default search action
6. ICDIM 2011: Melbourne, Australia
- Sixth IEEE International Conference on Digital Information Management, ICDIM 2011, Melbourne, Australia, September 26-28, 2011. IEEE 2011, ISBN 978-1-4577-1538-9
- Md. Sumon Shahriar, Jixue Liu:
On mining association rules with semantic constraints in XML. 1-5 - Fariba Khademolghorani:
An effective algorithm for mining association rules based on imperialist competitive algorithm. 6-11 - Eya Ben Ahmed, Ahlem Nabli, Faïez Gargouri:
Mining cyclic association rules from multidimensional knowledge. 12-17 - Tieta Antaresti, Mohamad Ivan Fanany, Aniati Murni Arymurthy:
Maintaining imbalance highly dependent medical data using dirichlet process data generation. 18-22 - Stanislav Fajt, Irena Mlynkova, Martin Necaský:
On mining XML integrity constraints. 23-29 - Khalid Iqbal, Sohail Asghar, Simon Fong:
A PPDM model using Bayesian Network for hiding sensitive XML Association Rules. 30-35 - Gabriele Di Chiara, Luca Paolino, Marco Romano, Monica Sebillo, Genny Tortora, Giuliana Vitiello, Athula Ginige:
The Framy user interface for visually-impaired users. 36-41 - Alton Yeow-Kuan Chua, Radhika Shenoy Balkunje, Dion Hoe-Lian Goh:
Evaluation of disaster management portals: Applying knowledge management to digital information. 42-47 - Elise Desmier, Frédéric Flouvat, Benoît Stoll, Nazha Selmaoui-Folcher:
Coconut fields classification using data mining on a large database of high-resolution Ikonos images. 48-53 - Jun Wu, Xiaodong Li, Xin Wang, Baoping Yan:
DNS usage mining and its two applications. 54-60 - Anwar Alhenshiri, Hoda Badesh:
The effect of user search behaviour on web information gathering tasks. 61-66 - Ingyu Lee, Byung-Won On:
Weighted hybrid features to resolve mixed entities. 67-72 - Michal Krátký, Radim Baca, David Bednar, Jirí Walder, Jiri Dvorský, Peter Chovanec:
Index-based n-gram extraction from large document collections. 73-78 - Fahad Alahmari:
Evaluating SPARQL using query federation and link traversal. 79-84 - Liliana Alexandre, Jorge Coelho:
Filtering XML content for publication and presentation on the web. 85-89 - Mansour Alsulaiman, Muhammad Ghulam, Zulfiqar Ali:
Comparison of voice features for Arabic speech recognition. 90-95 - Htwe Pa Pa Win, Phyo Thu Thu Khine, Khin Nwe Ni Tun:
Converting Myanmar printed document image into machine understandable text format. 96-101 - Ashfa Umber, Imran Sarwar Bajwa:
Minimizing ambiguity in natural language software requirements specification. 102-107 - Dongeun Lee, Sunghoon Choi:
Multisensor fusion-based object detection and tracking using Active Shape Model. 108-114 - Ales Mishchenko, Natalia Vassilieva:
Chart image understanding and numerical data extraction. 115-120 - Phyo Thu Thu Khine, Htwe Pa Pa Win, Khin Nwe Ni Tun:
Keyword searching and browsing system over relational databases. 121-126 - Agus Widodo, Mohamad Ivan Fanany, Indra Budi:
Technology forecasting in the field of Apnea from online publications: Time series analysis on Latent Semantic. 127-132 - A. N. K. Zaman, Pascal Matsakis, Charles Grant Brown:
Evaluation of stop word lists in text retrieval using Latent Semantic Indexing. 133-136 - Han Wang, Bo Lang:
Online ngram-enhanced topic model for academic retrieval. 137-142 - Sameendra Samarawickrama, Lakshman Jayaratne:
Automatic text classification and focused crawling. 143-148 - Zeynab Amiri, Masoud Sabae:
Prediction of hotspot in data centric storage. 149-153 - Talha Anwar, Sohail Asghar, Simon Fong:
Bayesian based subgroup discovery. 154-161 - Rui Tang, Simon Fong, Sababady Sarasvady:
Expert finding and query answering for Collaborative Inter-Organizational system by using Rule Responder. 162-167 - Jean-Pierre Nziga:
Minimal dataset for Network Intrusion Detection Systems via dimensionality reduction. 168-173 - Imran Sarwar Bajwa, Rubata Riasat:
A new perfect hashing based approach for secure stegnograph. 174-178 - Elvis Pontes, Adilson Eduardo Guelfi, Sergio Takeo Kofuji, Anderson Aparecido Alves da Silva:
Applying multi-correlation for improving forecasting in cyber security. 179-186 - Dina Sadat Jalali, Alireza Shahrbanoonezhad:
A new method based on Finite State Machine for detecting misbehaving nodes in ad hoc networks. 187-192 - Rosziati Ibrahim, Teoh Suk Kuan:
PRIS: Image processing tool for dealing with criminal cases using steganography technique. 193-198 - Anne Gabrielle Bowitz, Espen Grannes Graarud, Lawrie Brown, Martin Gilje Jaatun:
BatCave: Adding security to the BATMAN protocol. 199-204 - N. Parimala, Anu Saini:
Web service with criteria: Extending WSDL. 205-210 - Junpei Kawamoto, Masatoshi Yoshikawa:
Private range query by perturbation and matrix based encryption. 211-216 - Rayed AlGhamdi, Steve Drew, Mohammed Alshehri:
Strategic government initiatives to promote diffusion of online retailing in Saudi Arabia. 217-222 - Sven Groppe, Jinghua Groppe, Stefan Werner, Matthias Samsel, Florian Kalis, Kristina Fell, Peter Kliesch, Markus Nakhlah:
Monitoring eBay auctions by querying RDF streams. 223-228 - Alan C. Lin, Ho Minh Tuan, Dean K. Sheu:
Programming for evaluating strip layout of progressive dies. 229-234 - A. O. García, Serguei Bourov, Ahmad Hammad, Thomas Jejkal, Jens C. Otte, Sven Pfeiffer, T. Schenker, Christian Schmidt, Jos van Wezel, Bernhard Neumair, Achim Streit:
Data management and analysis at the Large Scale Data Facility. 235-241 - Martin Necaský, Jakub Klímek, Jakub Malý:
When theory meets practice: A case report on conceptual modeling for XML. 242-251 - Takao Shime, Kazuo Kunieda, Keiji Yamada, Hideki Kawai:
Area-based communication detector. 252-257 - Guanghao Low, Dion Hoe-Lian Goh, Chei Sian Lee:
A study of motivations for using mobile content sharing games. 258-263 - Kazunari Ishida:
Geo-local contents system with mobile devices. 264-269 - Yoshio Ishizawa, Dai Kusui, Hironori Mizuguchi, Yukitaka Kusumura, Yusuke Muraoka:
A method for conversational topic recommendation to appropriate user group. 270-275 - Shirlee-ann Knight:
Information management in health systems: Considering an organic approach. 276-281 - Mahdi Jalili:
Discriminating early stage AD patients from healthy controls using synchronization analysis of EEG. 282-287 - Md. Sumon Shahriar, Paulo A. de Souza Jr., Greg P. Timms:
Pattern mining for query answering in marine sensor data. 288-293 - Ning Li, Zhanhuai Li, Yanming Nie, Xiling Sun, Xia Li:
Predicting software black-box defects using stacked generalization. 294-299 - Reza Reyhani, Amir-Masoud Eftekhari-Moghadam:
A heuristic method for forecasting chaotic time series based on economic variables. 300-304 - Bafrin Zarei, Reza Ghanbarzadeh, Poorya Khodabande, Hadi Toofani:
MHPSO: A new method to enhance the Particle Swarm Optimizer. 305-309 - Divesh Lala, Sutasinee Thovutikul, Toyoaki Nishida:
Towards a virtual environment for capturing behavior in cultural crowds. 310-315 - Nicolas Jones, Armelle Brun, Anne Boyer:
Improving reliability of user preferences: Comparing instead of rating. 316-321 - Faaizah Shahbodin, Mariana Yusoff, Che Ku Nuraini Che Ku Mohd:
ICT + PBL = holistic learning solution: UTeM's experience. 322-326 - Nada Bajnaid, Rachid Benlamri, Boris I. Cogan:
Context-aware SQA e-learning system. 327-331 - Fattaneh Mimhashemi, Amir Albadavi, Abbas Asosheh, Mohammad Ghaem Tajgardoon:
A service-based grid computing model to apply in the universities and institutes. 332-336 - Zhuojia Xu, Xun Yi:
Classification of Privacy-preserving Distributed Data Mining protocols. 337-342 - Yusuke Gotoh, Kentaro Suzuki, Tomoki Yoshihisa, Hideo Taniguchi, Masanori Kanazawa:
Evaluation of P2P streaming systems for webcast. 343-350 - Wejdan Alkaldi, Fereidoon Sadri:
Query optimization in information integration for queries involving aggregation and group by. 351-358
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.