default search action
5. ICDIM 2010: Lakehead University, Thunder Bay, Canada
- Fifth IEEE International Conference on Digital Information Management, ICDIM 2010, July 5-8, 2010, Lakehead University, Thunder Bay, Canada. IEEE 2010, ISBN 978-1-4244-7572-8
- A. N. K. Zaman, Charles Grant Brown:
Latent semantic indexing and large dataset: Study of term-weighting schemes. 1-4 - Rozita Jamili Oskouei:
Behavior mining of female students by analyzing log files. 5-10 - Herna L. Viktor, Bo Wang, Eric Paquet, Julie Doyle:
Preserving object-relational databases for the next generations. 11-18 - Ludmila Himmelspach, Stefan Conrad:
Clustering approaches for data with missing values: Comparison and evaluation. 19-28 - Yang Hang, Simon Fong:
Real-time business intelligence system architecture with stream mining. 29-34 - Muhammad Usman, Sohail Asghar, Simon Fong:
Data mining and automatic OLAP schema generation. 35-43 - Razan Paul, Abu Sayed Md. Latiful Hoque:
Clustering medical data to predict the likelihood of diseases. 44-49 - Kerstin Denecke, Marko Brosowski:
Topic detection in noisy data sources. 50-55 - Marcelo Queiroz Leite, Leandro Halle Najm, Pedro Luiz Pizzigatti Corrêa, Ayrton Vollet Neto, Vera Lucia Imperatriz Fonseca:
System architecture for data acquisition, extraction and analysis for experiments with weblabs. 56-62 - Razan Paul, Abu Sayed Md. Latiful Hoque:
Mining irregular association rules based on action & non-action type data. 63-68 - Farid Bourennani, Ghaus M. Rizvi, Daniel Ross:
Plastic color mismatch causes identification using OLAP and data mining. 69-74 - Kevin H. Xu, Jingsong Zhang, Shelby Gao:
High-order functions and their ordering relations. 75-80 - Razan Paul, Abu Sayed Md. Latiful Hoque:
Finding symmetric association rules to support medical qualitative research. 81-86 - Daniel Lins da Silva, Pedro Luiz Pizzigatti Corrêa, Leandro Halle Najm:
Requirements analysis for a traceability system for management wood supply chain on Amazon Forest. 87-94 - Pan Juasiripukdee, Lisa Wiyartanti, Laehyun Kim:
Clustering search results of non-text user generated content. 95-100 - Anwar Alhenshiri, Stephen Brooks, Carolyn R. Watters, Michael A. Shepherd:
Augmenting the visual presentation of Web search results. 101-107 - Ali Sajedi Badashian, Hamidreza Afzali, Morteza Ashurzad Delcheh, Mehregan Mahdavi, Mahdi Alipour:
Conceptual File Management: Revising the structure of classification-based information retrieval. 108-113 - Chongyang Shi, Zhendong Niu:
A novel similarity evaluating model based on RFCA and ICS. 114-119 - Ting-Chun Peng, Chia Chun Shih:
Using Chinese part-of-speech patterns for sentiment phrase identification and opinion extraction in user generated reviews. 120-127 - Quoc Hao Mach, Mathew D. Hunter, Ratvinder Singh Grewal:
Quantitative measurements of cognitive processing involved with gaze fixations. 128-131 - Masoud Makrehchi:
Query-relevant document representation for text clustering. 132-138 - Xiaolin Wang, Bao-Liang Lu:
Flatten hierarchies for large-scale hierarchical text categorization. 139-144 - Yanchun Zhong, Heng Li, Jialei Bi:
A feedback-based method for adaptive ROI protection in H.264/AVC. 145-151 - Abdul Sattar, Renaud Séguier:
Facial feature extraction using hybrid genetic-simplex optimization in multi-objective Active Appearance Model. 152-158 - Jiehan Zhou, Jaakko Moisanen, Mika Rautiainen, Mika Ylianttila:
Design and development of Digital Movie Guide service for approaching Community Coordinated Multimedia. 159-162 - Syed Yasser Arafat, Syed Afaq Husain, Iftikhar Azim Niaz, Muhammad Saleem:
Logo detection and recognition in video stream. 163-168 - Azam Karami, Mehran Yazdi, Alireza Zolghadre Asli:
Best rank-r tensor selection using Genetic Algorithm for better noise reduction and compression of Hyperspectral images. 169-173 - Mohamed Saber, Mostafa M. Aref, Tarek F. Gharib:
An efficient filtering technique for super-graph query processing. 174-181 - Abdunnaser Diaf, Rachid Benlamri, Boubakeur Boufama, Riadh Ksantini:
A novel eigenspace-based method for human action recognition. 182-187 - Riadh Ksantini, Boubakeur Boufama, Imran Shafiq Ahmad, Naimul Mefraz Khan:
A new combined KSVM and KFD model for classification and recognition. 188-193 - Ali Shiri:
Query reformulation strategies in an interdisciplinary digital library: The case of nanoscience and technology. 200-206 - Kamal Bal, Omar Nouali:
Deal with multiplicity and diversity of relevance factors in XML retrieval. 207-212 - Raed Al-Shaikh, Ghalib Hashim, AbdulRahman BinHuraib, Salahadin Mohammed:
A modulo-based labeling scheme for dynamically ordered XML trees. 213-221 - Amel Bouzeghoub, Chantal Taconet, Amina Jarraya, Ngoc-Kien Do, Denis Conan:
Complementarity of process-oriented and ontology-based context managers to identify situations. 222-229 - Diego Garcia, Miriam A. M. Capretz, Maria Beatriz Felgar de Toledo:
Using contract and ontology for privacy protection in Service-Oriented Architecture. 230-235 - Nasser Noroozi:
Probabilistic modal logic as a foundation for knowledge management. 236-241 - Zhao Lu, Zoltán Miklós, Songmei Cai, Junzhong Gu:
Measuring taxonomic consistency of ontologies using lexical semantic relatedness. 242-247 - Ching-Cha Hsieh, Chia-Hui Lo, Ying-Hsun Hung:
Context-relevant criteria for starting knowledge management initiatives. 248-253 - Stefan Burger, Bernd Stieger:
Ontology-based classification of unstructured information. 254-259 - Ming Fang, Weiling Li, Rajshekhar Sunderraman:
Maintaining integrity constraints in relational to OWL transformations. 260-265 - Wei Chen, Simon Fong:
Social network collaborative filtering framework and online trust factors: A case study on Facebook. 266-273 - Yi-Chun Chen, Guanling Lee:
An efficient projected database method for mining sequential association rules. 274-278 - R. Etemadi, Nasrollah Moghadam Charkari:
An approach in web content mining for clustering web pages. 279-284 - Rasha M. BinSultan Al-Eidan, Hend S. Al-Khalifa, AbdulMalik S. Al-Salman:
Measuring the credibility of Arabic text content in Twitter. 285-291 - Richard Khoury:
Exploiting Wikipedia in query understanding systems. 292-297 - Erika Matsak, Peeter Lorents:
Digital solutions for inference rules in decision-supporting systems. 298-302 - Min-Hooi Chuah:
An enterprise business intelligence maturity model (EBIMM): Conceptual framework. 303-308 - Mansour Alsulaiman, Awais Mahmood, Muhammad Ghulam, Mohamed Abdelkader Bencherif, Yousef Ajami Alotaibi:
A technique to overcome the problem of small size database for automatic speaker recognition. 303-308 - Sandra J. Leonetti:
Government Electronic Service Delivery (ESD) and privacy in Ontario. 309-314 - Ho Si Meng, Simon Fong:
Visualizing e-Government portal and its performance in WEBVS. 315-320 - Evan Asfoura, Naoum Jamous, Gamal Kassem, Reiner R. Dumke:
Pricing-model for marketing of FERP workflow as product. 321-325 - Syed Nayyer Abbas Kazmi:
Factors influencing e-Governance implementation: Issues and challenges in Pakistan. 326-331 - E. Guerrero, J. Alvarez, L. Rivero:
3D-ADAL: A three-dimensional distributed range-free localization algorithm for wireless sensor networks based on unmanned aerial vehicles. 332-338 - Nils Hoeller, Christoph Reinke, Jana Neumann, Sven Groppe, Florian Frischat, Volker Linnemann:
DACS: A dynamic approximative caching scheme for Wireless Sensor Networks. 339-346 - Osama Abu-Rahmeh, Princy Johnson:
A load balancing scheme for latency optimization in Grid networks. 347-352 - Muhammad Sohaib Aslam, Susan Rea, Dirk Pesch:
A vision for Wireless Sensor Networks: Hybrid architecture, model framework and service based systems. 353-358 - Hakimeh Alemi Baktash, Mohammadbagher Karimi, Mohammad Reza Meybodi, Asgarali Bouyer:
2L-RBACG: A new framework for resource access control in grid environments. 359-366 - Ulises Ibarra Hernandez, Miguel Vargas Martin, Francisco Álvarez Rodríguez, Ricardo Mendoza González, Fabio A. Garcia Toribio:
A requirements taxonomy and rating model for secure and usable B2C/C2C e-commerce websites. 367-372 - Katharina Hahn:
Adaptive workflow management to ensure transactional service composition. 373-378 - Fahad Abdulaziz Aleid, Simon Rogerson, N. Ben Fairweather:
A suppliers' perspective on e-commerce: Suppliers responses to consumers' perspectives on e-commerce adoption in developing countries - A Saudi Arabian empirical study. 379-383 - Lubomir Stanchev:
On index merging for semantic web data. 384-391 - Koya Tamura, Kenji Hatano, Hiroshi Yadohisa:
Characterizing Web pages based on the query likelihoods of neighboring pages. 392-397 - T. Hoang Ngan Le, Kim Hung Nguyen, Hoai Bac Le:
A robust biometric watermark-based authentication scheme. 398-403 - Elvis Pontes, Wagner L. Zucchi:
Fibonacci sequence and EWMA for intrusion forecasting system. 404-411 - Shahriar Mohammadi, Soulmaz Pourdavar:
Penetration test: A case study on remote command execution security hole. 412-416 - Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, Serge Mankovski:
Detecting incompleteness in access control policies using data classification schemes. 417-422 - Raheel Ali Baloch, Noël Crespi:
Formal model for analysis of context dependencies in ubiquitous systems. 431-436 - Seokhoon Ko, Seman Oh:
Dynamic reconfigurable screen keyboard generation method using probe key test. 437-441 - Yu-Ling Chang, Eduardo S. Barrenechea, Paulo S. C. Alencar:
Dynamic user-centric mobile context model. 442-447 - Pawan Kumar Verma, Deepak Dahiya, Pooja Jain:
Using aspect oriented software architecture for enterprise systems development. 448-453 - Jawad Berri:
Towards a framework for Collective Intelligence. 454-459 - Ali Aljumaah:
Modeling students acceptance of E-learning: A case of the KS university. 460-464 - Salah Al-Sharhan, Ahmed Al-Hunaiyyan, Hanaa Al-sharah:
A new efficient blended e-learning model and framework for K12 and higher education: Design and implementation success factors. 465-471 - Jinan Fiaidhi, Sabah Mohammed, David A. J. Thomas, Lyle F. Chamarette:
Securing AJAX-enriched mobile environment for exchanging SVG-based learning materials. 472-477 - Ali Sajedi Badashian, Asghar Dehghani Firouzabadi, Morteza Ashurzad Delcheh, Hamidreza Afzali, Mehregan Mahdavi:
Designing a collaborative educational system: A competitive approach to e-learning. 478-483 - Rachel H. Ellaway, Jeremy R. Cooperstock, Bruce Spencer:
Simulation integration for healthcare education, training and assessment. 484-489 - Rachel H. Ellaway:
OpenLabyrinth: An abstract pathway-based serious game engine for professional education. 490-495 - Hamdi Yahyaoui, Mohammed Almulla:
Context-based specification of Web service policies using WSPL. 496-501 - Mubarak Obaid AlQahtani, Muhammad Ghulam, Yousef Ajami Alotaibi:
Environment sound recognition using zero crossing features and MPEG-7. 502-506 - Amel Boubendir, Allaoua Chaoui:
Towards a generic technique for analysing interactions between aspects at requirement phase. 507-512 - Tetsuya Suzuki, Kazuyuki Hayashi:
Text data compression ratio as a text attribute for a language-independent text art extraction method. 513-518 - (Withdrawn) Patient Data Management System - Periodic Model using GSM. 519-524
- Ali Al-Haj, Christina Twal, Ahmad A. Mohammad:
Hybrid DWT-SVD audio watermarking. 525-529 - Stelios Sotiriadis, Nik Bessis, Ye Huang, Paul Sant, Carsten Maple:
Towards decentralized grid agent models for continuous resource discovery of interoperable grid Virtual Organisations. 530-535 - Ejaz Ahmed, Nik Bessis, Yong Yue:
Customizing interactive patient's diagnosis user interface. 536-539 - Mehmet Emin Aydin:
Collaboration of heterogenous metaheuristic agents. 540-545 - Salima Ouadfel, Mohamed Batouche, Abdelmalik Taleb-Ahmed:
A new particle swarm optimization algorithm for dynamic image clustering. 546-551 - Said Talhi, Salima Ouadfel, Amel Behaz, Mahieddine Djoudi:
Co-authoring an Adaptive Educational Hypermedia. 552-557 - Ji Ma, Kamel Adi, Luigi Logrippo, Serge Mankovski:
Risk management in dynamic role based access control systems. 1-8
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.