


default search action
20th SAC 2005: Santa Fe, New Mexico, USA
- Hisham Haddad, Lorie M. Liebrock, Andrea Omicini, Roger L. Wainwright:

Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), Santa Fe, New Mexico, USA, March 13-17, 2005. ACM 2005, ISBN 1-58113-964-0
Keynote Address
- Bob Hutchinson:

The future of systematic information protection. 1 - Ramon E. Moore:

Order relations and rigor in computing. 2
AI and Computational Logic and Image Analysis (AI)
- Chih-Cheng Hung:

Editorial message: special track on artificial intelligence, computational logic and image analysis. 3 - Grégory Valigiani, Raphael Biojout, Yannick Jamont, Evelyne Lutton

, Claire Bourgeois-République, Pierre Collet:
Experimenting with a real-size man-hill to optimize pedagogical paths. 4-8 - Marco Antonio Montes de Oca, Leonardo Garrido, José-Luis Aguirre:

An hybridization of an ant-based clustering algorithm with growing neural gas networks for classification tasks. 9-13 - Kengo Katayama, Takahiro Koshiishi, Hiroyuki Narihisa:

Reinforcement learning agents with primary knowledge designed by analytic hierarchy process. 14-21 - Shawn Martin, Alex Bäcker:

Estimating manifold dimension by inversion error. 22-26 - Jie Zhou, Giovanni Pasteris:

Data driven approach to designing minimum hamming distance polychotomizer. 27-31 - Huanjing Wang, Allen S. Parrish, Randy K. Smith, Susan V. Vrbsky:

Variable selection and ranking for analyzing automobile traffic accident data. 32-37 - Gaurav Pandey, Himanshu Gupta, Pabitra Mitra:

Stochastic scheduling of active support vector learning algorithms. 38-42
AI and Computational Logic and Image Analysis (AI): Poster Papers
- Dongyong Yang, Jungan Chen:

The T-detectors maturation algorithm based on match range model. 43-44 - Dongseob Jang, Sung Y. Shin, Charlie Y. Shim, C. C. Hung:

A comparison on information fusion methods for air target identification. 45-46
Agents, Interactions, Mobility, and Systems (AIMS)
- Huy Hoang To, Shonali Krishnaswamy, Bala Srinivasan:

Mobile agents for network management: when and when not! 47-53 - Sahin Albayrak, Stefan Wollny, Nicolas Varone, Andreas Lommatzsch, Dragan Milosevic:

Agent technology for personalized information filtering: the PIA-system. 54-59 - Avelino F. Zorzo, Felipe Rech Meneguzzi

:
An agent model for fault-tolerant systems. 60-65 - Volker Roth, Ulrich Pinsdorf, Jan Peters:

A distributed content-based search engine based on mobile code. 66-73 - David Hurt, Paul Tarau:

An empirical evaluation of communication effectiveness in autonomous reactive multiagent systems. 74-78 - Hoong Chuin Lau

, Hui Wang:
A multi-agent approach for solving optimization problems involving expensive resources. 79-83 - Linli He, Thomas R. Ioerger:

Forming resource-sharing coalitions: a distributed resource allocation mechanism for self-interested agents in computational grids. 84-91
Agents, Interactions, Mobility, and Systems (AIMS): Poster Paper
- Mosaab Daoud

, Qusay H. Mahmoud
:
Reliability analysis of mobile agent-based systems. 92-93 - Ludmil Mikhailov

, Petco E. Tsvetinov:
Fuzzy approach to outsourcing of information technology services. 94-98
Bioinformatics (BIO)
- Mathew J. Palakal, Sven Rahmann, Birong Liao:

Editorial message: special track on bioinformatics. 99 - Hsiao Ping Lee, Tzu Fang Sheu, Yin-Te Tsai:

Efficient discovery of unique signatures on whole-genome EST databases. 100-104 - Shannon Hastings, Stephen Langella, Scott Oster, Tahsin M. Kurç, Tony Pan, Ümit V. Çatalyürek

, Daniel Janies, Joel H. Saltz:
Grid-based management of biomedical data using an XML-based distributed data management system. 105-109 - Jake Yue Chen

, John V. Carlis, Ning Gao:
A complex biological database querying method. 110-114 - Eric A. Wernert, Jagannathan Lakshmipathy:

PViN: a scalable and flexible system for visualizing pedigree databases. 115-122 - Imad Rahal, Dongmei Ren, Amal Perera, Hassan Najadat

, William Perrizo, Riad Rahhal
, Willy Valdivia Granda:
Incremental interactive mining of constrained association rules from biological annotation data with nominal features. 123-127 - Andrei Oliveira da Silva, Osmar Norberto de Souza

:
A framework for result handling in bioinformatics: an application to computer assisted drug design. 128-132 - James R. Faeder

, Michael L. Blinov
, William S. Hlavacek:
Graphical rule-based representation of signal-transduction networks. 133-140 - Niranjan Jayadevaprakash, Snehasis Mukhopadhyay, Mathew J. Palakal:

Generating association graphs of non-cooccurring text objects using transitive methods. 141-145 - Yao-Ting Huang, Kun-Mao Chao, Ting Chen:

An approximation algorithm for haplotype inference by maximum parsimony. 146-150 - Sebastian Böcker, Zsuzsanna Lipták

:
Efficient mass decomposition. 151-157 - Joc Cing Tay, Atul Jhavar:

CAFISS: a complex adaptive framework for immune system simulation. 158-164 - Jacqueline Signorini, Patrick Greussay:

Object-oriented wound healing in the liver: a class-structured view of fibrogenesis and a glimpse of its evolution. 165-171 - Min Hu, Qunsheng Peng:

Volume fractal dimensionality: a useful parameter for measuring the complexity of 3D protein spatial structures. 172-176 - Rong Chen, Hesham H. Ali:

A new approach for gene prediction using comparative sequence analysis. 177-184 - Paul Davidsson

, Johan Hagelbäck, Kenny Svensson:
Comparing approaches to predict transmembrane domains in protein sequences. 185-189 - Mehmet M. Dalkilic, Arijit Sengupta

:
Design and evaluation of CATPA: curation and alignment tool for protein analysis. 190-194 - Conrad Plake, Jörg Hakenberg

, Ulf Leser:
Optimizing syntax patterns for discovering protein-protein interactions. 195-201
Bioinformatics (BIO): Poster Papers
- Shu Ju Hsieh, Yun Sheng Chung, Chun-Yuan Lin, Chuan Yi Tang:

EXONSCAN: EXON prediction with Signal detection and Coding region AligNment in homologous sequences. 202-203 - Baoying Wang, William Perrizo:

Tree-based clustering for gene expression data. 204-205 - Raymond Wan

, Hiroshi Mamitsuka
, Kiyoko F. Aoki
:
Cleaning microarray expression data using Markov random fields based on profile similarity. 206-207 - Zubin Balsara, Steve Roach:

Prediction of inherited and genetic mutations using the software model checker SPIN. 208-209 - Pankaj Kankar, Sougata Mukherjea

:
Text-based summarization and visualization of gene clusters. 210-211 - Chandan K. Reddy

, Hsiao-Dong Chiang:
Finding saddle points using stability boundaries. 212-213
Computer Applications in Health Care (CAHC)
- Valentin Masero

:
Health care information systems. 214-215 - Eduardo B. Fernández

, Tami Sorgente:
An analysis of modeling flaws in HL7 and JAHIS. 216-223 - David J. Power, Mark Slaymaker

, Eugenia A. Politou
, Andrew C. Simpson
:
Protecting sensitive patient data via query modification. 224-230 - Claire Bourgeois-République, Grégory Valigiani, Pierre Collet:

An interactive evolutionary algorithm for cochlear implant fitting: first results. 231-235 - Stefan Jablonski, Rainer Lay, Christian Meiler, Sascha Müller, Wolfgang Hümmer:

Data logistics as a means of integration in healthcare applications. 236-241 - Xiaodong Wu, John Abraham:

The intensity level reduction in radiation therapy. 242-246 - Francisco J. Guerrero, Valentin Masero

, Juan M. León-Rojas
, José Moreno:
Multilure active contours. 247-254 - Michela Antonelli

, Beatrice Lazzerini
, Francesco Marcelloni
:
Segmentation and reconstruction of the lung volume in CT images. 255-259 - Heng Huang, Li Shen, Fillia Makedon, Sheng Zhang, Mark Greenberg, Ling Gao, Justin D. Pearlman:

A clustering-based approach for prediction of cardiac resynchronization therapy. 260-266 - Kaja M. Abbas

, Armin R. Mikler, Robert Gatti:
Temporal analysis of infectious diseases: influenza. 267-271 - Roozbeh Jafari, Foad Dabiri, Philip Brisk

, Majid Sarrafzadeh:
Adaptive and fault tolerant medical vest for life-critical medical monitoring. 272-279
Computer-Aided Law and Advanced Technologies (CLAT)
- Giovanni Sartor, Jeremy V. Pitt, Alessandra Villecco:

Computer-aided law and advanced technologies. 280-281 - Mindaugas Kiskis

, Rimantas Petrauskas:
Compensating creativity in the digital world: reconciling technology and culture. 282-286 - Slim Rekhis

, Noureddine Boudriga:
A formal logic-based language and an automated verification tool for computer forensic investigation. 287-291 - Ben Hachey

, Claire Grover:
Sequence modelling for sentence classification in a legal summarisation system. 292-296 - Alessandra Villecco Bettelli:

The employment of XML standards in electronic judicial proceedings. 297-301
Computer-Aided Law and Advanced Technologies (CLAT): Poster Paper
- Wei Ren

, Hai Jin:
Honeynet based distributed adaptive network forensics and active real time investigation. 302-303
Computer Security (SEC)
- Giampaolo Bella

, Peter Y. A. Ryan
:
Special track on computer security. 304-305 - Himanshu Khurana, Adam J. Slagell, Rafael Bonilla:

SELS: a secure e-mail list service. 306-313 - Ginger Myles, Christian S. Collberg:

K-gram based software birthmarks. 314-318 - Dev Anshul, Suman Roy

:
A ZKP-based identification scheme for base nodes in wireless sensor networks. 319-323 - Maurizio Adriano Strangio:

Efficient Diffie-Hellmann two-party key agreement protocols based on elliptic curves. 324-331 - Karsten Sohr

, Michael Drouineaud, Gail-Joon Ahn
:
Formal specification of role-based security policies for clinical information systems. 332-339 - Victoria Ungureanu:

Efficient support for enterprise delegation policies. 340-345 - Prem Uppuluri, Uday Joshi, Arnab Ray:

Preventing race condition attacks on file-systems. 346-353 - Li Yang, Raimund K. Ege, Huiqun Yu:

Mediation security specification and enforcement for heterogeneous databases. 354-358 - Xinwen Zhang, Yingjiu Li, Divya Nalla:

An attribute-based access matrix model. 359-363
Constraint Solving and Programming (CSP)
- Stefano Bistarelli

, Éric Monfroy, Barry O'Sullivan
:
Editorial: special track on constraint solving and programming. 364-365 - Farid Ajili, Robert Rodosek, Andrew Eremin:

A branch-price-and-propagate approach for optimizing IGP weight setting subject to unique shortest paths. 366-370 - Yat Chiu Law, Jimmy Ho-Man Lee:

Breaking value symmetries in matrix models using channeling constraints. 371-376 - Frédéric Goualard, Laurent Granvilliers:

Controlled propagation in continuous numerical constraint networks. 377-382 - Wided Ouaja, Barry Richards:

Hybrid Lagrangian relaxation for bandwidth-constrained routing: knapsack decomposition. 383-387 - Roman Barták, Hana Rudová:

Limited assignments: a new cutoff strategy for incomplete depth-first search. 388-392 - Stefan S. Dantchev, Frank D. Valencia:

On the computational limits of infinite satisfaction. 393-397 - Tony Lambert, Éric Monfroy, Frédéric Saubion:

Solving strategies using a hybridization model for local search and constraint propagation. 398-403 - Sarah O'Connell, Barry O'Sullivan

, Eugene C. Freuder:
Timid acquisition of constraint satisfaction problems. 404-408
Constraint Solving and Programming (CSP): Poster Papers
- Songshan Guo, Weixing Li, Andrew Lim

, Fan Wang
:
The shortest route cut and fill problem in linear topological structure. 409-410
Coordination Models, Languages and Applications (CM)
- Sascha Ossowski

, Ronaldo Menezes
:
Special track on coordination models, languages and applications. 411-412 - Gian Pietro Picco, Davide Balzarotti, Paolo Costa:

LighTS: a lightweight, customizable tuple space supporting context-aware applications. 413-419 - Alessandro Ricci

, Mirko Viroli
:
A timed extension of ReSpecT. 420-427 - Rocco De Nicola

, Diego Latella
, Mieke Massink
:
Formal modeling and quantitative analysis of KLAIM-based mobile systems. 428-435 - Juan Guillen Scholten, Farhad Arbab, Frank S. de Boer, Marcello M. Bonsangue

:
MoCha-pi, an exogenous coordination calculus based on mobile channels. 436-442 - Giancarlo Fortino

, Wilma Russo
:
Multi-coordination of mobile agents: a model and a component-based architecture. 443-450 - Juan Manuel Serrano, Sascha Ossowski

:
A semantic framework for the recursive specification of interaction protocols. 451-456 - Amine Tafat, Michèle Courant, Béat Hirsbrunner:

Implicit environment-based coordination in pervasive computing. 457-461 - María-Victoria Belmonte

, José-Luis Pérez-de-la-Cruz, Francisco Triguero Ruiz, Alberto Fernández
:
Agent coordination for bus fleet management. 462-466
Coordination Models, Languages and Applications (CM): Poster Paper
- Ronaldo Menezes

:
Self-organization and computer security: a case study in adaptive coordination. 467-468
Data Mining (DM)
- Sang-Wook Kim, Byeong-Soo Jeong:

Performance bottleneck in time-series subsequence matching. 469-473 - Miriam Baglioni

, Barbara Furletti, Franco Turini:
DrC4.5: Improving C4.5 by means of prior knowledge. 474-481 - Malik Agyemang, Ken Barker, Reda Alhajj:

Mining web content outliers using structure oriented weighting techniques and N-grams. 482-487 - Mingjun Song, Sanguthevar Rajasekaran:

Finding frequent itemsets by transaction mapping. 488-492 - Vandana Pursnani Janeja, Vijayalakshmi Atluri

:
LS3: a Linear Semantic Scan Statistic technique for detecting anomalous windows. 493-497 - Todd Ebert, Darin Goldstein:

A "Go With the Winners" approach to finding frequent patterns. 498-502 - Giuseppe Carenini, Raymond T. Ng, Xiaodong Zhou, Ed Zwart:

Discovery and regeneration of hidden emails. 503-510 - Tina Eliassi-Rad, Terence Critchlow:

A hybrid approach for multiresolution modeling of large-scale scientific data. 511-518 - Gyesung Lee, Xindong Wu, Jinho Chon:

Rearranging data objects for efficient and stable clustering. 519-523 - Yu Qian, Kang Zhang, Fang Qiu:

Spatial contextual noise removal for post classification smoothing of remotely sensed images. 524-528 - Claudio Silvestri

, Salvatore Orlando
:
Distributed approximate mining of frequent patterns. 529-536 - Fabrizio Angiulli

, Stefano Basta
, Clara Pizzuti:
Detection and prediction of distance-based outliers. 537-542
Data Mining (DM): Poster Papers
- Yasuhiko Morimoto:

Optimized transitive association rule: mining significant stopover between events. 543-544 - Carlos Ordonez:

A model for association rules based on clustering. 545-546 - Mehmet M. Dalkilic, Arijit Sengupta

:
Circle: design and implementation of a classifier based on circuit minimization. 547-548 - Xiaowei Xu, Mutlu Mete, Nurcan Yuruk:

Mining concept associations for knowledge discovery in large textual databases. 549-550 - Rajesh Natarajan

, B. Shekar:
A relatedness-based data-driven approach to determination of interestingness of association rules. 551-552
Data Streams (DS)
- Jesús S. Aguilar-Ruiz

, S. Muthukrishnan:
Editorial message: special track on data streams. 553-554 - Henrike Berthold

, Sven Schmidt, Wolfgang Lehner
, Claude-Joachim Hamann:
Integrated resource management for data stream systems. 555-562 - Like Gao, Min Wang, Xiaoyang Sean Wang:

Quality-driven evaluation of trigger conditions on streaming time series. 563-567 - Francisco J. Ferrer-Troyano

, Jesús S. Aguilar-Ruiz
, José Cristóbal Riquelme Santos:
Incremental rule learning based on example nearness from numerical data streams. 568-572 - João Gama

, Pedro Medas, Pedro Pereira Rodrigues
:
Learning decision trees from dynamic data streams. 573-577
Data Streams (DS): Poster Paper
- Christoph Heinz, Bernhard Seeger:

Wavelet density estimators over data streams. 578-579
Database Theory, Technology and Applications (DTTA)
- Ramzi A. Haraty

, Apostolos N. Papadopoulos, Junping Sun:
Editorial message: special track on database theory, technology, and applications. 580 - Man-Soon Kim, Sang-Wook Kim, Miyoung Shin:

Optimization of subsequence matching under time warping in time-series databases. 581-586 - Alejandro Pauly, Markus Schneider:

Identifying topological predicates for vague spatial objects. 587-591 - Lavinia Egidi

, Paolo Terenziani
:
A flexible approach to user-defined symbolic granularities in temporal databases. 592-597 - Filippo Furfaro

, Giuseppe M. Mazzeo
, Domenico Saccà
, Cristina Sirangelo:
Hierarchical binary histograms for summarizing multi-dimensional data. 598-603 - Caetano Traina Jr.

, Josiel Maimoni de Figueiredo, Agma J. M. Traina:
Image domain formalization for content-based image retrieval. 604-609 - Dan C. Stefanescu, Alex Thomo

, Lida Thomo:
Distributed evaluation of generalized path queries. 610-616 - Renato Bueno

, Agma J. M. Traina, Caetano Traina Jr.
:
Accelerating approximate similarity queries using genetic algorithms. 617-622 - Andreas Behrend:

Optimizing existential queries in stratifiable deductive databases. 623-628 - Igor Wojnicki, Antoni Ligeza

:
Jelly view: a technology for arbitrarily advanced queries within RDBMS. 629-633 - Zhenyu Liu, Ka Cheung Sia, Junghoo Cho:

Cost-efficient processing of MIN/MAX queries over distributed sensors with uncertainty. 634-641 - Luciano Baresi

, Elisa Quintarelli
:
Graph transformation to infer schemata from XML documents. 642-646 - Nobutaka Suzuki:

Finding an optimum edit script between an XML document and a DTD. 647-653 - Juan Raposo, Alberto Pan, Manuel Álvarez

, Ángel Viña:
Automatic wrapper maintenance for semi-structured web sources using results from previous queries. 654-659 - Yongjing Lin, Youtao Zhang, Quanzhong Li, Jun Yang:

Supporting efficient query processing on compressed XML files. 660-665 - Sujatha R. Upadhyaya, P. Sreenivasa Kumar:

ERONTO: a tool for extracting ontologies from extended E/R diagrams. 666-670 - Andrew J. Robinson

, J. Wenny Rahayu, Susanna Herd, Tharam S. Dillon:
User-defined view automation of genomic databases. 671-675
Database Theory, Technology and Applications (DTTA): Poster Paper
- Chris Giannella, Bassem Sayrafi:

An information theoretic histogram for single dimensional selectivity estimation. 676-677
Distributed Systems and Grid Computing (DSGC)
- Robert van Engelen, Nectarios Koziris, Madhusudhan Govindaraju, Kleanthis Psarris:

Editorial message: special track on distributed systems and grid computing. 678-679 - Gurmeet Singh, Ewa Deelman, Gaurang Mehta, Karan Vahi, Mei-Hui Su, G. Bruce Berriman, John Good, Joseph C. Jacob, Daniel S. Katz

, Albert Lazzarini, Kent Blackburn, Scott Koranda
:
The Pegasus portal: web based grid computing. 680-686 - Radu Prodan

, Thomas Fahringer
:
Dynamic scheduling of scientific workflow applications on the grid: a case study. 687-694 - Rashedur M. Rahman

, Ken Barker, Reda Alhajj:
Replica selection in grid environment: a data-mining approach. 695-700 - Giovanni Aloisio

, Massimo Cafaro
, Sandro Fiore
, Gianvito Quarta:
A grid-based architecture for earth observation data access. 701-705 - Markus Aleksy

, Axel Korthaus
, Martin Schader:
Realizing the leasing concept in CORBA-based applications. 706-712 - Zhichun Xiao, Wing Ning Li, John Jing-Fu Jenq:

On unit task linear-nonlinear two-cluster scheduling problem. 713-717 - Francesco Quaglia, Paolo Romano

:
Reliability in three-tier systems without application server coordination and persistent message queues. 718-723 - Ricardo Neisse, Maria Janilce Bosquiroli Almeida, Lisandro Zambenedetti Granville

, Liane Margarida Rockenbach Tarouco
:
Policies translation for integrated management of grids and networks. 724-729 - M. Monemizadeh, Hamid Sarbazi-Azad:

The necklace-hypercube: a well scalable hypercube-based interconnection network for multiprocessors. 729-733 - Mohammad Reza Hoseiny Farahabady

, Hamid Sarbazi-Azad:
The recursive transpose-connected cycles (RTCC) interconnection network for multiprocessors. 734-738 - Marco Aurélio Spohn

, J. J. Garcia-Luna-Aceves:
A solution for the location problem in arbitrary computer networks using generic dominating sets. 739-743 - Wei Zheng, Sheng Zhang, Yi Ouyang, Fillia Makedon, James Ford:

Node clustering based on link delay in P2P networks. 744-749
Distributed Systems and Grid Computing (DSGC): Poster Paper
- Yanqing Ji, Hai Jiang, Vipin Chaudhary

:
Adaptation point analysis for computation migration/checkpointing. 750-751
Document Engineering (DE)
- Rafael Dueire Lins:

Editorial message: special track on document engineering. 752-753 - Vladimir Pervouchine, Graham Leedham, Konstantin Melikhov:

Handwritten character skeletonisation for forensic document analysis. 754-758 - Daniel P. Lopresti

:
Performance evaluation for text processing of noisy inputs. 759-763 - Bruno Martins

, Mário J. Silva
:
Language identification in web pages. 764-768 - Istvan Beszteri, Petri Vuorimaa:

An XForms based solution for adaptable documents editing. 769-775 - Stefan Gruner, Stuart Naven:

Tool support for plagiarism detection in text documents. 776-781 - Paul Tarau, Rada Mihalcea, Elizabeth Figa:

Semantic document engineering with WordNet and PageRank. 782-786
Document Engineering (DE): Poster Paper
- E. Rodney Canfield, Guangming Xing:

Approximate XML document matching. 787-788
Electronic Commerce Technologies (ECT)
- Sviatoslav B. Braynov, Manuel Núñez

, Peter R. Wurman
:
Editorial message: special track on e-commerce technologies. 789-790 - Huseyin Polat, Wenliang Du:

SVD-based collaborative filtering with privacy. 791-795 - Ismael Rodríguez, Natalia López:

Implementing private Vickrey auctions. 796-800 - Himanshu Khurana:

Scalable security and accounting services for content-based publish/subscribe systems. 801-807 - Jiyong Zhang

, Pearl Pu:
Effort and accuracy analysis of choice strategies for electronic product catalogs. 808-814 - Gregorio Díaz

, Kim Guldstrand Larsen, Juan José Pardo, Fernando Cuartero, Valentín Valero:
An approach to handle real time and probabilistic behaviors in e-commerce: validating the SET protocol. 815-820 - Sheng Zhang, Fillia Makedon:

Privacy preserving learning in negotiation. 821-825 - Jesús Arias-Fisteus

, Luis Sánchez Fernández, Carlos Delgado Kloos:
Applying model checking to BPEL4WS business collaborations. 826-830 - Mario Bravetti, Claudio Guidi, Roberto Lucchi, Gianluigi Zavattaro:

Supporting e-commerce systems formalization with choreography languages. 831-835
Embedded Systems: Applications, Solutions and Techniques (EMBS)
- Alessio Bechini

, François Bodin, Cosimo Antonio Prete:
Editorial message for the special track on embedded systems: applications, solutions, and techniques. 836-837 - Jen-Wei Hsieh, Li-Pin Chang, Tei-Wei Kuo

:
Efficient on-line identification of hot data for flash-memory management. 838-842 - Keun Soo Yim, Jihong Kim, Kern Koh:

A fast start-up technique for flash memory based computing systems. 843-849 - Jan-Willem van de Waerdt, Gerrit A. Slavenburg, Jean-Paul van Itegem, Stamatis Vassiliadis:

Motion estimation performance of the TM3270 processor. 850-856 - Shahrooz Feizabadi, Binoy Ravindran

, E. Douglas Jensen:
MSA: a memory-aware utility accrual scheduling algorithm. 857-862 - Sreejith K. Menon, Priti Shankar:

A code compression advisory tool for embedded processors. 863-867 - Paul A. Griffin, Witawas Srisa-an

, J. Morris Chang:
On designing a low-power garbage collector for java embedded devices: a case study. 868-873 - Mourad Debbabi

, Azzam Mourad
, Nadia Tawbi
:
Armed E-Bunny: a selective dynamic compiler for embedded Java virtual machine targeting ARM processors. 874-878 - Flavius Gruian, Per Andersson, Krzysztof Kuchcinski

, Martin Schoeberl
:
Automatic generation of application-specific systems based on a micro-programmed Java core. 879-884 - Christian Del Rosso:

Performance analysis framework for large software-intensive systems with a message passing paradigm. 885-889 - Ning Weng, Tilman Wolf

:
Profiling and mapping of parallel workloads on network processors. 890-896
Embedded Systems: Applications, Solutions and Techniques (EMBS): Poster Papers
- Ya-Shu Chen, Li-Pin Chang, Tei-Wei Kuo

, Aloysius K. Mok:
Real-time task scheduling anomaly: observations and prevention. 897-898 - Roozbeh Jafari, Foad Dabiri, Bo-Kyung Choi, Majid Sarrafzadeh:

Efficient placement and routing in grid-based networks. 899-900 - Ben H. H. Juurlink, Asadollah Shahbahrami, Stamatis Vassiliadis:

Avoiding data conversions in embedded media processors. 901-902 - Shih-Hsi Liu, Barrett R. Bryant, Jeffrey G. Gray

, Rajeev R. Raje, Andrew M. Olson, Mikhail Auguston:
Two-level assurance of QoS requirements for distributed real-time and embedded systems. 903-904
Evolutionary Computation and Optimization (ECO)
- Bryant A. Julstrom:

Editorial message: special track on applications of evolutionary computation. 905-906 - Daniel Delahaye, Sofiane Oussedik, Stéphane Puechmorel:

Airspace congestion smoothing by multi-objective genetic algorithm. 907-912 - Andrew Lim

, Xingwen Zhang:
The container loading problem. 913-917 - Na Tang, V. Rao Vemuri:

An artificial immune system approach to document clustering. 918-922 - Ivan De Falco

, Ernesto Tarantino
, Antonio Della Cioppa
, Francesco Gagliardi
:
A new variable-length genome genetic algorithm for data clustering in semeiotics. 923-927 - Ivan De Falco

, Ernesto Tarantino
, Antonio Della Cioppa
, Francesco Gagliardi:
A novel grammar-based genetic programming approach to clustering. 928-932 - Andrew Lim

, Yi Zhu, Q. Lou, Brian Rodrigues:
Heuristic methods for graph coloring problems. 933-939 - L. Zhang, Songshan Guo, Yunsong Zhu, Andrew Lim

:
A tabu search algorithm for the safe transportation of hazardous materials. 940-946 - Jeffrey S. Goettl, Alexander W. Brugh, Bryant A. Julstrom:

Call me e-mail: arranging the keyboard with a permutation-coded genetic algorithm. 947-951 - Haiyu Hou, Gerry V. Dozier:

Immunity-based intrusion detection system design, vulnerability analysis, and GENERTIA's genetic arms race. 952-956
Evolutionary Computation and Optimization (ECO): Poster Papers
- Ivan De Falco

, Ernesto Tarantino
, Antonio Della Cioppa
, Alessandro Passaro:
Inductive inference of chaotic series by Genetic Programming: a Solomonoff-based approach. 957-958 - Jesús S. Aguilar-Ruiz

, Federico Divina
:
Evolutionary computation for biclustering of gene expression. 959-960
Handheld Computing (HHC)
- Qusay H. Mahmoud

, Zakaria Maamar:
Special track on handheld computing. 961-962 - Timothy O'Sullivan, Richard Studdert:

Agent technology and reconfigurable computing for mobile devices. 963-969 - Ankit Arora, Alexander Ferworn:

Pocket PC beacons: Wi-Fi based human tracking and following. 970-974 - Carolyn R. Watters, Rui Zhang, Jack Duffy:

Comparing table views for small devices. 975-980 - Mattia Monga

, Angelo Scotto:
A generic serializer for mobile devices. 981-985 - Eiko Yoneki, Jean Bacon:

Dynamic group communication in mobile peer-to-peer environments. 986-992 - Abdelghani Bellaachia, Iehab Al Rassan:

Efficiency of prefix and non-prefix codes in string matching over compressed databases on handheld devices. 993-997 - Jean-Charles Tournier, Jean-Philippe Babau, Vincent Olive:

An evaluation of Qinna, a component-based QoS architecture for embedded systems. 998-1002 - Angela Carrillo Ramos

, Jérôme Gensel
, Marlène Villanova-Oliver, Hervé Martin:
PUMAS: a framework based on ubiquitous agents for accessing web information systems through mobile devices. 1003-1008
Information Access and Retrieval (IAR)
- Fabio Crestani

, Gabriella Pasi:
Editorial message: special track on information access and retrieval. 1009-1010 - Mustapha Baziz, Mohand Boughanem, Nathalie Aussenac-Gilles

, Claude Chrisment:
Semantic cores for representing documents in IR. 1011-1017 - Michel Beigbeder, Annabelle Mercier:

An information retrieval model using the fuzzy proximity degree of term occurences. 1018-1022 - Wai Gen Yee, Ophir Frieder:

On search in peer-to-peer file sharing systems. 1023-1030 - Masashi Inoue

, Naonori Ueda:
Retrieving lightly annotated images using image similarities. 1031-1037 - Dmitriy Fradkin, Paul B. Kantor:

Methods for learning classifier combinations: no clear winner. 1038-1043 - Yan-Shi Dong, Ke-Song Han:

Text classification based on data partitioning and parameter varying ensembles. 1044-1048 - Hui Han, Eren Manavoglu, Hongyuan Zha, Kostas Tsioutsiouliklis, C. Lee Giles

, Xiangmin Zhang:
Rule-based word clustering for document metadata extraction. 1049-1053 - Fan Li, Yiming Yang:

Using recursive classification to discover predictive features. 1054-1058 - Thomas Mandl

, Christa Womser-Hacker:
The effect of named entities on effectiveness in cross-language information retrieval evaluation. 1059-1064 - Hui Han, Wei Xu, Hongyuan Zha, C. Lee Giles

:
A hierarchical naive Bayes mixture model for name disambiguation in author citations. 1065-1069 - Ling Ma, Nazli Goharian:

Query length impact on misuse detection in information retrieval systems. 1070-1075 - Zhenyu Liu, Wesley W. Chu:

Knowledge-based query expansion to support scenario-specific retrieval of medical free text. 1076-1083 - Laali Elkhalifa, Raman Adaikkalavan, Sharma Chakravarthy

:
InfoFilter: a system for expressive pattern specification and detection over text streams. 1084-1088 - Chunhua Cui, Hiroyuki Kitagawa

:
Topic activation analysis for document streams based on document arrival rate and relevance. 1089-1095 - Hamid Tebri, Mohand Boughanem, Claude Chrisment:

Incremental profile learning based on a reinforcement method. 1096-1101 - Rickard Cöster, Martin Svensson:

Incremental collaborative filtering for mobile devices. 1102-1106 - Gloria Bordogna

, Giuseppe Psaila
:
Extending SQL with customizable soft selection conditions. 1107-1111 - Xuequn Shang, Kai-Uwe Sattler:

Depth-first frequent itemset mining in relational databases. 1112-1117
Mobile Computing and Applications (MCA)
- Hong Va Leong, Alvin T. S. Chan:

Editorial message: special track on mobile computing and applications. 1118-1119 - Xing Gao, Ali R. Hurson:

Location dependent query proxy. 1120-1124 - Yuni Xia, Sunil Prabhakar

, Shan Lei, Reynold Cheng, Rahul Shah:
Indexing continuously changing data with mean-variance tree. 1125-1132 - Tomoaki Kaneda, Youhei Tanaka, Tomoya Enokido, Makoto Takizawa

:
Transactional agent model for fault-tolerant object systems. 1133-1138 - Takehiro Nakayama:

Alternative source coding model for mobile text communication. 1139-1145 - Djalel Chefrour

:
Developing component based adaptive applications in mobile environments. 1146-1150 - Celso Maciel da Costa, Marcelo da Silva Strzykalski, Guy Bernard:

A reflective middleware architecture to support adaptive mobile applications. 1151-1154 - Flávia Coimbra Delicato, Paulo F. Pires

, Luiz F. Rust da Costa Carmo, Luci Pirmez, José Ferreira de Rezende
:
Reflective middleware for wireless sensor networks. 1155-1159 - Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio:

An adaptive TDMA slot assignment protocol in ad hoc sensor networks. 1160-1165 - Christopher L. Barrett, Stephan J. Eidenbenz, Lukas Kroc, Madhav V. Marathe, James P. Smith:

Probabilistic multi-path vs. deterministic single-path protocols for dynamic ad-hoc network scenarios. 1166-1173
Mobile Computing and Applications (MCA): Poster Papers
- Takahiro Hara:

Location management of data items in mobile ad hoc networks. 1174-1175 - Guohui Li, Hongya Wang, Yunsheng Liu, Jixiong Chen:

Mobile real-time read-only transaction processing in data broadcast environments. 1176-1177
Multimedia and visualization (MV)
- Chaman L. Sabharwal:

MultiMedia and visualization track. 1178-1179 - Benjamin Bustos

, Daniel A. Keim, Tobias Schreck
:
A pivot-based index structure for combination of feature vectors. 1180-1184 - Maik Flanagin, Aurélien Grenotton, Jay J. Ratcliff, Mahdi Abdelguerfi, Kevin Shaw:

Automated terrain generation using LIDAR and waterbody survey data. 1185-1189 - June-Suh Cho, Joonsoo Choi:

Contour-based partial object recognition using symmetry in image databases. 1190-1194 - Nualsawat Hiransakolwong, Kien A. Hua, Soontharee Koompairojn, Khanh Vu, Sheau-Dong Lang:

An adaptive distance computation technique for image retrieval systems. 1195-1199 - Nathaniel Fout, Jian Huang, Zhaohua Ding:

Visualization of neuronal fiber connections from DT-MRI with global optimization. 1200-1206 - Ilmi Yoon, Sanghyuk Yoon, Neo D. Martinez, Richard J. Williams, Jennifer A. Dunne:

Interactive 3D visualization of highly connected ecological networks on the WWW. 1207-1212 - Byungwoo Kim, Jong P. Yoon:

Similarity measurement for aggregation of spatial objects. 1213-1217 - Fabio Jun Takada Chino, Marcos R. Vieira, Agma J. M. Traina, Caetano Traina Jr.

:
MAMView: a visual tool for exploring and understanding metric access methods. 1218-1223 - Nathaniel Fout, Kwan-Liu Ma, James P. Ahrens

:
Time-varying, multivariate volume data reduction. 1224-1230 - Jonathan McPherson, Kwan-Liu Ma, Michael Ogawa:

Discovering parametric clusters in social small-world graphs. 1231-1238 - Yu Qian, Kang Zhang:

The role of visualization in effective data cleaning. 1239-1243 - James R. Miller, Serhan Yengulalp, Patrick L. Sterner:

A framework for collaborative control of applications. 1244-1249
Multimedia and Visualization (MV)
- Christopher P. Walker, Norbert Maerz, Michael G. Hilgers:

Surface reconstruction using shadow profilometry. 1250-1251 - Hiroshi Hosobe:

Solving linear and one-way constraints for web document layout. 1252-1253 - Leonard Brown:

Issues in augmenting image databases to improve processing content-based similarity searches. 1254-1255
Object-Oriented Programming Languages and Systems (OOP)
- Davide Ancona, Rajeev R. Raje, Mirko Viroli

:
Editorial message: special track on object oriented programming languages and systems. 1256-1257 - Lorenzo Bettini

, Viviana Bono
, Silvia Likavec
:
Safe and flexible objects. 1258-1263 - Walter Cazzola

, Antonio Cisternino
, Diego Colombo:
[a]C#: C# with a customizable code annotation mechanism. 1264-1268 - Tetsuo Kamina, Tetsuo Tamai:

Selective method combination in mixin-based composition. 1269-1273 - Christian Heinlein:

Virtual namespace functions: an alternative to virtual member functions in C++ and advice in AspectC++. 1274-1281 - Bruno Cabral

, Paulo Marques, Luís Moura Silva:
RAIL: code instrumentation for .NET. 1282-1287 - Shruti Gorappa, Raymond Klefstad:

Empirical evaluation of OpenCCM for Java-based distributed, real-time, and embedded systems. 1288-1292
Organizational Engineering (OE)
- José M. Tribolet

, Robert Winter, Artur Caetano
:
Editorial message: special track on organizational engineering. 1293-1294 - Christian Braun, Felix Wortmann, Martin Hafner, Robert Winter:

Method construction - a core approach to organizational engineering. 1295-1299 - Steven J. Bleistein, Karl Cox, June M. Verner:

Strategic alignment in requirements analysis for organizational IT: an integrated approach. 1300-1307 - Artur Caetano

, António Rito Silva
, José M. Tribolet
:
Using roles and business objects to model and understand business processes. 1308-1313 - Simona Colucci

, Tommaso Di Noia
, Eugenio Di Sciascio
, Francesco M. Donini, Giacomo Piscitelli, Stefano Coppi:
Knowledge based approach to semantic composition of teams in an organization. 1314-1319 - Roel J. Wieringa, Jaap Gordijn

:
Value-oriented design of service coordination processes: correctness and trust. 1320-1327 - Andreas Schaad, Pascal Spadone, Helmut Weichsel:

A case study of separation of duty properties in the context of the Austrian "eLaw" process. 1328-1332 - Joachim Schelp

, Alexander Schwinn:
Extending the business engineering framework for application integration purposes. 1333-1337 - Lerina Aversano

, Thierry Bodhuin, Maria Tortorella:
Assessment and impact analysis for aligning business processes and software systems. 1338-1343
Organizational Engineering (OE): Poster Paper
- Carla Marques Pereira, Pedro Manuel Antunes Sousa:

Enterprise architecture: business and IT alignment. 1344-1345
Programming for Separation of Concerns (PSC)
- Walter Cazzola

, Sonia Pini, Massimo Ancona:
AOP for software evolution: a design oriented approach. 1346-1350 - Frederic Ogel, Gaël Thomas, Bertil Folliot:

Supporting efficient dynamic aspects through reflection and dynamic compilation. 1351-1356 - Francisco Heron de Carvalho Junior, Rafael Dueire Lins:

The # model: separation of concerns for reconciling modularity, abstraction and efficiency in distributed parallel programming. 1357-1364 - Xiaoqing Wu, Suman Roychoudhury, Barrett R. Bryant, Jeffrey G. Gray

, Marjan Mernik:
A two-dimensional separation of concerns for compiler construction. 1365-1369 - Hui Wu, Jeffrey G. Gray

, Suman Roychoudhury, Marjan Mernik:
Weaving a debugging aspect into domain-specific language grammars. 1370-1374 - Marco Milazzo, Giuseppe Pappalardo, Emiliano Tramontana, Giuseppe Ursino:

Handling run-time updates in distributed applications. 1375-1380
Programming for Separation of Concerns (PSC): Poster Paper
- Antonella Di Stefano, Marco Fargetta

, Giuseppe Pappalardo, Emiliano Tramontana:
Metrics for evaluating concern separation and composition. 1381-1382
Programming Languages (PL)
- Chang-Hyun Jo, Marjan Mernik, Barrett R. Bryant:

Editorial: programming languages track. 1383-1384 - Burak Emir:

Compiling regular patterns to sequential machines. 1385-1389 - Giovanni Rimassa, Mirko Viroli

:
Understanding access restriction of variant parametric types and Java wildcards. 1390-1397 - Thomas Cleenewerck, Theo D'Hondt:

Disentangling the implementation of local-to-global transformations in a rewrite rule transformation system. 1398-1403 - Lunjin Lu:

Use of correctness assertions in declarative diagnosis. 1404-1408 - Rémi Forax, Étienne Duris, Gilles Roussel:

Reflection-based implementation of Java extensions: the double-dispatch use-case. 1409-1413 - Hai-Feng Guo, Bharat Jayaraman:

Mode-directed preferences for logic programs. 1414-1418 - Qian Wang, Gopal Gupta:

Rapidly prototyping implementation infrastructure of domain specific languages: a semantics-based approach. 1419-1426
Programming Languages (PL): Poster Paper
- Paul Tarau:

Agent oriented logic programming in Jinni 2004. 1427-1428
Reliable Computations and Their Applications (RCA)
- Martine Ceberio, Vladik Kreinovich, Michel Rueher:

Editorial: track reliable computations and their applications. 1429-1430 - Ramon E. Moore:

Order relations and rigor in computing. 1431-1433 - Frédéric Goualard:

On considering an interval constraint solving algorithm as a free-steering nonlinear Gauss-Seidel procedure. 1434-1438 - Gilles Chabert, Gilles Trombettoni, Bertrand Neveu:

Box-set consistency for interval-based constraint problems. 1439-1443 - Qiang Duan, Chenyi Hu

, Han-Chieh Wei:
Enhancing network intrusion detection systems with interval methods. 1444-1448 - Olga Kosheleva, Vladik Kreinovich, Günter Mayer, Hung T. Nguyen:

Computing the cube of an interval matrix is NP-Hard. 1449-1453
Software Engineering: Applications, Practices and Tools (SE)
- Stefan Gruner, Alessandra Cavarra, Sung Shin:

Editorial message: special track on software engineering: methods, practices, and tools. 1454-1455 - Áine Mitchell, James F. Power

:
Using object-level run-time metrics to study coupling between objects. 1456-1462 - Kai-Yuan Cai, Tsong Yueh Chen

, Yong-Chao Li, Wei-Yi Ning, Yuen-Tak Yu:
Adaptive testing of software components. 1463-1469 - M. Brian Blake, Kevin Cleary, Sohan Ranjan, Luis Ibáñez, Kevin Gary:

Use case-driven component specification: a medical applications perspective to product line development. 1470-1477 - Gerardo Canfora

, Aniello Cimitile, Félix García
, Mario Piattini
, Corrado Aaron Visaggio
:
Confirming the influence of educational background in pair-design knowledge through experiments. 1478-1484 - W. Eric Wong, Yu Qi, Kendra M. L. Cooper:

Source code-based software risk assessing. 1485-1490 - Axel Anders Kvale, Jingyue Li

, Reidar Conradi:
A case study on building COTS-based system using aspect-oriented programming. 1491-1498 - Matthew J. Rummel, Gregory M. Kapfhammer, Andrew Thall:

Towards the prioritization of regression test suites with data flow information. 1499-1504 - Ed Mancebo, Anneliese Amschler Andrews:

A strategy for selecting multiple components. 1505-1510 - Pradeep Varma, Ashok Anand, Donald P. Pazel, Beth Tibbitts:

NextGen eXtreme porting: structured by automation. 1511-1517 - Richard F. Paige, Howard Chivers, John A. McDermid

, Zoë R. Stephenson:
High-integrity extreme programming. 1518-1523 - YoungJoon Byun, Beverly A. Sanders:

A pattern-based development methodology for communication protocols. 1524-1528 - Xinpei Zhao, Keith C. C. Chan

, Mingshu Li:
Applying agent technology to software process modeling and process-centered software engineering environment. 1529-1533 - Andrea Trentini

, Daniela Micucci
:
Plan validation via petri nets in the real-time performers Java framework. 1534-1538 - Songsri Tangsripairoj, Mansur H. Samadzadeh:

Organizing and visualizing software repositories using the growing hierarchical self-organizing map. 1539-1545 - Ninh-Thuan Truong, Jeanine Souquières:

Verification of behavioural elements of UML models using B. 1546-1552 - Fei Cao, Barrett R. Bryant, Wei Zhao, Carol C. Burt, Rajeev R. Raje, Andrew M. Olson, Mikhail Auguston:

Marshaling and unmarshaling models using the entity-relationship model. 1553-1557 - Junyoung Heo

, Sangho Yi, Yookun Cho, Jiman Hong, Sung Y. Shin:
Space-efficient page-level incremental checkpointing. 1558-1562
Software Engineering: Applications, Practices and Tools (SE): Poster Papers
- Tiago Stein D'Agostini, Antônio Augusto Fröhlich

:
Bridging AOP to SMP: turning GCC into a metalanguage preprocessor. 1563-1564 - Stephen Doxsee, William B. Gardner:

Synthesis of C++ software for automated teller from CSPm specifications. 1565-1566 - Li Yang, Raimund K. Ege, Huiqun Yu:

Mediation framework modeling and verification by SAM. 1567-1568
Trust, Recommendations, Evidence, and Other Collaboration Know-how (TRECK)
- Jean-Marc Seigneur

, Christian Damsgaard Jensen:
Editorial message special track on trust, recommendations, evidence and other collaboration know-how (TRECK). 1569 - Michael Kinateder, Ralf Terdic, Kurt Rothermel:

Strong pseudonymous communication for peer-to-peer reputation systems. 1570-1576 - Seamus Moloney:

Simulation of a distributed recommendation system for pervasive networks. 1577-1581 - Yanjun Zuo, Brajendra Panda:

Component based trust management in the context of a virtual organization. 1582-1588 - Paolo Avesani, Paolo Massa, Roberto Tiella:

A trust-enhanced recommender system application: Moleskiing. 1589-1593 - Kemal Bicakci

, Bruno Crispo, Andrew S. Tanenbaum
:
How to incorporate revocation status information into the trust metrics for public-key certification. 1594-1598
Ubiquitous Computing (UC)
- George Roussos

, George Samaras:
Editorial message: special track on ubiquitous computing. 1599 - Yanna Vogiazou, Marc Eisenstadt, Martin Dzbor, Jirí Komzák:

From buddyspace to CitiTag: large-scale symbolic presence for community building and spontaneous play. 1600-1606 - Thorsten Staake, Frédéric Thiesse, Elgar Fleisch:

Extending the EPC network: the potential of RFID in anti-counterfeiting. 1607-1612 - Kaori Fujinami, Tatsuo Nakajima:

Towards system software for physical space applications. 1613-1620 - Kartik Vishwanath, Arvind Gautam, Yugyung Lee:

Intelligent file management in ubiquitous environments. 1621-1625
Ubiquitous Computing (UC): Poster Paper
- Tope Omitola:

Declarative control of the future home environment. 1626-1627
Web Technologies and Applications (WTA)
- Cristina Cachero

, Sara Comai
, Maristella Matera
:
Editorial message: special track on web technologies and applications. 1628-1629 - Xia Sun, Qinghua Zheng:

An approach to acquire semantic relationships between terms. 1630-1633 - Lawrence H. Reeve, Hyoil Han:

Survey of semantic annotation platforms. 1634-1638 - Dario Bonino

, Fulvio Corno
, Federico Pescarmona:
Automatic learning of text-to-concept mappings exploiting WordNet-like lexical networks. 1639-1644 - François Bry

, Paula-Lavinia Patranjan:
Reactivity on the web: paradigms and applications of the language XChange. 1645-1649 - Yi-Hsuan Lu, Yoojin Hong, Jinesh Varia, Dongwon Lee

:
Pollock: automatic generation of virtual web services from web sites. 1650-1655 - Zakaria Maamar, Djamal Benslimane, Chirine Ghedira

, Qusay H. Mahmoud
, Hamdi Yahyaoui
:
Tuple spaces for self-coordination of web services. 1656-1660 - Laura Bocchi, Paolo Ciancarini

, Rocco Moretti, Valentina Presutti
, Davide Rossi:
An OWL-S based approach to express grid services coordination. 1661-1667 - Manuele Kirsch-Pinheiro, Marlène Villanova-Oliver, Jérôme Gensel

, Hervé Martin:
Context-aware filtering for collaborative web systems: adapting the awareness information to the user's context. 1668-1673 - Luciano Baresi

, Sebastiano Colazzo, Luca Mainetti
:
First experiences on constraining consistency and adaptivity of W2000 models. 1674-1678 - Yuming Zhou, Baowen Xu

:
Measuring structural complexity for class diagrams: an information theory approach. 1679-1683 - Richard Atterer:

Where web engineering tool support ends: building usable websites. 1684-1688 - Luca Balzerani, Davide Di Ruscio

, Alfonso Pierantonio
, Guglielmo De Angelis:
A product line architecture for web applications. 1689-1693 - Carlo Bellettini

, Alessandro Marchetto
, Andrea Trentini
:
TestUml: user-metrics driven web applications testing. 1694-1698 - Giuliano Casale:

Combining queueing networks and web usage mining techniques for web performance analysis. 1699-1703 - Nabor C. Mendonça

, José Airton F. Silva:
An empirical evaluation of client-side server selection policies for accessing replicated web services. 1704-1708 - Raffaella Grieco, Delfina Malandrino

, Vittorio Scarano
:
SEcS: scalable edge-computing services. 1709-1713 - Lule Ahmedi

:
Making XPath reach for the web-wide links. 1714-1721 - Sandip Debnath, Prasenjit Mitra, C. Lee Giles

:
Automatic extraction of informative blocks from webpages. 1722-1726 - Raman Adaikkalavan, Sharma Chakravarthy

:
SmartGate: a smart push-pull approach to support role-based security in web gateways. 1727-1731 - Hao Jin, Curtis E. Dyreson

:
Sanitizing using metadata in MetaXQuery. 1732-1736
Web Technologies and Applications (WTA): Poster Papers
- Ronaldo Luna, William T. Lawrence, John M. Sullivan, Richard H. Hall, Michael G. Hilgers, Matt Buechler:

Learning system to introduce GIS to civil engineers. 1737-1738 - Abdelkarim Erradi, Piyush Maheshwari:

wsBus: a framework for reliable web services interactions. 1739-1740

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














