Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
DEXA
DEXA 2014
Generate Citations
2014 25th International Workshop on Database and Expert Systems Applications (DEXA)
Sept. 1 2014 to Sept. 5 2014
Munich, Germany
Table of Contents
Title Page i
Freely available from IEEE.
pp. i-i
Title Page iii
Freely available from IEEE.
pp. iii-iii
Copyright Page
Freely available from IEEE.
pp. iv-iv
Table of Contents
Freely available from IEEE.
pp. v-x
Message from the DEXA 2014 Program Chairs
Freely available from IEEE.
pp. xi-xi
DEXA 2014 Conference Committee
Freely available from IEEE.
pp. xii-xii
BIOKDD 2014 Workshop Preface
Freely available from IEEE.
pp. xiii-xiii
BIOKDD 2014 Workshop Committee
Freely available from IEEE.
pp. xiv-xiv
IATEM 2014 Workshop Preface
Freely available from IEEE.
pp. xv-xv
IATEM 2014 Workshop Committee
Freely available from IEEE.
pp. xvi-xvi
ISSASiM 2014 Workshop Preface
Freely available from IEEE.
pp. xvii-xvii
ISSASiM 2014 Workshop Committee
Freely available from IEEE.
pp. xviii-xviii
TIR 2014 Workshop Preface
Freely available from IEEE.
pp. xix-xix
TIR 2014 Workshop Committee
Freely available from IEEE.
pp. xx-xx
NoSQL-Net 2014 Workshop Preface
Freely available from IEEE.
pp. xxi-xxi
NoSQL-Net 2014 Workshop Committee
Freely available from IEEE.
pp. xxii-xxii
SHCIS 2014 Workshop Preface
Freely available from IEEE.
pp. xxiii-xxiii
SHCIS 2014 Workshop Committee
Freely available from IEEE.
pp. xxiv-xxiv
Protein Data Modelling for Concurrent Sequential Patterns
Full-text access may be available. Sign in or learn about subscription options.
pp. 5-9
by
Jing Lu
,
Malcolm Keech
,
Cuiqing Wang
New Online Hierarchical Feature Extraction Algorithm for Classification of Protein
Full-text access may be available. Sign in or learn about subscription options.
pp. 10-14
by
Mehdi Kchouk
,
Faouzi Mhamdi
A New Approach for Phylogenetic Tree Construction Based on Minimal Absent Words
Full-text access may be available. Sign in or learn about subscription options.
pp. 15-19
by
Supaporn Chairungsee
Protein Motif Retrieval by Secondary Structure Element Geometry and Biological Features Saliency
Full-text access may be available. Sign in or learn about subscription options.
pp. 23-27
by
Virginio Cantoni
,
Marco Ferretti
,
Nicola Pellicano
,
Jennifer Vandoni
,
Mirto Musci
,
Nahumi Nugrahaningsih
Mining Frequent Patterns for Genetic Variants Associated to Diabetes
Full-text access may be available. Sign in or learn about subscription options.
pp. 28-32
by
Sofianita Mutalib
,
Shuzlina Abdul-Rahman
,
Azlinah Mohamed
A Consensus Algorithm for Simple Motifs Finding
Full-text access may be available. Sign in or learn about subscription options.
pp. 33-37
by
Tarek El Falah
,
Maroua Ghnimi
,
Mourad Elloumi
Toward Efficient Variant Calling Inside Main-Memory Database Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 41-45
by
Sebastian Dorok
,
Sebastian Bress
,
Gunter Saake
Feature Selection Methods on Biological Knowledge Discovery and Data Mining: A Survey
Full-text access may be available. Sign in or learn about subscription options.
pp. 46-50
by
Hanen Mhamdi
,
Faouzi Mhamdi
New Method Combining Feature Weighting and Feature Selection for Protein Classification
Full-text access may be available. Sign in or learn about subscription options.
pp. 51-55
by
Salma Aouled El Haj Mohamed
,
Faouzi Mhamdi
A Filter Correlation Method for Feature Selection
Full-text access may be available. Sign in or learn about subscription options.
pp. 59-63
by
Hanen Hosni
,
Faouzi Mhamdi
An Efficient Algorithm for Hierarchical Classification of Protein and Gene Functions
Full-text access may be available. Sign in or learn about subscription options.
pp. 64-68
by
Fabio Fabris
,
Alex A. Freitas
Classifying Bacterial Genomes with Compact Logic Formulas on k-Mer Frequencies
Freely available from IEEE.
pp. 69-73
by
Emanuel Weitschek
,
Fabio Cunial
,
Giovanni Felici
FT-IR Spectra Analysis toward Cancer Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 77-81
by
SeungJin Lim
,
Menashi Cohenford
A PubMed Meta Search Engine Based on Biomedical Entity Mining
Full-text access may be available. Sign in or learn about subscription options.
pp. 82-86
by
Andreas Kanavos
,
Evangelos Theodoridis
,
Athanasios Tsakalidis
Content-Based Search on Time-Series Microarray Databases
Full-text access may be available. Sign in or learn about subscription options.
pp. 89-93
by
Ahmet Hayran
,
Hasan Ogul
,
Esma Ozkoc
A Light-Weight Visualization Tool for Support Vector Machines
Full-text access may be available. Sign in or learn about subscription options.
pp. 94-98
by
SeungJin Lim
Agent-Based Simulation of Interrelated Wholesale Electricity Markets
Full-text access may be available. Sign in or learn about subscription options.
pp. 103-108
by
Andreas Bublitz
,
Philipp Ringler
,
Massimo Genoese
,
Dogan Keles
,
Wolf Fichtner
Realistic Multi-agent Simulation of Competitive Electricity Markets
Full-text access may be available. Sign in or learn about subscription options.
pp. 109-113
by
Tiago Pinto
,
Gabriel Santos
,
Zita Vale
,
Isabel Praca
,
Fernando Lopes
,
Hugo Algarvio
A Trader Portfolio Optimization of Bilateral Contracts in Electricity Retail Markets
Full-text access may be available. Sign in or learn about subscription options.
pp. 114-118
by
Hugo Algarvio
,
Fernando Lopes
,
Jorge A.M. Sousa
,
Joao Lagarto
Realistic User Behavior Modeling for Energy Saving in Residential Buildings
Full-text access may be available. Sign in or learn about subscription options.
pp. 121-125
by
Jorge Martinez-Gil
,
Georgios Chasparis
,
Bernhard Freudenthaler
,
Thomas Natschlaeger
A Multi-agent Coordination Framework for Smart Building Energy Management
Full-text access may be available. Sign in or learn about subscription options.
pp. 126-130
by
Thanos G. Stavropoulos
,
Emmanouil S. Rigas
,
Efstratios Kontopoulos
,
Nick Bassiliades
,
Ioannis Vlahavas
Multi-agent Simulation of Bilateral Contracting in Competitive Electricity Markets
Full-text access may be available. Sign in or learn about subscription options.
pp. 131-135
by
Fernando Lopes
,
Hugo Algarvio
,
Jorge A.M. Sousa
,
Helder Coelho
,
Tiago Pinto
,
Gabriel Santos
,
Zita Vale
,
Isabel Praca
Power Producers Trading Electricity in Both Pool and Forward Markets
Full-text access may be available. Sign in or learn about subscription options.
pp. 139-143
by
Hugo Algarvio
,
Fernando Lopes
,
Jorge A.M. Sousa
,
Joao Lagarto
On the Formalization of Expert Knowledge: A Disaster Management Case Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 149-153
by
Mario Pichler
,
Diethard Leber
Situation Awareness and Decision Support Tools for Response Phase of Emergency Management: A Short Survey
Full-text access may be available. Sign in or learn about subscription options.
pp. 154-159
by
Bogdan Pavkovic
,
Lazar Berbakov
,
Sanja Vrane
,
Milo Milenkovic
Generic Approach for Dynamic Disaster Management System Component
Full-text access may be available. Sign in or learn about subscription options.
pp. 160-164
by
Marina Tropmann-Frick
,
Thomas Ziebermayr
eXsight: An Analytical Framework for Quantifying Financial Loss in the Aftermath of Catastrophic Events
Full-text access may be available. Sign in or learn about subscription options.
pp. 165-170
by
Matthew Coelho
,
Andrew Rau-Chaplin
Exploiting Process Patterns and Process Instances to Support Adaptability of Dynamic Business Processes
Full-text access may be available. Sign in or learn about subscription options.
pp. 173-177
by
Andreas Bogl
,
Christine Natschlager
,
Michael Karlinger
,
Michael Schrefl
Similarity Search of Human Behavior Processes Using Extended Linked Data Semantic Distance
Full-text access may be available. Sign in or learn about subscription options.
pp. 178-182
by
Zhang Zuo
,
Hung-Hsuan Huang
,
Kyoji Kawagoe
Improving Activity Recognition via Satellite Imagery and Commonsense Knowledge
Full-text access may be available. Sign in or learn about subscription options.
pp. 183-187
by
Nicola Bicocchi
,
Damiano Fontana
,
Franco Zambonelli
Cumulative Citation Recommendation: A Feature-Aware Comparison of Approaches
Full-text access may be available. Sign in or learn about subscription options.
pp. 193-197
by
Gebrekirstos G. Gebremeskel
,
Jiyin He
,
Arjen P. de Vries
,
Jimmy Lin
Text Retrieval Based on Dyadic Conceptual Projection
Full-text access may be available. Sign in or learn about subscription options.
pp. 198-202
by
Sonia Alouane-Ksouri
,
Minyar Sassi-Hidri
,
Kamel Barkaoui
Random Manhattan Indexing
Full-text access may be available. Sign in or learn about subscription options.
pp. 203-208
by
Behrang Q. Zadeh
,
Siegfried Handschuh
On the Use of Reliable-Negatives Selection Strategies in the PU Learning Approach for Quality Flaws Prediction in Wikipedia
Full-text access may be available. Sign in or learn about subscription options.
pp. 211-215
by
Edgardo Ferretti
,
Marcelo L. Errecalde
,
Maik Anderka
,
Benno Stein
Enhancing Patient Safety through Human-Computer Information Retrieval on the Example of German-Speaking Surgical Reports
Full-text access may be available. Sign in or learn about subscription options.
pp. 216-220
by
Christof Stocker
,
Leopold-Michael Marzi
,
Christian Matula
,
Johannes Schantl
,
Gottfried Prohaska
,
Aberto Brabenetz
,
Andreas Holzinger
Investigation of Latent Semantic Analysis for Clustering of Czech News Articles
Full-text access may be available. Sign in or learn about subscription options.
pp. 223-227
by
Michal Rott
,
Petr Cerva
Robust Language Identification of Noisy Texts: Proposal of Hybrid Approaches
Full-text access may be available. Sign in or learn about subscription options.
pp. 228-232
by
Kheireddine Abainia
,
Siham Ouamour
,
Halim Sayoud
A Pure URL-Based Genre Classification of Web Pages
Full-text access may be available. Sign in or learn about subscription options.
pp. 233-237
by
Chaker Jebari
Keyphrase Extraction Abstracts Instead of Full Papers
Full-text access may be available. Sign in or learn about subscription options.
pp. 241-245
by
Svetlana Popova
,
Vera Danilova
Towards an Automated Approach to Extract and Compare Fictional Networks: An Initial Evaluation
Full-text access may be available. Sign in or learn about subscription options.
pp. 246-250
by
Marcello Trovati
,
James Brady
Distributed Evaluation of XPath Axes Queries over Large XML Documents Stored in MapReduce Clusters
Full-text access may be available. Sign in or learn about subscription options.
pp. 253-257
by
Adam enk
,
Michal Valenta
,
Wolfgang Benn
Column-Oriented Data Store for Astrophysical Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 258-262
by
Jakub Yaghob
,
David Bednarek
,
Martin Kruli
,
Filip Zavoral
M2RML: Multidimensional to RDF Mapping Language
Full-text access may be available. Sign in or learn about subscription options.
pp. 263-267
by
Saleh Ghasemi
,
Wo-Shun Luk
,
Norah Alrayes
Analyzing Recent Trends in Enterprise Identity Management
Full-text access may be available. Sign in or learn about subscription options.
pp. 273-277
by
Michael Kunz
,
Matthias Hummer
,
Ludwig Fuchs
,
Michael Netter
,
Gunther Pernul
Trust and Big Data: A Roadmap for Research
Full-text access may be available. Sign in or learn about subscription options.
pp. 278-282
by
Johannes Sanger
,
Christian Richthammer
,
Sabri Hassan
,
Gunther Pernul
Detectability of Deep Packet Inspection in Common Provider/Consumer Relations
Full-text access may be available. Sign in or learn about subscription options.
pp. 283-287
by
Christian Roth
,
Rolf Schillinger
A Fuzzy Security Investment Decision Support Model for Highly Distributed Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 291-295
by
Emrah Yasasin
,
Gerhard Rauchecker
,
Julian Prester
,
Guido Schryen
Applicability of Prediction Markets in Information Security Risk Management
Full-text access may be available. Sign in or learn about subscription options.
pp. 296-300
by
Pankaj Pandey
,
Einar Arthur Snekkenes
Towards a Flexible Virtualization-Based Architecture for Malware Detection and Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 303-307
by
Marius Vlad
,
Hans P. Reiser
Multi-tiered Security Architecture for ARM via the Virtualization and Security Extensions
Full-text access may be available. Sign in or learn about subscription options.
pp. 308-312
by
Tamas K. Lengyel
,
Thomas Kittel
,
Jonas Pfoh
,
Claudia Eckert
An(other) Exercise in Measuring the Strength of Source Code Obfuscation
Full-text access may be available. Sign in or learn about subscription options.
pp. 313-317
by
Yan Zhuang
,
Mykola Protsenko
,
Tilo Muller
,
Felix C. Freiling
The di.me Trust Approach for Supporting Collaborative Scenarios
Full-text access may be available. Sign in or learn about subscription options.
pp. 321-325
by
Marcel Heupel
,
Mohamed Bourimi
,
Dogan Kesdogan
Specifying IT Security Awareness
Full-text access may be available. Sign in or learn about subscription options.
pp. 326-330
by
Norman Hansch
,
Zinaida Benenson
Honeypot Effectiveness in Different Categories of Attacks on Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 331-335
by
Jurgen Markert
,
Michael Massoth
Author Index
Freely available from IEEE.
pp. 336-337
Publisher's Information
Freely available from IEEE.
pp. 338-338
Showing 74 out of 74