu. 142-147 [doi]
- Local as view information integration in the Semantic Model approachFereidoon Sadri. 148-153 [doi]
- Mining transcriptional association rules from breast cancer profile dataRakhi Malpani, Meiliu Lu, Du Zhang, Wing-Kin Sung. 154-159 [doi]
- Subjectivity classification and analysis of the ASRS corpusJason Switzer, Latifur Khan, Fahad Bin Muhaya. 160-165 [doi]
- Association rules mining based approach for Web usage miningMohamad Nagi, Abdallah M. ElSheikh, Iyad Suleiman, Peter Peng, Mohammad Rifaie, Keivan Kianmehr, Panagiotis Karampelas, Mick J. Ridley, Jon G. Rokne, Reda Alhajj. 166-171 [doi]
- Information reuse in hospital information systems: A data mining approachShusaku Tsumoto, Shoji Hirano, Yuko Tsumoto. 172-176 [doi]
- Learning Unified Famous Objects (UFO) to bootstrap information integrationMichael N. Gubanov, Linda G. Shapiro, Anna Pyayt. 177-180 [doi]
- Hierarchical disaster image classification for situation report enhancementYimin Yang, Hsin-Yu Ha, Fausto Fleites, Shu-Ching Chen, Steven Luis. 181-186 [doi]
- Aggregating metadata to improve access to resourcesMartin Wolpers, Martin Memmel, Katja Niemann, Joris Klerkx, Marcus Specht, Alberto Giretti, Erik Duval. 187-192 [doi]
- Retrieval, description and security: Towards the large-scale UI component-based reuse and integrationHao Han, Peng Gao, Keizo Oyama. 193-199 [doi]
- Multiple criteria decision support for software reuse: A case studyAlejandra Yepez Lopez, Nan Niu. 200-205 [doi]
- SAFE-CRITES: Developing safety-critical embedded systems supported by reuse techniquesRosana T. Vaccare Braga, Kalinka R. L. J. Castelo Branco, Onofre Trindade Júnior, Luciano de Oliveira Neris. 206-211 [doi]
- E-CAL: A formal language for software model evolutionSamuel A. Ajila. 212-217 [doi]
- FOZCIL: A framework for converting formal specifications in Object-Z to design contracts in OO programming languagesNixon Sunny George, Cui Zhang, Anne-Louise Radimsky. 218-221 [doi]
- Reusing a compound-based infrastructure for searching video storiesNádia P. Kozievitch, Jurandy Almeida, Ricardo da Silva Torres, André Santanchè, Neucimar J. Leite. 222-227 [doi]
- How do they compare? Automatic identification of comparable entities on the WebAlpa Jain, Patrick Pantel. 228-233 [doi]
- Comparison of approaches to alleviate problems with high-dimensional and class-imbalanced dataAhmad Abu Shanab, Taghi M. Khoshgoftaar, Randall Wald, Jason Van Hulse. 234-239 [doi]
- A noise-based stability evaluation of threshold-based feature selection techniquesWilker Altidor, Taghi M. Khoshgoftaar, Amri Napolitano. 240-245 [doi]
- Measuring effort in a corporate repositoryMichael VanHilst, Shihong Huang, James J. Mulcahy, Wayne Ballantyne, Ed Suarez-Rivero, Douglas Harwood. 246-252 [doi]
- System information quantification Based on combinatory patternsM. Yahyavi, Mohammad Vaziri, Suresh Vadhva. 253-257 [doi]
- Transfer learning capability of Evolving Logic NetworkMyoung Soo Park. 258-262 [doi]
- Efficient range query processing on uncertain dataAndrew Knight, Qi Yu, Manjeet Rege. 263-268 [doi]
- PLUS: A provenance manager for integrated informationAdriane Chapman, Barbara T. Blaustein, Len Seligman, M. David Allen. 269-275 [doi]
- An architecture to support information sources discovery through semantic searchVeronica dos Santos, Fernanda Araujo Baião, Asterio Tanaka. 276-282 [doi]
- Automatic English-Chinese name translation by using Web-Mining and phonetic similarityJen-Ming Chung, Fu-Yuan Hsu, Cheng-Yu Lu, Hahn-Ming Lee, Jan-Ming Ho. 283-287 [doi]
- Query and tag translation for Chinese-Korean cross-language social media retrievalYu-Chun Wang, Jian-Ting Chen, Richard Tzong-Han Tsai, Wen-Lian Hsu. 288-291 [doi]
- Network and profile based measures for user similarities on social networksCuneyt Gurcan Akcora, Barbara Carminati, Elena Ferrari. 292-298 [doi]
- Non-myopic active learning for recommender systems based on Matrix FactorizationRasoul Karimi, Christoph Freudenthaler, Alexandros Nanopoulos, Lars Schmidt-Thieme. 299-303 [doi]
- Novel supervised feature extraction algorithm based on iterative calculationsYohei Takeuchi, Momoyo Ito, Koji Kashihara, Minoru Fukumi. 304-308 [doi]
- Measuring robustness of Feature Selection techniques on software engineering datasetsHuanjing Wang, Taghi M. Khoshgoftaar, Randall Wald. 309-314 [doi]
- A comparative evaluation of feature ranking methods for high dimensional bioinformatics dataJason Van Hulse, Taghi M. Khoshgoftaar, Amri Napolitano. 315-320 [doi]
- READFAST: Browsing large documents through unified famous objects (UFO)Michael N. Gubanov, Anna Pyayt, Linda G. Shapiro. 321-326 [doi]
- Cost-effective condition-based inspection scheme for condition-based maintenanceHamid Reza Golmakani. 327-330 [doi]
- Implementation of automated knowledge-based Classification of Nursing Care CategoriesShihong Huang, Subhomoy Dass, Sam Hsu, Abhijit S. Pandya. 331-336 [doi]
- Improving the performance of the enterprise information system via optimal schedulingWeiwen Yang, Yanzhen Qu, Bo Sanden. 337-341 [doi]
- A respecification and extension of DeLone and McLean model of IS success in the citizen-centric e-governanceSeyed Mohammadbagher Jafari, Noor Azman Ali, Murali Sambasivan, Mohd Fuaad Said. 342-346 [doi]
- Induction of linear genetic programs for relational database manipulationGabriel Ambrosio Archanjo, Fernando J. Von Zuben. 347-352 [doi]
- A methodology to specify DEVS domain specific profiles and create profile-based modelsStéphane Garredu, Evelyne Vittori, Jean François Santucci, Dominique Urbani. 353-359 [doi]
- Invariant object description with inverse pyramid based on the truncated modified discrete Mellin-Fourier transformRoumen Kountchev, Stuart Harvey Rubin, Mariofanna G. Milanova, Roumiana Kountcheva. 360-365 [doi]
- Fourier transforms for vibration analysis: A review and case studyRandall Wald, Taghi M. Khoshgoftaar, John C. Sloan. 366-371 [doi]
- Language integration for model formalizationThouraya Bouabana-Tebibel. 372-377 [doi]
- Applying pattern structures to document and reuse components in component-based software engineering environmentsMarco Paludo, Sheila S. Reinehr, Andreia Malucelli, Lucas Bruzon, Pamela Pinho. 378-383 [doi]
- Clustering-based binary-class classification for imbalanced data setsChao Chen, Mei-Ling Shyu. 384-389 [doi]
- Effective supervised discretization for classification based on correlation maximizationQiusha Zhu, Lin Lin, Mei-Ling Shyu, Shu-Ching Chen. 390-395 [doi]
- CWJess: An expert system shell for computing with wordsElham Sahebkar Khorasani, Shahram Rahimi, Purvag Patel, Daniel Houle. 396-399 [doi]
- Graph partitioning using a Simulated Bee Colony algorithmJames D. McCaffrey. 400-405 [doi]
- Clinical guidelines as decision support for referrals from primary careVigdis Heimly, Øystein Nytrø. 406-411 [doi]
- Using image metadata for automatic patient staging in LymphomaSonja Zillner. 412-415 [doi]
- Self-supervised detection of disease reporting events in outbreak reportsAvare Stewart, Ernesto Diaz-Aviles, Alexandros Nanopoulos. 416-421 [doi]
- Link prediction and classification in social networks and its application in healthcareWadhah Almansoori, Shang Gao, Tamer N. Jarada, Reda Alhajj, Jon G. Rokne. 422-428 [doi]
- Facial nerve stream modeling for facial paralysis patients states evolutionJalel Akaichi, Wided Oueslati. 429-433 [doi]
- Determining exact fault location in a distribution network in presence of DGs using RBF neural networksHadi Zayandehroodi, Azah Mohamed, Hussain Shareef, Marjan Mohammadjafari. 434-438 [doi]
- Distributed generation issues, and standardsMohammad Vaziri, Suresh Vadhva, T. Oneal, Matthew Johnson. 439-443 [doi]
- Review of ferroresonance in power distribution gridsS. Hassan, Mohammad Vaziri, Suresh Vadhva. 444-448 [doi]
- Modeling and controlling 3D formations and flocking behavior of unmanned air vehiclesFethi Belkhouche, Suresh Vadhva, Mohammad Vaziri. 449-454 [doi]
- Is the Kolmogorov complexity of computational intelligence bounded above?Stuart Harvey Rubin. 455-461 [doi]
- Learning by body action: A virtual environment for refraction of lightNoriyuki Iwane, Toru Kawasaki, Masaru Okamoto, Yukihiro Matsubara. 462-467 [doi]
- Design based learning by knowledge reuse: Towards its application to e-learningNoriyuki Iwane, Hiroaki Ueda, Makoto Yoshida. 468-473 [doi]
- Dynamic contextual usage metadata for learning resource reuse in adaptive environmentsEddie Walsh, Rachael Rafter, Owen Conlan, Vincent Wade. 474-479 [doi]
- Macrocosmic analysis method for dynamic traffic flow based on hypernetworks of celluar automataTao Yang. 480-481 [doi]
- Adaptive fuzzy formation control for a nonholonomic robotic swarmFaridoon Shabaninia, Seyed Hamid Reza Abbasi. 482-483 [doi]
- Dynamic OSoS analysis using structure reorganization methodologyGuoli Yang, Baoxin Xiu, Wei Ming Zhang, Yong Zhang. 484-486 [doi]
- Mobile databases - Synchronization & conflict resolution strategies using SQL serverSamuel A. Ajila, Ahmed Al-Asaad. 487-489 [doi]
- A light weight substitution-based adaptation approachLu Chen, Randy Chow. 490-491 [doi]
- An embedded control architecture for smart wheelchair navigation via wireless networkYoucef Touati, Hania Aoudia, Ben Ali-Cherif. 492-493 [doi]
- Model based analysis of internet filtering systemsMohammad Moshirpour, Payman Mohassel, Behrouz H. Far. 494-495 [doi]
- Metamodels for models complete integrationSamia Benabdellah Chaouni, Mounia Fredj, Salma Mouline. 496-497 [doi]
- Software security: Application-level vulnerabilities in SCADA systemsSidney Valentine, Csilla Farkas. 498-499 [doi]
- A research on employing fuzzy composite concepts based on human reasoning through singleton and non-singleton fuzzificationSeyed Hamid Reza Abbasi, Faridoon Shabaninia. 500-501 [doi]
- Development of an automated decision system for selection of preoperative investigations based on cartesian product and gaussian distributionSamunya Tisavipat, Poonphon Suesaowaluk. 502-503 [doi]
- Prediction of pediatric injury by bayesian approach: A proposed framework for pre-diagnosis by automate systemSakda Arj-Ong, Poonphon Suesaowaluk. 504-506 [doi]
- Exploring the effects of enabling Web 2.0 in e-government servicesGeroli Peedu, David R. Lamas. 507-512 [doi]
- Trustworthy opportunistic sensing: A Social Computing ParadigmHenric Johnson, Niklas Lavesson, Daniela A. S. de Oliveira, Shyhtsun Felix Wu. 513-518 [doi]
- Simulating the effect of privacy concerns in online social networksNathalie Baracaldo, Claudia López, Mohd Anwar, Michael Lewis. 519-524 [doi]
- Integrated social information engineeringAlexander Wassell, Stuart Harvey Rubin, Eric G. Frost. 525-527 [doi]
- Software reuse methods to improve technological infrastructure for e-ScienceJames J. Marshall, Robert R. Downs, Chris A. Mattmann. 528-532 [doi]
- A heuristic calculus for transformative reasoning about social informationStuart Harvey Rubin. 533-538 [doi]
- Learning capabilities of agents in social systemsNguyen-Thinh Le, Lukas Martin, Niels Pinkwart. 539-544 [doi]
- A Cognitive-based scheme for user reliability and expertise assessment in Q&A social networksKonstantinos Pelechrinis, Vladimir Zadorozhny, Vladimir A. Oleshchuk. 545-550 [doi]
- Social network analysis of research collaboration in information reuse and integrationMin-Yuh Day, Sheng-Pao Shih, Weide Chang. 551-556 [doi]
- A model for navigation experience sharing through social navigation networks (SoNavNets)Hassan A. Karimi, Jessica G. Benner, Mohd M. Anwar. 557-560 [doi]