default search action
Data & Knowledge Engineering, Volume 66, 2008
Volume 66, Number 1, July 2008
- Christian Kop, Heinrich C. Mayr, Günther Fliedl, Elisabeth Métais:
Special issue on Natural Language Processing and Information Systems (NLDB 2006). 1-2 - Deryle W. Lonsdale, Clint Tustison, Craig G. Parker, David W. Embley:
Assessing clinical trial eligibility with logic expression queries. 3-17 - Jordi Conesa, Veda C. Storey, Vijayan Sugumaran:
Improving web-query processing through semantic knowledge. 18-34 - Epaminondas Kapetanios, Vijayan Sugumaran, Diana Tanase:
A parametric linguistics based approach for cross-lingual web querying. 35-52 - Leila Kosseim, Jamileh Yousefi:
Improving the performance of question answering with semantically equivalent answer patterns. 53-67
- Anthony J. T. Lee, Chun-Sheng Wang, Wan-Yu Weng, Yi-An Chen, Huei-Wen Wu:
An efficient algorithm for mining closed inter-transaction itemsets. 68-91 - Josep Aguilar-Saborit, Pedro Trancoso, Victor Muntés-Mulero, Josep Lluís Larriba-Pey:
Dynamic adaptive data structures for monitoring data streams. 92-115 - Efstratios Kontopoulos, Nick Bassiliades, Grigoris Antoniou:
Deploying defeasible logic rule bases for the semantic web. 116-146 - Mikel Egaña Aranguren, Chris Wroe, Carole A. Goble, Robert Stevens:
In situ migration of handcrafted ontologies to reason-able forms. 147-162 - Lavinia Egidi, Paolo Terenziani:
A modular approach to user-defined symbolic periodicities. 163-198
Volume 66, Number 2, August 2008
- Rafae Bhatti, Dengfeng Gao, Wen-Syan Li:
Enabling policy-based access control in BI applications. 199-222 - Maristela Holanda, Angelo Brayner, Sergio Fialho:
A self-adaptable scheduler for synchronizing transactions in dynamically configurable environments. 223-242 - Injun Choi, Jisoo Jung, Michael V. Mannino, Chulsoon Park:
Terminability and compensatibility of cycles in business processes with a process-oriented trigger. 243-263 - Shibnath Mukherjee, Madhushri Banerjee, Zhiyuan Chen, Aryya Gangopadhyay:
A privacy preserving technique for distance-based classification with worst case privacy guarantees. 264-288 - Man Lung Yiu, Nikos Mamoulis, Vagelis Hristidis:
Extracting k most important groups from data efficiently. 289-310 - Tsvetanka Georgieva:
Discovering branching and fractional dependencies in databases. 311-325 - Hassan Artail, Kassem Fawaz:
A fast HTML web page change detection approach based on hashing and reducing the number of similarity computations. 326-337 - Alok Sharma, Kuldip K. Paliwal:
Cancer classification by gradient LDA technique using microarray gene expression data. 338-347
Volume 66, Number 3, September 2008
- Yen-Liang Chen, Tony Cheng-Kui Huang:
A novel knowledge discovering model for mining fuzzy multi-level sequential patterns in sequence databases. 349-367 - Huimin Zhao, Sudha Ram:
Entity matching across heterogeneous data sources: An approach based on constrained cascade generalization. 368-381 - Feng-Cheng Lin, Chien-Yen Lai, Jen-Shin Hong:
Minimize presentation lag by sequencing media objects for auto-assembled presentations from digital libraries. 382-401 - Galina T. Bogdanova, Tsvetanka Georgieva:
Using error-correcting dependencies for collaborative filtering. 402-413 - Guillem Rull, Carles Farré, Ernest Teniente, Toni Urpí:
Validation of mappings between schemas. 414-437 - Barbara Weber, Manfred Reichert, Stefanie Rinderle-Ma:
Change patterns and change support features - Enhancing flexibility in process-aware information systems. 438-466 - Themis P. Exarchos, Markos G. Tsipouras, Costas Papaloukas, Dimitrios I. Fotiadis:
A two-stage methodology for sequence classification based on sequential pattern mining and optimization. 467-487
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.