callback( { "result":{ "query":":facetid:toc:\"db/conf/iiwas/iiwas2016.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"218.20" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"76", "@dc":"76", "@oc":"76", "@id":"43302569", "text":":facetid:toc:db/conf/iiwas/iiwas2016.bht" } }, "hits":{ "@total":"76", "@computed":"76", "@sent":"76", "@first":"0", "hit":[{ "@score":"1", "@id":"3267829", "info":{"authors":{"author":[{"@pid":"z/JianweiZhang2","text":"Jianwei Zhang 0002"},{"@pid":"62/5078","text":"Yuhki Shiraishi"},{"@pid":"186/8038","text":"Katsumi Kumai"},{"@pid":"m/AtsuyukiMorishima","text":"Atsuyuki Morishima"}]},"title":"Real-time captioning of sign language by groups of deaf and hard-of-hearing people.","venue":"iiWAS","pages":"54-63","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/0002SKM16","doi":"10.1145/3011141.3011143","ee":"https://doi.org/10.1145/3011141.3011143","url":"https://dblp.org/rec/conf/iiwas/0002SKM16"}, "url":"URL#3267829" }, { "@score":"1", "@id":"3267830", "info":{"authors":{"author":[{"@pid":"168/2958","text":"Yusuke Adachi"},{"@pid":"194/8689","text":"Naoya Onimura"},{"@pid":"168/7784","text":"Takanori Yamashita"},{"@pid":"23/2141","text":"Sachio Hirokawa"}]},"title":"Standard measure and SVM measure for feature selection and their performance effect for text classification.","venue":"iiWAS","pages":"262-266","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/AdachiOYH16","doi":"10.1145/3011141.3011190","ee":"https://doi.org/10.1145/3011141.3011190","url":"https://dblp.org/rec/conf/iiwas/AdachiOYH16"}, "url":"URL#3267830" }, { "@score":"1", "@id":"3267831", "info":{"authors":{"author":[{"@pid":"191/0853","text":"Wed Al-Ateeq"},{"@pid":"23/2615","text":"Hend S. Al-Khalifa"}]},"title":"A hands-on approach to the web of things: the Twitter vending machine experience.","venue":"iiWAS","pages":"500-503","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/Al-AteeqA16","doi":"10.1145/3011141.3011214","ee":"https://doi.org/10.1145/3011141.3011214","url":"https://dblp.org/rec/conf/iiwas/Al-AteeqA16"}, "url":"URL#3267831" }, { "@score":"1", "@id":"3267832", "info":{"authors":{"author":[{"@pid":"23/2615","text":"Hend S. Al-Khalifa"},{"@pid":"194/8631","text":"Bashayer Al-Twaim"},{"@pid":"194/8629","text":"Bedour AlHarbi"}]},"title":"A heuristic checklist for usability evaluation of Saudi government mobile applications.","venue":"iiWAS","pages":"375-378","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/Al-KhalifaAA16","doi":"10.1145/3011141.3011189","ee":"https://doi.org/10.1145/3011141.3011189","url":"https://dblp.org/rec/conf/iiwas/Al-KhalifaAA16"}, "url":"URL#3267832" }, { "@score":"1", "@id":"3267833", "info":{"authors":{"author":[{"@pid":"23/2615","text":"Hend S. Al-Khalifa"},{"@pid":"194/8644","text":"Afnan Alfaadhel"},{"@pid":"194/8672","text":"Daniah Albulikhi"},{"@pid":"194/8706","text":"Lamya Alrakhes"},{"@pid":"194/8677","text":"Nada Almugren"},{"@pid":"194/8704","text":"Sara Alqubaisi"},{"@pid":"194/1733","text":"Muna A. Muhaureq"}]},"title":"A web-based system and web service for coloring and decoding Arabic text for Arabic learners.","venue":"iiWAS","pages":"468-471","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/Al-KhalifaAAAAA16","doi":"10.1145/3011141.3011188","ee":"https://doi.org/10.1145/3011141.3011188","url":"https://dblp.org/rec/conf/iiwas/Al-KhalifaAAAAA16"}, "url":"URL#3267833" }, { "@score":"1", "@id":"3267834", "info":{"authors":{"author":[{"@pid":"28/8278","text":"Lamya Albraheem"},{"@pid":"194/8670","text":"Jawaher Al-Yahya"},{"@pid":"194/8705","text":"Nouf Al-Rowais"},{"@pid":"194/8693","text":"Sara Al-Shathri"},{"@pid":"194/8679","text":"Lamees Alsuhaibani"},{"@pid":"194/8707","text":"Amal Alabdulkarim"}]},"title":"Location-aware system for content delivery using Bluetooth low energy technology.","venue":"iiWAS","pages":"394-400","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/AlbraheemAAAAA16","doi":"10.1145/3011141.3011187","ee":"https://doi.org/10.1145/3011141.3011187","url":"https://dblp.org/rec/conf/iiwas/AlbraheemAAAAA16"}, "url":"URL#3267834" }, { "@score":"1", "@id":"3267835", "info":{"authors":{"author":[{"@pid":"194/8691","text":"Nouf Alromaih"},{"@pid":"194/8640","text":"Hend Albassam"},{"@pid":"23/2615","text":"Hend S. Al-Khalifa"}]},"title":"A proposed checklist for the technical maturity of open government data: an application on GCC countries.","venue":"iiWAS","pages":"494-499","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/AlromaihAA16","doi":"10.1145/3011141.3011211","ee":"https://doi.org/10.1145/3011141.3011211","url":"https://dblp.org/rec/conf/iiwas/AlromaihAA16"}, "url":"URL#3267835" }, { "@score":"1", "@id":"3267836", "info":{"authors":{"author":[{"@pid":"192/2602","text":"Shrooq Alsenan"},{"@pid":"00/517","text":"Abdulrahman A. Mirza"}]},"title":"E-commerce alarming security symptoms review and discussion of attacks indicators in e-commerce.","venue":"iiWAS","pages":"313-317","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/AlsenanM16","doi":"10.1145/3011141.3011206","ee":"https://doi.org/10.1145/3011141.3011206","url":"https://dblp.org/rec/conf/iiwas/AlsenanM16"}, "url":"URL#3267836" }, { "@score":"1", "@id":"3267837", "info":{"authors":{"author":[{"@pid":"194/8668","text":"Naylor G. Bachiega"},{"@pid":"194/8673","text":"Sílvia M. D. Diaz"},{"@pid":"194/8710","text":"Vitor S. Montes"}]},"title":"Kiosk IoT for electoral consciousness.","venue":"iiWAS","pages":"405-409","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/BachiegaDM16","doi":"10.1145/3011141.3011191","ee":"https://doi.org/10.1145/3011141.3011191","url":"https://dblp.org/rec/conf/iiwas/BachiegaDM16"}, "url":"URL#3267837" }, { "@score":"1", "@id":"3267838", "info":{"authors":{"author":[{"@pid":"194/8686","text":"Volodimir Begy"},{"@pid":"89/2040","text":"Erich Schikuta"}]},"title":"A lightweight e-learning system for algorithms and data structures.","venue":"iiWAS","pages":"199-208","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/BegyS16","doi":"10.1145/3011141.3011181","ee":"https://doi.org/10.1145/3011141.3011181","url":"https://dblp.org/rec/conf/iiwas/BegyS16"}, "url":"URL#3267838" }, { "@score":"1", "@id":"3267839", "info":{"authors":{"author":[{"@pid":"163/2370","text":"Joaquim Bellmunt"},{"@pid":"48/1412","text":"Mounir Mokhtari"},{"@pid":"66/1134","text":"Bessam Abdulrazak"},{"@pid":"97/7165","text":"Hamdi Aloulou"}]},"title":"Agile framework for rapid deployment in ambient assisted living environments.","venue":"iiWAS","pages":"410-413","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/BellmuntMAA16","doi":"10.1145/3011141.3011196","ee":"https://doi.org/10.1145/3011141.3011196","url":"https://dblp.org/rec/conf/iiwas/BellmuntMAA16"}, "url":"URL#3267839" }, { "@score":"1", "@id":"3267840", "info":{"authors":{"author":[{"@pid":"133/8477","text":"Meisam Booshehri"},{"@pid":"l/PeterLuksch1","text":"Peter Luksch 0001"}]},"title":"Towards linked open data enabled ontology learning from text.","venue":"iiWAS","pages":"252-256","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/Booshehri016","doi":"10.1145/3011141.3011184","ee":"https://doi.org/10.1145/3011141.3011184","url":"https://dblp.org/rec/conf/iiwas/Booshehri016"}, "url":"URL#3267840" }, { "@score":"1", "@id":"3267841", "info":{"authors":{"author":[{"@pid":"194/8712","text":"Iryna Bursuk"},{"@pid":"23/11240","text":"Andreas Mladenow"},{"@pid":"141/2166","text":"Niina Maarit Novak"},{"@pid":"11/6501","text":"Christine Strauss"}]},"title":"Online cofounder search in tech startups.","venue":"iiWAS","pages":"482-488","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/BursukMNS16","doi":"10.1145/3011141.3011221","ee":"https://doi.org/10.1145/3011141.3011221","url":"https://dblp.org/rec/conf/iiwas/BursukMNS16"}, "url":"URL#3267841" }, { "@score":"1", "@id":"3267842", "info":{"authors":{"author":[{"@pid":"204/7908","text":"Mengya Cai"},{"@pid":"21/4396","text":"Y. Lin"},{"@pid":"41/5538-1","text":"Wen-Jun Zhang 0001"}]},"title":"Expert opinions aggregation for discrete events.","venue":"iiWAS","pages":"190-192","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/CaiLZ16","doi":"10.1145/3011141.3011212","ee":"https://doi.org/10.1145/3011141.3011212","url":"https://dblp.org/rec/conf/iiwas/CaiLZ16"}, "url":"URL#3267842" }, { "@score":"1", "@id":"3267843", "info":{"authors":{"author":[{"@pid":"204/7908","text":"Mengya Cai"},{"@pid":"21/4396","text":"Y. Lin"},{"@pid":"41/5538-1","text":"Wen-Jun Zhang 0001"}]},"title":"Study of the optimal number of rating bars in the likert scale.","venue":"iiWAS","pages":"193-198","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/CaiLZ16a","doi":"10.1145/3011141.3011213","ee":"https://doi.org/10.1145/3011141.3011213","url":"https://dblp.org/rec/conf/iiwas/CaiLZ16a"}, "url":"URL#3267843" }, { "@score":"1", "@id":"3267844", "info":{"authors":{"author":[{"@pid":"194/8669","text":"André de Camargo"},{"@pid":"155/5140","text":"Ivan Luiz Salvadori"},{"@pid":"82/6647","text":"Ronaldo dos Santos Mello"},{"@pid":"32/5988","text":"Frank Siqueira"}]},"title":"An architecture to automate performance tests on microservices.","venue":"iiWAS","pages":"422-429","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/CamargoSMS16","doi":"10.1145/3011141.3011179","ee":"https://doi.org/10.1145/3011141.3011179","url":"https://dblp.org/rec/conf/iiwas/CamargoSMS16"}, "url":"URL#3267844" }, { "@score":"1", "@id":"3267845", "info":{"authors":{"author":[{"@pid":"194/8694","text":"Yohsuke Chiba"},{"@pid":"194/8698","text":"Shogo Kitajima"},{"@pid":"34/1526","text":"Tatsuo Tsuji"},{"@pid":"64/2787","text":"Ken Higuchi"}]},"title":"A scheme of dynamic attributes addition for tuple datasets.","venue":"iiWAS","pages":"288-292","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/ChibaKTH16","doi":"10.1145/3011141.3011164","ee":"https://doi.org/10.1145/3011141.3011164","url":"https://dblp.org/rec/conf/iiwas/ChibaKTH16"}, "url":"URL#3267845" }, { "@score":"1", "@id":"3267846", "info":{"authors":{"author":[{"@pid":"163/2545","text":"Alexandru Cristian Cosma"},{"@pid":"50/1056","text":"Rodica Potolea"}]},"title":"Meta-NEAT, meta-analysis of neuroevolving topologies.","venue":"iiWAS","pages":"133-140","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/CosmaP16","doi":"10.1145/3011141.3011166","ee":"https://doi.org/10.1145/3011141.3011166","url":"https://dblp.org/rec/conf/iiwas/CosmaP16"}, "url":"URL#3267846" }, { "@score":"1", "@id":"3267847", "info":{"authors":{"author":[{"@pid":"168/6097","text":"Zouhir Djilani"},{"@pid":"153/5784","text":"Abderrahmane Khiat"},{"@pid":"53/8931","text":"Selma Khouri"},{"@pid":"b/LadjelBellatreche","text":"Ladjel Bellatreche"}]},"title":"MURGROOM: multi-site requirement reuse through GRaph and ontology matching.","venue":"iiWAS","pages":"160-169","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/DjilaniKKB16","doi":"10.1145/3011141.3011183","ee":"https://doi.org/10.1145/3011141.3011183","url":"https://dblp.org/rec/conf/iiwas/DjilaniKKB16"}, "url":"URL#3267847" }, { "@score":"1", "@id":"3267848", "info":{"authors":{"author":{"@pid":"178/2096","text":"Robert Ecker"}},"title":"Automated detection and guessing without semantics of sender-receiver relations in computer-mediated discourses.","venue":"iiWAS","pages":"170-178","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/Ecker16","doi":"10.1145/3011141.3011175","ee":"https://doi.org/10.1145/3011141.3011175","url":"https://dblp.org/rec/conf/iiwas/Ecker16"}, "url":"URL#3267848" }, { "@score":"1", "@id":"3267849", "info":{"authors":{"author":[{"@pid":"194/8646","text":"Ngurah Agus Sanjaya Er"},{"@pid":"a/TAbdessalem","text":"Talel Abdessalem"},{"@pid":"b/SBressan","text":"Stéphane Bressan"}]},"title":"Set of t-uples expansion by example.","venue":"iiWAS","pages":"221-230","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/ErAB16","doi":"10.1145/3011141.3011144","ee":"https://doi.org/10.1145/3011141.3011144","url":"https://dblp.org/rec/conf/iiwas/ErAB16"}, "url":"URL#3267849" }, { "@score":"1", "@id":"3267850", "info":{"authors":{"author":[{"@pid":"194/8678","text":"Tomohiro Furusawa"},{"@pid":"45/6143","text":"Mamiko Matsubayashi"},{"@pid":"57/6558","text":"Tetsuji Satoh"}]},"title":"Users' preferences for answer forms to reference questions in libraries.","venue":"iiWAS","pages":"245-251","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/FurusawaMS16","doi":"10.1145/3011141.3011168","ee":"https://doi.org/10.1145/3011141.3011168","url":"https://dblp.org/rec/conf/iiwas/FurusawaMS16"}, "url":"URL#3267850" }, { "@score":"1", "@id":"3267851", "info":{"authors":{"author":{"@pid":"95/4100","text":"Olga Georgieva"}},"title":"Dynamic service quality selection.","venue":"iiWAS","pages":"401-404","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/Georgieva16","doi":"10.1145/3011141.3011156","ee":"https://doi.org/10.1145/3011141.3011156","url":"https://dblp.org/rec/conf/iiwas/Georgieva16"}, "url":"URL#3267851" }, { "@score":"1", "@id":"3267852", "info":{"authors":{"author":[{"@pid":"182/5237","text":"Kota Gushima"},{"@pid":"08/10003","text":"Mizuki Sakamoto"},{"@pid":"77/6979","text":"Tatsuo Nakajima"}]},"title":"Community-based crowdsourcing to increase a community's well-being.","venue":"iiWAS","pages":"1-6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/GushimaSN16","doi":"10.1145/3011141.3011173","ee":"https://doi.org/10.1145/3011141.3011173","url":"https://dblp.org/rec/conf/iiwas/GushimaSN16"}, "url":"URL#3267852" }, { "@score":"1", "@id":"3267853", "info":{"authors":{"author":[{"@pid":"32/7214","text":"Tzipora Halevi"},{"@pid":"89/6419","text":"Nasir D. Memon"},{"@pid":"50/6468","text":"James Lewis"},{"@pid":"97/5147","text":"Ponnurangam Kumaraguru"},{"@pid":"194/2904","text":"Sumit Arora"},{"@pid":"194/8714","text":"Nikita Dagar"},{"@pid":"a/FAAloul","text":"Fadi A. Aloul"},{"@pid":"48/4323","text":"Jay Chen"}]},"title":"Cultural and psychological factors in cyber-security.","venue":"iiWAS","pages":"318-324","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/HaleviMLKADAC16","doi":"10.1145/3011141.3011165","ee":"https://doi.org/10.1145/3011141.3011165","url":"https://dblp.org/rec/conf/iiwas/HaleviMLKADAC16"}, "url":"URL#3267853" }, { "@score":"1", "@id":"3267854", "info":{"authors":{"author":[{"@pid":"194/8699","text":"Keisuke Hamada"},{"@pid":"50/1648","text":"Shinsuke Nakajima"},{"@pid":"50/916","text":"Daisuke Kitayama"},{"@pid":"42/5410","text":"Kazutoshi Sumiya"}]},"title":"Experimental evaluation of method for driving route recommendation and learning drivers' route selection preferences.","venue":"iiWAS","pages":"16-25","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/HamadaNKS16","doi":"10.1145/3011141.3011150","ee":"https://doi.org/10.1145/3011141.3011150","url":"https://dblp.org/rec/conf/iiwas/HamadaNKS16"}, "url":"URL#3267854" }, { "@score":"1", "@id":"3267855", "info":{"authors":{"author":{"@pid":"04/2380","text":"Bo Hu"}},"title":"Approximate graph distance with imagisation.","venue":"iiWAS","pages":"115-124","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/Hu16","doi":"10.1145/3011141.3011163","ee":"https://doi.org/10.1145/3011141.3011163","url":"https://dblp.org/rec/conf/iiwas/Hu16"}, "url":"URL#3267855" }, { "@score":"1", "@id":"3267856", "info":{"authors":{"author":[{"@pid":"194/8655","text":"Sayaka Ikeda"},{"@pid":"194/8666","text":"Shinya Mizuno"}]},"title":"Framework for the effective use of teaching videos.","venue":"iiWAS","pages":"214-216","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/IkedaM16","doi":"10.1145/3011141.3011208","ee":"https://doi.org/10.1145/3011141.3011208","url":"https://dblp.org/rec/conf/iiwas/IkedaM16"}, "url":"URL#3267856" }, { "@score":"1", "@id":"3267857", "info":{"authors":{"author":[{"@pid":"194/8675","text":"Kazufumi Inafuku"},{"@pid":"24/4094","text":"Takayasu Fushimi"},{"@pid":"57/6558","text":"Tetsuji Satoh"}]},"title":"Extraction method of typical purchase patterns based on motif analysis of directed graphs.","venue":"iiWAS","pages":"86-95","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/InafukuFS16","doi":"10.1145/3011141.3011178","ee":"https://doi.org/10.1145/3011141.3011178","url":"https://dblp.org/rec/conf/iiwas/InafukuFS16"}, "url":"URL#3267857" }, { "@score":"1", "@id":"3267858", "info":{"authors":{"author":[{"@pid":"167/5011","text":"Hikaru Inomoto"},{"@pid":"93/2855","text":"Sachio Saiki"},{"@pid":"71/2858","text":"Masahide Nakamura"},{"@pid":"79/3883","text":"Shinsuke Matsumoto"}]},"title":"Mission-oriented large-scale environment sensing based on analogy of military system.","venue":"iiWAS","pages":"414-421","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/InomotoSNM16","doi":"10.1145/3011141.3011148","ee":"https://doi.org/10.1145/3011141.3011148","url":"https://dblp.org/rec/conf/iiwas/InomotoSNM16"}, "url":"URL#3267858" }, { "@score":"1", "@id":"3267859", "info":{"authors":{"author":[{"@pid":"178/2108","text":"Ademar Crotti Junior"},{"@pid":"75/3691","text":"Christophe Debruyne"},{"@pid":"30/625","text":"Rob Brennan"},{"@pid":"16/508","text":"Declan O'Sullivan"}]},"title":"FunUL: a method to incorporate functions into uplift mapping languages.","venue":"iiWAS","pages":"267-275","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/JuniorDBO16","doi":"10.1145/3011141.3011152","ee":"https://doi.org/10.1145/3011141.3011152","url":"https://dblp.org/rec/conf/iiwas/JuniorDBO16"}, "url":"URL#3267859" }, { "@score":"1", "@id":"3267860", "info":{"authors":{"author":[{"@pid":"60/10459","text":"Mohammadreza Khelghati"},{"@pid":"19/3140","text":"Djoerd Hiemstra"},{"@pid":"k/MauricevanKeulen","text":"Maurice van Keulen"}]},"title":"Efficient web harvesting strategies for monitoring deep web content.","venue":"iiWAS","pages":"389-393","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/KhelghatiHK16","doi":"10.1145/3011141.3011198","ee":"https://doi.org/10.1145/3011141.3011198","url":"https://dblp.org/rec/conf/iiwas/KhelghatiHK16"}, "url":"URL#3267860" }, { "@score":"1", "@id":"3267861", "info":{"authors":{"author":{"@pid":"50/916","text":"Daisuke Kitayama"}},"title":"Extraction method for Anaba spots based on name recognition and user's evaluation.","venue":"iiWAS","pages":"12-15","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/Kitayama16","doi":"10.1145/3011141.3011197","ee":"https://doi.org/10.1145/3011141.3011197","url":"https://dblp.org/rec/conf/iiwas/Kitayama16"}, "url":"URL#3267861" }, { "@score":"1", "@id":"3267862", "info":{"authors":{"author":[{"@pid":"165/6546","text":"Ryosuke Koshijima"},{"@pid":"165/6483","text":"Kento Goto"},{"@pid":"42/6933","text":"Motomichi Toyama"}]},"title":"Generating responsive web pages using SuperSQL.","venue":"iiWAS","pages":"231-240","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/KoshijimaGT16","doi":"10.1145/3011141.3011162","ee":"https://doi.org/10.1145/3011141.3011162","url":"https://dblp.org/rec/conf/iiwas/KoshijimaGT16"}, "url":"URL#3267862" }, { "@score":"1", "@id":"3267863", "info":{"authors":{"author":[{"@pid":"143/8841","text":"Ziyi Li"},{"@pid":"34/1625","text":"Junpei Kawamoto"},{"@pid":"12/1181","text":"Yaokai Feng"},{"@pid":"16/3865","text":"Kouichi Sakurai"}]},"title":"Cyberbullying detection using parent-child relationship between comments.","venue":"iiWAS","pages":"325-334","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/LiKFS16","doi":"10.1145/3011141.3011182","ee":"https://doi.org/10.1145/3011141.3011182","url":"https://dblp.org/rec/conf/iiwas/LiKFS16"}, "url":"URL#3267863" }, { "@score":"1", "@id":"3267864", "info":{"authors":{"author":[{"@pid":"18/6855","text":"Xiaoyu Li"},{"@pid":"14/5985","text":"Osamu Yoshie"},{"@pid":"90/2308","text":"Daoping Huang"}]},"title":"A passive means based privacy protection method for the perceptual layer of IoTs.","venue":"iiWAS","pages":"335-339","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/LiYH16","doi":"10.1145/3011141.3011153","ee":"https://doi.org/10.1145/3011141.3011153","url":"https://dblp.org/rec/conf/iiwas/LiYH16"}, "url":"URL#3267864" }, { "@score":"1", "@id":"3267865", "info":{"authors":{"author":[{"@pid":"166/4502","text":"Douglas Hiura Longo"},{"@pid":"69/3719","text":"Patricia Vilain"},{"@pid":"183/4308","text":"Lucas Pereira da Silva"},{"@pid":"82/6647","text":"Ronaldo dos Santos Mello"}]},"title":"A web framework for test automation: user scenarios through user interaction diagrams.","venue":"iiWAS","pages":"458-467","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/LongoVSM16","doi":"10.1145/3011141.3011158","ee":"https://doi.org/10.1145/3011141.3011158","url":"https://dblp.org/rec/conf/iiwas/LongoVSM16"}, "url":"URL#3267865" }, { "@score":"1", "@id":"3267866", "info":{"authors":{"author":[{"@pid":"147/1623","text":"Robert Luh"},{"@pid":"09/8857","text":"Sebastian Schrittwieser"},{"@pid":"178/2156","text":"Stefan Marschalek"}]},"title":"TAON: an ontology-based approach to mitigating targeted attacks.","venue":"iiWAS","pages":"303-312","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/LuhSM16","doi":"10.1145/3011141.3011157","ee":"https://doi.org/10.1145/3011141.3011157","url":"https://dblp.org/rec/conf/iiwas/LuhSM16"}, "url":"URL#3267866" }, { "@score":"1", "@id":"3267867", "info":{"authors":{"author":[{"@pid":"194/8688","text":"Wakana Maeda"},{"@pid":"55/6987","text":"Yu Suzuki"},{"@pid":"57/1548-1","text":"Satoshi Nakamura 0001"}]},"title":"Fast text anonymization using k-anonyminity.","venue":"iiWAS","pages":"340-344","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/MaedaSN16","doi":"10.1145/3011141.3011217","ee":"https://doi.org/10.1145/3011141.3011217","url":"https://dblp.org/rec/conf/iiwas/MaedaSN16"}, "url":"URL#3267867" }, { "@score":"1", "@id":"3267868", "info":{"authors":{"author":[{"@pid":"194/8687","text":"Andres-Leonardo Martínez-Ortiz"},{"@pid":"87/4742","text":"David Lizcano"},{"@pid":"242/2191","text":"Miguel Ortega"},{"@pid":"14/6923","text":"Luis Ruiz"},{"@pid":"01/5092","text":"Genoveva López"}]},"title":"A quality model for web components.","venue":"iiWAS","pages":"430-432","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/Martinez-OrtizL16","doi":"10.1145/3011141.3011203","ee":"https://doi.org/10.1145/3011141.3011203","url":"https://dblp.org/rec/conf/iiwas/Martinez-OrtizL16"}, "url":"URL#3267868" }, { "@score":"1", "@id":"3267869", "info":{"authors":{"author":[{"@pid":"181/4963","text":"Imadeddine Mountasser"},{"@pid":"89/10502","text":"Brahim Ouhbi"},{"@pid":"66/10502","text":"Bouchra Frikh"}]},"title":"Hybrid large-scale ontology matching strategy on big data environment.","venue":"iiWAS","pages":"282-287","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/MountasserOF16","doi":"10.1145/3011141.3011185","ee":"https://doi.org/10.1145/3011141.3011185","url":"https://dblp.org/rec/conf/iiwas/MountasserOF16"}, "url":"URL#3267869" }, { "@score":"1", "@id":"3267870", "info":{"authors":{"author":[{"@pid":"194/8658","text":"Hisae Nakajima"},{"@pid":"29/1912","text":"Naoko Kosugi"},{"@pid":"19/3497","text":"Makoto Onizuka"},{"@pid":"157/5590","text":"Hiroaki Kazui"},{"@pid":"178/2078","text":"Manabu Ikeda"}]},"title":"Grouping method of dementia care text information to share dementiacare information in a website named Ninchisho Chienowa-net.","venue":"iiWAS","pages":"477-481","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/NakajimaKOKI16","doi":"10.1145/3011141.3011210","ee":"https://doi.org/10.1145/3011141.3011210","url":"https://dblp.org/rec/conf/iiwas/NakajimaKOKI16"}, "url":"URL#3267870" }, { "@score":"1", "@id":"3267871", "info":{"authors":{"author":[{"@pid":"194/8671","text":"Nelson Mariano Leite Neto"},{"@pid":"69/3719","text":"Patricia Vilain"},{"@pid":"82/6647","text":"Ronaldo dos Santos Mello"}]},"title":"Segen: generation of test cases for selenium and selendroid.","venue":"iiWAS","pages":"433-442","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/NetoVM16","doi":"10.1145/3011141.3011154","ee":"https://doi.org/10.1145/3011141.3011154","url":"https://dblp.org/rec/conf/iiwas/NetoVM16"}, "url":"URL#3267871" }, { "@score":"1", "@id":"3267872", "info":{"authors":{"author":{"@pid":"55/8981","text":"Thi Thanh Sang Nguyen"}},"title":"A deep learning framework for book search.","venue":"iiWAS","pages":"81-85","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/Nguyen16","doi":"10.1145/3011141.3011195","ee":"https://doi.org/10.1145/3011141.3011195","url":"https://dblp.org/rec/conf/iiwas/Nguyen16"}, "url":"URL#3267872" }, { "@score":"1", "@id":"3267873", "info":{"authors":{"author":[{"@pid":"173/2955","text":"Hoang-Minh Nguyen"},{"@pid":"194/8685","text":"Cong-Phuoc Phan"},{"@pid":"16/1260","text":"Hong-Quang Nguyen"}]},"title":"GeTCo: an ontology-based approach for patent classification search.","venue":"iiWAS","pages":"241-244","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/NguyenPN16","doi":"10.1145/3011141.3011205","ee":"https://doi.org/10.1145/3011141.3011205","url":"https://dblp.org/rec/conf/iiwas/NguyenPN16"}, "url":"URL#3267873" }, { "@score":"1", "@id":"3267874", "info":{"authors":{"author":[{"@pid":"74/1178","text":"Mika Ohtsuki"},{"@pid":"00/2241","text":"Kazuki Ohta"},{"@pid":"16/3891-1","text":"Tetsuro Kakeshita 0001"}]},"title":"Software engineer education support system ALECSS utilizing DevOps tools.","venue":"iiWAS","pages":"209-213","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/OhtsukiOK16","doi":"10.1145/3011141.3011200","ee":"https://doi.org/10.1145/3011141.3011200","url":"https://dblp.org/rec/conf/iiwas/OhtsukiOK16"}, "url":"URL#3267874" }, { "@score":"1", "@id":"3267875", "info":{"authors":{"author":[{"@pid":"89/10502","text":"Brahim Ouhbi"},{"@pid":"194/8695","text":"Mostafa Kamoune"},{"@pid":"66/10502","text":"Bouchra Frikh"},{"@pid":"141/2038","text":"El Moukhtar Zemmouri"},{"@pid":"38/6154","text":"Hicham Behja"}]},"title":"A hybrid feature selection rule measure and its application to systematic review.","venue":"iiWAS","pages":"106-114","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/OuhbiKFZB16","doi":"10.1145/3011141.3011177","ee":"https://doi.org/10.1145/3011141.3011177","url":"https://dblp.org/rec/conf/iiwas/OuhbiKFZB16"}, "url":"URL#3267875" }, { "@score":"1", "@id":"3267876", "info":{"authors":{"author":[{"@pid":"194/8708","text":"Ali Pazahr"},{"@pid":"64/4711","text":"José Javier Samper Zapater"},{"@pid":"89/3382","text":"Francisco García-Sánchez 0001"},{"@pid":"94/7528","text":"Carmen Botella"},{"@pid":"53/2442","text":"Rafael J. Martínez"}]},"title":"Semantically-enhanced advertisement recommender systems in social networks.","venue":"iiWAS","pages":"179-189","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/PazahrZSBM16","doi":"10.1145/3011141.3011489","ee":"https://doi.org/10.1145/3011141.3011489","url":"https://dblp.org/rec/conf/iiwas/PazahrZSBM16"}, "url":"URL#3267876" }, { "@score":"1", "@id":"3267877", "info":{"authors":{"author":[{"@pid":"92/6880","text":"Paolo Perlasca"},{"@pid":"17/6574","text":"Giorgio Valentini"},{"@pid":"03/9512","text":"Marco Frasca 0001"},{"@pid":"48/4862","text":"Marco Mesiti"}]},"title":"Multi-species protein function prediction: towards web-based visual analytics.","venue":"iiWAS","pages":"489-493","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/PerlascaVFM16","doi":"10.1145/3011141.3011222","ee":"https://doi.org/10.1145/3011141.3011222","url":"https://dblp.org/rec/conf/iiwas/PerlascaVFM16"}, "url":"URL#3267877" }, { "@score":"1", "@id":"3267878", "info":{"authors":{"author":[{"@pid":"93/3103","text":"Hélène Pigot"},{"@pid":"194/8664","text":"Pierre-Yves Nivollet"},{"@pid":"194/8665","text":"Taoufik Zayani"},{"@pid":"194/8630","text":"Yannick Adelise"}]},"title":"Ubiquitous reminders to manage timetable in a smart home.","venue":"iiWAS","pages":"363-367","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/PigotNZA16","doi":"10.1145/3011141.3011186","ee":"https://doi.org/10.1145/3011141.3011186","url":"https://dblp.org/rec/conf/iiwas/PigotNZA16"}, "url":"URL#3267878" }, { "@score":"1", "@id":"3267879", "info":{"authors":{"author":[{"@pid":"140/7189","text":"Benedikt Pittl"},{"@pid":"65/5142","text":"Werner Mach"},{"@pid":"89/2040","text":"Erich Schikuta"}]},"title":"A classification of autonomous bilateral cloud SLA negotiation strategies.","venue":"iiWAS","pages":"379-388","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/PittlMS16","doi":"10.1145/3011141.3011159","ee":"https://doi.org/10.1145/3011141.3011159","url":"https://dblp.org/rec/conf/iiwas/PittlMS16"}, "url":"URL#3267879" }, { "@score":"1", "@id":"3267880", "info":{"authors":{"author":[{"@pid":"12/8278","text":"Syopiansyah Jaya Putra"},{"@pid":"194/8700","text":"Ria Hari Gusmita"},{"@pid":"194/8674","text":"Khodijah Hulliyah"},{"@pid":"26/6107","text":"Husni Teja Sukmana"}]},"title":"A semantic-based question answering system for indonesian translation of Quran.","venue":"iiWAS","pages":"504-507","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/PutraGHS16","doi":"10.1145/3011141.3011219","ee":"https://doi.org/10.1145/3011141.3011219","url":"https://dblp.org/rec/conf/iiwas/PutraGHS16"}, "url":"URL#3267880" }, { "@score":"1", "@id":"3267881", "info":{"authors":{"author":[{"@pid":"12/8278","text":"Syopiansyah Jaya Putra"},{"@pid":"194/8674","text":"Khodijah Hulliyah"},{"@pid":"157/2450","text":"Nashrul Hakiem"},{"@pid":"194/8709","text":"Rayi Pradono Iswara"},{"@pid":"194/8627","text":"Asep Fajar Firmansyah"}]},"title":"Generating weighted vector for concepts in indonesian translation of Quran.","venue":"iiWAS","pages":"293-297","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/PutraHHIF16","doi":"10.1145/3011141.3011218","ee":"https://doi.org/10.1145/3011141.3011218","url":"https://dblp.org/rec/conf/iiwas/PutraHHIF16"}, "url":"URL#3267881" }, { "@score":"1", "@id":"3267882", "info":{"authors":{"author":[{"@pid":"194/8641","text":"Kacper Radzikowski"},{"@pid":"79/652","text":"Le Wang"},{"@pid":"14/5985","text":"Osamu Yoshie"}]},"title":"Non-native English speakers' speech correction, based on domain focused document.","venue":"iiWAS","pages":"276-281","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/RadzikowskiWY16","doi":"10.1145/3011141.3011169","ee":"https://doi.org/10.1145/3011141.3011169","url":"https://dblp.org/rec/conf/iiwas/RadzikowskiWY16"}, "url":"URL#3267882" }, { "@score":"1", "@id":"3267883", "info":{"authors":{"author":[{"@pid":"169/3255","text":"Robert Radziszewski"},{"@pid":"194/8652","text":"Hubert Kenfack Ngankam"},{"@pid":"93/3103","text":"Hélène Pigot"},{"@pid":"91/2538","text":"Vincent Grégoire"},{"@pid":"194/8661","text":"Dominique Lorrain"},{"@pid":"38/4348","text":"Sylvain Giroux"}]},"title":"An ambient assisted living nighttime wandering system for elderly.","venue":"iiWAS","pages":"368-374","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/RadziszewskiNPG16","doi":"10.1145/3011141.3011171","ee":"https://doi.org/10.1145/3011141.3011171","url":"https://dblp.org/rec/conf/iiwas/RadziszewskiNPG16"}, "url":"URL#3267883" }, { "@score":"1", "@id":"3267884", "info":{"authors":{"author":[{"@pid":"194/8657","text":"Keigo Sakai"},{"@pid":"25/1907","text":"Akiyo Nadamoto"}]},"title":"Extracting welcome news from travel reviews.","venue":"iiWAS","pages":"141-148","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/SakaiN16","doi":"10.1145/3011141.3011149","ee":"https://doi.org/10.1145/3011141.3011149","url":"https://dblp.org/rec/conf/iiwas/SakaiN16"}, "url":"URL#3267884" }, { "@score":"1", "@id":"3267885", "info":{"authors":{"author":[{"@pid":"155/5140","text":"Ivan Luiz Salvadori"},{"@pid":"185/1485","text":"Alexis Huf"},{"@pid":"82/6647","text":"Ronaldo dos Santos Mello"},{"@pid":"32/5988","text":"Frank Siqueira"}]},"title":"Publishing linked data through semantic microservices composition.","venue":"iiWAS","pages":"443-452","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/SalvadoriHMS16","doi":"10.1145/3011141.3011155","ee":"https://doi.org/10.1145/3011141.3011155","url":"https://dblp.org/rec/conf/iiwas/SalvadoriHMS16"}, "url":"URL#3267885" }, { "@score":"1", "@id":"3267886", "info":{"authors":{"author":[{"@pid":"194/8703","text":"Yuta Sano"},{"@pid":"65/742","text":"Tsunenori Mine"}]},"title":"Extraction of current actual status and demand expressions from complaint reports.","venue":"iiWAS","pages":"149-153","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/SanoM16","doi":"10.1145/3011141.3011201","ee":"https://doi.org/10.1145/3011141.3011201","url":"https://dblp.org/rec/conf/iiwas/SanoM16"}, "url":"URL#3267886" }, { "@score":"1", "@id":"3267887", "info":{"authors":{"author":[{"@pid":"194/8632","text":"Yume Sasaki"},{"@pid":"183/9391","text":"Takuya Komatsuda"},{"@pid":"45/9489","text":"Atsushi Keyaki"},{"@pid":"49/4886","text":"Jun Miyazaki"}]},"title":"A new readability measure for web documents and its evaluation on an effective web search engine.","venue":"iiWAS","pages":"355-362","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/SasakiKKM16","doi":"10.1145/3011141.3011172","ee":"https://doi.org/10.1145/3011141.3011172","url":"https://dblp.org/rec/conf/iiwas/SasakiKKM16"}, "url":"URL#3267887" }, { "@score":"1", "@id":"3267888", "info":{"authors":{"author":[{"@pid":"46/2185","text":"Alexander V. Smirnov 0001"},{"@pid":"149/3009","text":"Andrew Ponomarev"},{"@pid":"68/344","text":"Tatiana Levashova"},{"@pid":"117/8935","text":"Nikolay Teslya"}]},"title":"Decision support in tourism based on human-computer cloud.","venue":"iiWAS","pages":"125-132","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/SmirnovPLT16","doi":"10.1145/3011141.3011174","ee":"https://doi.org/10.1145/3011141.3011174","url":"https://dblp.org/rec/conf/iiwas/SmirnovPLT16"}, "url":"URL#3267888" }, { "@score":"1", "@id":"3267889", "info":{"authors":{"author":[{"@pid":"05/677","text":"Vlado Stankovski"},{"@pid":"31/3637","text":"Jernej Trnkoczy"},{"@pid":"174/4157","text":"Salman Taherizadeh"},{"@pid":"194/8692","text":"Matej Cigale"}]},"title":"Implementing time-critical functionalities with a distributed adaptive container architecture.","venue":"iiWAS","pages":"453-457","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/StankovskiTTC16","doi":"10.1145/3011141.3011202","ee":"https://doi.org/10.1145/3011141.3011202","url":"https://dblp.org/rec/conf/iiwas/StankovskiTTC16"}, "url":"URL#3267889" }, { "@score":"1", "@id":"3267890", "info":{"authors":{"author":[{"@pid":"194/8653","text":"Kanjana Sudathip"},{"@pid":"03/8293","text":"Maleerat Sodanil"}]},"title":"Ontology knowledge-based framework for machine learning concept.","venue":"iiWAS","pages":"50-53","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/SudathipS16","doi":"10.1145/3011141.3011207","ee":"https://doi.org/10.1145/3011141.3011207","url":"https://dblp.org/rec/conf/iiwas/SudathipS16"}, "url":"URL#3267890" }, { "@score":"1", "@id":"3267891", "info":{"authors":{"author":[{"@pid":"194/8651","text":"Hikari Suganuma"},{"@pid":"165/6446","text":"Takamitsu Shioi"},{"@pid":"99/5612","text":"Kenji Hatano"}]},"title":"Construction of discriminant model of web documents suitability as search results.","venue":"iiWAS","pages":"257-261","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/SuganumaSH16","doi":"10.1145/3011141.3011204","ee":"https://doi.org/10.1145/3011141.3011204","url":"https://dblp.org/rec/conf/iiwas/SuganumaSH16"}, "url":"URL#3267891" }, { "@score":"1", "@id":"3267892", "info":{"authors":{"author":[{"@pid":"194/8654","text":"Eunice Tan"},{"@pid":"191/3393","text":"Iris Seaman"},{"@pid":"194/8683","text":"Humphrey Leung"},{"@pid":"08/4453","text":"Yiu-Kai Ng"}]},"title":"Making personalized movie recommendations for children.","venue":"iiWAS","pages":"96-105","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/TanSLN16","doi":"10.1145/3011141.3011142","ee":"https://doi.org/10.1145/3011141.3011142","url":"https://dblp.org/rec/conf/iiwas/TanSLN16"}, "url":"URL#3267892" }, { "@score":"1", "@id":"3267893", "info":{"authors":{"author":[{"@pid":"194/8697","text":"Phannakan Tengkiattrakul"},{"@pid":"66/1275","text":"Saranya Maneeroj"},{"@pid":"35/2213","text":"Atsuhiro Takasu"}]},"title":"Applying ant-colony concepts to trust-based recommender systems.","venue":"iiWAS","pages":"34-41","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/TengkiattrakulM16","doi":"10.1145/3011141.3011161","ee":"https://doi.org/10.1145/3011141.3011161","url":"https://dblp.org/rec/conf/iiwas/TengkiattrakulM16"}, "url":"URL#3267893" }, { "@score":"1", "@id":"3267894", "info":{"authors":{"author":{"@pid":"37/10773","text":"Yoshihisa Udagawa"}},"title":"Maximal frequent sequence mining for finding software clones.","venue":"iiWAS","pages":"26-33","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/Udagawa16","doi":"10.1145/3011141.3011160","ee":"https://doi.org/10.1145/3011141.3011160","url":"https://dblp.org/rec/conf/iiwas/Udagawa16"}, "url":"URL#3267894" }, { "@score":"1", "@id":"3267895", "info":{"authors":{"author":[{"@pid":"63/1404","text":"Mayumi Ueda"},{"@pid":"194/8636","text":"Yukitoshi Morishita"},{"@pid":"194/8638","text":"Tomiyo Nakamura"},{"@pid":"194/8650","text":"Natsuhiko Takata"},{"@pid":"50/1648","text":"Shinsuke Nakajima"}]},"title":"A recipe recommendation system that considers user's mood.","venue":"iiWAS","pages":"472-476","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/UedaMNTN16","doi":"10.1145/3011141.3011192","ee":"https://doi.org/10.1145/3011141.3011192","url":"https://dblp.org/rec/conf/iiwas/UedaMNTN16"}, "url":"URL#3267895" }, { "@score":"1", "@id":"3267896", "info":{"authors":{"author":[{"@pid":"07/9490","text":"Harald Wahl"},{"@pid":"169/3041","text":"Rudolf Galler"},{"@pid":"w/WernerWiniwarter","text":"Werner Winiwarter"}]},"title":"Extending the integrated intelligent computer-assisted language learning (iiCALL) environment.","venue":"iiWAS","pages":"217-220","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/WahlGW16","doi":"10.1145/3011141.3011209","ee":"https://doi.org/10.1145/3011141.3011209","url":"https://dblp.org/rec/conf/iiwas/WahlGW16"}, "url":"URL#3267896" }, { "@score":"1", "@id":"3267897", "info":{"authors":{"author":[{"@pid":"194/8660","text":"Alicia Wood"},{"@pid":"08/4453","text":"Yiu-Kai Ng"}]},"title":"Orthogonal query recommendations for children.","venue":"iiWAS","pages":"298-302","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/WoodN16","doi":"10.1145/3011141.3011220","ee":"https://doi.org/10.1145/3011141.3011220","url":"https://dblp.org/rec/conf/iiwas/WoodN16"}, "url":"URL#3267897" }, { "@score":"1", "@id":"3267898", "info":{"authors":{"author":[{"@pid":"166/5575","text":"Fadwa Yahya"},{"@pid":"86/4432","text":"Khouloud Boukadi"},{"@pid":"11/6673","text":"Zakaria Maamar"},{"@pid":"07/6383","text":"Hanêne Ben-Abdallah"}]},"title":"Towards a meta-modeling approach for social business process requirements capture.","venue":"iiWAS","pages":"345-354","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/YahyaBMB16","doi":"10.1145/3011141.3011170","ee":"https://doi.org/10.1145/3011141.3011170","url":"https://dblp.org/rec/conf/iiwas/YahyaBMB16"}, "url":"URL#3267898" }, { "@score":"1", "@id":"3267899", "info":{"authors":{"author":[{"@pid":"194/8680","text":"Yuriko Yamaguchi"},{"@pid":"194/8681","text":"Mimpei Morishita"},{"@pid":"74/916","text":"Yoichi Inagaki"},{"@pid":"29/2220","text":"Reyn Y. Nakamoto"},{"@pid":"z/JianweiZhang2","text":"Jianwei Zhang 0002"},{"@pid":"194/8639","text":"Junichi Aoi"},{"@pid":"50/1648","text":"Shinsuke Nakajima"}]},"title":"Web advertising recommender system based on estimating users' latent interests.","venue":"iiWAS","pages":"42-49","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/YamaguchiMIN0AN16","doi":"10.1145/3011141.3011180","ee":"https://doi.org/10.1145/3011141.3011180","url":"https://dblp.org/rec/conf/iiwas/YamaguchiMIN0AN16"}, "url":"URL#3267899" }, { "@score":"1", "@id":"3267900", "info":{"authors":{"author":[{"@pid":"46/5262","text":"Shuhei Yamamoto"},{"@pid":"54/5313","text":"Kei Wakabayashi"},{"@pid":"40/4968","text":"Noriko Kando"},{"@pid":"57/6558","text":"Tetsuji Satoh"}]},"title":"Who are growth users?: analyzing and predicting intended Twitter user growth.","venue":"iiWAS","pages":"64-71","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/YamamotoWKS16","doi":"10.1145/3011141.3011145","ee":"https://doi.org/10.1145/3011141.3011145","url":"https://dblp.org/rec/conf/iiwas/YamamotoWKS16"}, "url":"URL#3267900" }, { "@score":"1", "@id":"3267901", "info":{"authors":{"author":[{"@pid":"194/8684","text":"Zen Yoshida"},{"@pid":"86/3844","text":"Masayoshi Aritsugi"}]},"title":"Applying a tendency to be well retweeted to false information detection.","venue":"iiWAS","pages":"154-159","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/YoshidaA16","doi":"10.1145/3011141.3011199","ee":"https://doi.org/10.1145/3011141.3011199","url":"https://dblp.org/rec/conf/iiwas/YoshidaA16"}, "url":"URL#3267901" }, { "@score":"1", "@id":"3267902", "info":{"authors":{"author":[{"@pid":"162/7842","text":"Tomofumi Yoshida"},{"@pid":"50/916","text":"Daisuke Kitayama"}]},"title":"A feature terms extraction method based on polarity analysis of customer reviews for content-based recommendation.","venue":"iiWAS","pages":"7-11","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/YoshidaK16","doi":"10.1145/3011141.3011193","ee":"https://doi.org/10.1145/3011141.3011193","url":"https://dblp.org/rec/conf/iiwas/YoshidaK16"}, "url":"URL#3267902" }, { "@score":"1", "@id":"3267903", "info":{"authors":{"author":[{"@pid":"194/8634","text":"Chaw Thet Zan"},{"@pid":"56/3917","text":"Hayato Yamana"}]},"title":"An improved symbolic aggregate approximation distance measure based on its statistical features.","venue":"iiWAS","pages":"72-80","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/iiwas/ZanY16","doi":"10.1145/3011141.3011146","ee":"https://doi.org/10.1145/3011141.3011146","url":"https://dblp.org/rec/conf/iiwas/ZanY16"}, "url":"URL#3267903" }, { "@score":"1", "@id":"3339446", "info":{"authors":{"author":{"@pid":"158/7753","text":"Gabriele Anderst-Kotsis"}},"title":"Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, iiWAS 2016, Singapore, November 28-30, 2016","venue":"iiWAS","publisher":"ACM","year":"2016","type":"Editorship","key":"conf/iiwas/2016","doi":"10.1145/3011141","ee":"https://doi.org/10.1145/3011141","url":"https://dblp.org/rec/conf/iiwas/2016"}, "url":"URL#3339446" } ] } } } )