Abstract is missing.
- Text versus non-text distinction in online handwritten documentsEmanuel Indermühle, Horst Bunke, Faisal Shafait, Thomas M. Breuel. 3-7 [doi]
- Enhancing document structure analysis using visual analyticsAndreas Stoffel, David Spretke, Henrik Kinnemann, Daniel A. Keim. 8-12 [doi]
- An automatic linking service of document images reducing the effects of OCR errors with latent semanticsRenato Bulcão Neto, José Antonio Camacho Guerrero, Alvaro Barreiro, Javier Parapar, Alessandra A. Macedo. 13-17 [doi]
- Structural handwritten and machine print classification for sparse content and arbitrary oriented document fragmentsSukalpa Chanda, Katrin Franke, Umapada Pal. 18-22 [doi]
- Seal object detection in document images using GHT of local component shapesPartha Pratim Roy, Umapada Pal, Josep Lladós. 23-27 [doi]
- Scalable indexing for layout based document retrieval and rankingLoïc Lecerf, Boris Chidlovskii. 28-32 [doi]
- Automatically detecting and classifying noises in document imagesRafael Dueire Lins, Serene Banerjee, Marcelo Thielo. 33-39 [doi]
- Exploring, visualizing and slicing the soul of XML documentsDaniela Carneiro da Cruz, Pedro Rangel Henriques. 40-46 [doi]
- Document retrieval using image featuresDan Smith, Richard Harvey. 47-51 [doi]
- Evaluation of different feature sets in an OCR free method for word spotting in printed documentsIsrael Rios, Alceu de Souza Britto Jr., Alessandro L. Koerich, Luiz S. Oliveira. 52-56 [doi]
- A novel framework to detect source code plagiarism: now, students have to work for real!Boris Lesner, Romain Brixtel, Cyril Bazin, Guillaume Bagan. 57-58 [doi]
- Text line detection and segmentation: uneven skew angles and hill-and-dale writingErgina Kavallieratou. 59-60 [doi]
- A dewarping algorithm to compensate volume binding distortion in scanned documentsRafael Dueire Lins, Daniel Marques de Oliveira, Gabriel Torreão, Jian Fan, Marcelo Thielo. 61-62 [doi]
- Quality and perceived usefulness of process modelsPeter Rittgen. 65-72 [doi]
- An APQC-PCF based framework to compare service offerings in business transformation projectsBiplav Srivastava, Pietro Mazzoleni. 73-78 [doi]
- A method for business process decomposition based on the separation of concerns principleArtur Caetano, António Rito Silva, José M. Tribolet. 79-85 [doi]
- Interaction refinement in the design of business collaborationsTeduh Dirgahayu, Dick A. C. Quartel, Marten van Sinderen. 86-93 [doi]
- New theoretical findings in multiple personalized recommendationsYong-Hyuk Kim, Yourim Yoon. 94-98 [doi]
- Exploring business value models from the inter-organizational collaboration perspectiveTharaka Ilayperuma, Jelena Zdravkovic. 99-105 [doi]
- Organizing master data management: findings from an expert surveyBoris Otto, Andreas Reichert. 106-110 [doi]
- A requirements elicitation framework and tool for sourcing business-IT aligned e-servicesSoonhwa Lee-Klenz, Pedro Sampaio, Trevor Wood-Harper. 111-117 [doi]
- Business modeling for service engineering: a case study in the IT outsourcing domainGregor Scheithauer, Holger Kett, Joachim Kaiser, Susanne Hackner, Hao Hu, Guido Wirtz. 118-123 [doi]
- An ontology-based semantic foundation for ARIS EPCsPaulo Sérgio Santos Jr., João Paulo A. Almeida, Giancarlo Guizzardi. 124-130 [doi]
- A method for application evaluations in context of enterprise architectureJan Stefan Addicks, Hans-Jürgen Appelrath. 131-136 [doi]
- Towards quality-aware development and evolution of enterprise information systemsOliver Hummel, Christof Momm, Susan Hickl. 137-144 [doi]
- A method for validating the compliance of business processes to business rulesBruno de Moura Araujo, Eber Assis Schmitz, Alexandre L. Correa, Antonio Juarez Alencar. 145-149 [doi]
- Towards a GOD-theory for organizational engineering: continuously modeling the continuous (re)generation, operation and deletion of the enterpriseDavid Aveiro, António Rito Silva, José M. Tribolet. 150-157 [doi]
- Goal and model driven design of an architecture for a care service platformLucas O. Meertens, Maria-Eugenia Iacob, Lambert J. M. Nieuwenhuis. 158-164 [doi]
- On the use of patterns to recover business processesRicardo Pérez-Castillo, Ignacio García Rodríguez de Guzmán, Mario Piattini. 165-166 [doi]
- Fact-oriented declarative semantic enterprise modelingPeter Bollen. 167-168 [doi]
- Software tools for requirements management in an ERP system contextBjörn Johansson, Rogério Atem de Carvalho. 169-170 [doi]
- Load-based covert channels between Xen virtual machinesKeisuke Okamura, Yoshihiro Oyama. 173-180 [doi]
- Task-aware based co-scheduling for virtual machine systemYuebin Bai, Cong Xu, Zhi Li. 181-188 [doi]
- A hybrid prefetch policy for the retrieval of link-associated information on vehicular networksJunghoon Lee, Gyung-Leen Park, Sang-Wook Kim, Hye-Jin Kim, Sung Y. Shin. 189-193 [doi]
- Energy efficient program updating for sensor nodes with flash memoryJunyoung Heo, Boncheol Gu, Sang Il Eo, PanKoo Kim, Gwangil Jeon. 194-200 [doi]
- Swap-before-hibernate: a time efficient method to suspend an OS to a flash driveShi-Wu Lo, Wei-shiuan Tsai, Jeng-gang Lin, Guan-shiung Cheng. 201-205 [doi]
- Performance and extension of user space file systemsAditya Rajgarhia, Ashish Gehani. 206-213 [doi]
- Hypervisor-based prevention of persistent rootkitsYosuke Chubachi, Takahiro Shinagawa, Kazuhiko Kato. 214-220 [doi]
- ::::Chordet::::: an efficient and transparent replication for improving availability of peer-to-peer networked systemsGeunyoung Park, Seokhyun Kim, Yookun Cho, Joongjin Kook, Jiman Hong. 221-225 [doi]
- An aspect-oriented framework for operating system evolutionJing Chen, Hui-Ming Su, Chien-Fu Chou. 226-230 [doi]
- Dynamic register-renaming scheme for reducing power-density and temperatureJungwook Kim, Seong Tae Jhang, Chu Shik Jhon. 231-237 [doi]
- ART: adaptive, reliable, and fault-tolerant task management for computational gridsSangho Yi, Jung Y. Kim, Hong Min, Bongjae Kim, Chang Oan Sung. 238-239 [doi]
- Virtual protocol stack interface for multiple wireless sensor network simulatorsJinman Jung, Yookun Cho, Yeongkwun Kim, Yoojin Chung, Bongchan Gim, Jiyoung Kwak. 240-241 [doi]
- ReSSD: a software layer for resuscitating SSDs from poor small random write performanceYoungjae Lee, Jin-Soo Kim, Seungryoul Maeng. 242-243 [doi]
- A general energy optimization model for wireless networks using configurable antennasSong Guo, Zhuzhong Qian, Sanglu Lu. 246-250 [doi]
- Energy efficient management scheme for heterogeneous secondary storage system in mobile computersShu Liu, Xu Cheng, Xuetao Guan, Dong Tong. 251-257 [doi]
- Energy-efficient real-time scheduling of multimedia tasks on multi-core processorsYi-Hung Wei, Chuan-Yue Yang, Tei-Wei Kuo, Shih-Hao Hung, Yuan-Hua Chu. 258-262 [doi]
- Dynamic optimization of power and performance for virtualized server clustersVinicius Petrucci, Orlando Loques, Daniel Mossé. 263-264 [doi]
- A deidealisation semantics for KAOSRichard Banach. 267-274 [doi]
- Early identification of crosscutting concerns in the domain model guided by statesLeandro Antonelli, Gustavo Rossi, Julio Cesar Sampaio do Prado Leite. 275-280 [doi]
- An experience in using a tool for evaluating a large set of natural language requirementsAntonio Bucchiarone, Stefania Gnesi, Alessandro Fantechi, Gianluca Trentanni. 281-286 [doi]
- Identifying and modeling aspectual scenarios with theme and MATAAna Sofia Penim, João Araújo. 287-291 [doi]
- Towards modular i* modelsFernanda M. R. Alencar, Jaelson Castro, Márcia Lucena, Emanuel Santos, Carla T. L. L. Silva, João Araújo, Ana Moreira. 292-297 [doi]
- Transparency versus security: early analysis of antagonistic requirementsClaudia Cappelli, Herbet de Souza Cunha, Bruno González-Baixauli, Julio Cesar Sampaio do Prado Leite. 298-305 [doi]
- ::::UbiCheck::::: an approach to support requirements definition in the ubicomp domainRodrigo O. Spínola, Felipe C. R. Pinto, Guilherme Horta Travassos. 306-310 [doi]
- An investigation into the notion of non-functional requirementsDewi Mairiza, Didar Zowghi, Nur Nurmuliani. 311-317 [doi]
- Using interaction requirements to operationalize usabilityHolger Röder. 318-319 [doi]
- Energy-aware dual-mode voltage scaling for weakly hard real-time systemsLinwei Niu. 321-325 [doi]
- RTTM: real-time transactional memoryMartin Schoeberl, Florian Brandner, Jan Vitek. 326-333 [doi]
- Profit and penalty aware (PP-aware) scheduling for tasks with variable task execution timeYue Yu, Shangping Ren, Nianen Chen, Xing Wang. 334-339 [doi]
- Sporadic Server revisitedDario Faggioli, Marko Bertogna, Fabio Checconi. 340-345 [doi]
- Load forecasting applied to soft real-time web clustersCarlos Santana, Julius C. B. Leite, Daniel Mossé. 346-350 [doi]
- Performance analysis of FlexRay-based systems using real-time calculus, revisitedDevesh B. Chokshi, Purandar Bhaduri. 351-356 [doi]
- Timing analyzing for systems with execution dependencies between tasksYue Lu, Thomas Nolte, Iain Bate. 357-358 [doi]
- Resource partitioning for real-time processing on a multicore architectureTullio Facchinetti, Matteo Foppiano. 359-360 [doi]
- Harnessing input redundancy in a MapReduce frameworkShin Gyu Kim, Hyuck Han, Hyungsoo Jung, Hyeonsang Eom, Heon Young Yeom. 362-366 [doi]
- Design of a market-based mechanism for quality attribute tradeoff of services in the cloudVivek Nallur, Rami Bahsoon. 367-371 [doi]
- Towards mobile process as a serviceSonja Zaplata, Winfried Lamersdorf. 372-379 [doi]
- A business driven cloud optimization architectureMarin Litoiu, C. Murray Woodside, Johnny Wong, Joanna Ng, Gabriel Iszlai. 380-385 [doi]
- CloudXplor: a tool for configuration planning in clouds based on empirical dataSimon Malkowski, Markus Hedwig, Deepal Jayasinghe, Calton Pu, Dirk Neumann. 391-398 [doi]
- Client-side load balancer using cloudSewook Wee, Huan Liu. 399-405 [doi]
- Semi-join computation on distributed file systems using map-reduce-merge modelMohamad Al Hajj Hassan, Mostafa Bamha. 406-413 [doi]
- Transparent security for cloudFlavio Lombardi, Roberto Di Pietro. 414-415 [doi]
- Fast, flexible, and highly resilient genuine fifo and causal multicast algorithmsNicolas Schiper, Fernando Pedone. 418-422 [doi]
- TransPeer: adaptive distributed transaction monitoring for Web2.0 applicationsIdrissa Sarr, Hubert Naacke, Stéphane Gançarski. 423-430 [doi]
- Exploiting non-functional preferences in architectural adaptation for self-managed systemsDaniel Sykes, William Heaven, Jeff Magee, Jeff Kramer. 431-438 [doi]
- S-search: finding RFID tags using scalable and secure search protocolMd. Endadul Hoque, Farzana Rahman, Sheikh Iqbal Ahamed. 439-443 [doi]
- Adaptive internet services through performance and availability controlJean Arnaud, Sara Bouchenak. 444-451 [doi]
- Improving complex distributed software system availability through information hidingLi Wang, Yair Leiferman, Shangping Ren, Kevin A. Kwiat, Xiaowei Li. 452-456 [doi]
- MetaSelf: an architecture and a development method for dependable self-* systemsGiovanna Di Marzo Serugendo, John S. Fitzgerald, Alexander Romanovsky. 457-461 [doi]
- Software adaptation patterns for service-oriented architecturesHassan Gomaa, Koji Hashimoto, Minseong Kim, Sam Malek, Daniel A. Menascé. 462-469 [doi]
- Dynamic context-aware business process: a rule-based approach supported by pattern identificationJose Felipe Mejia Bernal, Paolo Falcarin, Maurizio Morisio, Jia Dai. 470-474 [doi]
- Asynchronous Byzantine consensus with 2f+1 processesMiguel Correia, Giuliana Santos Veronese, Lau Cheuk Lung. 475-480 [doi]
- Reactive parallel processing for synchronous dataflowClaus Traulsen, Reinhard von Hanxleden. 483-490 [doi]
- Design and development of a real-time embedded inertial measurement unitTullio Facchinetti, Alberto Savioli, Emanuele Goldoni. 491-495 [doi]
- Application-guided tool development for architecturally diverse computationRoger D. Chamberlain, Jeremy Buhler, Mark A. Franklin, James H. Buckley. 496-501 [doi]
- Flash-aware cluster allocation method based on filename extension for FAT file systemSeungwoo Ryu, Chul Lee, Sanghyun Yoo, Sungjong Seo. 502-509 [doi]
- A fast multiplier-less edge detection accelerator for FPGAsNikos Anastasiadis, Isidoros Sideris, Kiamal Z. Pekmestzi. 510-515 [doi]
- Dynamic task set partitioning based on balancing resource requirements and utilization to reduce power consumptionDiana Bautista, Julio Sahuquillo, Houcine Hassan, Salvador Petit, José Duato. 521-526 [doi]
- A real-time architecture design language for multi-rate embedded control systemsJulien Forget, Frédéric Boniol, David Lesens, Claire Pagetti. 527-534 [doi]
- Efficient mapping and voltage islanding technique for energy minimization in NoC under design constraintsPavel Ghosh, Arunabha Sen. 535-541 [doi]
- Energy-efficient scheduling on homogeneous multiprocessor platformsJian-Jia Chen, Lothar Thiele. 542-549 [doi]
- Optimized Java Card transaction mechanism based on object localityDawei Zhang, Zhen Han, Wei Jin. 550-551 [doi]
- A hardware peripheral for Java bytecodes translation accelerationIsidoros Sideris, Nikos K. Moshopoulos, Kiamal Z. Pekmestzi. 552-553 [doi]
- Flash-aware record management methodDuck-Ho Bae, Ji-Woong Chang, Sang-Wook Kim. 554-555 [doi]
- Collaborative context management framework for mobile ad hoc network environmentsWaskitho Wibisono, Sea Ling, Arkady B. Zaslavsky. 558-562 [doi]
- Towards semantic-based adaptation decisions for context-aware mobile computingEdwin J. Y. Wei, Alvin T. S. Chan. 563-567 [doi]
- An indoor tracking algorithm with the virtual reference based positioningYile Wang, Junhuai Li, Jing Zhang, Lei Yu. 568-574 [doi]
- Considerations on developing mobile applications based on the Capuchin projectMarcio E. F. Maia, Claysson Celes, Rute Castro, Rossana M. C. Andrade. 575-579 [doi]
- Profit-based on-demand broadcast scheduling of real-time multi-item requestsJingsong Lv, Victor Lee, Minming Li, Enhong Chen. 580-584 [doi]
- On processing location based top-k queries in the wireless broadcasting systemHaRim Jung, Byung Ku Cho, Yon Dohn Chung, Ling Liu. 585-591 [doi]
- Towards in-network data prediction in wireless sensor networksTales Benigno Matos, Angelo Brayner, José Everardo Bessa Maia. 592-596 [doi]
- Evaluating the usability of a mobile content sharing gameAlton Yeow-Kuan Chua, Chei Sian Lee, Dion Hoe-Lian Goh, Keng Tiong Tan, Nguyen Anthony. 597-598 [doi]
- Mobile intelligent interruptions management (MIIM): a context aware unavailability systemKarl Stamm, Sheikh Iqbal Ahamed, Praveen Madiraju, Sina Zulkernain. 599-600 [doi]
- Uplink scheduling algorithm with dynamic polling management in IEEE 802.16 broadband wireless networksMarcio Andrey Teixeira, Paulo Roberto Guardieiro. 601-602 [doi]
- A data perturbation approach to sensitive classification rule hidingAggelos Delis, Vassilios S. Verykios, Achilleas A. Tsitsonis. 605-609 [doi]
- Privacy preserving linear discriminant analysis from perturbed dataSomnath Chakrabarti, Zhiyuan Chen, Aryya Gangopadhyay, Shibnath Mukherjee. 610-615 [doi]
- CNL4DSA: a controlled natural language for data sharing agreementsIlaria Matteucci, Marinella Petrocchi, Marco Luca Sbodio. 616-620 [doi]
- Secret interest groups (SIGs) in social networks with an implementation on FacebookAlessandro Sorniotti, Refik Molva. 621-628 [doi]
- An improved WLAN-first access scheme for UMTS/WLAN integrated systemSibaram Khara, Iti Saha Misra, Debashis Saha. 630-634 [doi]
- A multi-objective optimization approach for fault-tolerance provisioning in multi-radio hybrid wireless-optical broadband access networksGabriela Schütz, Noélia S. C. Correia. 635-640 [doi]
- Improving cost and accuracy of DPI traffic classifiersNiccolo Cascarano, Luigi Ciminiera, Fulvio Risso. 641-646 [doi]
- Mode independent session directory service architecture: a unified approach for ASM and SSM multicast networksPiyush Harsh, Richard Newman. 647-654 [doi]
- Load balancing for structured P2P networks using the advanced finger selection algorithm (AFSA)Jani Hautakorpi, Jouni Mäenpää. 655-662 [doi]
- Transport congestion events detection (TCED): towards decorrelating congestion detection from TCPPascal Anelli, Emmanuel Lochin, Fanilo Harivelo, Dino Martin Lopez. 663-669 [doi]
- Quality of service for multicasting using NICEMarc Brogle, Sebastian Barthlomé, Torsten Braun. 670-677 [doi]
- Concept for providing guaranteed service level over an array of unguaranteed commodity connectionsAntti Mäkelä. 678-683 [doi]
- Maintaining data reliability without availability in P2P storage systemsLluis Pamies-Juarez, Pedro García López. 684-688 [doi]
- MMSRP: multi-wavelength Markov-based split reservation protocol for DWDM optical networksMalabika Sengupta, Swapan Kumar Mondal, Debashis Saha. 689-693 [doi]
- SeRViSO: a selective retransmission scheme for video streaming in overlay networksCarlos Eduardo Lenz, Lau Cheuk Lung, Frank Augusto Siqueira. 694-698 [doi]
- A novel stable and low-maintenance clustering schemeLuís Conceição, David Palma, Marilia Curado. 699-705 [doi]
- CapaCon: access control mechanism for inter-device communications through TCP connectionsMitsuhiro Mabuchi, Yasushi Shinjo, Koji Hasebe, Akira Sato, Kazuhiko Kato. 706-712 [doi]
- Mitigating denial of capability attacks using sink tree based quota allocationZhang Fu, Marina Papatriantafilou, Philippas Tsigas, Wei Wei. 713-718 [doi]
- A new two level hierarchy structuring for node partitioning in ad hoc networksBenaouda Nacéra, Hervé Guyennet, Hammad Ahmed, Mostefai Mohammed. 719-726 [doi]
- Network state consistency of virtual machine in live migrationXingang Liu, Jinpeng Huai, Qin Li, Tianyu Wo. 727-728 [doi]
- A network polling solution through a P2P-based distributed management environmentCristina Melchiors, Alessandro H. dos Santos, Dionatan Mattjie, Carlos R. P. dos Santos, André Panisson, Lisandro Zambenedetti Granville, Liane Margarida Rockenbach Tarouco. 729-730 [doi]
- ::::ASTRAL::::: an adaptive, efficient, and reliable flooding mechanism for MANETJinman Jung, Yookun Cho, Yeongkwun Kim, Injoo Kim. 731-732 [doi]
- Dual-level defense for networks under DDoS attacksAnjali Sardana, Ramesh Chandra Joshi. 733-734 [doi]
- Integrating real-time hybrid task scheduling into a sensor node platformTaehoon Kim, Bora Kang, E. K. Park, Sungwoo Tak. 737-741 [doi]
- An operating system abstraction layer for portable applications in wireless sensor networksRamon Serna Oliver, Ivan Shcherbakov, Gerhard Fohler. 742-748 [doi]
- Towards higher throughput and energy efficiency in dense wireless ad hoc and sensor networksWei Zhou, Radu Stoleru. 749-755 [doi]
- Network-adaptive management of computation energy in wireless sensor networksFabrizio Mulas, Andrea Acquaviva, Salvatore Carta, Gianni Fenu, Davide Quaglia, Franco Fummi. 756-763 [doi]
- Leveraging fuzzy query processing to support applications in wireless sensor networksMarguerite Doman, Jamie Payton, Teresa Dahlberg. 764-771 [doi]
- Analysis of collision probability in unsaturated situationQian Dong, Waltenegus Dargie. 772-777 [doi]
- A group-based security policy for wireless sensor networksWilliam Claycomb, Rodrigo Lopes, Dongwan Shin, Byunggi Kim. 778-785 [doi]
- Dealing with application requirements and energy consumption in wireless sensor networks: a novelty detection approach for quality of query servicesAngelo Brayner, André L. V. Coelho, Karina Marinho de Souza. 786-790 [doi]
- Towards lightweight self-configuration in wireless sensor networksBenjamin Satzger, Faruk Bagci, Florian Kluge, Theo Ungerer. 791-792 [doi]
- Towards fine-grained and application-centric access control for wireless sensor networksNelson Matthys, Syed Rehan Afzal, Christophe Huygens, Sam Michiels, Wouter Joosen, Danny Hughes. 793-794 [doi]
- Mobile air pollution monitoring networkW. Hedgecock, Péter Völgyesi, Ákos Lédeczi, Xenofon D. Koutsoukos, Akram Aldroubi, Alexander S. Szalay, Andreas Terzis. 795-796 [doi]
- Trustworthy interaction balancing in mixed service-oriented systemsFlorian Skopik, Daniel Schall, Schahram Dustdar. 799-806 [doi]
- Investigating the influence of social computing applications on website qualityDion Hoe-Lian Goh, Alton Yeow-Kuan Chua. 807-811 [doi]
- Peer-to-peer collaboration in the lively kernelJanne Kuuskeri, Janne Lautamäki, Tommi Mikkonen. 812-817 [doi]
- A robust link-translating proxy server mirroring the whole webZiqing Mao, Cormac Herley. 818-825 [doi]
- Content cloaking: preserving privacy with Google Docs and other web applicationsGabriele D Angelo, Fabio Vitali, Stefano Zacchiroli. 826-830 [doi]
- Referrer graph: a low-cost web prediction algorithmB. de la Ossa, Ana Pont, Julio Sahuquillo, José A. Gil. 831-838 [doi]
- Integration of a human face annotation technology in an audio-visual search engine platformAlessandro Bozzon, Marco Brambilla, Piero Fraternali, Pasquale Pigazzini. 839-843 [doi]
- Of mice and terms: clustering algorithms on ambiguous terms in folksonomiesNicola Raffaele Di Matteo, Silvio Peroni, Fabio Tamburini, Fabio Vitali. 844-848 [doi]
- Separation of concerns in service-oriented applications based on pervasive design patternsCristian Mateos, Marco Crasso, Alejandro Zunino, Marcelo R. Campo. 849-853 [doi]
- A semantic web-based approach for personalizing newsKim Schouten, Philip Ruijgrok, Jethro Borsje, Flavius Frasincar, Leonard Levering, Frederik Hogenboom. 854-861 [doi]
- Avoiding to dispense with accuracy: a method to make different DTDs documents comparableMatteo Battistelli, Silvia Mirri, Ludovico Antonio Muratori, Paola Salomoni, Simone Spagnoli. 862-866 [doi]
- Expert finding in question-answering websites: a novel hybrid approachWei-Chen Kao, Duen-Ren Liu, Shiu-Wen Wang. 867-871 [doi]
- MOPSI location-based search engine: concept, architecture and prototypePasi Fränti, Juha Kuittinen, Andrei Tabarcea, Lomanzi Sakala. 872-873 [doi]
- Host-IP clustering technique for deep web characterizationDenis Shestakov, Tapio Salakoski. 874-875 [doi]
- Social music making on the web with CODESEvandro Manara Miletto, Marcelo Soares Pimenta, Jean-Paul Sansonnet, François Bouchet. 876-877 [doi]
- Standardized interoperable image retrievalMario Döller, Florian Stegmaier, Harald Kosch, Rubén Tous, Jaime Delgado. 880-886 [doi]
- RecoMap: an interactive and adaptive map-based recommenderAndrea Ballatore, Gavin McArdle, Caitriona Kelly, Michela Bertolotto. 887-891 [doi]
- Convex onion peeling genetic algorithm: an efficient solution to map labeling of point-featureWan D. Bae, Shayma Alkobaisi, Petr Vojtechovský, Sada Narayanappa, Kye Y. Bae. 892-899 [doi]
- CLEARMiner: a new algorithm for mining association patterns on heterogeneous time series from climate dataLuciana A. S. Romani, Ana Maria Heuminski de Ávila, Jurandir Zullo Jr., Richard Chbeir, Caetano Traina Jr., Agma J. M. Traina. 900-905 [doi]
- Modeling cardinal directions in the 3D space with the objects interaction cube matrixTao Chen, Markus Schneider. 906-910 [doi]
- A metrics suite for evaluating agent-oriented architecturesIván García-Magariño, Massimo Cossentino, Valeria Seidita. 912-919 [doi]
- Building an agent methodology from fragments: the MEnSA experienceMariachiara Puviani, Massimo Cossentino, Giacomo Cabri, Ambra Molesini. 920-927 [doi]
- JAAF+T: a framework to implement self-adaptive agents that apply self-testAndrew Diniz da Costa, Camila Nunes, Viviane Torres da Silva, Baldoino Fonseca dos Santos Neto, Carlos José Pereira de Lucena. 928-935 [doi]
- Towards the modeling reactive and proactive agents by using MAS-MLEnyo J. Tavares Gonçalves, Mariela I. Cortés, Gustavo A. Campos, Gilzamir F. Gomes, Viviane Torres da Silva. 936-937 [doi]
- An approach based upon OWL-S for method fragments documentation and selectionVincent Hilaire, Nicolas Gaud, Stéphane Galland, Abderrafiaa Koukam. 938-939 [doi]
- Semantic scene detection system for baseball videos based on the MPEG-7 specificationYin-Fu Huang, Lien-Hung Tung. 941-947 [doi]
- A new methodology for photometric validation in vehicles visual interactive systemsAlexandre W. C. Faria, David Menotti, Daniel S. D. Lara, Gisele L. Pappa, Arnaldo de Albuquerque Araújo. 948-953 [doi]
- A committee machine implementing the pattern recognition module for fingerspelling applicationsRenata C. B. Madeo, Sarajane Marques Peres, Helton Hideraldo Bíscaro, Daniel B. Dias, Clodis Boscarioli. 954-958 [doi]
- An improved K-view algorithm for image texture classification using new characteristic views selection methodsYihua Lan, Hong Liu, Enmin Song, Chih-Cheng Hung. 959-963 [doi]
- A morphologic three-stage approach for detecting exudates in color eye fundus imagesDaniel Welfer, Jacob Scharcanski, Diane Ruschel Marinho. 964-968 [doi]
- Automatic recognition of finger spelling for LIBRAS based on a two-layer architectureEdnaldo Brigante Pizzolato, Mauro dos Santos Anjo, Guilherme C. Pedroso. 969-973 [doi]
- Reparameterization based consistent graph-structured linear programsHongbo Zhou, Qiang Cheng, Zhikun She. 974-978 [doi]
- Automatic K-complex detection using Hjorth parameters and fuzzy decisionDaria Migotina, Agostinho Rosa, Ana L. N. Fred. 979-980 [doi]
- Image representation and classification based on data compressionNuo Zhang, Toshinori Watanabe. 981-982 [doi]
- Advanced motion detection for intelligent video surveillance systemsFan-Chieh Cheng, Shih-Chia Huang, Shanq-Jang Ruan. 983-984 [doi]
- MICHO: a scalable constraint-based algorithm for learning Bayesian networksMurugan Ayyappan, Yew Kwong Woon, Wee Keong Ng. 985-989 [doi]
- A rough set approach to mining connections from information systemsKen Kaneiwa. 990-996 [doi]
- Mining interesting sets and rules in relational databasesBart Goethals, Wim Le Page, Michael Mampaey. 997-1001 [doi]
- The impact of random samples in ensemble classifiersPaulo Fernandes, Lucelene Lopes, Duncan Dubugras A. Ruiz. 1002-1009 [doi]
- A Bayesian classifier for uncertain dataBiao Qin, Yuni Xia, Fang Li. 1010-1014 [doi]
- Probabilistic context prediction using time-inferred multiple pattern networksYong-Hyuk Kim, Wonkook Kim, Kyungsub Min, Yourim Yoon. 1015-1019 [doi]
- Malware detection based on mining API callsAshkan Sami, Babak Yadegari, Hossein Rahimi, Naser Peiravian, Sattar Hashemi, Ali Hamzeh. 1020-1025 [doi]
- ABBA: adaptive bicluster-based approach to impute missing values in binary matricesAlessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde. 1026-1033 [doi]
- Mining uncertain data for frequent itemsets that satisfy aggregate constraintsCarson Kai-Sang Leung, Boyu Hao, Dale A. Brajczuk. 1034-1038 [doi]
- A study on interestingness measures for associative classifiersMojdeh Jalali Heravi, Osmar R. Zaïane. 1039-1046 [doi]
- Mining preorder relation between knowledge units from textJun Liu, Lu Jiang, Zhaohui Wu, Qinghua Zheng, Ya-nan Qian. 1047-1053 [doi]
- Constrained colocation mining: application to soil erosion characterizationFrédéric Flouvat, Nazha Selmaoui-Folcher, Dominique Gay, Isabelle Rouet, Chloé Grison. 1054-1059 [doi]
- A persistent HY-Tree to efficiently support itemset mining on large datasetsElena Baralis, Tania Cerquitelli, Silvia Chiusano. 1060-1064 [doi]
- Transductive learning for spatial regression with co-trainingAnnalisa Appice, Michelangelo Ceci, Donato Malerba. 1065-1070 [doi]
- Complex objects ranking: a relational data mining approachMichelangelo Ceci, Annalisa Appice, Corrado Loglisci, Donato Malerba. 1071-1077 [doi]
- Mining models of exceptional objects through rule learningGianni Costa, Fabio Fassetti, Massimo Guarascio, Giuseppe Manco, Riccardo Ortale. 1078-1082 [doi]
- Eigenvector-based clustering using aggregated similarity matricesHans-Henning Gabriel, Myra Spiliopoulou, Alexandros Nanopoulos. 1083-1087 [doi]
- OASNET: an optimal allocation approach to influence maximization in modular social networksTianyu Cao, Xindong Wu, Song Wang, Xiaohua Hu. 1088-1094 [doi]
- Efficiently detecting clusters of mobile objects in the presence of dense noiseJames Rosswog, Kanad Ghose. 1095-1102 [doi]
- User-controlled generalization boundaries for ::::p::::-sensitive ::::k::::-anonymityAlina Campan, Traian Marius Truta, Nicholas Cooper. 1103-1104 [doi]
- Introducing global scaling parameters into NcutYiling Zeng, Hongbo Xu, Xueqi Cheng, Shuo Bai. 1105-1106 [doi]
- Mining temporal relationships among categoriesSaket S. R. Mengle, Nazli Goharian. 1107-1108 [doi]
- A generative pattern model for mining binary datasetsClaudio Lucchese, Salvatore Orlando, Raffaele Perego. 1109-1110 [doi]
- Canonical random correlation analysisJianchun Zhang, Daoqiang Zhang. 1111-1112 [doi]
- Background knowledge in formal concept analysis: constraints via closure operatorsRadim Belohlávek, Vilém Vychodil. 1113-1114 [doi]
- Link prediction using probabilistic group models of network structureAkira Ninagawa, Koji Eguchi. 1115-1116 [doi]
- Searching for knee regions in multi-objective optimization using mobile reference pointsSlim Bechikh, Lamjed Ben Said, Khaled Ghédira. 1118-1125 [doi]
- Evolutionary testing of object-oriented softwareLucas Serpa Silva, Maarten van Someren. 1126-1130 [doi]
- Evolutionary model tree inductionRodrigo C. Barros, Márcio P. Basgalupp, Duncan D. Ruiz, André Carlos Ponce Leon Ferreira de Carvalho, Alex Alves Freitas. 1131-1137 [doi]
- Probabilistic developmental program evolutionElmira Ghoulbeigi, Marcus Vinicius dos Santos. 1138-1142 [doi]
- Evolutionary metaheuristic for biclustering based on linear correlations among genesJuan A. Nepomuceno, Alicia Troncoso Lora, Jesús S. Aguilar-Ruiz. 1143-1147 [doi]
- Parallel genetic algorithm approaches applied to solve a synchronized and integrated lot sizing and scheduling problemClaudio Fabiano Motta Toledo, Lucas de Oliveira, Renato Resende Ribeiro de Oliveira, Marluce Rodrigues Pereira. 1148-1152 [doi]
- Hybrid evolutionary quantum inspired method to adjust time phase distortions in financial time seriesRicardo de A. Araújo, Adriano L. I. de Oliveira, Sérgio C. B. Soares. 1153-1154 [doi]
- Multi-objective evolutionary approach for solving facility layout problem using local searchKazi Shah Nawaz Ripon, Kyrre Glette, Mats Høvin, Jim Tørresen. 1155-1156 [doi]
- Input device for disabled persons using expiration and tooth-touch sound signalsKoichi Kuzume. 1159-1164 [doi]
- Visualizing time-series data in processlines: design and evaluation of a process enterprise applicationXiongFei Luo, Feng Tian, Wei Liu, Dongxing Teng, Guozhong Dai, Hongan Wang. 1165-1172 [doi]
- Scalable analysis of collective behaviour in smart service systemsMieke Massink, Michael D. Harrison, Diego Latella. 1173-1180 [doi]
- How to manage interactive dialogues of avatar agents by using 3D spatial information of virtual worldSeung-Hyun Ji, Jong Woo Kim, Taijin Yoon, Hwan-Gue Cho. 1181-1187 [doi]
- Where people and cars meet: social interactions to improve information sharing in large scale vehicular networksAnsar-Ul-Haque Yasar, Nasim Mahmud, Davy Preuveneers, Kris Luyten, Karin Coninx, Yolande Berbers. 1188-1194 [doi]
- Transformation templates: adding flexibility to model-driven engineering of user interfacesNathalie Aquino, Jean Vanderdonckt, Oscar Pastor. 1195-1202 [doi]
- Recognizing affect from non-stylized body motion using shape of Gaussian descriptorsLiyu Gong, Tianjiang Wang, Chengshuo Wang, Fang Liu, Fuqiang Zhang, Xiaoyuan Yu. 1203-1206 [doi]
- Semiotic inspection method in the context of educational simulation gamesDaniela Cristina Cascini Peixoto, Raquel Oliveira Prates, Rodolfo F. Resende. 1207-1212 [doi]
- Understanding meta-communication in an inclusive scenarioElaine Cristina Saito Hayashi, Maria Cecília Calani Baranauskas. 1213-1218 [doi]
- Summarizing observational client-side data to reveal web usage patternsVagner Figuerêdo de Santana, Maria Cecília Calani Baranauskas. 1219-1223 [doi]
- Reality cues-based interaction using whole-body awarenessAnderson Maciel, Luciana Porcher Nedel, Vitor A. M. Jorge, Juan M. T. Ibiapina, Luis F. M. S. Silva. 1224-1228 [doi]
- Collaborative interaction through spatially aware moving displaysAnderson Maciel, Luciana Porcher Nedel, Eduardo M. Mesquita, Marcelo H. Mattos, Gustavo M. Machado, Carla M. D. S. Freitas. 1229-1233 [doi]
- Towards interactionflows for smart productsMarcus Ständer. 1234-1235 [doi]
- Experiences in reading detection with EEG signalsInês Oliveira, Ovidiu Grigore, Nuno Guimarães, Carlos Duarte. 1236-1237 [doi]
- A format to design narrative multimedia applications for cultural heritage communicationElisa Rubegni, Nicoletta Di Blas, Paolo Paolini, Amalia Sabiescu. 1238-1239 [doi]
- Constraint-based LN-curvesYoung Joon Ahn, Christoph M. Hoffmann. 1242-1246 [doi]
- Polytope-based computation of polynomial rangesChristoph Fünfzig, Dominique Michelucci, Sebti Foufou. 1247-1252 [doi]
- Haptic manipulation of rational parametric planar cubics using shape constraintsChristoph Fünfzig, Philippe Thomin, Gudrun Albrecht. 1253-1257 [doi]
- Feature-based 3D morphing based on geometrically constrained sphere mapping optimizationTheodoris Athanasiadis, Ioannis Fudos, Christophoros Nikou, Vasiliki Stamati. 1258-1265 [doi]
- Blade geometry design with kinematic ruled surface approximationYayun Zhou, Jörg Schulze, Stefan Schäffler. 1266-1267 [doi]
- MSP algorithm: multi-robot patrolling based on territory allocation using balanced graph partitioningDavid Portugal, Rui Rocha. 1271-1276 [doi]
- Simulated annealing based algorithm for smooth robot path planning with different kinematic constraintsYi-Ju Ho, Jing-Sin Liu. 1277-1281 [doi]
- Tracking random finite objects using 3D-LIDAR in marine environmentsKwang Wee Lee, Bharath Kalyan, W. Sardha Wijesoma, Martin Adams, Franz S. Hover, Nicholas M. Patrikalakis. 1282-1287 [doi]
- Dispatching AGVs with noisy estimation of crane operation timeRi Choe, Taejin Park, Kwang Ryel Ryu. 1288-1293 [doi]
- Detecting narrow passages in configuration spaces via spectra of probabilistic roadmapsHassan Mohy-ud-Din, Abubakr Muhammad. 1294-1298 [doi]
- Coverage-hole trap model in target tracking using distributed relay-robot networkHuawei Miao, Chia-Ching Ooi, Xiaowen Wu, Christian Schindelhauer. 1299-1304 [doi]
- A supervisory control approach for safe behavior of service robot case study: FRIENDLeila Fotoohi, Axel Gräser. 1305-1306 [doi]
- Spanders: distributed spanning expandersShlomi Dolev, Nir Tzachar. 1309-1314 [doi]
- Chemotaxis-based sorting of self-organizing heterotypic agentsManolya Eyiyurekli, Linge Bai, Peter I. Lelkes, David E. Breen. 1315-1322 [doi]
- Gray networking: a step towards next generation computer networksPiyush Harsh, Randy Chow, Richard Newman. 1323-1328 [doi]
- Estimating node similarity from co-citation in a spatial graph modelJeannette Janssen, Pawel Pralat, Rory Wilson. 1329-1333 [doi]
- Infrastructureless storage in dynamic environmentsJose Luis Fernandez-Marquez, Josep Lluís Arcos, Giovanna Di Marzo Serugendo. 1334-1338 [doi]
- RDFSwarms: selforganized distributed RDF triple storeMarko Harasic, Anne Augustin, Philipp Obermeier, Robert Tolksdorf. 1339-1340 [doi]
- Towards automatic extraction of epistemic items from scientific publicationsTudor Groza, Siegfried Handschuh, Georgeta Bordea. 1341-1348 [doi]
- Ontologies and summarizability in OLAPTapio Niemi, Marko Niinimäki. 1349-1353 [doi]
- Extracting ontology concept hierarchies from text using Markov logicLucas Drumond, Rosario Girardi. 1354-1358 [doi]
- Semantic content distribution with aggregated profilesAhmad Ali Iqbal, Maximilian Ott, Aruna Seneviratne. 1359-1365 [doi]
- Semantics for intelligent delivery of multimedia contentIoan Marius Bilasco, Samir Amir, Patrick Blandin, Chabane Djeraba, Juhani Laitakari, Jean Martinet, Eduardo Martínez-Gracía, Daniel Pakkala, Mika Rautiainen, Mika Ylianttila, Jiehan Zhou. 1366-1372 [doi]
- External sorting for index construction of large semantic web databasesSven Groppe, Jinghua Groppe. 1373-1380 [doi]
- Evidential reasoning for the treatment of incoherent terminologiesEbrahim Bagheri, Faezeh Ensan. 1381-1387 [doi]
- Web-based graphical querying of databases through an ontology: the Wonder systemDiego Calvanese, C. Maria Keet, Werner Nutt, Mariano Rodriguez-Muro, Giorgio Stefanoni. 1388-1395 [doi]
- Semantically enabled business process discoveryMaría José Ibáñez, Gabriela Vulcu, Joaquin Ezpeleta, Sami Bhiri. 1396-1403 [doi]
- Dynamic linking and personalization on webMelike Sah, Wendy Hall, David De Roure. 1404-1410 [doi]
- Interchangeable consistency constraints for public health care systemsYvette Teiken, Stefan Brüggemann, Hans-Jürgen Appelrath. 1411-1416 [doi]
- A framework for handling revisions in distributed ontologiesFaezeh Ensan, Ebrahim Bagheri. 1417-1422 [doi]
- Towards the induction of terminological decision treesNicola Fanizzi, Claudia d Amato, Floriana Esposito. 1423-1427 [doi]
- Recovering uncertain mappings through structural validation and aggregation with the MoTo systemFloriana Esposito, Nicola Fanizzi, Claudia d Amato. 1428-1432 [doi]
- An ontology-based software framework to provide educational data miningTarsis Marinho, Evandro de Barros Costa, Diego Dermeval, Rafael Ferreira, Lucas M. Braz, Ig Ibert Bittencourt, Henrique Pacca Loureiro Luna. 1433-1437 [doi]
- Enhancing semantic search using case-based modular ontologyNesrine Ben Mustapha, Hajer Baazaoui Zghal, Marie-Aude Aufaure, Henda Hajjami Ben Ghézala. 1438-1439 [doi]
- The semantics of personalised web accessibility assessmentRui Lopes, Konstantinos Votis, Luís Carriço, Dimitrios Tzovaras, Spiridon D. Likothanassis. 1440-1441 [doi]
- ONTOMO: web-based ontology building system: ---instance recommendation using bootstrapping---I. Shin, Takahiro Kawamura, Hiroyuki Nakagawa, Ken Nakayama, Yasuyuki Tahara, Akihiko Ohsuga. 1442-1443 [doi]
- A review of approaches for representing RCC8 in OWLFrederik Hogenboom, Flavius Frasincar, Uzay Kaymak. 1444-1445 [doi]
- Inductive reasoning and semantic web searchClaudia d Amato, Floriana Esposito, Nicola Fanizzi, Bettina Fazzinga, Georg Gottlob, Thomas Lukasiewicz. 1446-1447 [doi]
- Evaluating trust in grid certificatesDavid O Callaghan, Louise Doran, Brian A. Coghlan. 1449-1450 [doi]
- Fraud detection in reputation systems in e-markets using logistic regressionRafael Maranzato, Adriano M. Pereira, Alair Pereira do Lago, Marden Neubert. 1454-1455 [doi]
- Computing multi-party trust privately: in ::::O::::(::::n::::) time units sending one (possibly large) message at a timeShlomi Dolev, Niv Gilboa, Marina Kopeetsky. 1460-1465 [doi]
- ::::iTrust::::: an integrated trust framework for wireless sensor networksKuldeep Yadav, Avinash Srinivasan. 1466-1471 [doi]
- T2D: a peer to peer trust management system based on disposition to trustRachid Saadi, Jean-Marc Pierson, Lionel Brunie. 1472-1478 [doi]
- Experimental study on the impact of robust watermarking on iris recognition accuracyJutta Hämmerle-Uhl, Karl Raab, Andreas Uhl. 1479-1484 [doi]
- A discriminated correlation classifier for face recognitionZhongkai Han, Chi Fang, Xiaoqing Ding. 1485-1490 [doi]
- Visual processing-inspired fern-audio features for noise-robust speaker verificationAnindya Roy, Sébastien Marcel. 1491-1495 [doi]
- Personal identification using periocular skin texturePhilip E. Miller, Allen W. Rawls, Shrinivas J. Pundlik, Damon L. Woodard. 1496-1500 [doi]
- Constrained Viterbi decoding for embedded user-customised password speaker recognitionAnthony Larcher, Jean-François Bonastre, John S. D. Mason. 1501-1502 [doi]
- Mistral: open source biometric platformEric Charton, Anthony Larcher, Christophe Levy, Jean-François Bonastre. 1503-1504 [doi]
- An incremental algorithm for efficient unique signature discoveries on DNA databasesHsiao Ping Lee, Tzu-Fang Sheu, Chuan Yi Tang. 1506-1510 [doi]
- A framework for cross-disciplinary hypothesis generationYue W. Webster, Ranga Chandra Gudivada, Ernst R. Dow, Jacob Koehler, Mathew J. Palakal. 1511-1515 [doi]
- Expression microarray classification using topic modelsManuele Bicego, Pietro Lovato, Barbara Oliboni, Alessandro Perina. 1516-1520 [doi]
- An improved algorithm to enumerate all traces that sort a signed permutation by reversalsChristian Baudet, Zanoni Dias. 1521-1525 [doi]
- Advanced querying interface for biochemical network databasesBrendan Elliott, Stephen Mayes, Ali Cakmak, Gultekin Özsoyoglu, Z. Meral Özsoyoglu. 1526-1533 [doi]
- A stochastic approach to candidate disease gene subnetwork extractionMohammad Shafkat Amin, Anupam Bhattacharjee, Russell L. Finley Jr., Hasan M. Jamil. 1534-1538 [doi]
- FANGS: high speed sequence mapping for next generation sequencersSanchit Misra, Ramanathan Narayanan, Simon Lin, Alok N. Choudhary. 1539-1546 [doi]
- PROM-OOGLE: data mining and integration of on-line databases to discover gene promotersDean Cheng, John Sheldon, Marcelo Marcet-Palacios, Osmar R. Zaïane. 1547-1551 [doi]
- Hypothesis generation and ranking based on event similaritiesTaiki Miyanishi, Kazuhiro Seki, Kuniaki Uehara. 1552-1558 [doi]
- g-tries: an efficient data structure for discovering network motifsPedro Manuel Pinto Ribeiro, Fernando M. A. Silva. 1559-1566 [doi]
- Virus DNA-fragment classification using taxonomic hidden Markov model profilesMark Menor, Kyungim Baek, Mahdi Belcaid, Yannick Gingras, Guylaine Poisson. 1567-1571 [doi]
- A cytoscape based framework for efficient sub-graph isomorphic protein-protein interaction motif lookupMohammad Shafkat Amin, Anupam Bhattacharjee, Hasan M. Jamil. 1572-1576 [doi]
- Making sense of unstructured flash-memory dumpsDavid Billard, Rolf Hauri. 1579-1583 [doi]
- The Dresden Image Database for benchmarking digital image forensicsThomas Gloe, Rainer Böhme. 1584-1590 [doi]
- e-mail authorship verification for forensic investigationFarkhund Iqbal, Liaquat A. Khan, Benjamin C. M. Fung, Mourad Debbabi. 1591-1598 [doi]
- Filtering the shadows from poorly illuminated photosCarlos A. B. Mello. 1599-1600 [doi]
- Fast file-type identificationIrfan Ahmed, Kyung-suk Lhee, Hyunjung Shin, Manpyo Hong. 1601-1602 [doi]
- A wavelet-based sampling algorithm for wireless sensor networks applicationsAndré L. L. de Aquino, Ricardo A. R. Oliveira, Elizabeth F. Wanner. 1604-1608 [doi]
- Data stream anomaly detection through principal subspace trackingPedro Henriques dos Santos Teixeira, Ruy Luiz Milidiú. 1609-1616 [doi]
- A fast approximation strategy for summarizing a set of streaming time seriesAlice Marascu, Florent Masseglia, Yves Lechevallier. 1617-1621 [doi]
- Online mining of temporal maximal utility itemsets from data streamsBai-En Shie, Vincent S. Tseng, Philip S. Yu. 1622-1626 [doi]
- Spatiotemporal sampling for trajectory streamsMohamed Khalil El Mahrsi, Christine Potier, Georges Hébrail, Fabrice Rossi. 1627-1628 [doi]
- Distributed data stream classification for wireless sensor networksMohamed Medhat Gaber, Ary Mazharuddin Shiddiqi. 1629-1630 [doi]
- A lightweight framework for testing database applicationsJoe Tang, Eric Lo. 1632-1637 [doi]
- A time optimal algorithm for evaluating tree pattern queriesYangjun Chen. 1638-1642 [doi]
- Target-based database synchronizationMadhu Ahluwalia, Ruchika Gupta, Aryya Gangopadhyay, Yelena Yesha, Michael McAllister. 1643-1647 [doi]
- Query systems in similarity-based databases: logical foundations, expressive power, and completenessRadim Belohlávek, Vilém Vychodil. 1648-1655 [doi]
- Wikipedia driven autonomous label assignment in wrapper induced tables with missing column namesMohammad Shafkat Amin, Anupam Bhattacharjee, Hasan M. Jamil. 1656-1660 [doi]
- Efficient shortest path finding of k-nearest neighbor objects in road network databasesSung-Hyun Shin, Sang-Chul Lee, Sang-Wook Kim, Junghoon Lee, Eul-Gyu Im. 1661-1665 [doi]
- A secure multiparty computation privacy preserving OLAP framework over distributed XML dataAlfredo Cuzzocrea, Elisa Bertino. 1666-1673 [doi]
- Empirical analysis of database server scalability using an N-tier benchmark with read-intensive workloadSimon Malkowski, Deepal Jayasinghe, Markus Hedwig, Junhee Park, Yasuhiko Kanemasa, Calton Pu. 1680-1687 [doi]
- A distributed protocol for ensuring replicated database consistency in mobile computing environmentsAlex Costa, José Maria Monteiro, Angelo Brayner. 1688-1693 [doi]
- WMS-extracting multiple sections data records from search engine results pagesJer-Lang Hong, Eu-Gene Siew, Simon Egerton. 1696-1701 [doi]
- Improving automatic music genre classification with hybrid content-based feature vectorsCarlos Nascimento Silla Jr., Alessandro L. Koerich, Celso A. A. Kaestner. 1702-1707 [doi]
- Adapting the tf idf vector-space model to domain specific information retrievalClaire Fautsch, Jacques Savoy. 1708-1712 [doi]
- LFRP-search: multi-layer ranked visual faceted search: an approach to cope with complex search situationsRaiko Eckstein, Andreas Henrich, Nadine Weber. 1713-1717 [doi]
- Extending relational algebra to handle bipolarityPatrick Bosc, Olivier Pivert, Amine Mokhtari, Ludovic Lietard. 1718-1722 [doi]
- Extending a hybrid tag-based recommender system with personalizationFrederico Araujo Durão, Peter Dolog. 1723-1727 [doi]
- Flexible document-query matching based on a probabilistic content and structure score combinationMohamed Benaouicha, Mohamed Tmar, Mohand Boughanem. 1728-1734 [doi]
- Addressing the limited scope problem of focused crawling using a result merging approachAri Pirkola, Tuomas Talvensaari. 1735-1740 [doi]
- Prediction of social bookmarking based on a behavior transition modelTadanobu Furukawa, Seishi Okamoto, Yutaka Matsuo, Mitsuru Ishizuka. 1741-1747 [doi]
- Feature selection for ordinal regressionStefano Baccianella, Andrea Esuli, Fabrizio Sebastiani. 1748-1754 [doi]
- Focused retrieval with proximity scoringMichel Beigbeder. 1755-1759 [doi]
- Combining global and local information for enhanced deep classificationHeung-Seon Oh, Yoonjung Choi, Sung-Hyon Myaeng. 1760-1767 [doi]
- Classification of violent web images using context based analysisRadhouane Guermazi, Mohamed Hammami, Abdelmajid Ben Hamadou. 1768-1773 [doi]
- Traveling among clusters: a way to reconsider the benefits of the cluster hypothesisSylvain Lamprier, Tassadit Amghar, Frédéric Saubion, Bernard Levrat. 1774-1780 [doi]
- A knowledge-rich similarity measure for improving IT incident resolution processYong-Bin Kang, Arkady B. Zaslavsky, Shonali Krishnaswamy, Claudio Bartolini. 1781-1788 [doi]
- Query-oriented clustering: a multi-objective approachSylvain Lamprier, Tassadit Amghar, Frédéric Saubion, Bernard Levrat. 1789-1795 [doi]
- Applying taxonomic knowledge to Bayesian belief network for personalized searchJae-Won Lee, Han-joon Kim, Sang-goo Lee. 1796-1801 [doi]
- Probabilistic anti-spam filtering with dimensionality reductionTiago A. Almeida, Akebo Yamakami, Jurandy Almeida. 1802-1806 [doi]
- Separating the reputation and the sociability of online community usersHyoseop Shin, Jeehoon Lee, Kyouhyun Hwang. 1807-1814 [doi]
- An adaptive information extraction system based on wrapper induction with POS taggingRinaldo Lima, Bernard Espinasse, Frederico Luiz Gonçalves de Freitas. 1815-1820 [doi]
- Using passage-based language model for opinion detection in blogsMalik Muhammad Saad Missen, Mohand Boughanem, Guillaume Cabanac. 1821-1822 [doi]
- ::::HMNews::::: a multimodal news data association frameworkMaurizio Montagnuolo, Alberto Messina, Marco Ferri. 1823-1824 [doi]
- OncoViz: a user-centric mining and visualization tool for cancer-related literatureZi Ning, Ji Soo Yi, Mathew J. Palakal, Anna M. McDaniel. 1827-1828 [doi]
- SMaC: spatial map caching technique for mobile devicesGerardo Pelosi, Giuseppe Psaila. 1829-1830 [doi]
- Ontology-based generation of IT-security metricsStefan Fenz. 1833-1839 [doi]
- An electronic-signature based circular resolution database systemThomas Zefferer, Thomas Knall. 1840-1845 [doi]
- TokDoc: a self-healing web application firewallTammo Krueger, Christian Gehl, Konrad Rieck, Pavel Laskov. 1846-1853 [doi]
- Filtering spams using the minimum description length principleTiago A. Almeida, Akebo Yamakami, Jurandy Almeida. 1854-1858 [doi]
- ADSandbox: sandboxing JavaScript to fight malicious websitesAndreas Dewald, Thorsten Holz, Felix C. Freiling. 1859-1864 [doi]
- CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farmsManuel Egele, Leyla Bilge, Engin Kirda, Christopher Kruegel. 1865-1870 [doi]
- Improving the efficiency of dynamic malware analysisUlrich Bayer, Engin Kirda, Christopher Kruegel. 1871-1878 [doi]
- Nudge: intermediaries role in interdependent network securityJens Grossklags, Svetlana Radosavac, Alvaro A. Cárdenas, John Chuang. 1879-1880 [doi]
- A framework for risk analysis in virtual directory securityWilliam Claycomb, Dongwan Shin. 1881-1882 [doi]
- PHOTOLAND: a new image layout system using spatio-temporal information in digital photosDong-Sung Ryu, Woo-Keun Chung, Hwan-Gue Cho. 1884-1891 [doi]
- XTemplate 3.0: adding semantics to hypermedia compositions and providing document structure reuseJoel André Ferreira dos Santos, Débora C. Muchaluat-Saade. 1892-1897 [doi]
- Subjective video quality assessment applied to scalable video coding and transmission instabilityLeonardo Crauss Daronco, Valter Roesler, José Valdeni de Lima. 1898-1904 [doi]
- Web-based image mattingYen-Chun Lin, Yi-Fang Hsieh, Hsiang-An Wang. 1905-1910 [doi]
- An approach to intelligently crop and scale video for broadcast applicationsJoerg Deigmoeller, Takebumi Itagaki, Gerhard Stoll, Norbert Just. 1911-1918 [doi]
- An evaluation of the sinuosity effect on visualization of RDP simplified maps: an empirical studyLuca Paolino, Monica Sebillo, Giuliana Vitiello, Genoveffa Tortora. 1919-1923 [doi]
- A novel music recommender by discovering preferable perceptual-patterns from music piecesJa-Hwung Su, Hsin-Ho Yeh, Vincent S. Tseng. 1924-1928 [doi]
- Distributed discrimination of media moments and media intervals: a Watch-and-Comment approachCésar A. C. Teixeira, Giliard B. Freitas, Maria da Graça Campos Pimentel. 1929-1935 [doi]
- Proposal of an improved motion estimation module for SVCRonaldo Husemann, Ricardo Kintschner, Valter Roesler, José Valdeni de Lima, Altamiro Amadeu Susin. 1936-1940 [doi]
- Listening the photosSergio Canazza, Antonina Dattolo. 1941-1945 [doi]
- NCL-inspector: towards improving NCL codeGustavo de Sá Carvalho Honorato, Simone Diniz Junqueira Barbosa. 1946-1947 [doi]
- Novel immune-based framework for securing ad hoc networksYasir Abdelgadir Mohamed, Azween B. Abdullah. 1950-1957 [doi]
- A simple role mining algorithmCarlo Blundo, Stelvio Cimato. 1958-1962 [doi]
- Can complexity, coupling, and cohesion metrics be used as early indicators of vulnerabilities?Istehad Chowdhury, Mohammad Zulkernine. 1963-1969 [doi]
- Detecting metamorphic malwares using code graphsJusuk Lee, Kyoochang Jeong, Heejo Lee. 1970-1977 [doi]
- Botzilla: detecting the phoning home of malicious softwareKonrad Rieck, Guido Schwenk, Tobias Limmer, Thorsten Holz, Pavel Laskov. 1978-1984 [doi]
- R-LEAP+: randomizing LEAP+ key distribution to resist replay and jamming attacksSam Blackshear, Rakesh M. Verma. 1985-1992 [doi]
- Using logic-based reduction for adversarial component recoveryJ. Todd McDonald, Eric D. Trias, Yong C. Kim, Michael R. Grimaila. 1993-2000 [doi]
- Cooperation enablement for centralistic early warning systemsUlrich Flegel, Johannes Hoffmann, Michael Meier. 2001-2008 [doi]
- Inter-DSL coordination support by combining megamodeling and model weavingFrédéric Jouault, Bert Vanhooff, Hugo Bruneliere, Guillaume Doux, Yolande Berbers, Jean Bézivin. 2011-2018 [doi]
- Agent-based coordination for the sensor webConor Muldoon, Richard Tynan, Gregory M. P. O Hare, Michael J. O Grady. 2019-2023 [doi]
- Agents & artefacts for multiple models coordination: objective and decentralized coordination of simulatorsJulien Siebert, Laurent Ciarletta, Vincent Chevrier. 2024-2028 [doi]
- Chemical-inspired self-composition of competing servicesMirko Viroli, Matteo Casadei. 2029-2036 [doi]
- Coordination in open and dynamic environments with TuCSoN semantic tuple centresElena Nardini, Mirko Viroli, Emanuele Panzavolta. 2037-2044 [doi]
- Towards the introduction of QoS information in a component modelSun Meng, Luís Soares Barbosa. 2045-2046 [doi]
- Box consistency through adaptive shavingAlexandre Goldsztejn, Frédéric Goualard. 2049-2054 [doi]
- Probabilistic constraints for reliability problemsElsa Carvalho, Jorge Cruz, Pedro Barahona. 2055-2060 [doi]
- Variable ranges in linear constraintsSalvatore Ruggieri, Fred Mesnard. 2061-2065 [doi]
- Constraint processing in relational database systems: from theory to implementationJames J. Lu, Sebastien Siva, Ojas Parekh, George H. L. Fletcher, Hantao Zhang. 2066-2070 [doi]
- Local lemma: a new strategy of pruning in SAT solversXiangxue Jia, Runming Lu, Sheng Liu, Jian Zhang 0001. 2071-2072 [doi]
- Relational consistency by constraint filteringShant Karakashian, Robert J. Woodward, Berthe Y. Choueiry, Christian Bessiere. 2073-2074 [doi]
- Scheduling intense applications most surprising firstSean Rooney. 2077-2084 [doi]
- Implicit invocation of traitsThomas Pawlitzki, Friedrich Steimann. 2085-2089 [doi]
- Named and default arguments for polymorphic object-oriented languages: a discussion on the design implemented in the Scala languageLukas Rytz, Martin Odersky. 2090-2095 [doi]
- Implementing software product lines using traitsLorenzo Bettini, Ferruccio Damiani, Ina Schaefer. 2096-2102 [doi]
- Embedded contract languagesManuel Fähndrich, Michael Barnett, Francesco Logozzo. 2103-2110 [doi]
- Generic flow-sensitive optimizing transformations in C++ with conceptsXiaolong Tang, Jaakko Järvi. 2111-2118 [doi]
- Design pattern implementation in object teamsJoão L. Gomes, Miguel P. Monteiro. 2119-2120 [doi]
- Software transactional memory for implicitly parallel functional languagePetr Krajca, Vilém Vychodil. 2123-2130 [doi]
- General constant expressions for system programming languagesGabriel Dos Reis, Bjarne Stroustrup. 2131-2136 [doi]
- Dual analysis for proving safety and finding bugsCorneliu Popeea, Wei-Ngan Chin. 2137-2143 [doi]
- An algorithm to generate the context-sensitive synchronized control flow graphMarisa Llorens, Javier Oliver, Josep Silva, Salvador Tamarit. 2144-2148 [doi]
- A new technique for data privatization in user-level threads and its use in parallel applicationsEduardo Rocha Rodrigues, Philippe Olivier Alexandre Navaux, Jairo Panetta, Celso L. Mendes. 2149-2154 [doi]
- Efficient inline caching without dynamic translationStefan Brunthaler. 2155-2156 [doi]
- Aho-Corasick like multiple subtree matching by pushdown automataTomás Flouri, Borivoj Melichar, Jan Janousek. 2157-2158 [doi]
- Expressing aspectual interactions in requirements engineering: experiences in the slot machine domainArturo Zambrano, Johan Fabry, Guillermo Jacobson, Silvia E. Gordillo. 2161-2168 [doi]
- Dynamic contract layersRobert Hirschfeld, Michael Perscheid, Christian Schubert, Malte Appeltauer. 2169-2175 [doi]
- Intensional changes: modularizing crosscutting featuresPeter Ebraert, Theo D Hondt, Tim Molderez, Dirk Janssens. 2176-2182 [doi]
- Using aspects and annotations to separate application code from design patternsRosario Giunta, Giuseppe Pappalardo, Emiliano Tramontana. 2183-2189 [doi]
- Semi-automated diagnosis of FODA feature diagramShin Nakajima. 2191-2197 [doi]
- An approach for architectural layer recoveryGiuseppe Scanniello, Anna D Amico, Carmela D Amico, Teodora D Amico. 2198-2202 [doi]
- Extraction of component-environment interaction model using state space traversalPavel Parizek, Nodir Yuldashev. 2203-2210 [doi]
- Data generation in model-based testingPadmanabhan Krishnan, Percy Antonio Pari Salas. 2211-2215 [doi]
- Dealing with anonymity in wireless sensor networksAlberto Coen-Porisini, Pietro Colombo, Sabrina Sicari. 2216-2223 [doi]
- SysML-based requirement modeling environment for multicore embedded systemChih-Hung Chang, Chih-Wei Lu, Nien-Lin Hsueh, William C. Chu, Chihhsiong Shih, Chao-Tung Yang, Pao-Ann Hsiung, Chorng-Shiuh Koong. 2224-2228 [doi]
- A study of relative redundancy in test-suite reduction while retaining or improving fault-localization effectivenessXin Zhang, Qing Gu, Xiang Chen, Jingxian Qi, Daoxu Chen. 2229-2236 [doi]
- Combining independent model transformationsAnne Etien, Alexis Muller, Thomas Legrand, Xavier Blanc. 2237-2243 [doi]
- Checking architectural compliance in component-based systemsSebastian Herold. 2244-2251 [doi]
- An approach to developing reusable domain services for service oriented applicationsJoonseok Park, Jeonghan Kim, Sanghyun Yun, Mikyeong Moon, Keunhyuk Yeom. 2252-2256 [doi]
- Modeling and analyzing architectural change with alloyKlaus Marius Hansen, Mads Ingstrup. 2257-2264 [doi]
- Graph-based verification of static program constraintsSelim Ciraci, Pim van den Broek, Mehmet Aksit. 2265-2272 [doi]
- SE-155 DBSA: a device-based software architecture for data miningJanne Kätevä, Perttu Laurinen, Taneli Rautio, Jaakko Suutala, Lauri Tuovinen, Juha Röning. 2273-2280 [doi]
- MatchBox: combined meta-model matching for semi-automatic mapping generationKonrad Voigt, Petko Ivanov, Andreas Rummler. 2281-2288 [doi]
- An overview and an empirical evaluation of UML-AOF: an UML profile for aspect-oriented frameworksJosé Uetanabara Júnior, Rosångela Dellosso Penteado, Valter Vieira de Camargo. 2289-2296 [doi]
- A multi-view model-driven approach for packaging software componentsAmine Lajmi, Mikal Ziane, Tewfik Ziadi, Sylvie Cauvin. 2297-2304 [doi]
- Monitoring MPI programs for performance characterization and management controlRobert A. Ballance, Jonathan Cook. 2305-2310 [doi]
- Refinement of models of software componentsZizhen Wang, Hanpin Wang, Naijun Zhan. 2311-2318 [doi]
- Quantitative assessments of key success factors in software process improvement for small and medium web companiesMuhammad Sulayman, Emilia Mendes. 2319-2323 [doi]
- An empirical study of requirements model understanding: ::::Use Case:::: vs. ::::Tropos:::: modelsIrit Hadar, Tsvi Kuflik, Anna Perini, Iris Reinhartz-Berger, Filippo Ricca, Angelo Susi. 2324-2329 [doi]
- Measuring the alignment between business processes and software systems: a case studyLerina Aversano, Carmine Grasso, Maria Tortorella. 2330-2336 [doi]
- Paving the road for formally defined architecture description in software developmentRainer Weinreich, Georg Buchgeher. 2337-2343 [doi]
- Modeling the variability of architectural patternsAhmad Waqas Kamal, Paris Avgeriou. 2344-2351 [doi]
- A formal approach to reuse successful traceability practices in SPL projectsAngelina Espinoza, Goetz Botterweck, Juan Garbajosa. 2352-2359 [doi]
- Feature interaction networksStefan Sobernig. 2360-2364 [doi]
- An empirical investigation on the relation between analysis models and source code comprehensionCarmine Gravino, Genoveffa Tortora, Giuseppe Scanniello. 2365-2366 [doi]
- Rationale visualization of software architectural design decision using compendiumMojtaba Shahin, Peng Liang, Mohammad-Reza Khayyambashi. 2367-2368 [doi]
- Assessing the impact of refactoring activities on the JHotDraw projectIshwor Thapa, Harvey P. Siy. 2369-2370 [doi]
- A meta model for representing arbitrary meta model hierarchiesBernhard Volz. 2371-2372 [doi]
- Sub-clone refactoring in open source software artifactsRobert Tairas, Jeffrey G. Gray. 2373-2374 [doi]
- Accelerating multi-core simulatorsAparna Mandke Dani, Keshavan Varadarajan, Bharadwaj Amrutur, Y. N. Srikant. 2377-2382 [doi]
- A two stage yard crane workload partitioning and job sequencing algorithm for container terminalsXi Guo, Shell-Ying Huang. 2383-2388 [doi]
- Identification and control of intrinsic bias in a multiscale computational model of drug addictionYariv Z. Levy, Dino Levy, Jerrold S. Meyer, Hava T. Siegelmann. 2389-2393 [doi]
- Modeling POMDPs for generating and simulating stock investment policiesAugusto Cesar Espíndola Baffa, Angelo E. M. Ciarlini. 2394-2399 [doi]
- Using surface effect measures to model parallel performanceBelgacem Ben Youssef. 2400-2401 [doi]
- A simulation of large-scale groundwater flow on CUDA-enabled GPUsXiaohui Ji, Tangpei Cheng, Qun Wang. 2402-2403 [doi]
- Data-aware design and verification of service compositions with Reo and mCRL2Natallia Kokash, Christian Krause, Erik P. de Vink. 2406-2413 [doi]
- Dynamic set-up of monitoring infrastructures for service based systemsMarco Comuzzi, George Spanoudakis. 2414-2421 [doi]
- Using XML schema to improve writing, validation, and structure of WS-policiesSteffen Heinzl, Benjamin Schmeling. 2422-2429 [doi]
- Exploiting assumption-based verification for the adaptation of service-based applicationsAndreas Gehlert, Antonio Bucchiarone, Raman Kazhamiakin, Andreas Metzger, Marco Pistore, Klaus Pohl. 2430-2437 [doi]
- A tool for rapid development of WS-BPEL applicationsLuca Cesari, Alessandro Lapadula, Rosario Pugliese, Francesco Tiezzi. 2438-2442 [doi]
- A service-based context management framework for cross-enterprise collaborationFatih Turkmen, Bruno Crispo, Pietro Mazzoleni. 2443-2450 [doi]
- A well-founded approach to service modelling with Casl4Soa: part 1 (service in isolation)Christine Choppy, Gianna Reggio. 2451-2458 [doi]
- ESB federation for large-scale SOAFrançoise Baude, Imen Filali, Fabrice Huet, Virginie Legrand Contes, Elton N. Mathias, Philippe Merle, Cristian Ruz, Reto Krummenacher, Elena Paslaru Bontas Simperl, Christophe Hammerling, Jean-Pierre Lorré. 2459-2466 [doi]
- Adaptive fuzzy-valued service selectionDavide Bacciu, Maria Grazia Buscemi, Lusine Mkrtchyan. 2467-2471 [doi]
- A standard-driven implementaion of WS-BPEL 2.0Tim Hallwyl, Fritz Henglein, Thomas Hildebrandt. 2472-2476 [doi]
- A heterogeneous approach to service-oriented systems specificationAlexander Knapp, Grzegorz Marczynski, Martin Wirsing, Artur Zawlocki. 2477-2484 [doi]
- Cross-organizational process monitoring based on service choreographiesBranimir Wetzstein, Dimka Karastoyanova, Oliver Kopp, Frank Leymann, Daniel Zwink. 2485-2490 [doi]
- Can domain-specific languages be implemented by service-oriented architecture?Shih-Hsi Liu, Adam Cardenas, Xang Xiong, Marjan Mernik, Barrett R. Bryant, Jeffrey G. Gray. 2491-2492 [doi]
- Publication and discovery of YASA web servicesYassin Chabeb, Samir Tata. 2493-2494 [doi]
- Comparison of enterprise service buses based on their support of high availabilityIrina Astrova, Arne Koschel, Tobias Kruessmann. 2495-2496 [doi]
- Time and alternation: an automata based framework to software model checkingAbdelaziz Fellah. 2498-2502 [doi]
- Proving consistency of VDM models using HOLSander Vermolen, Jozef Hooman, Peter Gorm Larsen. 2503-2510 [doi]
- Reachability analysis of GSPDIs: theory, optimization, and implementationHallstein Asheim Hansen, Gerardo Schneider. 2511-2516 [doi]
- A machine-checked soundness proof for an efficient verification condition generatorFrédéric Vogels, Bart Jacobs 0002, Frank Piessens. 2517-2522 [doi]
- Checking concurrent contracts with aspectsEric Kerfoot, Steve McKeever. 2523-2530 [doi]
- Design-level metrics estimation based on code metricsAshkan Sami, Seyed Mostafa Fakhrahmad. 2531-2535 [doi]
- Formal analysis of policy-based self-adaptive systemsNarges Khakpour, Ramtin Khosravi, Marjan Sirjani, Saeed Jalili. 2536-2543 [doi]
- Programming assistance based on contracts and modular verification in the automation domainDominik Hurnaus, Herbert Prähofer. 2544-2551 [doi]