default search action
25th DEXA Workshops 2014: Munich, Germany
- 25th International Workshop on Database and Expert Systems Applications, DEXA 2014, Munich, Germany, September 1-5, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-5721-7
5th International Workshop on Biological Knowledge Discovery and Data Mining - BIOKDD 2014
Session 1
- Jing Lu, Malcolm Keech, Cuiqing Wang:
Protein Data Modelling for Concurrent Sequential Patterns. 5-9 - Mehdi Kchouk, Faouzi Mhamdi:
New Online Hierarchical Feature Extraction Algorithm for Classification of Protein. 10-14 - Supaporn Chairungsee:
A New Approach for Phylogenetic Tree Construction Based on Minimal Absent Words. 15-19
Session 2
- Virginio Cantoni, Marco Ferretti, Nicola Pellicano, Jennifer Vandoni, Mirto Musci, Nahumi Nugrahaningsih:
Protein Motif Retrieval by Secondary Structure Element Geometry and Biological Features Saliency. 23-27 - Sofianita Mutalib, Shuzlina Abdul Rahman, Azlinah Mohamed:
Mining Frequent Patterns for Genetic Variants Associated to Diabetes. 28-32 - Tarek El Falah, Maroua Ghnimi, Mourad Elloumi:
A Consensus Algorithm for Simple Motifs Finding. 33-37
Session 3
- Sebastian Dorok, Sebastian Breß, Gunter Saake:
Toward Efficient Variant Calling Inside Main-Memory Database Systems. 41-45 - Hanen Mhamdi, Faouzi Mhamdi:
Feature Selection Methods on Biological Knowledge Discovery and Data Mining: A Survey. 46-50 - Salma Aouled El Haj Mohamed, Faouzi Mhamdi:
New Method Combining Feature Weighting and Feature Selection for Protein Classification. 51-55
Session 4
- Hanen Hosni, Faouzi Mhamdi:
A Filter Correlation Method for Feature Selection. 59-63 - Fabio Fabris, Alex Alves Freitas:
An Efficient Algorithm for Hierarchical Classification of Protein and Gene Functions. 64-68 - Emanuel Weitschek, Fabio Cunial, Giovanni Felici:
Classifying Bacterial Genomes with Compact Logic Formulas on k-Mer Frequencies. 69-73
Session 5
- SeungJin Lim, Menashi Cohenford:
FT-IR Spectra Analysis toward Cancer Detection. 77-81
Session 6
- Ahmet Hayran, Hasan Ogul, Esma Ozkoc:
Content-Based Search on Time-Series Microarray Databases. 89-93 - SeungJin Lim:
A Light-Weight Visualization Tool for Support Vector Machines. 94-98
3rd International Workshop on Intelligent Agent Technology, Power Systems, and Energy Markets - IATEM 2014
Session 1: Multi-agent Electricity Markets I
- Andreas Bublitz, Philipp Ringler, Massimo Genoese, Dogan Keles, Wolf Fichtner:
Agent-Based Simulation of Interrelated Wholesale Electricity Markets. 103-108 - Tiago Pinto, Gabriel Santos, Zita A. Vale, Isabel Praça, Fernando Lopes, Hugo Algarvio:
Realistic Multi-agent Simulation of Competitive Electricity Markets. 109-113 - Hugo Algarvio, Fernando Lopes, Jorge A. M. Sousa, Joao Lagarto:
A Trader Portfolio Optimization of Bilateral Contracts in Electricity Retail Markets. 114-118
Session 2: Intelligent Energy Systems and Energy Markets
- Jorge Martínez Gil, Georgios C. Chasparis, Bernhard Freudenthaler, Thomas Natschläger:
Realistic User Behavior Modeling for Energy Saving in Residential Buildings. 121-125 - Thanos G. Stavropoulos, Emmanouil S. Rigas, Efstratios Kontopoulos, Nick Bassiliades, Ioannis P. Vlahavas:
A Multi-agent Coordination Framework for Smart Building Energy Management. 126-130 - Fernando Lopes, Hugo Algarvio, Jorge A. M. Sousa, Helder Coelho, Tiago Pinto, Gabriel Santos, Zita A. Vale, Isabel Praça:
Multi-agent Simulation of Bilateral Contracting in Competitive Electricity Markets. 131-135
Session 3: Multi-agent Electricity Markets II
- Hugo Algarvio, Fernando Lopes, Jorge A. M. Sousa, Joao Lagarto:
Power Producers Trading Electricity in Both Pool and Forward Markets. 139-143
4th International Workshop on Information Systems for Situation Awareness and Situation Management - ISSASiM 2014
Session 1: Situation Awareness and Management for Disaster Management
- Mario Pichler, Diethard Leber:
On the Formalization of Expert Knowledge: A Disaster Management Case Study. 149-153 - Bogdan Pavkovic, Lazar Berbakov, Sanja Vranes, Milos Milenkovic:
Situation Awareness and Decision Support Tools for Response Phase of Emergency Management: A Short Survey. 154-159 - Marina Tropmann-Frick, Thomas Ziebermayr:
Generic Approach for Dynamic Disaster Management System Component. 160-164 - Matthew Coelho, Andrew Rau-Chaplin:
eXsight: An Analytical Framework for Quantifying Financial Loss in the Aftermath of Catastrophic Events. 165-170
Session 2: Knowledge Discovery and Reasoning
- Andreas Bögl, Christine Natschläger, Michael Karlinger, Michael Schrefl:
Exploiting Process Patterns and Process Instances to Support Adaptability of Dynamic Business Processes. 173-177 - Zhang Zuo, Hung-Hsuan Huang, Kyoji Kawagoe:
Similarity Search of Human Behavior Processes Using Extended Linked Data Semantic Distance. 178-182 - Nicola Bicocchi, Damiano Fontana, Franco Zambonelli:
Improving Activity Recognition via Satellite Imagery and Commonsense Knowledge. 183-187
11th International Workshop on Text-Based Information Retrieval - TIR 2014
Session: Information Retrieval Theory
- Gebrekirstos G. Gebremeskel, Jiyin He, Arjen P. de Vries, Jimmy Lin:
Cumulative Citation Recommendation: A Feature-Aware Comparison of Approaches. 193-197 - Sonia Alouane-Ksouri, Minyar Sassi Hidri, Kamel Barkaoui:
Text Retrieval Based on Dyadic Conceptual Projection. 198-202 - Behrang Q. Zadeh, Siegfried Handschuh:
Random Manhattan Indexing. 203-208
Session: Text Mining and Classification I
- Edgardo Ferretti, Marcelo Luis Errecalde, Maik Anderka, Benno Stein:
On the Use of Reliable-Negatives Selection Strategies in the PU Learning Approach for Quality Flaws Prediction in Wikipedia. 211-215 - Christof Stocker, Leopold-Michael Marzi, Christian Matula, Johannes Schantl, Gottfried Prohaska, Alberto Brabenetz, Andreas Holzinger:
Enhancing Patient Safety through Human-Computer Information Retrieval on the Example of German-Speaking Surgical Reports. 216-220
Session: Text Mining and Classification II
- Michal Rott, Petr Cerva:
Investigation of Latent Semantic Analysis for Clustering of Czech News Articles. 223-227 - Kheireddine Abainia, Siham Ouamour-Sayoud, Halim Sayoud:
Robust Language Identification of Noisy Texts: Proposal of Hybrid Approaches. 228-232 - Chaker Jebari:
A Pure URL-Based Genre Classification of Web Pages. 233-237
Session: Information Extraction
- Svetlana Popova, Vera Danilova:
Keyphrase Extraction Abstracts Instead of Full Papers. 241-245 - Marcello Trovati, James Brady:
Towards an Automated Approach to Extract and Compare Fictional Networks: An Initial Evaluation. 246-250
1st International Workshop on NoSQL Databases and Linked Data Applications - NoSQL-Net 2014
- Adam Senk, Michal Valenta, Wolfgang Benn:
Distributed Evaluation of XPath Axes Queries over Large XML Documents Stored in MapReduce Clusters. 253-257 - Jakub Yaghob, David Bednárek, Martin Krulis, Filip Zavoral:
Column-Oriented Data Store for Astrophysical Data. 258-262 - Saleh Ghasemi, Wo-Shun Luk, Norah Alrayes:
M2RML: Multidimensional to RDF Mapping Language. 263-267
1st Workshop on Security in Highly Connected IT systems - SHCIS 2014
Session 1
- Michael Kunz, Matthias Hummer, Ludwig Fuchs, Michael Netter, Günther Pernul:
Analyzing Recent Trends in Enterprise Identity Management. 273-277 - Johannes Sänger, Christian Richthammer, Sabri Hassan, Günther Pernul:
Trust and Big Data: A Roadmap for Research. 278-282 - Christian Roth, Rolf Schillinger:
Detectability of Deep Packet Inspection in Common Provider/Consumer Relations. 283-287
Session 2
- Emrah Yasasin, Gerhard Rauchecker, Julian Prester, Guido Schryen:
A Fuzzy Security Investment Decision Support Model for Highly Distributed Systems. 291-295 - Pankaj Pandey, Einar Arthur Snekkenes:
Applicability of Prediction Markets in Information Security Risk Management. 296-300
Session 3
- Marius Vlad, Hans P. Reiser:
Towards a Flexible Virtualization-Based Architecture for Malware Detection and Analysis. 303-307 - Tamas K. Lengyel, Thomas Kittel, Jonas Pfoh, Claudia Eckert:
Multi-tiered Security Architecture for ARM via the Virtualization and Security Extensions. 308-312 - Yan Zhuang, Mykola Protsenko, Tilo Müller, Felix C. Freiling:
An(other) Exercise in Measuring the Strength of Source Code Obfuscation. 313-317
Session 4
- Marcel Heupel, Mohamed Bourimi, Dogan Kesdogan:
The di.me Trust Approach for Supporting Collaborative Scenarios. 321-325 - Norman Hänsch, Zinaida Benenson:
Specifying IT Security Awareness. 326-330 - Jürgen Markert, Michael Massoth:
Honeypot Effectiveness in Different Categories of Attacks on Wireless Sensor Networks. 331-335
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.