callback( { "result":{ "query":":facetid:toc:\"db/conf/icwe/icwe2013.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"207.45" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"52", "@dc":"52", "@oc":"52", "@id":"43392379", "text":":facetid:toc:db/conf/icwe/icwe2013.bht" } }, "hits":{ "@total":"52", "@computed":"52", "@sent":"52", "@first":"0", "hit":[{ "@score":"1", "@id":"4175165", "info":{"authors":{"author":{"@pid":"a/WilMPvanderAalst","text":"Wil M. P. van der Aalst"}},"title":"Challenges in Service Mining: Record, Check, Discover.","venue":"ICWE","pages":"1-4","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/Aalst13","doi":"10.1007/978-3-642-39200-9_1","ee":"https://doi.org/10.1007/978-3-642-39200-9_1","url":"https://dblp.org/rec/conf/icwe/Aalst13"}, "url":"URL#4175165" }, { "@score":"1", "@id":"4175166", "info":{"authors":{"author":[{"@pid":"32/3306","text":"Sudhir Agarwal 0001"},{"@pid":"92/8176","text":"Martin Junghans 0001"}]},"title":"Towards Simulation-Based Similarity of End User Browsing Processes.","venue":"ICWE","pages":"216-223","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/AgarwalJ13","doi":"10.1007/978-3-642-39200-9_19","ee":"https://doi.org/10.1007/978-3-642-39200-9_19","url":"https://dblp.org/rec/conf/icwe/AgarwalJ13"}, "url":"URL#4175166" }, { "@score":"1", "@id":"4175167", "info":{"authors":{"author":[{"@pid":"132/0302","text":"M. Elgin Akpinar"},{"@pid":"y/YYesilada","text":"Yeliz Yesilada"}]},"title":"Erratum: Heuristic Role Detection of Visual Elements of Web Pages.","venue":"ICWE","pages":"1","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/AkpinarY13","doi":"10.1007/978-3-642-39200-9_51","ee":"https://doi.org/10.1007/978-3-642-39200-9_51","url":"https://dblp.org/rec/conf/icwe/AkpinarY13"}, "url":"URL#4175167" }, { "@score":"1", "@id":"4175168", "info":{"authors":{"author":[{"@pid":"132/0302","text":"M. Elgin Akpinar"},{"@pid":"y/YYesilada","text":"Yeliz Yesilada"}]},"title":"Heuristic Role Detection of Visual Elements of Web Pages.","venue":"ICWE","pages":"123-131","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/AkpinarY13a","doi":"10.1007/978-3-642-39200-9_12","ee":"https://doi.org/10.1007/978-3-642-39200-9_12","url":"https://dblp.org/rec/conf/icwe/AkpinarY13a"}, "url":"URL#4175168" }, { "@score":"1", "@id":"4175170", "info":{"authors":{"author":[{"@pid":"128/2531","text":"Asil A. Almonaies"},{"@pid":"49/2794","text":"Manar H. Alalfi"},{"@pid":"c/JamesRCordy","text":"James R. Cordy"},{"@pid":"d/ThomasRDean","text":"Thomas R. Dean"}]},"title":"A Framework for Migrating Web Applications to Web Services.","venue":"ICWE","pages":"384-399","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/AlmonaiesACD13","doi":"10.1007/978-3-642-39200-9_32","ee":"https://doi.org/10.1007/978-3-642-39200-9_32","url":"https://dblp.org/rec/conf/icwe/AlmonaiesACD13"}, "url":"URL#4175170" }, { "@score":"1", "@id":"4175172", "info":{"authors":{"author":[{"@pid":"10/870","text":"Markus Ast"},{"@pid":"55/819","text":"Stefan Wild"},{"@pid":"11/4107","text":"Martin Gaedke"}]},"title":"The SWAC Approach for Sharing a Web Application's Codebase Between Server and Client.","venue":"ICWE","pages":"84-98","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/AstWG13","doi":"10.1007/978-3-642-39200-9_9","ee":"https://doi.org/10.1007/978-3-642-39200-9_9","url":"https://dblp.org/rec/conf/icwe/AstWG13"}, "url":"URL#4175172" }, { "@score":"1", "@id":"4175174", "info":{"authors":{"author":[{"@pid":"132/0308","text":"Zahra Behfarshad"},{"@pid":"72/4471-1","text":"Ali Mesbah 0001"}]},"title":"Hidden-Web Induced by Client-Side Scripting: An Empirical Study.","venue":"ICWE","pages":"52-67","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/BehfarshadM13","doi":"10.1007/978-3-642-39200-9_7","ee":"https://doi.org/10.1007/978-3-642-39200-9_7","url":"https://dblp.org/rec/conf/icwe/BehfarshadM13"}, "url":"URL#4175174" }, { "@score":"1", "@id":"4175175", "info":{"authors":{"author":[{"@pid":"03/3919","text":"Antonia Bertolino"},{"@pid":"93/7522","text":"Antonello Calabrò"},{"@pid":"45/5900","text":"Guglielmo De Angelis"}]},"title":"A Generative Approach for the Adaptive Monitoring of SLA in Service Choreographies.","venue":"ICWE","pages":"408-415","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/BertolinoCA13","doi":"10.1007/978-3-642-39200-9_34","ee":"https://doi.org/10.1007/978-3-642-39200-9_34","url":"https://dblp.org/rec/conf/icwe/BertolinoCA13"}, "url":"URL#4175175" }, { "@score":"1", "@id":"4175176", "info":{"authors":{"author":[{"@pid":"44/3930","text":"Devis Bianchini"},{"@pid":"a/ValeriaDeAntonellis","text":"Valeria De Antonellis"},{"@pid":"45/1072","text":"Michele Melchiori"}]},"title":"A Linked Data Perspective for Effective Exploration of Web APIs Repositories.","venue":"ICWE","pages":"506-509","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/BianchiniAM13","doi":"10.1007/978-3-642-39200-9_46","ee":"https://doi.org/10.1007/978-3-642-39200-9_46","url":"https://dblp.org/rec/conf/icwe/BianchiniAM13"}, "url":"URL#4175176" }, { "@score":"1", "@id":"4175178", "info":{"authors":{"author":{"@pid":"b/JOBorchers","text":"Jan O. Borchers"}},"title":"An Internet of Custom-Made Things: From 3D Printing and Personal Fabrication to Personal Design of Interactive Devices.","venue":"ICWE","pages":"6","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/Borchers13","doi":"10.1007/978-3-642-39200-9_3","ee":"https://doi.org/10.1007/978-3-642-39200-9_3","url":"https://dblp.org/rec/conf/icwe/Borchers13"}, "url":"URL#4175178" }, { "@score":"1", "@id":"4175179", "info":{"authors":{"author":[{"@pid":"64/8750","text":"Mohamed Reda Bouadjenek"},{"@pid":"63/9059","text":"Amyn Bennamane"},{"@pid":"48/287","text":"Hakim Hacid"},{"@pid":"b/MBouzeghoub","text":"Mokrane Bouzeghoub"}]},"title":"Evaluation of Personalized Social Ranking Functions of Information Retrieval.","venue":"ICWE","pages":"283-290","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/BouadjenekBHB13","doi":"10.1007/978-3-642-39200-9_24","ee":"https://doi.org/10.1007/978-3-642-39200-9_24","url":"https://dblp.org/rec/conf/icwe/BouadjenekBHB13"}, "url":"URL#4175179" }, { "@score":"1", "@id":"4175180", "info":{"authors":{"author":[{"@pid":"12/2920","text":"Alessandro Bozzon"},{"@pid":"80/9674","text":"Luca Galli"}]},"title":"An Introduction to Human Computation and Games with a Purpose.","venue":"ICWE","pages":"514-517","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/BozzonG13","doi":"10.1007/978-3-642-39200-9_48","ee":"https://doi.org/10.1007/978-3-642-39200-9_48","url":"https://dblp.org/rec/conf/icwe/BozzonG13"}, "url":"URL#4175180" }, { "@score":"1", "@id":"4175185", "info":{"authors":{"author":[{"@pid":"20/11466","text":"Suryakant Choudhary"},{"@pid":"01/9795","text":"Mustafa Emre Dincturk"},{"@pid":"01/8524","text":"Seyed M. Mirtaheri"},{"@pid":"99/2759","text":"Guy-Vincent Jourdan"},{"@pid":"b/GvBochmann","text":"Gregor von Bochmann"},{"@pid":"90/5997","text":"Iosif-Viorel Onut"}]},"title":"Building Rich Internet Applications Models: Example of a Better Strategy.","venue":"ICWE","pages":"291-305","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/ChoudharyDMJBO13","doi":"10.1007/978-3-642-39200-9_25","ee":"https://doi.org/10.1007/978-3-642-39200-9_25","url":"https://dblp.org/rec/conf/icwe/ChoudharyDMJBO13"}, "url":"URL#4175185" }, { "@score":"1", "@id":"4175186", "info":{"authors":{"author":[{"@pid":"79/10097","text":"Olexiy Chudnovskyy"},{"@pid":"06/3720","text":"Christian Fischer"},{"@pid":"11/4107","text":"Martin Gaedke"},{"@pid":"31/3618","text":"Stefan Pietschmann"}]},"title":"Inter-Widget Communication by Demonstration in User Interface Mashups.","venue":"ICWE","pages":"502-505","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/ChudnovskyyFGP13","doi":"10.1007/978-3-642-39200-9_45","ee":"https://doi.org/10.1007/978-3-642-39200-9_45","url":"https://dblp.org/rec/conf/icwe/ChudnovskyyFGP13"}, "url":"URL#4175186" }, { "@score":"1", "@id":"4175187", "info":{"authors":{"author":[{"@pid":"79/10097","text":"Olexiy Chudnovskyy"},{"@pid":"31/3618","text":"Stefan Pietschmann"},{"@pid":"56/7066","text":"Matthias Niederhausen"},{"@pid":"12/388","text":"Vadim I. Chepegin"},{"@pid":"10/6918","text":"David Griffiths"},{"@pid":"11/4107","text":"Martin Gaedke"}]},"title":"Awareness and Control for Inter-Widget Communication: Challenges and Solutions.","venue":"ICWE","pages":"114-122","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/ChudnovskyyPNCGG13","doi":"10.1007/978-3-642-39200-9_11","ee":"https://doi.org/10.1007/978-3-642-39200-9_11","url":"https://dblp.org/rec/conf/icwe/ChudnovskyyPNCGG13"}, "url":"URL#4175187" }, { "@score":"1", "@id":"4175188", "info":{"authors":{"author":[{"@pid":"72/214","text":"Umberto Souza da Costa"},{"@pid":"f/MirianHalfeldFerrariAlves","text":"Mirian Halfeld Ferrari Alves"},{"@pid":"72/5025","text":"Martin A. Musicante"},{"@pid":"08/3387-1","text":"Sophie Robert 0001"}]},"title":"Automatic Refinement of Service Compositions.","venue":"ICWE","pages":"400-407","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/CostaAMR13","doi":"10.1007/978-3-642-39200-9_33","ee":"https://doi.org/10.1007/978-3-642-39200-9_33","url":"https://dblp.org/rec/conf/icwe/CostaAMR13"}, "url":"URL#4175188" }, { "@score":"1", "@id":"4175190", "info":{"authors":{"author":[{"@pid":"00/8343","text":"Tangjian Deng"},{"@pid":"63/5422-23","text":"Liang Zhao 0023"},{"@pid":"58/4464","text":"Ling Feng"}]},"title":"Enhancing Web Revisitation by Contextual Keywords.","venue":"ICWE","pages":"323-337","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/DengZF13","doi":"10.1007/978-3-642-39200-9_27","ee":"https://doi.org/10.1007/978-3-642-39200-9_27","url":"https://dblp.org/rec/conf/icwe/DengZF13"}, "url":"URL#4175190" }, { "@score":"1", "@id":"4175191", "info":{"authors":{"author":[{"@pid":"16/55","text":"Oscar Díaz"},{"@pid":"132/0296","text":"Itziar Otaduy"},{"@pid":"94/8308","text":"Gorka Puente"}]},"title":"User-Driven Automation of Web Form Filling.","venue":"ICWE","pages":"171-185","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/DiazOP13","doi":"10.1007/978-3-642-39200-9_16","ee":"https://doi.org/10.1007/978-3-642-39200-9_16","url":"https://dblp.org/rec/conf/icwe/DiazOP13"}, "url":"URL#4175191" }, { "@score":"1", "@id":"4175193", "info":{"authors":{"author":[{"@pid":"22/4396","text":"Frederico Araújo Durão"},{"@pid":"32/7717","text":"Rodrigo Elia Assad"},{"@pid":"132/0306","text":"Anderson Fonseca 0001"},{"@pid":"133/8482","text":"Jose Fernando S. Carvalho"},{"@pid":"g/ViniciusCardosoGarcia","text":"Vinicius Cardoso Garcia"},{"@pid":"126/6814","text":"Fernando A. M. Trinta"}]},"title":"USTO.RE: A Private Cloud Storage Software System.","venue":"ICWE","pages":"452-466","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/DuraoAFFGT13","doi":"10.1007/978-3-642-39200-9_38","ee":"https://doi.org/10.1007/978-3-642-39200-9_38","url":"https://dblp.org/rec/conf/icwe/DuraoAFFGT13"}, "url":"URL#4175193" }, { "@score":"1", "@id":"4175195", "info":{"authors":{"author":[{"@pid":"14/8074-2","text":"Muhammad Faheem 0002"},{"@pid":"12/225","text":"Pierre Senellart"}]},"title":"Intelligent and Adaptive Crawling of Web Applications for Web Archiving.","venue":"ICWE","pages":"306-322","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/FaheemS13","doi":"10.1007/978-3-642-39200-9_26","ee":"https://doi.org/10.1007/978-3-642-39200-9_26","url":"https://dblp.org/rec/conf/icwe/FaheemS13"}, "url":"URL#4175195" }, { "@score":"1", "@id":"4175196", "info":{"authors":{"author":[{"@pid":"117/4348","text":"Besnik Fetahu"},{"@pid":"08/10894","text":"Bernardo Pereira Nunes"},{"@pid":"25/5167","text":"Stefan Dietze"}]},"title":"Summaries on the Fly: Query-Based Extraction of Structured Knowledge from Web Documents.","venue":"ICWE","pages":"249-264","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/FetahuND13","doi":"10.1007/978-3-642-39200-9_22","ee":"https://doi.org/10.1007/978-3-642-39200-9_22","url":"https://dblp.org/rec/conf/icwe/FetahuND13"}, "url":"URL#4175196" }, { "@score":"1", "@id":"4175197", "info":{"authors":{"author":[{"@pid":"25/8234","text":"Sergio Firmenich"},{"@pid":"r/GustavoRossi","text":"Gustavo Rossi"},{"@pid":"43/410","text":"Marco Winckler"}]},"title":"A Domain Specific Language for Orchestrating User Tasks Whilst Navigation Web Sites.","venue":"ICWE","pages":"224-232","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/FirmenichRW13","doi":"10.1007/978-3-642-39200-9_20","ee":"https://doi.org/10.1007/978-3-642-39200-9_20","url":"https://dblp.org/rec/conf/icwe/FirmenichRW13"}, "url":"URL#4175197" }, { "@score":"1", "@id":"4175199", "info":{"authors":{"author":[{"@pid":"132/0297","text":"Simon Franz"},{"@pid":"h/ThomasHornung","text":"Thomas Hornung 0001"},{"@pid":"97/4570","text":"Cai-Nicolas Ziegler"},{"@pid":"28/9320","text":"Martin Przyjaciel-Zablocki"},{"@pid":"88/9320","text":"Alexander Schätzle"},{"@pid":"l/GeorgLausen","text":"Georg Lausen"}]},"title":"On Weighted Hybrid Track Recommendations.","venue":"ICWE","pages":"486-489","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/FranzHZPSL13","doi":"10.1007/978-3-642-39200-9_41","ee":"https://doi.org/10.1007/978-3-642-39200-9_41","url":"https://dblp.org/rec/conf/icwe/FranzHZPSL13"}, "url":"URL#4175199" }, { "@score":"1", "@id":"4175201", "info":{"authors":{"author":[{"@pid":"49/9739","text":"Patrick Gaubatz"},{"@pid":"48/8764","text":"Waldemar Hummer"},{"@pid":"00/6127","text":"Uwe Zdun"},{"@pid":"05/6430","text":"Mark Strembeck"}]},"title":"Supporting Customized Views for Enforcing Access Control Constraints in Real-Time Collaborative Web Applications.","venue":"ICWE","pages":"201-215","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/GaubatzHZS13","doi":"10.1007/978-3-642-39200-9_18","ee":"https://doi.org/10.1007/978-3-642-39200-9_18","url":"https://dblp.org/rec/conf/icwe/GaubatzHZS13"}, "url":"URL#4175201" }, { "@score":"1", "@id":"4175202", "info":{"authors":{"author":[{"@pid":"61/733","text":"Matthias Heinrich 0001"},{"@pid":"117/2829","text":"Franz Josef Grüneberger"},{"@pid":"41/5584","text":"Thomas Springer 0001"},{"@pid":"132/0310","text":"Philipp Hauer"},{"@pid":"11/4107","text":"Martin Gaedke"}]},"title":"GAwI: A Comprehensive Workspace Awareness Library for Collaborative Web Applications.","venue":"ICWE","pages":"482-485","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/HeinrichGSHG13","doi":"10.1007/978-3-642-39200-9_40","ee":"https://doi.org/10.1007/978-3-642-39200-9_40","url":"https://dblp.org/rec/conf/icwe/HeinrichGSHG13"}, "url":"URL#4175202" }, { "@score":"1", "@id":"4175204", "info":{"authors":{"author":[{"@pid":"60/7083","text":"Javier Luis Cánovas Izquierdo"},{"@pid":"18/948","text":"Jordi Cabot"}]},"title":"Discovering Implicit Schemas in JSON Data.","venue":"ICWE","pages":"68-83","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/IzquierdoC13","doi":"10.1007/978-3-642-39200-9_8","ee":"https://doi.org/10.1007/978-3-642-39200-9_8","url":"https://dblp.org/rec/conf/icwe/IzquierdoC13"}, "url":"URL#4175204" }, { "@score":"1", "@id":"4175205", "info":{"authors":{"author":[{"@pid":"13/6738","text":"Damir Juric"},{"@pid":"h/LauraHollink","text":"Laura Hollink"},{"@pid":"h/GeertJanHouben","text":"Geert-Jan Houben"}]},"title":"Discovering Links between Political Debates and Media.","venue":"ICWE","pages":"367-375","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/JuricHH13","doi":"10.1007/978-3-642-39200-9_30","ee":"https://doi.org/10.1007/978-3-642-39200-9_30","url":"https://dblp.org/rec/conf/icwe/JuricHH13"}, "url":"URL#4175205" }, { "@score":"1", "@id":"4175206", "info":{"authors":{"author":[{"@pid":"33/5836","text":"Matthias Keller"},{"@pid":"25/2112","text":"Hannes Hartenstein"}]},"title":"Mining Taxonomies from Web Menus: Rule-Based Concepts and Algorithms.","venue":"ICWE","pages":"265-282","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/KellerH13","doi":"10.1007/978-3-642-39200-9_23","ee":"https://doi.org/10.1007/978-3-642-39200-9_23","url":"https://dblp.org/rec/conf/icwe/KellerH13"}, "url":"URL#4175206" }, { "@score":"1", "@id":"4175209", "info":{"authors":{"author":[{"@pid":"30/7752","text":"Dejan Kovachev"},{"@pid":"35/7476","text":"Dominik Renzel"},{"@pid":"124/9756","text":"Petru Nicolaescu"},{"@pid":"k/RalfKlamma","text":"Ralf Klamma"}]},"title":"DireWolf - Distributing and Migrating User Interfaces for Widget-Based Web Applications.","venue":"ICWE","pages":"99-113","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/KovachevRNK13","doi":"10.1007/978-3-642-39200-9_10","ee":"https://doi.org/10.1007/978-3-642-39200-9_10","url":"https://dblp.org/rec/conf/icwe/KovachevRNK13"}, "url":"URL#4175209" }, { "@score":"1", "@id":"4175210", "info":{"authors":{"author":[{"@pid":"35/10647","text":"Rouven Krebs"},{"@pid":"61/11366","text":"Alexander Wert"},{"@pid":"k/SamuelKounev","text":"Samuel Kounev"}]},"title":"Multi-tenancy Performance Benchmark for Web Application Platforms.","venue":"ICWE","pages":"424-438","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/KrebsWK13","doi":"10.1007/978-3-642-39200-9_36","ee":"https://doi.org/10.1007/978-3-642-39200-9_36","url":"https://dblp.org/rec/conf/icwe/KrebsWK13"}, "url":"URL#4175210" }, { "@score":"1", "@id":"4175212", "info":{"authors":{"author":[{"@pid":"132/0307","text":"Juan José Jara Laconich"},{"@pid":"c/FabioCasati","text":"Fabio Casati"},{"@pid":"m/MaurizioMarchese","text":"Maurizio Marchese"}]},"title":"Social Spreadsheet.","venue":"ICWE","pages":"156-170","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/LaconichCM13","doi":"10.1007/978-3-642-39200-9_15","ee":"https://doi.org/10.1007/978-3-642-39200-9_15","url":"https://dblp.org/rec/conf/icwe/LaconichCM13"}, "url":"URL#4175212" }, { "@score":"1", "@id":"4175214", "info":{"authors":{"author":[{"@pid":"18/6095","text":"Jörg Lässig"},{"@pid":"121/3613","text":"Markus Ullrich"}]},"title":"Enterprise Application Integration - The Cloud Perspective.","venue":"ICWE","pages":"522-525","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/LassigU13","doi":"10.1007/978-3-642-39200-9_50","ee":"https://doi.org/10.1007/978-3-642-39200-9_50","url":"https://dblp.org/rec/conf/icwe/LassigU13"}, "url":"URL#4175214" }, { "@score":"1", "@id":"4175216", "info":{"authors":{"author":[{"@pid":"76/10928","text":"Martin Leginus"},{"@pid":"d/PeterDolog","text":"Peter Dolog"},{"@pid":"39/9059","text":"Ricardo Gomez Lage"}]},"title":"Tag Cloud Generation for Results of Multiple Keywords Queries.","venue":"ICWE","pages":"233-248","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/LeginusDL13","doi":"10.1007/978-3-642-39200-9_21","ee":"https://doi.org/10.1007/978-3-642-39200-9_21","url":"https://dblp.org/rec/conf/icwe/LeginusDL13"}, "url":"URL#4175216" }, { "@score":"1", "@id":"4175217", "info":{"authors":{"author":[{"@pid":"75/6273","text":"Luiz André P. Paes Leme"},{"@pid":"21/8385","text":"Giseli Rabello Lopes"},{"@pid":"08/10894","text":"Bernardo Pereira Nunes"},{"@pid":"c/MarcoACasanova","text":"Marco Antonio Casanova"},{"@pid":"25/5167","text":"Stefan Dietze"}]},"title":"Identifying Candidate Datasets for Data Interlinking.","venue":"ICWE","pages":"354-366","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/LemeLNCD13","doi":"10.1007/978-3-642-39200-9_29","ee":"https://doi.org/10.1007/978-3-642-39200-9_29","url":"https://dblp.org/rec/conf/icwe/LemeLNCD13"}, "url":"URL#4175217" }, { "@score":"1", "@id":"4175218", "info":{"authors":{"author":[{"@pid":"81/4741","text":"Stefania Leone"},{"@pid":"77/5842","text":"Alexandre de Spindler"},{"@pid":"n/MoiraCNorrie","text":"Moira C. Norrie"},{"@pid":"m/DennisMcLeod","text":"Dennis McLeod"}]},"title":"Integrating Component-Based Web Engineering into Content Management Systems.","venue":"ICWE","pages":"37-51","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/LeoneSNM13","doi":"10.1007/978-3-642-39200-9_6","ee":"https://doi.org/10.1007/978-3-642-39200-9_6","url":"https://dblp.org/rec/conf/icwe/LeoneSNM13"}, "url":"URL#4175218" }, { "@score":"1", "@id":"4175223", "info":{"authors":{"author":[{"@pid":"64/7880","text":"Josip Maras"},{"@pid":"20/6080","text":"Maja Stula"},{"@pid":"21/588","text":"Jan Carlson"}]},"title":"Generating Feature Usage Scenarios in Client-Side Web Applications.","venue":"ICWE","pages":"186-200","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/MarasSC13","doi":"10.1007/978-3-642-39200-9_17","ee":"https://doi.org/10.1007/978-3-642-39200-9_17","url":"https://dblp.org/rec/conf/icwe/MarasSC13"}, "url":"URL#4175223" }, { "@score":"1", "@id":"4175226", "info":{"authors":{"author":[{"@pid":"47/1654","text":"Maristella Matera"},{"@pid":"76/8688","text":"Matteo Picozzi"},{"@pid":"132/0303","text":"Michele Pini"},{"@pid":"132/0312","text":"Marco Tonazzo"}]},"title":"PEUDOM: A Mashup Platform for the End User Development of Common Information Spaces.","venue":"ICWE","pages":"494-497","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/MateraPPT13","doi":"10.1007/978-3-642-39200-9_43","ee":"https://doi.org/10.1007/978-3-642-39200-9_43","url":"https://dblp.org/rec/conf/icwe/MateraPPT13"}, "url":"URL#4175226" }, { "@score":"1", "@id":"4175227", "info":{"authors":{"author":[{"@pid":"15/8173","text":"Vagner de Brito Nascimento"},{"@pid":"s/DanielSchwabe","text":"Daniel Schwabe"}]},"title":"Semantic Data Driven Interfaces for Web Applications.","venue":"ICWE","pages":"22-36","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/NascimentoS13","doi":"10.1007/978-3-642-39200-9_5","ee":"https://doi.org/10.1007/978-3-642-39200-9_5","url":"https://dblp.org/rec/conf/icwe/NascimentoS13"}, "url":"URL#4175227" }, { "@score":"1", "@id":"4175228", "info":{"authors":{"author":[{"@pid":"62/6006","text":"Michael Nebeling"},{"@pid":"n/MoiraCNorrie","text":"Moira C. Norrie"}]},"title":"Responsive Design and Development: Methods, Technologies and Current Issues.","venue":"ICWE","pages":"510-513","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/NebelingN13","doi":"10.1007/978-3-642-39200-9_47","ee":"https://doi.org/10.1007/978-3-642-39200-9_47","url":"https://dblp.org/rec/conf/icwe/NebelingN13"}, "url":"URL#4175228" }, { "@score":"1", "@id":"4175230", "info":{"authors":{"author":[{"@pid":"56/9755","text":"Talal H. Noor"},{"@pid":"s/QuanZSheng","text":"Quan Z. Sheng"},{"@pid":"130/2971","text":"Abdullah Alfazi"}]},"title":"Detecting Occasional Reputation Attacks on Cloud Services.","venue":"ICWE","pages":"416-423","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/NoorSA13","doi":"10.1007/978-3-642-39200-9_35","ee":"https://doi.org/10.1007/978-3-642-39200-9_35","url":"https://dblp.org/rec/conf/icwe/NoorSA13"}, "url":"URL#4175230" }, { "@score":"1", "@id":"4175231", "info":{"authors":{"author":[{"@pid":"132/0311","text":"Alexandru Oprea"},{"@pid":"h/ThomasHornung","text":"Thomas Hornung 0001"},{"@pid":"97/4570","text":"Cai-Nicolas Ziegler"},{"@pid":"75/2121","text":"Holger Eggs"},{"@pid":"l/GeorgLausen","text":"Georg Lausen"}]},"title":"A Hybrid B2B App Recommender System.","venue":"ICWE","pages":"490-493","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/OpreaHZEL13","doi":"10.1007/978-3-642-39200-9_42","ee":"https://doi.org/10.1007/978-3-642-39200-9_42","url":"https://dblp.org/rec/conf/icwe/OpreaHZEL13"}, "url":"URL#4175231" }, { "@score":"1", "@id":"4175232", "info":{"authors":{"author":[{"@pid":"132/0294","text":"Tünay Özcan"},{"@pid":"132/0309","text":"Semra Kocak"},{"@pid":"56/10327","text":"Philipp Brune"}]},"title":"Agile Software Development with Open Source Software in a Hospital Environment - Case Study of an eCRF-System for Orthopaedical Studies.","venue":"ICWE","pages":"439-451","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/OzcanKB13","doi":"10.1007/978-3-642-39200-9_37","ee":"https://doi.org/10.1007/978-3-642-39200-9_37","url":"https://dblp.org/rec/conf/icwe/OzcanKB13"}, "url":"URL#4175232" }, { "@score":"1", "@id":"4175234", "info":{"authors":{"author":[{"@pid":"132/0299","text":"Carsten Radeck"},{"@pid":"31/9921","text":"Gregor Blichmann"},{"@pid":"m/KMeissner","text":"Klaus Meißner"}]},"title":"CapView - Functionality-Aware Visual Mashup Development for Non-programmers.","venue":"ICWE","pages":"140-155","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/RadeckBM13","doi":"10.1007/978-3-642-39200-9_14","ee":"https://doi.org/10.1007/978-3-642-39200-9_14","url":"https://dblp.org/rec/conf/icwe/RadeckBM13"}, "url":"URL#4175234" }, { "@score":"1", "@id":"4175235", "info":{"authors":{"author":[{"@pid":"59/8689","text":"José Matías Rivero"},{"@pid":"132/0295","text":"Sebastian Heil"},{"@pid":"03/6746","text":"Julián Grigera"},{"@pid":"11/4107","text":"Martin Gaedke"},{"@pid":"r/GustavoRossi","text":"Gustavo Rossi"}]},"title":"MockAPI: An Agile Approach Supporting API-first Web Application Development.","venue":"ICWE","pages":"7-21","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/RiveroHGGR13","doi":"10.1007/978-3-642-39200-9_4","ee":"https://doi.org/10.1007/978-3-642-39200-9_4","url":"https://dblp.org/rec/conf/icwe/RiveroHGGR13"}, "url":"URL#4175235" }, { "@score":"1", "@id":"4175239", "info":{"authors":{"author":{"@pid":"87/5324","text":"Denis Shestakov"}},"title":"Current Challenges in Web Crawling.","venue":"ICWE","pages":"518-521","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/Shestakov13","doi":"10.1007/978-3-642-39200-9_49","ee":"https://doi.org/10.1007/978-3-642-39200-9_49","url":"https://dblp.org/rec/conf/icwe/Shestakov13"}, "url":"URL#4175239" }, { "@score":"1", "@id":"4175241", "info":{"authors":{"author":[{"@pid":"61/2159","text":"Dhavalkumar Thakker"},{"@pid":"43/3552","text":"Vania Dimitrova"},{"@pid":"94/7339","text":"Lydia Lau"},{"@pid":"69/10370","text":"Fan Yang-Turner"},{"@pid":"90/9838","text":"Dimoklis Despotakis"}]},"title":"Assisting User Browsing over Linked Data: Requirements Elicitation with a User Study.","venue":"ICWE","pages":"376-383","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/ThakkerDLYD13","doi":"10.1007/978-3-642-39200-9_31","ee":"https://doi.org/10.1007/978-3-642-39200-9_31","url":"https://dblp.org/rec/conf/icwe/ThakkerDLYD13"}, "url":"URL#4175241" }, { "@score":"1", "@id":"4175242", "info":{"authors":{"author":[{"@pid":"51/6720","text":"Roberto De Virgilio"},{"@pid":"82/8707","text":"Antonio Maccioni"},{"@pid":"28/1886","text":"Paolo Cappellari"}]},"title":"A Linear and Monotonic Strategy to Keyword Search over RDF Data.","venue":"ICWE","pages":"338-353","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/VirgilioMC13","doi":"10.1007/978-3-642-39200-9_28","ee":"https://doi.org/10.1007/978-3-642-39200-9_28","url":"https://dblp.org/rec/conf/icwe/VirgilioMC13"}, "url":"URL#4175242" }, { "@score":"1", "@id":"4175243", "info":{"authors":{"author":[{"@pid":"50/4894","text":"Ulli Waltinger"},{"@pid":"43/1489","text":"Dan Tecuci"},{"@pid":"132/0298","text":"Florin Picioroaga"},{"@pid":"132/0313","text":"Cosmin Grigoras"},{"@pid":"132/0300","text":"Sean Sullivan"}]},"title":"Market Intelligence: Linked Data-driven Entity Resolution for Customer and Competitor Analysis.","venue":"ICWE","pages":"467-481","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/WaltingerTPGS13","doi":"10.1007/978-3-642-39200-9_39","ee":"https://doi.org/10.1007/978-3-642-39200-9_39","url":"https://dblp.org/rec/conf/icwe/WaltingerTPGS13"}, "url":"URL#4175243" }, { "@score":"1", "@id":"4175244", "info":{"authors":{"author":{"@pid":"w/XiaoyangSeanWang","text":"Xiaoyang Sean Wang"}},"title":"How to Share Data Securely.","venue":"ICWE","pages":"5","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/Wang13","doi":"10.1007/978-3-642-39200-9_2","ee":"https://doi.org/10.1007/978-3-642-39200-9_2","url":"https://dblp.org/rec/conf/icwe/Wang13"}, "url":"URL#4175244" }, { "@score":"1", "@id":"4175246", "info":{"authors":{"author":[{"@pid":"87/8239","text":"Dennis Westermann"},{"@pid":"99/3555","text":"Jens Happe"},{"@pid":"132/0304","text":"Petr Zdrahal"},{"@pid":"90/3548","text":"Martin Moser"},{"@pid":"r/RalfReussner","text":"Ralf H. Reussner"}]},"title":"Performance-Aware Design of Web Application Front-Ends.","venue":"ICWE","pages":"132-139","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/WestermannHZMR13","doi":"10.1007/978-3-642-39200-9_13","ee":"https://doi.org/10.1007/978-3-642-39200-9_13","url":"https://dblp.org/rec/conf/icwe/WestermannHZMR13"}, "url":"URL#4175246" }, { "@score":"1", "@id":"4175247", "info":{"authors":{"author":[{"@pid":"55/819","text":"Stefan Wild"},{"@pid":"79/10097","text":"Olexiy Chudnovskyy"},{"@pid":"132/0295","text":"Sebastian Heil"},{"@pid":"11/4107","text":"Martin Gaedke"}]},"title":"Customized Views on Profiles in WebID-Based Distributed Social Networks.","venue":"ICWE","pages":"498-501","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/icwe/WildCHG13","doi":"10.1007/978-3-642-39200-9_44","ee":"https://doi.org/10.1007/978-3-642-39200-9_44","url":"https://dblp.org/rec/conf/icwe/WildCHG13"}, "url":"URL#4175247" }, { "@score":"1", "@id":"4247486", "info":{"authors":{"author":[{"@pid":"07/4356","text":"Florian Daniel"},{"@pid":"d/PeterDolog","text":"Peter Dolog"},{"@pid":"181/2689-1","text":"Qing Li 0001"}]},"title":"Web Engineering - 13th International Conference, ICWE 2013, Aalborg, Denmark, July 8-12, 2013. Proceedings","venue":["ICWE","Lecture Notes in Computer Science"],"volume":"7977","publisher":"Springer","year":"2013","type":"Editorship","key":"conf/icwe/2013","doi":"10.1007/978-3-642-39200-9","ee":"https://doi.org/10.1007/978-3-642-39200-9","url":"https://dblp.org/rec/conf/icwe/2013"}, "url":"URL#4247486" } ] } } } )