


default search action
6. ICDIM 2011: Melbourne, Australia
- Sixth IEEE International Conference on Digital Information Management, ICDIM 2011, Melbourne, Australia, September 26-28, 2011. IEEE 2011, ISBN 978-1-4577-1538-9

- Md. Sumon Shahriar, Jixue Liu

:
On mining association rules with semantic constraints in XML. 1-5 - Fariba Khademolghorani:

An effective algorithm for mining association rules based on imperialist competitive algorithm. 6-11 - Eya Ben Ahmed, Ahlem Nabli, Faïez Gargouri

:
Mining cyclic association rules from multidimensional knowledge. 12-17 - Tieta Antaresti, Mohamad Ivan Fanany

, Aniati Murni Arymurthy:
Maintaining imbalance highly dependent medical data using dirichlet process data generation. 18-22 - Stanislav Fajt, Irena Mlynkova

, Martin Necaský
:
On mining XML integrity constraints. 23-29 - Khalid Iqbal, Sohail Asghar, Simon Fong:

A PPDM model using Bayesian Network for hiding sensitive XML Association Rules. 30-35 - Gabriele Di Chiara, Luca Paolino, Marco Romano

, Monica Sebillo, Genny Tortora, Giuliana Vitiello
, Athula Ginige
:
The Framy user interface for visually-impaired users. 36-41 - Alton Yeow-Kuan Chua, Radhika Shenoy Balkunje, Dion Hoe-Lian Goh:

Evaluation of disaster management portals: Applying knowledge management to digital information. 42-47 - Elise Desmier, Frédéric Flouvat, Benoît Stoll

, Nazha Selmaoui-Folcher
:
Coconut fields classification using data mining on a large database of high-resolution Ikonos images. 48-53 - Jun Wu, Xiaodong Li, Xin Wang, Baoping Yan:

DNS usage mining and its two applications. 54-60 - Anwar Alhenshiri, Hoda Badesh:

The effect of user search behaviour on web information gathering tasks. 61-66 - Ingyu Lee, Byung-Won On:

Weighted hybrid features to resolve mixed entities. 67-72 - Michal Krátký

, Radim Baca
, David Bednar, Jirí Walder, Jiri Dvorský, Peter Chovanec:
Index-based n-gram extraction from large document collections. 73-78 - Fahad Alahmari:

Evaluating SPARQL using query federation and link traversal. 79-84 - Liliana Alexandre, Jorge Coelho

:
Filtering XML content for publication and presentation on the web. 85-89 - Mansour Alsulaiman, Muhammad Ghulam

, Zulfiqar Ali
:
Comparison of voice features for Arabic speech recognition. 90-95 - Htwe Pa Pa Win, Phyo Thu Thu Khine, Khin Nwe Ni Tun:

Converting Myanmar printed document image into machine understandable text format. 96-101 - Ashfa Umber, Imran Sarwar Bajwa

:
Minimizing ambiguity in natural language software requirements specification. 102-107 - Dongeun Lee, Sunghoon Choi:

Multisensor fusion-based object detection and tracking using Active Shape Model. 108-114 - Ales Mishchenko

, Natalia Vassilieva:
Chart image understanding and numerical data extraction. 115-120 - Phyo Thu Thu Khine, Htwe Pa Pa Win, Khin Nwe Ni Tun:

Keyword searching and browsing system over relational databases. 121-126 - Agus Widodo

, Mohamad Ivan Fanany
, Indra Budi
:
Technology forecasting in the field of Apnea from online publications: Time series analysis on Latent Semantic. 127-132 - A. N. K. Zaman

, Pascal Matsakis, Charles Grant Brown:
Evaluation of stop word lists in text retrieval using Latent Semantic Indexing. 133-136 - Han Wang, Bo Lang:

Online ngram-enhanced topic model for academic retrieval. 137-142 - Sameendra Samarawickrama, Lakshman Jayaratne:

Automatic text classification and focused crawling. 143-148 - Zeynab Amiri, Masoud Sabae:

Prediction of hotspot in data centric storage. 149-153 - Talha Anwar, Sohail Asghar, Simon Fong:

Bayesian based subgroup discovery. 154-161 - Rui Tang, Simon Fong, Sababady Sarasvady:

Expert finding and query answering for Collaborative Inter-Organizational system by using Rule Responder. 162-167 - Jean-Pierre Nziga:

Minimal dataset for Network Intrusion Detection Systems via dimensionality reduction. 168-173 - Imran Sarwar Bajwa

, Rubata Riasat:
A new perfect hashing based approach for secure stegnograph. 174-178 - Elvis Pontes, Adilson Eduardo Guelfi, Sergio Takeo Kofuji

, Anderson Aparecido Alves da Silva
:
Applying multi-correlation for improving forecasting in cyber security. 179-186 - Dina Sadat Jalali, Alireza Shahrbanoonezhad:

A new method based on Finite State Machine for detecting misbehaving nodes in ad hoc networks. 187-192 - Rosziati Ibrahim

, Teoh Suk Kuan:
PRIS: Image processing tool for dealing with criminal cases using steganography technique. 193-198 - Anne Gabrielle Bowitz, Espen Grannes Graarud, Lawrie Brown, Martin Gilje Jaatun

:
BatCave: Adding security to the BATMAN protocol. 199-204 - N. Parimala, Anu Saini:

Web service with criteria: Extending WSDL. 205-210 - Junpei Kawamoto, Masatoshi Yoshikawa:

Private range query by perturbation and matrix based encryption. 211-216 - Rayed AlGhamdi

, Steve Drew, Mohammed Alshehri:
Strategic government initiatives to promote diffusion of online retailing in Saudi Arabia. 217-222 - Sven Groppe

, Jinghua Groppe, Stefan Werner, Matthias Samsel, Florian Kalis, Kristina Fell, Peter Kliesch, Markus Nakhlah:
Monitoring eBay auctions by querying RDF streams. 223-228 - Alan C. Lin, Ho Minh Tuan

, Dean K. Sheu:
Programming for evaluating strip layout of progressive dies. 229-234 - A. O. García, Serguei Bourov, Ahmad Hammad, Thomas Jejkal, Jens C. Otte, Sven Pfeiffer, T. Schenker, Christian Schmidt, Jos van Wezel

, Bernhard Neumair, Achim Streit
:
Data management and analysis at the Large Scale Data Facility. 235-241 - Martin Necaský

, Jakub Klímek
, Jakub Malý:
When theory meets practice: A case report on conceptual modeling for XML. 242-251 - Takao Shime, Kazuo Kunieda, Keiji Yamada, Hideki Kawai:

Area-based communication detector. 252-257 - Guanghao Low, Dion Hoe-Lian Goh, Chei Sian Lee:

A study of motivations for using mobile content sharing games. 258-263 - Kazunari Ishida:

Geo-local contents system with mobile devices. 264-269 - Yoshio Ishizawa, Dai Kusui, Hironori Mizuguchi, Yukitaka Kusumura, Yusuke Muraoka:

A method for conversational topic recommendation to appropriate user group. 270-275 - Shirlee-ann Knight

:
Information management in health systems: Considering an organic approach. 276-281 - Mahdi Jalili

:
Discriminating early stage AD patients from healthy controls using synchronization analysis of EEG. 282-287 - Md. Sumon Shahriar, Paulo A. de Souza Jr.

, Greg P. Timms:
Pattern mining for query answering in marine sensor data. 288-293 - Ning Li, Zhanhuai Li, Yanming Nie, Xiling Sun, Xia Li:

Predicting software black-box defects using stacked generalization. 294-299 - Reza Reyhani, Amir-Masoud Eftekhari-Moghadam:

A heuristic method for forecasting chaotic time series based on economic variables. 300-304 - Bafrin Zarei, Reza Ghanbarzadeh

, Poorya Khodabande, Hadi Toofani:
MHPSO: A new method to enhance the Particle Swarm Optimizer. 305-309 - Divesh Lala, Sutasinee Thovutikul

, Toyoaki Nishida:
Towards a virtual environment for capturing behavior in cultural crowds. 310-315 - Nicolas Jones, Armelle Brun, Anne Boyer:

Improving reliability of user preferences: Comparing instead of rating. 316-321 - Faaizah Shahbodin

, Mariana Yusoff, Che Ku Nuraini Che Ku Mohd
:
ICT + PBL = holistic learning solution: UTeM's experience. 322-326 - Nada Bajnaid, Rachid Benlamri, Boris I. Cogan:

Context-aware SQA e-learning system. 327-331 - Fattaneh Mimhashemi, Amir Albadavi, Abbas Asosheh, Mohammad Ghaem Tajgardoon:

A service-based grid computing model to apply in the universities and institutes. 332-336 - Zhuojia Xu, Xun Yi:

Classification of Privacy-preserving Distributed Data Mining protocols. 337-342 - Yusuke Gotoh, Kentaro Suzuki, Tomoki Yoshihisa, Hideo Taniguchi, Masanori Kanazawa:

Evaluation of P2P streaming systems for webcast. 343-350 - Wejdan Alkaldi, Fereidoon Sadri:

Query optimization in information integration for queries involving aggregation and group by. 351-358

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














