Default Cover Image

2009 20th International Workshop on Database and Expert Systems Application. DEXA 2009

Aug. 31 2009 to Sept. 4 2009

Linz

Table of Contents

Papers
Conference InformationFreely available from IEEE.pp. xiv-xxxvi
Papers
A Survey of Scientific Approaches Considering the Integration of Security and Risk Aspects into Business Process ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 127-132
Papers
[Copyright notice]Freely available from IEEE.pp. iv
Papers
Table of contentsFreely available from IEEE.pp. v-xiii
Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
Formal Verification of Systems-on-Chip - Industrial Experiences and Scientific PerspectivesFull-text access may be available. Sign in or learn about subscription options.pp. 3
Papers
Clustering and Non-clustering Effects in Flash Memory DatabasesFull-text access may be available. Sign in or learn about subscription options.pp. 4-8
Papers
Specialized Embedded DBMS: Cell Based ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 9-13
Papers
Reliable Group Communication for Dynamic and Resource-Constrained EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 14-18
Papers
Pattern Recognition with Embedded Systems Technology: A SurveyFull-text access may be available. Sign in or learn about subscription options.pp. 19
Papers
Acceleration of RSA Cryptographic Operations Using FPGA TechnologyFull-text access may be available. Sign in or learn about subscription options.pp. 20-25
Papers
Towards Data-Centric Security in Ubiquitous Computing EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 26-30
Papers
Collaborative Reputation-based Voice Spam FilteringFull-text access may be available. Sign in or learn about subscription options.pp. 33-37
Papers
A Multi-Agent Approach to Testing Anti-Spam SoftwareFull-text access may be available. Sign in or learn about subscription options.pp. 38-42
Papers
Mail-ShakeFull-text access may be available. Sign in or learn about subscription options.pp. 43-47
Papers
Trustnet Architecture for E-mail CommunicationFull-text access may be available. Sign in or learn about subscription options.pp. 48-52
Performance Comparison of Secure Comparison ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 133-136
Papers
A Biologically Inspired Method of SPAM DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 53-56
Papers
Utilizing Semantic Web Technologies for Efficient Data Lineage and Impact Analyses in Data Warehouse EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 59-63
Papers
Personalized Handling of Semantic Data with MIGFull-text access may be available. Sign in or learn about subscription options.pp. 64-68
Papers
Temporal Semantics Extraction for Improving Web SearchFull-text access may be available. Sign in or learn about subscription options.pp. 69-73
Papers
Robust Service-Based Semantic Querying to Distributed Heterogeneous DatabasesFull-text access may be available. Sign in or learn about subscription options.pp. 74-78
Papers
RDFStats - An Extensible RDF Statistics Generator and LibraryFull-text access may be available. Sign in or learn about subscription options.pp. 79-83
Papers
Matching Semantic Web ResourcesFull-text access may be available. Sign in or learn about subscription options.pp. 84-88
Papers
DSNotify - Detecting and Fixing Broken Links in Linked Data SetsFull-text access may be available. Sign in or learn about subscription options.pp. 89-93
Papers
Integrating Structural Data into Methods for Labeling Relations in Domain OntologiesFull-text access may be available. Sign in or learn about subscription options.pp. 94-98
Papers
A Heuristic Approach to Generate Good-Quality Linked Data about HydrographyFull-text access may be available. Sign in or learn about subscription options.pp. 99-103
Papers
Multiparty Computation of Fixed-Point Multiplication and ReciprocalFull-text access may be available. Sign in or learn about subscription options.pp. 107-111
Papers
Inter-organizational Processes: Requirements for Securing DataFull-text access may be available. Sign in or learn about subscription options.pp. 112-116
Papers
Privacy Against the Business Partner: Issues for Realizing End-to-End Confidentiality in Web Service CompositionsFull-text access may be available. Sign in or learn about subscription options.pp. 117-121
Papers
Improving Practical Performance on Secure and Private Collaborative Linear ProgrammingFull-text access may be available. Sign in or learn about subscription options.pp. 122-126
Event Detection from Video Surveillance Data Based on Optical Flow Histogram and High-level Feature ExtractionFull-text access may be available. Sign in or learn about subscription options.pp. 221-225
Papers
Active Rules for Business Value ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 137-141
Papers
Pattern-Based Approach for Logical Traffic Isolation Forensic ModellingFull-text access may be available. Sign in or learn about subscription options.pp. 145-149
Papers
Integrating Security Patterns into the Electronic Invoicing ProcessFull-text access may be available. Sign in or learn about subscription options.pp. 150-154
Papers
Using Misuse Patterns for VoIP SteganalysisFull-text access may be available. Sign in or learn about subscription options.pp. 160-164
Papers
Improving the Classification of Security PatternsFull-text access may be available. Sign in or learn about subscription options.pp. 165-170
Papers
Towards a Generic Process for Security Pattern IntegrationFull-text access may be available. Sign in or learn about subscription options.pp. 171-175
Papers
Embedding Security Patterns into a Domain ModelFull-text access may be available. Sign in or learn about subscription options.pp. 176-180
Papers
The Secure Pipes and Filters PatternFull-text access may be available. Sign in or learn about subscription options.pp. 181-185
Accessing Libraries of Media Art through MetadataFull-text access may be available. Sign in or learn about subscription options.pp. 269-273
Papers
A Pattern for Secure Graphical User Interface SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 186-190
Papers
Mining Biological Sequences with MasksFull-text access may be available. Sign in or learn about subscription options.pp. 193-197
Papers
Large Scale Analysis of Small Repeats via Mining of the Human GenomeFull-text access may be available. Sign in or learn about subscription options.pp. 198-202
Papers
Performance Analysis of Algorithms for Protein Structure ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 203-207
Papers
Identification of Shadow Exons: Mining for Alternative Exons in Human, Mouse and Rat Comparative DatabasesFull-text access may be available. Sign in or learn about subscription options.pp. 208-212
Papers
Mining Maximal Frequent Subgraphs in KEGG Reaction NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 213-217
Use and Modeling of Multi-agent Systems in MedicineFull-text access may be available. Sign in or learn about subscription options.pp. 303-307
Papers
Random Methods for Fast Exploration of the Raw Video MaterialFull-text access may be available. Sign in or learn about subscription options.pp. 226-230
Papers
Motion Based Video Classification for SPRITE GenerationFull-text access may be available. Sign in or learn about subscription options.pp. 231-235
Papers
Content-Based Image Retrieval Using Gabor FilteringFull-text access may be available. Sign in or learn about subscription options.pp. 236-240
Papers
A Content Based Model for Image CategorizationFull-text access may be available. Sign in or learn about subscription options.pp. 241-245
Papers
A LEGO-like Metadata Architecture for Image Search & RetrievalFull-text access may be available. Sign in or learn about subscription options.pp. 246-250
Papers
Enhancing Person Annotation for Personal Photo Management ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 251-255
Papers
Music Segmentation With Genetic AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 256-260
Papers
A Method to Estimate Object Existence Based on Temporal Analysis of Web Pages for Digital Map CredibilityFull-text access may be available. Sign in or learn about subscription options.pp. 261-265
Papers
Multimodal Query Suggestion and Searching for Video SearchFull-text access may be available. Sign in or learn about subscription options.pp. 274-278
Papers
Accessible Multimodal Web Pages with Sign Language Translations for Deaf and Hard of Hearing UsersFull-text access may be available. Sign in or learn about subscription options.pp. 279-283
Papers
A Conceptual Framework for Adaptation and Personalization in Virtual EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 284-288
Papers
TMS for Multimodal Information ProcessingFull-text access may be available. Sign in or learn about subscription options.pp. 295-299
Papers
Federated Databases as a Basis for Infrastructure Supporting Epidemiological ResearchFull-text access may be available. Sign in or learn about subscription options.pp. 313-317
Papers
SUT-Miner: A Knowledge Mining and Managing System for Medical DatabasesFull-text access may be available. Sign in or learn about subscription options.pp. 318-322
Papers
Identification of Surgery Indicators by Mining Hospital Data: A Preliminary StudyFull-text access may be available. Sign in or learn about subscription options.pp. 323-327
Papers
Motif Discovery in Brain Networks of Patients with Somatoform Pain DisorderFull-text access may be available. Sign in or learn about subscription options.pp. 328-332
Papers
A Framework for Supporting the Composition of Biodiversity Informatics ResourcesFull-text access may be available. Sign in or learn about subscription options.pp. 350-354
Papers
Instance-Based Data Management -- Is it Useful for Biodiversity Informatics Applications?Full-text access may be available. Sign in or learn about subscription options.pp. 355-359
Papers
Automatic Cluster Number Selection Using a Split and Merge K-Means ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 363-367
Modeling Trajectories: A Spatio-Temporal Data Type ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 447-451
Papers
Clustering of Short Strings in Large DatabasesFull-text access may be available. Sign in or learn about subscription options.pp. 368-372
Papers
Automatic User Comment Detection in Flat Internet ForaFull-text access may be available. Sign in or learn about subscription options.pp. 373-377
Papers
Comparison Between Manually and Automatically Assigned Descriptors Based on a German Bibliographic CollectionFull-text access may be available. Sign in or learn about subscription options.pp. 378-382
Papers
Collection-Relative Representations: A Unifying View to Retrieval ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 383-387
Papers
Persian Language, Is Stemming Efficient?Full-text access may be available. Sign in or learn about subscription options.pp. 388-392
Papers
Improving Web Page Retrieval Using Search Context from Clicked Domain NamesFull-text access may be available. Sign in or learn about subscription options.pp. 393-397
Papers
Cubing Algorithms for XML DataFull-text access may be available. Sign in or learn about subscription options.pp. 407-411
Papers
[Roster]Freely available from IEEE.pp. 494
Papers
A Flexible Data Warehousing Approach for One-Stop Querying on Heterogeneous Personal InformationFull-text access may be available. Sign in or learn about subscription options.pp. 412-416
Papers
HShreX - A Tool for Design and Evaluation of Hybrid XML StorageFull-text access may be available. Sign in or learn about subscription options.pp. 417-421
Papers
On Different Perspectives of XML Data EvolutionFull-text access may be available. Sign in or learn about subscription options.pp. 422-426
Papers
The Role of Clustering in Search ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 432-436
Papers
Flexible Integrity Checking of Hard and Soft ConstraintsFull-text access may be available. Sign in or learn about subscription options.pp. 437-441
Papers
A New Upgrade to SQLf: Towards a Standard in Fuzzy DatabasesFull-text access may be available. Sign in or learn about subscription options.pp. 442-446
Papers
DAMSEL: A System for Progressive Querying and Reasoning on Movement DataFull-text access may be available. Sign in or learn about subscription options.pp. 452-456
Papers
RDF Visualization - Thinking BigFull-text access may be available. Sign in or learn about subscription options.pp. 459-463
Papers
Algorithms for Generating Ontology Based Visualization from Semantic Search ResultsFull-text access may be available. Sign in or learn about subscription options.pp. 464-468
Papers
Ontology Knowledge Authoring by Natural Language EmpowermentFull-text access may be available. Sign in or learn about subscription options.pp. 469-473
Papers
A Meta-Framework for Generating Ontologies from Legacy SchemasFull-text access may be available. Sign in or learn about subscription options.pp. 474-479
Papers
Building Ontologies from XML Data SourcesFull-text access may be available. Sign in or learn about subscription options.pp. 480-484
Papers
Designing and Maintaining XML Integrity ConstraintsFull-text access may be available. Sign in or learn about subscription options.pp. 485-489
Papers
Author IndexFreely available from IEEE.pp. 490-493
Showing 99 out of 99