Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
DEXA
DEXA 2009
Generate Citations
2009 20th International Workshop on Database and Expert Systems Application. DEXA 2009
Aug. 31 2009 to Sept. 4 2009
Linz
Table of Contents
Papers
Conference Information
Freely available from IEEE.
pp. xiv-xxxvi
Papers
A Survey of Scientific Approaches Considering the Integration of Security and Risk Aspects into Business Process Management
Full-text access may be available. Sign in or learn about subscription options.
pp. 127-132
Papers
[Copyright notice]
Freely available from IEEE.
pp. iv
Papers
Table of contents
Freely available from IEEE.
pp. v-xiii
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Papers
Formal Verification of Systems-on-Chip - Industrial Experiences and Scientific Perspectives
Full-text access may be available. Sign in or learn about subscription options.
pp. 3
by
Dominik Stoffel
Papers
Clustering and Non-clustering Effects in Flash Memory Databases
Full-text access may be available. Sign in or learn about subscription options.
pp. 4-8
by
Duck-Ho Bae
,
Ji-Woong Chang
,
Sang-Wook Kim
Papers
Specialized Embedded DBMS: Cell Based Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 9-13
by
Syed Saif ur Rahman
,
Marko Rosenmüller
,
Norbert Siegmund
,
Gunter Saake
,
Sven Apel
Papers
Reliable Group Communication for Dynamic and Resource-Constrained Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 14-18
by
Ken Mayes
,
Juan Carlos García Ortiz
,
Emili Miedes
,
Stefan Beyer
Papers
Pattern Recognition with Embedded Systems Technology: A Survey
Full-text access may be available. Sign in or learn about subscription options.
pp. 19
by
Juan-Carlos Perez-Cortes
,
Jose-Luis Guardiola
,
Alberto-Jose Pérez-Jiménez
Papers
Acceleration of RSA Cryptographic Operations Using FPGA Technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 20-25
by
Jan Zutter
,
Max Thalmaier
,
Martin Klein
,
Karsten-Olaf Laux
Papers
Towards Data-Centric Security in Ubiquitous Computing Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 26-30
by
Stefan Ransom
,
Christian Werner
Papers
Collaborative Reputation-based Voice Spam Filtering
Full-text access may be available. Sign in or learn about subscription options.
pp. 33-37
by
Ruishan Zhang
,
Andrei Gurtov
Papers
A Multi-Agent Approach to Testing Anti-Spam Software
Full-text access may be available. Sign in or learn about subscription options.
pp. 38-42
by
Nathan Friess
,
Heather Crawford
,
John Aycock
Papers
Mail-Shake
Full-text access may be available. Sign in or learn about subscription options.
pp. 43-47
by
Markus Engelberth
,
Jan Göbel
,
Christian Gorecki
,
Philipp Trinius
Papers
Trustnet Architecture for E-mail Communication
Full-text access may be available. Sign in or learn about subscription options.
pp. 48-52
by
David Pölz
,
Wilfried N. Gansterer
Performance Comparison of Secure Comparison Protocols
Full-text access may be available. Sign in or learn about subscription options.
pp. 133-136
by
Florian Kerschbaum
,
Debmalya Biswas
,
Sebastiaan de Hoogh
Papers
A Biologically Inspired Method of SPAM Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 53-56
by
Paul Gardner-Stephen
Papers
Utilizing Semantic Web Technologies for Efficient Data Lineage and Impact Analyses in Data Warehouse Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 59-63
by
Andreas Reisser
,
Torsten Priebe
Papers
Personalized Handling of Semantic Data with MIG
Full-text access may be available. Sign in or learn about subscription options.
pp. 64-68
by
Mariano Rico
,
David Camacho
,
Corcho
Papers
Temporal Semantics Extraction for Improving Web Search
Full-text access may be available. Sign in or learn about subscription options.
pp. 69-73
by
María Teresa Vicente-Díez
,
Paloma Martínez
Papers
Robust Service-Based Semantic Querying to Distributed Heterogeneous Databases
Full-text access may be available. Sign in or learn about subscription options.
pp. 74-78
by
Carlos Buil-Aranda
,
Corcho
,
Amy Krause
Papers
RDFStats - An Extensible RDF Statistics Generator and Library
Full-text access may be available. Sign in or learn about subscription options.
pp. 79-83
by
Andreas Langegger
,
Wolfram Wöß
Papers
Matching Semantic Web Resources
Full-text access may be available. Sign in or learn about subscription options.
pp. 84-88
by
Silvana Castano
,
Alfio Ferrara
,
Stefano Montanelli
,
Gaia Varese
Papers
DSNotify - Detecting and Fixing Broken Links in Linked Data Sets
Full-text access may be available. Sign in or learn about subscription options.
pp. 89-93
by
Bernhard Haslhofer
,
Niko Popitsch
Papers
Integrating Structural Data into Methods for Labeling Relations in Domain Ontologies
Full-text access may be available. Sign in or learn about subscription options.
pp. 94-98
by
Gerhard Wohlgenannt
,
Albert Weichselbraun
,
Arno Scharl
Papers
A Heuristic Approach to Generate Good-Quality Linked Data about Hydrography
Full-text access may be available. Sign in or learn about subscription options.
pp. 99-103
by
Luis Manuel Vilches-Blázquez
,
Corcho
Papers
Multiparty Computation of Fixed-Point Multiplication and Reciprocal
Full-text access may be available. Sign in or learn about subscription options.
pp. 107-111
by
Octavian Catrina
,
Claudiu Dragulin
Papers
Inter-organizational Processes: Requirements for Securing Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 112-116
by
Antonio Zilli
,
Nicola Sicilia
,
Angelo Corallo
Papers
Privacy Against the Business Partner: Issues for Realizing End-to-End Confidentiality in Web Service Compositions
Full-text access may be available. Sign in or learn about subscription options.
pp. 117-121
by
Meiko Jensen
,
Nils Gruschka
Papers
Improving Practical Performance on Secure and Private Collaborative Linear Programming
Full-text access may be available. Sign in or learn about subscription options.
pp. 122-126
by
Rafael Deitos
,
Florian Kerschbaum
Event Detection from Video Surveillance Data Based on Optical Flow Histogram and High-level Feature Extraction
Full-text access may be available. Sign in or learn about subscription options.
pp. 221-225
by
Ali Wali
,
Adel M. Alimi
Papers
Active Rules for Business Value Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 137-141
by
Ernesto Damiani
,
Stefania Marrara
Papers
Pattern-Based Approach for Logical Traffic Isolation Forensic Modelling
Full-text access may be available. Sign in or learn about subscription options.
pp. 145-149
by
Innocentia Dlamini
,
Martin Olivier
,
Sihle Sibiya
Papers
Integrating Security Patterns into the Electronic Invoicing Process
Full-text access may be available. Sign in or learn about subscription options.
pp. 150-154
by
Michael Netter
,
Günther Pernul
Papers
A Pattern Methodology to Specify Usable Security in Websites
Full-text access may be available. Sign in or learn about subscription options.
pp. 155-159
by
Ricardo Mendoza Gonzalez
,
Jaime Muñoz-Arteaga
,
Miguel Vargas Martin
,
Francisco Álvarez-Rodriguez
,
Juan Gonzalez Calleros
Papers
Using Misuse Patterns for VoIP Steganalysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 160-164
by
Juan C. Pelaez
Papers
Improving the Classification of Security Patterns
Full-text access may be available. Sign in or learn about subscription options.
pp. 165-170
by
Hironori Washizaki
,
Eduardo B. Fernandez
,
Katsuhisa Maruyama
,
Atsuto Kubo
,
Nobukazu Yoshioka
Papers
Towards a Generic Process for Security Pattern Integration
Full-text access may be available. Sign in or learn about subscription options.
pp. 171-175
by
Andreas Fuchs
,
Sigrid Gürgens
,
Carsten Rudolph
Papers
Embedding Security Patterns into a Domain Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 176-180
by
Miguel Solinas
,
Eduardo B. Fernandez
,
Leandro Antonelli
Papers
The Secure Pipes and Filters Pattern
Full-text access may be available. Sign in or learn about subscription options.
pp. 181-185
by
Eduardo B. Fernandez
,
Jorge L. Ortega-Arjona
Accessing Libraries of Media Art through Metadata
Full-text access may be available. Sign in or learn about subscription options.
pp. 269-273
by
Andree Ludtke
,
Björn Gottfried
,
Otthein Herzog
,
George Ioannidis
,
Michael Leszczukz
,
Viliam imko
Papers
A Pattern for Secure Graphical User Interface Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 186-190
by
Thomas Fischer
,
Ahmad-Reza Sadeghi
,
Marcel Winandy
Papers
Mining Biological Sequences with Masks
Full-text access may be available. Sign in or learn about subscription options.
pp. 193-197
by
Giovanni Battaglia
,
Roberto Grossi
,
Roberto Marangoni
,
Nadia Pisanti
Papers
Large Scale Analysis of Small Repeats via Mining of the Human Genome
Full-text access may be available. Sign in or learn about subscription options.
pp. 198-202
by
Inge van den Berg
,
Dragan Bosnacki
,
Peter A.J. Hilbers
Papers
Performance Analysis of Algorithms for Protein Structure Classification
Full-text access may be available. Sign in or learn about subscription options.
pp. 203-207
by
Florin Leon
,
Bogdan Ioan Aignatoaiei
,
Mihai Horia Zaharia
Papers
Identification of Shadow Exons: Mining for Alternative Exons in Human, Mouse and Rat Comparative Databases
Full-text access may be available. Sign in or learn about subscription options.
pp. 208-212
by
Bahar Taneri
,
Alexey Novoradovsky
,
Terry Gaasterland
Papers
Mining Maximal Frequent Subgraphs in KEGG Reaction Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 213-217
by
Willem P.A. Ligtenberg
,
Dragan Bosnacki
,
Peter A.J. Hilbers
Use and Modeling of Multi-agent Systems in Medicine
Full-text access may be available. Sign in or learn about subscription options.
pp. 303-307
by
Maja Hadzic
,
Darshan Dillon
,
Tharam Dillon
Papers
Random Methods for Fast Exploration of the Raw Video Material
Full-text access may be available. Sign in or learn about subscription options.
pp. 226-230
by
Tijana Janjusevic
,
Sergio Benini
,
Ebroul Izquierdo
,
Riccardo Leonardi
Papers
Motion Based Video Classification for SPRITE Generation
Full-text access may be available. Sign in or learn about subscription options.
pp. 231-235
by
Abhidnya A. Deshpande
,
Ramazan S. Aygun
Papers
Content-Based Image Retrieval Using Gabor Filtering
Full-text access may be available. Sign in or learn about subscription options.
pp. 236-240
by
Tudor Barbu
Papers
A Content Based Model for Image Categorization
Full-text access may be available. Sign in or learn about subscription options.
pp. 241-245
by
Mohammad Reza Keyvanpour
,
Nasrollah Moghadam Charkari
Papers
A LEGO-like Metadata Architecture for Image Search & Retrieval
Full-text access may be available. Sign in or learn about subscription options.
pp. 246-250
by
Ruben Tous
,
Jaime Delgado
Papers
Enhancing Person Annotation for Personal Photo Management Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 251-255
by
Saman Hemantha Cooray
,
Noel Edward O'Connor
Unveiling Fuzzy Associations Between Breast Cancer Prognostic Factors and Gene Expression Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 338-342
by
Francisco Javier López Domingo
,
Marta Cuadros Celorrio
,
Armando Blanco Moron
,
Ángel Concha Lopez
Papers
Music Segmentation With Genetic Algorithms
Full-text access may be available. Sign in or learn about subscription options.
pp. 256-260
by
Brigitte Rafael
,
Stefan Oertl
,
Michael Affenzeller
,
Stefan Wagner
Papers
A Method to Estimate Object Existence Based on Temporal Analysis of Web Pages for Digital Map Credibility
Full-text access may be available. Sign in or learn about subscription options.
pp. 261-265
by
Daisuke Kitayama
,
Ryong Lee
,
Kazutoshi Sumiya
Papers
Multimodal Query Suggestion and Searching for Video Search
Full-text access may be available. Sign in or learn about subscription options.
pp. 274-278
by
Lvsong Li
,
Jing Li
Papers
Accessible Multimodal Web Pages with Sign Language Translations for Deaf and Hard of Hearing Users
Full-text access may be available. Sign in or learn about subscription options.
pp. 279-283
by
Matjaz Debevc
,
Primoz Kosec
,
Milan Rotovnik
,
Andreas Holzinger
Papers
A Conceptual Framework for Adaptation and Personalization in Virtual Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 284-288
by
Johanna Renny Octavia
,
Chris Raymaekers
,
Karin Coninx
Papers
Scene Extraction for Video Clips Based on the Relation of Text, Pointing Region and Temporal Duration of User Comments
Full-text access may be available. Sign in or learn about subscription options.
pp. 289-294
by
Shoko Wakamiya
,
Daisuke Kitayama
,
Kazutoshi Sumiya
Papers
TMS for Multimodal Information Processing
Full-text access may be available. Sign in or learn about subscription options.
pp. 295-299
by
Barbara Rita Barricelli
,
Marco Padula
,
Paolo Luigi Scala
Papers
A Case Study on the Analysis of the Data Quality of a Large Medical Database
Full-text access may be available. Sign in or learn about subscription options.
pp. 308-312
by
Matteo Bertoni
,
Giuliano Furlini
,
Gianluca Gozzoli
,
Maria Paola Landini
,
Matteo Magnani
,
Antonio Messina
,
Danilo Montesi
Papers
Federated Databases as a Basis for Infrastructure Supporting Epidemiological Research
Full-text access may be available. Sign in or learn about subscription options.
pp. 313-317
by
Ruslan Fomkin
,
Magnus Stenbeck
,
Jan-Eric Litton
Comparing Different Approaches to Treat Translation Ambiguity in CLIR: Structured Queries vs. Target Co-occurrence Based Selection
Full-text access may be available. Sign in or learn about subscription options.
pp. 398-404
by
Xabier Saralegi
,
Maddalen Lopez de Lacalle
Papers
SUT-Miner: A Knowledge Mining and Managing System for Medical Databases
Full-text access may be available. Sign in or learn about subscription options.
pp. 318-322
by
Kittisak Kerdprasop
,
Nittaya Kerdprasop
Papers
Identification of Surgery Indicators by Mining Hospital Data: A Preliminary Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 323-327
by
Marie Persson
,
Niklas Lavesson
Papers
Motif Discovery in Brain Networks of Patients with Somatoform Pain Disorder
Full-text access may be available. Sign in or learn about subscription options.
pp. 328-332
by
Annahita Oswald
,
Bianca Wackersreuther
Papers
Stacked Feature Selection in Liver Disease Using IMR-MS Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 333-337
by
Michael Netzer
,
Gunda Millonig
,
Bernhard Pfeifer
,
Kanthida Kusonmano
,
Siegfried Praun
,
Johannes Villinger
,
Wolfgang Vogel
,
Christian Baumgartner
Papers
Information Visualization and Organization for Participatory Monitoring of Invasive Alien Species
Full-text access may be available. Sign in or learn about subscription options.
pp. 345-349
by
Asanobu Kitamoto
,
Miri Nakahara
,
Izumi Washitani
,
Taku Kadoya
,
Masaki Yasuwaka
,
Masaru Kitsuregawa
Papers
A Framework for Supporting the Composition of Biodiversity Informatics Resources
Full-text access may be available. Sign in or learn about subscription options.
pp. 350-354
by
Russell P. McIver
,
Andrew C. Jones
,
Richard J. White
Papers
Instance-Based Data Management -- Is it Useful for Biodiversity Informatics Applications?
Full-text access may be available. Sign in or learn about subscription options.
pp. 355-359
by
Jeffrey Parsons
Papers
Automatic Cluster Number Selection Using a Split and Merge K-Means Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 363-367
by
Markus Muhr
,
Michael Granitzer
Modeling Trajectories: A Spatio-Temporal Data Type Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 447-451
by
Ali Frihida
,
Donia Zheni
,
Christophe Claramunt
,
Henda Ben Ghezala
Papers
Clustering of Short Strings in Large Databases
Full-text access may be available. Sign in or learn about subscription options.
pp. 368-372
by
Michail Kazimianec
,
Arturas Mazeika
Papers
Automatic User Comment Detection in Flat Internet Fora
Full-text access may be available. Sign in or learn about subscription options.
pp. 373-377
by
Mathias Bank
,
Michael Mattes
Papers
Comparison Between Manually and Automatically Assigned Descriptors Based on a German Bibliographic Collection
Full-text access may be available. Sign in or learn about subscription options.
pp. 378-382
by
Claire Fautsch
,
Jacques Savoy
Papers
Collection-Relative Representations: A Unifying View to Retrieval Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 383-387
by
Benno Stein
,
Maik Anderka
Papers
Persian Language, Is Stemming Efficient?
Full-text access may be available. Sign in or learn about subscription options.
pp. 388-392
by
Ljiljana Dolamic
,
Jacques Savoy
Papers
Improving Web Page Retrieval Using Search Context from Clicked Domain Names
Full-text access may be available. Sign in or learn about subscription options.
pp. 393-397
by
Rongmei Li
Papers
Cubing Algorithms for XML Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 407-411
by
Alfredo Cuzzocrea
Papers
[Roster]
Freely available from IEEE.
pp. 494
Papers
A Flexible Data Warehousing Approach for One-Stop Querying on Heterogeneous Personal Information
Full-text access may be available. Sign in or learn about subscription options.
pp. 412-416
by
Ming Zhong
,
Mengchi Liu
Papers
HShreX - A Tool for Design and Evaluation of Hybrid XML Storage
Full-text access may be available. Sign in or learn about subscription options.
pp. 417-421
by
Lena Strömbäck
,
Mikael Âsberg
,
David Hall
Papers
On Different Perspectives of XML Data Evolution
Full-text access may be available. Sign in or learn about subscription options.
pp. 422-426
by
Martin Necasky
,
Irena Mlynkova
Papers
Building an Enhanced Syntax-Directed Processing Environment for XML Documents by Combining StAX and CUP
Full-text access may be available. Sign in or learn about subscription options.
pp. 427-431
by
Antonio Sarasa-Cabezuelo
,
Bryan Temprado-Battad
,
Alberto Martinez-Aviles
,
Jose-Luis Sierra
,
Alfredo Fernandez-Valmayor
Papers
The Role of Clustering in Search Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 432-436
by
Alessandro Campi
,
Stefania Ronchi
Papers
Flexible Integrity Checking of Hard and Soft Constraints
Full-text access may be available. Sign in or learn about subscription options.
pp. 437-441
by
Hendrik Decker
Papers
A New Upgrade to SQLf: Towards a Standard in Fuzzy Databases
Full-text access may be available. Sign in or learn about subscription options.
pp. 442-446
by
Claudia González
,
Marlene Goncalves
,
Leonid Tineo
Papers
DAMSEL: A System for Progressive Querying and Reasoning on Movement Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 452-456
by
Roberto Trasarti
,
Miriam Baglioni
,
Chiara Renso
Papers
RDF Visualization - Thinking Big
Full-text access may be available. Sign in or learn about subscription options.
pp. 459-463
by
Jiri Dokulil
,
Jana Katreniakova
Papers
Algorithms for Generating Ontology Based Visualization from Semantic Search Results
Full-text access may be available. Sign in or learn about subscription options.
pp. 464-468
by
Fawad Nazir
,
Victoria Uren
,
Andriy Nikolov
Papers
Ontology Knowledge Authoring by Natural Language Empowerment
Full-text access may be available. Sign in or learn about subscription options.
pp. 469-473
by
Alfio Ferrara
,
Stefano Montanelli
,
Gaia Varese
,
Silvana Castano
Papers
A Meta-Framework for Generating Ontologies from Legacy Schemas
Full-text access may be available. Sign in or learn about subscription options.
pp. 474-479
by
Manuel Wimmer
Papers
Building Ontologies from XML Data Sources
Full-text access may be available. Sign in or learn about subscription options.
pp. 480-484
by
Raji Ghawi
,
Nadine Cullot
Papers
Designing and Maintaining XML Integrity Constraints
Full-text access may be available. Sign in or learn about subscription options.
pp. 485-489
by
Martin Necasky
,
Katerina Opocenska
Papers
Author Index
Freely available from IEEE.
pp. 490-493
Showing 99 out of 99