Default Cover Image

2014 25th International Workshop on Database and Expert Systems Applications (DEXA)

Sept. 1 2014 to Sept. 5 2014

Munich, Germany

Table of Contents

Title Page iFreely available from IEEE.pp. i-i
Title Page iiiFreely available from IEEE.pp. iii-iii
Copyright PageFreely available from IEEE.pp. iv-iv
Table of ContentsFreely available from IEEE.pp. v-x
Message from the DEXA 2014 Program ChairsFreely available from IEEE.pp. xi-xi
DEXA 2014 Conference CommitteeFreely available from IEEE.pp. xii-xii
BIOKDD 2014 Workshop PrefaceFreely available from IEEE.pp. xiii-xiii
BIOKDD 2014 Workshop CommitteeFreely available from IEEE.pp. xiv-xiv
IATEM 2014 Workshop PrefaceFreely available from IEEE.pp. xv-xv
IATEM 2014 Workshop CommitteeFreely available from IEEE.pp. xvi-xvi
ISSASiM 2014 Workshop PrefaceFreely available from IEEE.pp. xvii-xvii
ISSASiM 2014 Workshop CommitteeFreely available from IEEE.pp. xviii-xviii
TIR 2014 Workshop PrefaceFreely available from IEEE.pp. xix-xix
TIR 2014 Workshop CommitteeFreely available from IEEE.pp. xx-xx
NoSQL-Net 2014 Workshop PrefaceFreely available from IEEE.pp. xxi-xxi
NoSQL-Net 2014 Workshop CommitteeFreely available from IEEE.pp. xxii-xxii
SHCIS 2014 Workshop PrefaceFreely available from IEEE.pp. xxiii-xxiii
SHCIS 2014 Workshop CommitteeFreely available from IEEE.pp. xxiv-xxiv
Protein Data Modelling for Concurrent Sequential PatternsFull-text access may be available. Sign in or learn about subscription options.pp. 5-9
New Online Hierarchical Feature Extraction Algorithm for Classification of ProteinFull-text access may be available. Sign in or learn about subscription options.pp. 10-14
A New Approach for Phylogenetic Tree Construction Based on Minimal Absent WordsFull-text access may be available. Sign in or learn about subscription options.pp. 15-19
Mining Frequent Patterns for Genetic Variants Associated to DiabetesFull-text access may be available. Sign in or learn about subscription options.pp. 28-32
A Consensus Algorithm for Simple Motifs FindingFull-text access may be available. Sign in or learn about subscription options.pp. 33-37
Toward Efficient Variant Calling Inside Main-Memory Database SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 41-45
Feature Selection Methods on Biological Knowledge Discovery and Data Mining: A SurveyFull-text access may be available. Sign in or learn about subscription options.pp. 46-50
New Method Combining Feature Weighting and Feature Selection for Protein ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 51-55
A Filter Correlation Method for Feature SelectionFull-text access may be available. Sign in or learn about subscription options.pp. 59-63
An Efficient Algorithm for Hierarchical Classification of Protein and Gene FunctionsFull-text access may be available. Sign in or learn about subscription options.pp. 64-68
FT-IR Spectra Analysis toward Cancer DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 77-81
A PubMed Meta Search Engine Based on Biomedical Entity MiningFull-text access may be available. Sign in or learn about subscription options.pp. 82-86
Content-Based Search on Time-Series Microarray DatabasesFull-text access may be available. Sign in or learn about subscription options.pp. 89-93
A Light-Weight Visualization Tool for Support Vector MachinesFull-text access may be available. Sign in or learn about subscription options.pp. 94-98
Agent-Based Simulation of Interrelated Wholesale Electricity MarketsFull-text access may be available. Sign in or learn about subscription options.pp. 103-108
Realistic Multi-agent Simulation of Competitive Electricity MarketsFull-text access may be available. Sign in or learn about subscription options.pp. 109-113
A Trader Portfolio Optimization of Bilateral Contracts in Electricity Retail MarketsFull-text access may be available. Sign in or learn about subscription options.pp. 114-118
Power Producers Trading Electricity in Both Pool and Forward MarketsFull-text access may be available. Sign in or learn about subscription options.pp. 139-143
On the Formalization of Expert Knowledge: A Disaster Management Case StudyFull-text access may be available. Sign in or learn about subscription options.pp. 149-153
Generic Approach for Dynamic Disaster Management System ComponentFull-text access may be available. Sign in or learn about subscription options.pp. 160-164
eXsight: An Analytical Framework for Quantifying Financial Loss in the Aftermath of Catastrophic EventsFull-text access may be available. Sign in or learn about subscription options.pp. 165-170
Similarity Search of Human Behavior Processes Using Extended Linked Data Semantic DistanceFull-text access may be available. Sign in or learn about subscription options.pp. 178-182
Improving Activity Recognition via Satellite Imagery and Commonsense KnowledgeFull-text access may be available. Sign in or learn about subscription options.pp. 183-187
Cumulative Citation Recommendation: A Feature-Aware Comparison of ApproachesFull-text access may be available. Sign in or learn about subscription options.pp. 193-197
Text Retrieval Based on Dyadic Conceptual ProjectionFull-text access may be available. Sign in or learn about subscription options.pp. 198-202
Random Manhattan IndexingFull-text access may be available. Sign in or learn about subscription options.pp. 203-208
Investigation of Latent Semantic Analysis for Clustering of Czech News ArticlesFull-text access may be available. Sign in or learn about subscription options.pp. 223-227
Robust Language Identification of Noisy Texts: Proposal of Hybrid ApproachesFull-text access may be available. Sign in or learn about subscription options.pp. 228-232
A Pure URL-Based Genre Classification of Web PagesFull-text access may be available. Sign in or learn about subscription options.pp. 233-237
Keyphrase Extraction Abstracts Instead of Full PapersFull-text access may be available. Sign in or learn about subscription options.pp. 241-245
Towards an Automated Approach to Extract and Compare Fictional Networks: An Initial EvaluationFull-text access may be available. Sign in or learn about subscription options.pp. 246-250
Distributed Evaluation of XPath Axes Queries over Large XML Documents Stored in MapReduce ClustersFull-text access may be available. Sign in or learn about subscription options.pp. 253-257
Column-Oriented Data Store for Astrophysical DataFull-text access may be available. Sign in or learn about subscription options.pp. 258-262
M2RML: Multidimensional to RDF Mapping LanguageFull-text access may be available. Sign in or learn about subscription options.pp. 263-267
Analyzing Recent Trends in Enterprise Identity ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 273-277
Trust and Big Data: A Roadmap for ResearchFull-text access may be available. Sign in or learn about subscription options.pp. 278-282
Detectability of Deep Packet Inspection in Common Provider/Consumer RelationsFull-text access may be available. Sign in or learn about subscription options.pp. 283-287
A Fuzzy Security Investment Decision Support Model for Highly Distributed SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 291-295
Applicability of Prediction Markets in Information Security Risk ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 296-300
Towards a Flexible Virtualization-Based Architecture for Malware Detection and AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 303-307
Multi-tiered Security Architecture for ARM via the Virtualization and Security ExtensionsFull-text access may be available. Sign in or learn about subscription options.pp. 308-312
An(other) Exercise in Measuring the Strength of Source Code ObfuscationFull-text access may be available. Sign in or learn about subscription options.pp. 313-317
The di.me Trust Approach for Supporting Collaborative ScenariosFull-text access may be available. Sign in or learn about subscription options.pp. 321-325
Specifying IT Security AwarenessFull-text access may be available. Sign in or learn about subscription options.pp. 326-330
Honeypot Effectiveness in Different Categories of Attacks on Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 331-335
Author IndexFreely available from IEEE.pp. 336-337
Publisher's InformationFreely available from IEEE.pp. 338-338
Showing 74 out of 74