


Остановите войну!
for scientists:


default search action
3. ICDIM 2008: London, UK
- Pit Pichappan, Ajith Abraham:
Third IEEE International Conference on Digital Information Management (ICDIM), November 13-16, 2008, London, UK, Proceedings. IEEE 2008, ISBN 978-1-4244-2917-2
Artificial Intelligence and Expert Systems
- Mostafa Mahmoud, Mahmoud Rafea, Ahmed A. Rafea:
Using expert systems technology to increase agriculture production and water conservation. 1-7 - Amit Bahuguna:
Reference architecture for enterprise batch processing of unformation. 8-17 - Millie Pant, Radha Thangaraj, Crina Grosan
, Ajith Abraham:
Hybrid differential evolution - Particle Swarm Optimization algorithm for solving global optimization problems. 18-24 - Mahboobeh Parsapoor, Caro Lucas, Saeid Setayeshi:
Reinforcement _recurrent fuzzy rule based system based on brain emotional learning structure to predict the complexity dynamic system. 25-32
Human-Computer Interaction
- Natsuha Araki, Yoichi Muraoka:
Follow-the-Trial-Fitter: Real-time dressing without undressing. 33-38 - Wan Abdul Rahim Wan Mohd Isa
, Nor Laila Md. Noor, Shafie Mehad:
Exploring the applicability of Web Architectural-Inducing Model (WA-IM) for Information Architecture in cultural context: A structural equation modeling approach. 39-44 - Abdul Sattar, Renaud Séguier
:
GGA-AAM: Novel heuristic method of gradient driven Genetic Algorithm for Active Appearance Models. 45-50 - Efthymios Alepis, Maria Virvou, Katerina Kabassi
:
Mobile education: Towards affective bi-modal interaction for adaptivity. 51-56 - Veluchandhar Vadivelu, R. V. Jayakumar, M. Muthuvel, K. Balasubramanian, A. Karthi, Karthikesan, G. Ramaiyan, Alagarsamy Deepa, S. Albert Rabara:
A backup mechanism with concurrency control for multilevel secure distributed database systems. 57-62
Security and Access Control
- Abdullah M. Alnajim, Malcolm Munro:
An evaluation of users' tips effectiveness for Phishing websites detection. 63-68 - Sandhya Armoogum, Nawaz Mohamudally:
Mobile agent based real time IP traceback. 69-74 - Hany F. El Yamany
, Miriam A. M. Capretz
:
An authorization model for Web Services within SOA. 75-80 - Junqing Li, Xin-you Li, Shengxian Xie, Chen Chen, Hui-Shan Yu, Guangliang Liu:
A fine-grained time-constraint role-based access control using OCL. 81-86
Digital Libraries
- Matthew Rutledge-Taylor, André Vellino
, Robert L. West
:
A holographic associative memory recommender system. 87-92 - Alberto Messina, Maurizio Montagnuolo:
Content-based RSS and broadcast news streams aggregation and retrieval. 93-98 - Manabu Ohta, Takayuki Yakushi, Atsuhiro Takasu:
Bibliographic element extraction from scanned documents using conditional random fields. 99-104 - Mikalai Krapivin, Maurizio Marchese
, Andrei Yadrantsau, Yanchun Liang:
Unsupervised key-phrases extraction from scientific papers using domain and linguistic knowledge. 105-112 - José Bringel Filho, Hervé Martin:
A Quality-Aware Context-Based Access Control model for ubiquitous applications. 113-118 - Hasina Attaullah, Faiza Iqbal, Muhammad Younus Javed:
Intelligent vertical handover decision model to improve QoS. 119-124 - Anna Mastora, Maria Monopoli, Sarantos Kapidakis:
Term selection patterns for formulating queries: a User study focused on term semantics. 125-130 - Maria Biryukov, Yafang Wang:
Classification of personal names with application to DBLP. 131-137 - Tjalve Aarflot, Cathal Gurrin
, Dag Johansen:
A framework for transient objects in Digital Libraries. 138-145 - Hugo Manguinhas, Bruno Martins
, José Borbinha
:
A geo-temporal Web gazetteer integrating data from multiple sources. 146-153
Ubiquitous Systems
- Indong Yeo, Jonghyune Kim, Sunshin An:
Performance optimization over channel model for a Low Rate Wireless Personal Area Network. 154-159 - Kentaro Takahashi, Kaname Harumoto, Shojiro Nishio:
Peer-to-peer searching mechanisms for location-aware contents with time-dependent importance. 160-165 - Zohaib Sibte Hassan:
Ubiquitous computing and android. 166-171 - Changbai Choi, Insuk Park, Soon J. Hyun, Dongman Lee, David Hyun Sim:
MiRE: A Minimal Rule Engine for context-aware mobile devices. 172-177 - Ina Blümel
, Jürgen Diet, Harald Krottmaier:
Integrating multimedia repositories into the PROBADO framework. 178-183 - Norvald H. Ryeng, Kjetil Nørvåg:
RIPPNET: Efficient range indexing in peer-to-peer networks. 184-191 - Dong-cheol Shin, Sung-Gi Min:
Simultaneous multi-DAD (SDAD) in Mobile IPv6. 192-197 - Paul Doyle, Mark Deegan, Ciaran O'Driscoll, Michael Gleeson, Brian Gillespie:
Ubiquitous desktops with multi-factor authentication. 198-203
Information Visualization / Peer to Peer Data Management
- Anirban Kundu
, Alok Ranjan Pal, Tanay Sarkar, Moutan Banerjee, Sutirtha Kr. Guha, Debajyoti Mukhopadhyay
:
Comparative study on Null Boundary and Periodic Boundary 3-neighborhood Multiple Attractor Cellular Automata for classification. 204-209 - Boris P. Leontyev
:
Implementation of ER diagrams in the framework of a Periodic Table of Generic Visualization methods. 210-215 - Mehmet Celenk
, Thomas Conley, John Willis, James Graham:
Anomaly detection and visualization using Fisher Discriminant clustering of network entropy. 216-220 - Fabrice Matulic:
Automatic selection of visually attractive pages for thumbnail display in document list view. 221-226 - Tianyang Liu, He Guo, Xiukun Wang, Ajith Abraham, Hongbo Liu:
A machine vision approach for jacket launching angle measurement. 227-232
Information Retrieval
- Michael Granitzer
, Mark Kröll
, Christin Seifert
, Andreas S. Rath, Nicolas Weber, Olivia Dietzel, Stefanie N. Lindstaedt:
Analysis of machine learning techniques for context extraction. 233-240 - Nicolas Béchet, Mathieu Roche
, Jacques Chauché:
How the ExpLSA approach impacts the document classification tasks. 241-246 - Bo Yang, Jian Qin
:
Data collection system for link analysis. 247-252 - Agung Sediyono, Ku Ruhana Ku-Mahamud
:
Algorithm of the longest commonly consecutive word for Plagiarism detection in text based document. 253-259 - Lisa Wiyartanti
, Yo-Sub Han, Laehyun Kim:
A ranking algorithm for user-generated video contents based on social activities. 260-265 - Daniel Ortiz Arroyo
:
Flexible Question Answering System for mobile devices. 266-271 - Aisha Naseer, Lampros K. Stergioulas, Suhel Hammoud, Maozhen Li:
Grid-based Semantic Integration and dissemination of medical information. 272-278 - Yoshihide Kato, Seiji Egawa, Shigeki Matsubara
, Yasuyoshi Inagaki:
English sentence retrieval system based on dependency structure and its evaluation. 279-285
Information Management
- Josef Makolm, Silke Weiß, Doris Ipsmiller:
DYONIPOS: Proactive support of knowledge workers. 286-291 - Raija Halonen
, Elisa Laukkanen:
Managing tacit and explicit knowledge in organisational teams. 292-297 - Karim Ishak, Bernard Archimède, Philippe Charbonnaud:
Enhancing interoperability between enterprise planning applications: An architectural framework. 298-303 - Eyas El-Qawasmeh, Václav Snásel, Pit Pichappan
:
Reshaping email relationships. 304-307 - Flavio Corradini, Francesco De Angelis, Andrea Polini
, Alberto Polzonetti:
A participant testing strategy for service orchestrations. 308-313 - Katja Niemann, Martin Wolpers:
Modeling vocabularies in the architectural domain. 314-319 - Renata L. M. E. do Rego, Márcio Ribeiro
, Emanuella Aleixo, Renata M. C. R. de Souza:
Bug reports retrieval using Self-organizing Map. 320-325
Mobile, Ad Hoc and Sensor Network Security
- Maytham Safar, Nisreen Al-Masri:
Approximation algorithm using: Neighbors, history and errors (NHE). 326-333 - Sasa Mrdovic
, Branislava Perunicic
:
NIDS based on payload word frequencies and anomaly of transitions. 334-339 - Mohammad Nikoupour, Ali Nikoupour, Mehdi Dehghan
:
A cross-layer framework for video streaming over wireless ad-hoc networks. 340-345 - Tamara Pazynyuk, Jianzhong Li, George S. Oreku:
Reliable data aggregation protocol for wireless sensor networks. 346-350 - Songhe Zhao, Charles A. Shoniregun, Chris Imafidon:
Addressing the vulnerability of the 4-way handshake of 802.11i. 351-356 - Ahmad S. Al-Mogren:
A power efficient technique for multi-channel dissemination networks. 357-362
Semantic Web and Ontology
- Esraa Omran, Albert Bokma
, Shereef Abu Al-Maati:
Chain ontology based: A model for protecting personal information privacy. 363-368 - Ermelinda Oro
, Massimo Ruffolo
:
Description Ontologies. 369-374 - Rodolfo Stecher, Claudia Niederée
, Wolfgang Nejdl
:
Query rewriting for lightweight information integration. 375-380
E-Learning, eCommerce, e-Business and e-Government
- Efthimios Tambouris
, Nikos Loutas, Vassilios Peristeras, Konstantinos A. Tarabanis
:
The role of interoperability in eGovernment applications: An investigation of obstacles and implementation decisions. 381-386 - Wolfgang Kahlig:
Legal cognitive decision processing towards a dynamic taxonomy. 387-392 - Alexandra Lipitakis:
E-business and strategy management in Digital Information Management methodologies: An adaptive algorithmic approach. 393-398 - Arash Niknafs, Nasrollah Moghaddam Charkari, Ali Akbar Niknafs:
PROMETHEE-based recommender system for multi-sort recommendations in on-line stores. 399-404 - Cyril Ehijie Azenabor, Charles A. Shoniregun:
Electronic government paradigm. 405-410 - Samson Omosule, Charles A. Shoniregun, David Preston:
A framework for culture influence Virtual Learning Environments trust. 411-416 - Chima Adiele:
Modeling interactivity in a B2B Web-based Community. 417-422 - Abdullah A. Al-Tameem:
Identification of influence factors in the information technology formation in United Arab Emirates. 423-429
Web Mining including Web Intelligence and Web 3.0
- Kerstin Denecke
:
How to assess customer opinions beyond language barriers? 430-435 - Dell Zhang, Robert Mao:
Extracting community structure features for hypertext classification. 436-441
Case Studies on Data Management, Monitoring and Analysis
- Ahlem Melouah
, Hayet Farida Merouani
:
Hierarchical segmentation of digital mammography by agents competition. 442-447 - Benoît Otjacques, Pierre Collin, Fernand Feltz, Monique Noirhomme-Fraiture:
Visualizing consumption in weighted hierarchies. 448-455 - Chunyang Hu, Yongwang Zhao, Dianfu Ma, Xiaoliang Sun, Jun Shao, Xuan Li:
Collaborative geospatial web services for multi-dimension remote sensing data. 456-463 - Mohammed Ibrahim Alodib, Behzad Bordbar, Basim Majeed:
A model driven approach to the design and implementing of fault tolerant Service oriented Architectures. 464-469 - Santi Caballé
, Fatos Xhafa
, Ajith Abraham:
Towards an automatic real-time assessment of online discussions in Computer-Supported Collaborative Learning practices. 470-475
Mobile Data Management
- Zarina Dzolkhifli
, Hamidah Ibrahim, Lilly Suriani Affendey, Praveen Madiraju:
A framework for caching relevant data items for checking integrity constraints of mobile database. 476-482 - Alexander V. Smirnov, Nikolay Shilov
, Andrew Krizhanovsky
, Antti Lappeteläinen, Ian Oliver, Sergey Boldyrev:
Efficient distributed information management in smart spaces. 483-488 - Jacques M. Bahi, Mirna Eskandar, Ahmed Mostefaoui:
A robust cooperation approach for mobile multimedia adhoc networks. 489-494 - Seyed Hossein Khasteh
, Saeed Bagheri Shouraki, Ali Akbar Kiaei:
A new sufficient condition for 1-coverage to imply connectivity. 495-499
Natural Language Processing
- Alin Mihaila, Andreea Diana Mihis, Cristina Mihaila:
A genetic algorithm for logical topic text segmentation. 500-505 - Amani A. Al-Ajlan, Hend S. Al-Khalifa
, AbdulMalik S. Al-Salman:
Towards the development of an automatic readability measurements for arabic language. 506-511 - Francisco M. Carrero, José Carlos Cortizo, José María Gómez:
Testing concept indexing in crosslingual medical text classification. 512-519 - Mohamed Elhadi, Amjad Al-Tobi:
Use of text syntactical structures in detection of document duplicates. 520-525 - Azadeh Zamanifar
, Behrouz Minaei-Bidgoli
, Omid Kashefi
:
A new technique for detecting similar documents based on term co-occurrence and conceptual property of the text. 526-531 - Md. Nawab Yousuf Ali, S. M. Abdullah Al-Mamun, Jugal Krishna Das, Abu Mohammad Nurannabi:
Morphological analysis of Bangla words for Universal Networking Language. 532-537 - Yuzana, Khin Marlar Tun:
A comparison of collation algorithm for Myanmar language. 538-543 - Seiji Egawa, Yoshihide Kato, Shigeki Matsubara
:
Sentence compression by structural conversion of parse tree. 544-550 - Falk Brauer, Marcus Schramm, Wojciech M. Barczynski, Alexander Löser
, Hong Hai Do:
Robust recognition of complex entities in text exploiting enterprise data and NLP-techniques. 551-558
Information Content Security
- Muhammad Sharif, Tariq Faiz, Mudassar Raza
:
Time signatures - an implementation of Keystroke and click patterns for practical and secure authentication. 559-562 - Abbas Cheddad
, Joan Condell, Kevin Curran
, Paul McKevitt:
Securing information content using new encryption method and Steganography. 563-568 - Alexandros Papanikolaou
, Christos Ilioudis, Christos K. Georgiadis, Elias Pimenidis:
The importance of biometric sensor continuous secure monitoring. 569-574 - Noor-ul-Qayyum, Farooq Ahmad:
Integrity assurance of mobile agents through public-key encryption and watermarking. 575-580 - Yi-Tung F. Chan, Charles A. Shoniregun, Galyna A. Akmayeva:
A NetFlow based internet-worm detecting system in large network. 581-586
XML
- Karim Yaici, Ahmet M. Kondoz:
Runtime middleware for the generation of adaptive user interfaces on resource-constrained devices. 587-592 - Barbara Van De Keer, Dieter Van Rijsselbergen, Erik Mannens
, Rik Van de Walle:
A framework for RESTful object exchange through schematized XML (unRESTricted). 593-598 - Taketo Sasaki, Takuya Fukushima, Daeil Park, Motomichi Toyama:
Fine-grained access control in hybrid relational-XML database. 599-604 - Ramez Alkhatib
, Marc H. Scholl
:
CXQU: A compact XML storage for efficient query and update processing. 605-612 - Mercedes Argüello Casteleiro, Jose Julio Des Diz, A. Thompson, Hilary Paniagua, Maria Jesus Fernandez Prieto, Rogelio Perez:
Enabling smooth integration between HL7 CDA and medical guidelines on the web with an initial focus on women's health in general practice. 613-620
Data Management
- Christoph Schommer:
Sieving publishing communities in DBLP. 621-625 - Dell Zhang, Zheng Zhu:
A fast approximate algorithm for large-scale Latent Semantic Indexing. 626-631 - Renata M. C. R. de Souza, Francisco José de A. Cysneiros, Diego C. F. Queiroz, Roberta A. de A. Fagundes:
Two pattern classifiers for interval data based on binary regression models. 632-637 - Dell Zhang, Wee Sun Lee:
Learning classifiers without negative examples: A reduction approach. 638-643
Database Management
- Ali-Asghar Safaei, Mostafa Haghjoo, Sulmaz Abdi:
Semantic cache schema for query processing in mobile databases. 644-649 - Peyman Kabiri
, Hamed Shahbazi, Mohsen Soryani
:
Statistical shape based multispectral image retrieval extracting Power Spectrum Vectors. 650-655 - Jin Wu, Zhili Sun
:
A cross-layer quality driven approach in Web service selection. 656-661 - Teppei Shimada, Tatsuo Tsuji, Ken Higuchi:
A storage scheme for multidimensional data alleviating dimension dependency. 662-668 - Houssem Jerbi
, Franck Ravat
, Olivier Teste
, Gilles Zurfluh:
Management of context-aware preferences in multidimensional databases. 669-675 - Prakash Musham, Sharad Singh, Rashi Bahal, T. V. Prabhakar:
Visual SBVR. 676-683
Knowledge Management
- Myunggwon Hwang, Pankoo Kim:
Adapted relation structure algorithm for Word Sense Disambiguation. 684-688 - Olga Zvereva, Vera Morosova:
Process-oriented method usage for examining the knowledge mining process. 689-694 - Reza Hoveida, Gholamreza Shams, Ali Hooshmand:
Knowledge management practices in higher education institutes: A different approach. 695-702 - Qutaibah Althebyan
, Brajendra Panda:
Performance analysis of an insider threat mitigation model. 703-709 - Ann Johnston, Francesco Lelli
, Stefan Decker
:
Using the augmented vector space model to support the knowledge worker in document filtering. 710-715
Multimedia Information Systems
- Iker Gondra, Tao Xu:
Adaptive mean shift-based image segmentation using multiple instance learning. 716-721 - Dannan Lin, Charles A. Shoniregun, Galyna A. Akmayeva:
The softphone security. 722-726 - Ronald Glasberg, Sebastian Schmiedeke, Huseyin Oguz, Pascal Kelm, Thomas Sikora:
Real-time detection of sport in MPEG-2 sequences using high-level AV-descriptors and SVM. 727-732
Data and Information Quality Management
- Francisco M. Couto
, Tiago Grego
, Hugo P. Bastos, Catia Pesquita
, Rafael P. Torres
, Pablo Sanchez, Leandro Pascual, Christian Blaschke:
Identifying bioentity recognition errors of rule-based text-mining systems. 733-738 - Ana Iglesias
, Guillermo G. Millan, Elisa Pintado, Elena Castro:
MAW: A new effective and efficient knowledge Meta-model for Audiovisual Works. 739-744 - Ouldooz Baghban Karimi, Saleh Yousefi, Mahmood Fathy, Mojtaba Mazoochi:
Availability measurement in peer to peer network management systems. 745-750
Data Grids, Data and Information Quality
- Qaisar Rasool, Jianzhong Li, George S. Oreku, Shuo Zhang, Donghua Yang:
A load balancing replica placement strategy in Data Grid. 751-756