callback( { "result":{ "query":":facetid:toc:\"db/journals/is/is38.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"230.62" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"75", "@dc":"75", "@oc":"75", "@id":"43449819", "text":":facetid:toc:db/journals/is/is38.bht" } }, "hits":{ "@total":"75", "@computed":"75", "@sent":"30", "@first":"0", "hit":[{ "@score":"1", "@id":"4035261", "info":{"authors":{"author":[{"@pid":"88/301","text":"Marcelo Gabriel Armentano"},{"@pid":"69/4188","text":"Daniela Godoy"},{"@pid":"47/3034","text":"Analía A. Amandi"}]},"title":"Followee recommendation based on text analysis of micro-blogging activity.","venue":"Inf. Syst.","volume":"38","number":"8","pages":"1116-1127","year":"2013","type":"Journal Articles","access":"closed","key":"journals/is/ArmentanoGA13","doi":"10.1016/J.IS.2013.05.009","ee":"https://doi.org/10.1016/j.is.2013.05.009","url":"https://dblp.org/rec/journals/is/ArmentanoGA13"}, "url":"URL#4035261" }, { "@score":"1", "@id":"4035262", "info":{"authors":{"author":[{"@pid":"25/806","text":"Ebrahim Bagheri"},{"@pid":"94/2962","text":"Fred Freitas"},{"@pid":"68/84","text":"Luiz Olavo Bonino da Silva Santos"}]},"title":"Forward to the special issue on vocabularies, ontologies and rules for the enterprise.","venue":"Inf. Syst.","volume":"38","number":"5","pages":"688-689","year":"2013","type":"Journal Articles","access":"closed","key":"journals/is/BagheriFS13","doi":"10.1016/J.IS.2013.01.004","ee":"https://doi.org/10.1016/j.is.2013.01.004","url":"https://dblp.org/rec/journals/is/BagheriFS13"}, "url":"URL#4035262" }, { "@score":"1", "@id":"4035263", "info":{"authors":{"author":[{"@pid":"36/4642","text":"Alessio Bechini"},{"@pid":"123/8742","text":"Anna Vetrano"}]},"title":"Management and storage of in situ oceanographic data: An ECM-based approach.","venue":"Inf. Syst.","volume":"38","number":"3","pages":"351-368","year":"2013","type":"Journal Articles","access":"closed","key":"journals/is/BechiniV13","doi":"10.1016/J.IS.2012.10.004","ee":"https://doi.org/10.1016/j.is.2012.10.004","url":"https://dblp.org/rec/journals/is/BechiniV13"}, "url":"URL#4035263" }, { "@score":"1", "@id":"4035264", "info":{"authors":{"author":[{"@pid":"39/3706","text":"Andreas Behrend"},{"@pid":"48/4722","text":"Gereon Schüller"},{"@pid":"14/2940","text":"Monika Wieneke"}]},"title":"Efficient tracking of moving objects using a relational database.","venue":"Inf. Syst.","volume":"38","number":"8","pages":"1269-1284","year":"2013","type":"Journal Articles","access":"closed","key":"journals/is/BehrendSW13","doi":"10.1016/J.IS.2012.01.001","ee":"https://doi.org/10.1016/j.is.2012.01.001","url":"https://dblp.org/rec/journals/is/BehrendSW13"}, "url":"URL#4035264" }, { "@score":"1", "@id":"4035265", "info":{"authors":{"author":[{"@pid":"39/3585","text":"Khalid Belhajjame"},{"@pid":"p/NWPaton","text":"Norman W. Paton"},{"@pid":"e/SMEmbury","text":"Suzanne M. Embury"},{"@pid":"f/AAAFernandes","text":"Alvaro A. A. Fernandes"},{"@pid":"59/4045","text":"Cornelia Hedeler"}]},"title":"Incrementally improving dataspaces based on user feedback.","venue":"Inf. Syst.","volume":"38","number":"5","pages":"656-687","year":"2013","type":"Journal Articles","access":"closed","key":"journals/is/BelhajjamePEFH13","doi":"10.1016/J.IS.2013.01.006","ee":"https://doi.org/10.1016/j.is.2013.01.006","url":"https://dblp.org/rec/journals/is/BelhajjamePEFH13"}, "url":"URL#4035265" }, { "@score":"1", "@id":"4035266", "info":{"authors":{"author":[{"@pid":"84/5979","text":"Fábio de Lima Bezerra"},{"@pid":"73/4164","text":"Jacques Wainer"}]},"title":"Algorithms for anomaly detection of traces in logs of process aware information systems.","venue":"Inf. Syst.","volume":"38","number":"1","pages":"33-44","year":"2013","type":"Journal Articles","access":"closed","key":"journals/is/BezerraW13","doi":"10.1016/J.IS.2012.04.004","ee":"https://doi.org/10.1016/j.is.2012.04.004","url":"https://dblp.org/rec/journals/is/BezerraW13"}, "url":"URL#4035266" }, { "@score":"1", "@id":"4035267", "info":{"authors":{"author":[{"@pid":"b/CristianaBolchini","text":"Cristiana Bolchini"},{"@pid":"85/6716","text":"Elisa Quintarelli"},{"@pid":"t/LetiziaTanca","text":"Letizia Tanca"}]},"title":"CARVE: Context-aware automatic view definition over relational databases.","venue":"Inf. Syst.","volume":"38","number":"1","pages":"45-67","year":"2013","type":"Journal Articles","access":"closed","key":"journals/is/BolchiniQT13","doi":"10.1016/J.IS.2012.05.004","ee":"https://doi.org/10.1016/j.is.2012.05.004","url":"https://dblp.org/rec/journals/is/BolchiniQT13"}, "url":"URL#4035267" }, { "@score":"1", "@id":"4035268", "info":{"authors":{"author":[{"@pid":"04/646","text":"Fabiano C. Botelho"},{"@pid":"p/RasmusPagh","text":"Rasmus Pagh"},{"@pid":"z/NZiviani","text":"Nivio Ziviani"}]},"title":"Practical perfect hashing in nearly optimal space.","venue":"Inf. Syst.","volume":"38","number":"1","pages":"108-131","year":"2013","type":"Journal Articles","access":"closed","key":"journals/is/BotelhoPZ13","doi":"10.1016/J.IS.2012.06.002","ee":"https://doi.org/10.1016/j.is.2012.06.002","url":"https://dblp.org/rec/journals/is/BotelhoPZ13"}, "url":"URL#4035268" }, { "@score":"1", "@id":"4035269", "info":{"authors":{"author":[{"@pid":"25/11440","text":"Sebastian Breß"},{"@pid":"55/9320","text":"Felix Beier"},{"@pid":"01/11155","text":"Hannes Rauhe"},{"@pid":"s/KaiUweSattler","text":"Kai-Uwe Sattler"},{"@pid":"s/EikeSchallehn","text":"Eike Schallehn"},{"@pid":"s/GunterSaake","text":"Gunter Saake"}]},"title":"Efficient co-processor utilization in database query processing.","venue":"Inf. Syst.","volume":"38","number":"8","pages":"1084-1096","year":"2013","type":"Journal Articles","access":"closed","key":"journals/is/BressBRSSS13","doi":"10.1016/J.IS.2013.05.004","ee":"https://doi.org/10.1016/j.is.2013.05.004","url":"https://dblp.org/rec/journals/is/BressBRSSS13"}, "url":"URL#4035269" }, { "@score":"1", "@id":"4035270", "info":{"authors":{"author":[{"@pid":"b/NievesRBrisaboa","text":"Nieves R. Brisaboa"},{"@pid":"92/3841","text":"Miguel Rodríguez Luaces"},{"@pid":"n/GonzaloNavarro","text":"Gonzalo Navarro 0001"},{"@pid":"68/2814","text":"Diego Seco"}]},"title":"Space-efficient representations of rectangle datasets supporting orthogonal range querying.","venue":"Inf. Syst.","volume":"38","number":"5","pages":"635-655","year":"2013","type":"Journal Articles","access":"closed","key":"journals/is/BrisaboaLNS13","doi":"10.1016/J.IS.2013.01.005","ee":"https://doi.org/10.1016/j.is.2013.01.005","url":"https://dblp.org/rec/journals/is/BrisaboaLNS13"}, "url":"URL#4035270" }, { "@score":"1", "@id":"4035271", "info":{"authors":{"author":[{"@pid":"126/2577","text":"Slaven Brumec"},{"@pid":"24/8977","text":"Neven Vrcek"}]},"title":"Cost effectiveness of commercial computing clouds.","venue":"Inf. Syst.","volume":"38","number":"4","pages":"495-508","year":"2013","type":"Journal Articles","access":"closed","key":"journals/is/BrumecV13","doi":"10.1016/J.IS.2012.11.002","ee":"https://doi.org/10.1016/j.is.2012.11.002","url":"https://dblp.org/rec/journals/is/BrumecV13"}, "url":"URL#4035271" }, { "@score":"1", "@id":"4035272", "info":{"authors":{"author":[{"@pid":"34/6088","text":"Moisés G. de Carvalho"},{"@pid":"l/AHFLaender","text":"Alberto H. F. Laender"},{"@pid":"45/1395","text":"Marcos André Gonçalves"},{"@pid":"s/ASdaSilva","text":"Altigran Soares da Silva"}]},"title":"An evolutionary approach to complex schema matching.","venue":"Inf. Syst.","volume":"38","number":"3","pages":"302-316","year":"2013","type":"Journal Articles","access":"closed","key":"journals/is/CarvalhoLGS13","doi":"10.1016/J.IS.2012.10.002","ee":"https://doi.org/10.1016/j.is.2012.10.002","url":"https://dblp.org/rec/journals/is/CarvalhoLGS13"}, "url":"URL#4035272" }, { "@score":"1", "@id":"4035273", "info":{"authors":{"author":[{"@pid":"66/9859","text":"Carmelo Cassisi"},{"@pid":"f/AlfredoFerro","text":"Alfredo Ferro"},{"@pid":"02/5792","text":"Rosalba Giugno"},{"@pid":"33/5650","text":"Giuseppe Pigola"},{"@pid":"56/727","text":"Alfredo Pulvirenti"}]},"title":"Enhancing density-based clustering: Parameter reduction and outlier detection.","venue":"Inf. Syst.","volume":"38","number":"3","pages":"317-330","year":"2013","type":"Journal Articles","access":"closed","key":"journals/is/CassisiFGPP13","doi":"10.1016/J.IS.2012.09.001","ee":"https://doi.org/10.1016/j.is.2012.09.001","url":"https://dblp.org/rec/journals/is/CassisiFGPP13"}, "url":"URL#4035273" }, { "@score":"1", "@id":"4035274", "info":{"authors":{"author":[{"@pid":"87/7806","text":"Lixia Chen"},{"@pid":"68/3272","text":"Alin Dobra"}]},"title":"Histograms as statistical estimators for aggregate queries.","venue":"Inf. Syst.","volume":"38","number":"2","pages":"213-230","year":"2013","type":"Journal Articles","access":"closed","key":"journals/is/ChenD13","doi":"10.1016/J.IS.2012.08.003","ee":"https://doi.org/10.1016/j.is.2012.08.003","url":"https://dblp.org/rec/journals/is/ChenD13"}, "url":"URL#4035274" }, { "@score":"1", "@id":"4035275", "info":{"authors":{"author":[{"@pid":"07/3959","text":"Yu-Chi Chung"},{"@pid":"31/1669","text":"I-Fang Su"},{"@pid":"96/5639","text":"Chiang Lee"}]},"title":"Efficient computation of combinatorial skyline queries.","venue":"Inf. Syst.","volume":"38","number":"3","pages":"369-387","year":"2013","type":"Journal Articles","access":"closed","key":"journals/is/ChungSL13","doi":"10.1016/J.IS.2012.10.005","ee":"https://doi.org/10.1016/j.is.2012.10.005","url":"https://dblp.org/rec/journals/is/ChungSL13"}, "url":"URL#4035275" }, { "@score":"1", "@id":"4035276", "info":{"authors":{"author":[{"@pid":"c/PaoloCiaccia","text":"Paolo Ciaccia"},{"@pid":"g/MatteoGolfarelli","text":"Matteo Golfarelli"},{"@pid":"75/5487","text":"Stefano Rizzi"}]},"title":"Efficient derivation of numerical dependencies.","venue":"Inf. Syst.","volume":"38","number":"3","pages":"410-429","year":"2013","type":"Journal Articles","access":"closed","key":"journals/is/CiacciaGR13","doi":"10.1016/J.IS.2012.07.007","ee":"https://doi.org/10.1016/j.is.2012.07.007","url":"https://dblp.org/rec/journals/is/CiacciaGR13"}, "url":"URL#4035276" }, { "@score":"1", "@id":"4035277", "info":{"authors":{"author":{"@pid":"c/AlfredoCuzzocrea","text":"Alfredo Cuzzocrea"}},"title":"Advances in Managing, Updating and Querying Uncertain and Imprecise Sensor and Stream Databases.","venue":"Inf. Syst.","volume":"38","number":"8","pages":"1184-1186","year":"2013","type":"Journal Articles","access":"closed","key":"journals/is/Cuzzocrea13","doi":"10.1016/J.IS.2013.03.004","ee":"https://doi.org/10.1016/j.is.2013.03.004","url":"https://dblp.org/rec/journals/is/Cuzzocrea13"}, "url":"URL#4035277" }, { "@score":"1", "@id":"4035278", "info":{"authors":{"author":[{"@pid":"86/3913","text":"Elio Damaggio"},{"@pid":"h/RichardHull","text":"Richard Hull 0001"},{"@pid":"47/4468","text":"Roman Vaculín"}]},"title":"On the equivalence of incremental and fixpoint semantics for business artifacts with Guard-Stage-Milestone lifecycles.","venue":"Inf. Syst.","volume":"38","number":"4","pages":"561-584","year":"2013","type":"Journal Articles","access":"closed","key":"journals/is/DamaggioHV13","doi":"10.1016/J.IS.2012.09.002","ee":"https://doi.org/10.1016/j.is.2012.09.002","url":"https://dblp.org/rec/journals/is/DamaggioHV13"}, "url":"URL#4035278" }, { "@score":"1", "@id":"4035279", "info":{"authors":{"author":[{"@pid":"d/MarlonDumas","text":"Marlon Dumas"},{"@pid":"19/2137","text":"Luciano García-Bañuelos"},{"@pid":"20/3634","text":"Marcello La Rosa"},{"@pid":"85/8686","text":"Reina Uba"}]},"title":"Fast detection of exact clones in business process model repositories.","venue":"Inf. Syst.","volume":"38","number":"4","pages":"619-633","year":"2013","type":"Journal Articles","access":"closed","key":"journals/is/DumasGRU13","doi":"10.1016/J.IS.2012.07.002","ee":"https://doi.org/10.1016/j.is.2012.07.002","url":"https://dblp.org/rec/journals/is/DumasGRU13"}, "url":"URL#4035279" }, { "@score":"1", "@id":"4035280", "info":{"authors":{"author":[{"@pid":"61/5189","text":"Faezeh Ensan"},{"@pid":"43/6984","text":"Weichang Du"}]},"title":"A semantic metrics suite for evaluating modular ontologies.","venue":"Inf. Syst.","volume":"38","number":"5","pages":"745-770","year":"2013","type":"Journal Articles","access":"closed","key":"journals/is/EnsanD13","doi":"10.1016/J.IS.2012.11.012","ee":"https://doi.org/10.1016/j.is.2012.11.012","url":"https://dblp.org/rec/journals/is/EnsanD13"}, "url":"URL#4035280" }, { "@score":"1", "@id":"4035281", "info":{"authors":{"author":[{"@pid":"67/5970","text":"Dirk Fahland"},{"@pid":"a/WilMPvanderAalst","text":"Wil M. P. van der Aalst"}]},"title":"Simplifying discovered process models in a controlled manner.","venue":"Inf. Syst.","volume":"38","number":"4","pages":"585-605","year":"2013","type":"Journal Articles","access":"closed","key":"journals/is/FahlandA13","doi":"10.1016/J.IS.2012.07.004","ee":"https://doi.org/10.1016/j.is.2012.07.004","url":"https://dblp.org/rec/journals/is/FahlandA13"}, "url":"URL#4035281" }, { "@score":"1", "@id":"4035282", "info":{"authors":{"author":[{"@pid":"05/8694","text":"Sandro Rama Fiorini"},{"@pid":"a/MaraAbel","text":"Mara Abel"},{"@pid":"84/7545","text":"Claiton M. S. Scherer"}]},"title":"An approach for grounding ontologies in raw data using foundational ontology.","venue":"Inf. Syst.","volume":"38","number":"5","pages":"784-799","year":"2013","type":"Journal Articles","access":"closed","key":"journals/is/FioriniAS13","doi":"10.1016/J.IS.2012.11.013","ee":"https://doi.org/10.1016/j.is.2012.11.013","url":"https://dblp.org/rec/journals/is/FioriniAS13"}, "url":"URL#4035282" }, { "@score":"1", "@id":"4035283", "info":{"authors":{"author":[{"@pid":"53/7449","text":"Gayatree Ganu"},{"@pid":"120/3206","text":"Yogesh Kakodkar"},{"@pid":"m/AmelieMarian","text":"Amélie Marian"}]},"title":"Improving the quality of predictions using textual information in online user reviews.","venue":"Inf. Syst.","volume":"38","number":"1","pages":"1-15","year":"2013","type":"Journal Articles","access":"closed","key":"journals/is/GanuKM13","doi":"10.1016/J.IS.2012.03.001","ee":"https://doi.org/10.1016/j.is.2012.03.001","url":"https://dblp.org/rec/journals/is/GanuKM13"}, "url":"URL#4035283" }, { "@score":"1", "@id":"4035284", "info":{"authors":{"author":[{"@pid":"17/1242","text":"Nikos Giatrakos"},{"@pid":"k/YannisKotidis","text":"Yannis Kotidis"},{"@pid":"d/ADeligiannakis","text":"Antonios Deligiannakis"},{"@pid":"v/VVassalos","text":"Vasilis Vassalos"},{"@pid":"t/YannisTheodoridis","text":"Yannis Theodoridis"}]},"title":"In-network approximate computation of outliers with quality guarantees.","venue":"Inf. Syst.","volume":"38","number":"8","pages":"1285-1308","year":"2013","type":"Journal Articles","access":"closed","key":"journals/is/GiatrakosKDVT13","doi":"10.1016/J.IS.2011.08.005","ee":"https://doi.org/10.1016/j.is.2011.08.005","url":"https://dblp.org/rec/journals/is/GiatrakosKDVT13"}, "url":"URL#4035284" }, { "@score":"1", "@id":"4035285", "info":{"authors":{"author":[{"@pid":"08/7258","text":"Gerd Gröner"},{"@pid":"80/3938","text":"Marko Boskovic"},{"@pid":"01/3446","text":"Fernando Silva Parreiras"},{"@pid":"67/5716","text":"Dragan Gasevic"}]},"title":"Modeling and validation of business process families.","venue":"Inf. Syst.","volume":"38","number":"5","pages":"709-726","year":"2013","type":"Journal Articles","access":"closed","key":"journals/is/GronerBPG13","doi":"10.1016/J.IS.2012.11.010","ee":"https://doi.org/10.1016/j.is.2012.11.010","url":"https://dblp.org/rec/journals/is/GronerBPG13"}, "url":"URL#4035285" }, { "@score":"1", "@id":"4035286", "info":{"authors":{"author":[{"@pid":"37/4370","text":"Tanzima Hashem"},{"@pid":"57/1331","text":"Lars Kulik"},{"@pid":"03/505","text":"Rui Zhang 0003"}]},"title":"Countering overlapping rectangle privacy attack for moving kNN queries.","venue":"Inf. Syst.","volume":"38","number":"3","pages":"430-453","year":"2013","type":"Journal Articles","access":"closed","key":"journals/is/HashemK013","doi":"10.1016/J.IS.2012.07.001","ee":"https://doi.org/10.1016/j.is.2012.07.001","url":"https://dblp.org/rec/journals/is/HashemK013"}, "url":"URL#4035286" }, { "@score":"1", "@id":"4035287", "info":{"authors":{"author":[{"@pid":"85/93-4","text":"Jing He 0004"},{"@pid":"32/2837","text":"Yanchun Zhang"},{"@pid":"00/1198","text":"Guangyan Huang"},{"@pid":"124/7086","text":"Paulo A. de Souza"}]},"title":"CIRCE: Correcting Imprecise Readings and Compressing Excrescent points for querying common patterns in uncertain sensor streams.","venue":"Inf. Syst.","volume":"38","number":"8","pages":"1234-1251","year":"2013","type":"Journal Articles","access":"closed","key":"journals/is/HeZHS13","doi":"10.1016/J.IS.2012.01.003","ee":"https://doi.org/10.1016/j.is.2012.01.003","url":"https://dblp.org/rec/journals/is/HeZHS13"}, "url":"URL#4035287" }, { "@score":"1", "@id":"4035288", "info":{"authors":{"author":[{"@pid":"52/93","text":"Magnus Lie Hetland"},{"@pid":"s/TomasSkopal","text":"Tomás Skopal"},{"@pid":"00/1649","text":"Jakub Lokoc"},{"@pid":"40/998","text":"Christian Beecks"}]},"title":"Ptolemaic access methods: Challenging the reign of the metric space model.","venue":"Inf. Syst.","volume":"38","number":"7","pages":"989-1006","year":"2013","type":"Journal Articles","access":"closed","key":"journals/is/HetlandSLB13","doi":"10.1016/J.IS.2012.05.011","ee":"https://doi.org/10.1016/j.is.2012.05.011","url":"https://dblp.org/rec/journals/is/HetlandSLB13"}, "url":"URL#4035288" }, { "@score":"1", "@id":"4035289", "info":{"authors":{"author":[{"@pid":"129/8175","text":"Ray Hylock"},{"@pid":"83/3958","text":"Faiz Currim"}]},"title":"A maintenance centric approach to the view selection problem.","venue":"Inf. Syst.","volume":"38","number":"7","pages":"971-987","year":"2013","type":"Journal Articles","access":"closed","key":"journals/is/HylockC13","doi":"10.1016/J.IS.2013.03.005","ee":"https://doi.org/10.1016/j.is.2013.03.005","url":"https://dblp.org/rec/journals/is/HylockC13"}, "url":"URL#4035289" }, { "@score":"1", "@id":"4035290", "info":{"authors":{"author":[{"@pid":"24/4928","text":"Anastasios Karagiannis"},{"@pid":"13/1242","text":"Panos Vassiliadis"},{"@pid":"s/ASimitsis","text":"Alkis Simitsis"}]},"title":"Scheduling strategies for efficient ETL execution.","venue":"Inf. Syst.","volume":"38","number":"6","pages":"927-945","year":"2013","type":"Journal Articles","access":"closed","key":"journals/is/KaragiannisVS13","doi":"10.1016/J.IS.2012.12.001","ee":"https://doi.org/10.1016/j.is.2012.12.001","url":"https://dblp.org/rec/journals/is/KaragiannisVS13"}, "url":"URL#4035290" } ] } } } )