


default search action
5. ICDIM 2010: Lakehead University, Thunder Bay, Canada
- Fifth IEEE International Conference on Digital Information Management, ICDIM 2010, July 5-8, 2010, Lakehead University, Thunder Bay, Canada. IEEE 2010, ISBN 978-1-4244-7572-8

- A. N. K. Zaman

, Charles Grant Brown:
Latent semantic indexing and large dataset: Study of term-weighting schemes. 1-4 - Rozita Jamili Oskouei:

Behavior mining of female students by analyzing log files. 5-10 - Herna L. Viktor, Bo Wang, Eric Paquet, Julie Doyle:

Preserving object-relational databases for the next generations. 11-18 - Ludmila Himmelspach, Stefan Conrad

:
Clustering approaches for data with missing values: Comparison and evaluation. 19-28 - Yang Hang, Simon Fong

:
Real-time business intelligence system architecture with stream mining. 29-34 - Muhammad Usman

, Sohail Asghar, Simon Fong
:
Data mining and automatic OLAP schema generation. 35-43 - Razan Paul, Abu Sayed Md. Latiful Hoque:

Clustering medical data to predict the likelihood of diseases. 44-49 - Kerstin Denecke

, Marko Brosowski:
Topic detection in noisy data sources. 50-55 - Marcelo Queiroz Leite, Leandro Halle Najm, Pedro Luiz Pizzigatti Corrêa

, Ayrton Vollet Neto, Vera Lucia Imperatriz Fonseca
:
System architecture for data acquisition, extraction and analysis for experiments with weblabs. 56-62 - Razan Paul, Abu Sayed Md. Latiful Hoque:

Mining irregular association rules based on action & non-action type data. 63-68 - Farid Bourennani, Ghaus M. Rizvi, Daniel Ross:

Plastic color mismatch causes identification using OLAP and data mining. 69-74 - Kevin H. Xu, Jingsong Zhang, Shelby Gao:

High-order functions and their ordering relations. 75-80 - Razan Paul, Abu Sayed Md. Latiful Hoque:

Finding symmetric association rules to support medical qualitative research. 81-86 - Daniel Lins da Silva

, Pedro Luiz Pizzigatti Corrêa
, Leandro Halle Najm:
Requirements analysis for a traceability system for management wood supply chain on Amazon Forest. 87-94 - Pan Juasiripukdee, Lisa Wiyartanti

, Laehyun Kim:
Clustering search results of non-text user generated content. 95-100 - Anwar Alhenshiri, Stephen Brooks, Carolyn R. Watters, Michael A. Shepherd:

Augmenting the visual presentation of Web search results. 101-107 - Ali Sajedi Badashian, Hamidreza Afzali, Morteza Ashurzad Delcheh, Mehregan Mahdavi, Mahdi Alipour:

Conceptual File Management: Revising the structure of classification-based information retrieval. 108-113 - Chongyang Shi, Zhendong Niu

:
A novel similarity evaluating model based on RFCA and ICS. 114-119 - Ting-Chun Peng, Chia Chun Shih:

Using Chinese part-of-speech patterns for sentiment phrase identification and opinion extraction in user generated reviews. 120-127 - Quoc Hao Mach, Mathew D. Hunter, Ratvinder Singh Grewal:

Quantitative measurements of cognitive processing involved with gaze fixations. 128-131 - Masoud Makrehchi:

Query-relevant document representation for text clustering. 132-138 - Xiaolin Wang, Bao-Liang Lu:

Flatten hierarchies for large-scale hierarchical text categorization. 139-144 - Yanchun Zhong, Heng Li, Jialei Bi:

A feedback-based method for adaptive ROI protection in H.264/AVC. 145-151 - Abdul Sattar, Renaud Séguier

:
Facial feature extraction using hybrid genetic-simplex optimization in multi-objective Active Appearance Model. 152-158 - Jiehan Zhou

, Jaakko Moisanen, Mika Rautiainen, Mika Ylianttila
:
Design and development of Digital Movie Guide service for approaching Community Coordinated Multimedia. 159-162 - Syed Yasser Arafat, Syed Afaq Husain

, Iftikhar Azim Niaz, Muhammad Saleem:
Logo detection and recognition in video stream. 163-168 - Azam Karami

, Mehran Yazdi
, Alireza Zolghadre Asli:
Best rank-r tensor selection using Genetic Algorithm for better noise reduction and compression of Hyperspectral images. 169-173 - Mohamed Saber, Mostafa M. Aref, Tarek F. Gharib:

An efficient filtering technique for super-graph query processing. 174-181 - Abdunnaser Diaf, Rachid Benlamri, Boubakeur Boufama, Riadh Ksantini:

A novel eigenspace-based method for human action recognition. 182-187 - Riadh Ksantini, Boubakeur Boufama, Imran Shafiq Ahmad, Naimul Mefraz Khan:

A new combined KSVM and KFD model for classification and recognition. 188-193 - Ali Shiri

:
Query reformulation strategies in an interdisciplinary digital library: The case of nanoscience and technology. 200-206 - Kamal Bal, Omar Nouali:

Deal with multiplicity and diversity of relevance factors in XML retrieval. 207-212 - Raed Al-Shaikh, Ghalib Hashim, AbdulRahman BinHuraib, Salahadin Mohammed:

A modulo-based labeling scheme for dynamically ordered XML trees. 213-221 - Amel Bouzeghoub, Chantal Taconet, Amina Jarraya, Ngoc-Kien Do, Denis Conan

:
Complementarity of process-oriented and ontology-based context managers to identify situations. 222-229 - Diego Garcia, Miriam A. M. Capretz, Maria Beatriz Felgar de Toledo:

Using contract and ontology for privacy protection in Service-Oriented Architecture. 230-235 - Nasser Noroozi:

Probabilistic modal logic as a foundation for knowledge management. 236-241 - Zhao Lu, Zoltán Miklós, Songmei Cai, Junzhong Gu:

Measuring taxonomic consistency of ontologies using lexical semantic relatedness. 242-247 - Ching-Cha Hsieh, Chia-Hui Lo, Ying-Hsun Hung:

Context-relevant criteria for starting knowledge management initiatives. 248-253 - Stefan Burger, Bernd Stieger:

Ontology-based classification of unstructured information. 254-259 - Ming Fang, Weiling Li, Rajshekhar Sunderraman:

Maintaining integrity constraints in relational to OWL transformations. 260-265 - Wei Chen, Simon Fong:

Social network collaborative filtering framework and online trust factors: A case study on Facebook. 266-273 - Yi-Chun Chen, Guanling Lee:

An efficient projected database method for mining sequential association rules. 274-278 - R. Etemadi, Nasrollah Moghadam Charkari:

An approach in web content mining for clustering web pages. 279-284 - Rasha M. BinSultan Al-Eidan, Hend S. Al-Khalifa, AbdulMalik S. Al-Salman:

Measuring the credibility of Arabic text content in Twitter. 285-291 - Richard Khoury

:
Exploiting Wikipedia in query understanding systems. 292-297 - Erika Matsak, Peeter Lorents:

Digital solutions for inference rules in decision-supporting systems. 298-302 - Min-Hooi Chuah

:
An enterprise business intelligence maturity model (EBIMM): Conceptual framework. 303-308 - Mansour Alsulaiman, Awais Mahmood

, Muhammad Ghulam, Mohamed Abdelkader Bencherif, Yousef Ajami Alotaibi
:
A technique to overcome the problem of small size database for automatic speaker recognition. 303-308 - Sandra J. Leonetti:

Government Electronic Service Delivery (ESD) and privacy in Ontario. 309-314 - Ho Si Meng, Simon Fong

:
Visualizing e-Government portal and its performance in WEBVS. 315-320 - Evan Asfoura, Naoum Jamous, Gamal Kassem, Reiner R. Dumke:

Pricing-model for marketing of FERP workflow as product. 321-325 - Syed Nayyer Abbas Kazmi:

Factors influencing e-Governance implementation: Issues and challenges in Pakistan. 326-331 - E. Guerrero, J. Alvarez, L. Rivero:

3D-ADAL: A three-dimensional distributed range-free localization algorithm for wireless sensor networks based on unmanned aerial vehicles. 332-338 - Nils Hoeller, Christoph Reinke, Jana Neumann, Sven Groppe

, Florian Frischat, Volker Linnemann:
DACS: A dynamic approximative caching scheme for Wireless Sensor Networks. 339-346 - Osama Abu-Rahmeh, Princy Johnson

:
A load balancing scheme for latency optimization in Grid networks. 347-352 - Muhammad Sohaib Aslam, Susan Rea

, Dirk Pesch
:
A vision for Wireless Sensor Networks: Hybrid architecture, model framework and service based systems. 353-358 - Hakimeh Alemi Baktash, Mohammadbagher Karimi

, Mohammad Reza Meybodi, Asgarali Bouyer
:
2L-RBACG: A new framework for resource access control in grid environments. 359-366 - Ulises Ibarra Hernandez, Miguel Vargas Martin, Francisco Álvarez Rodríguez

, Ricardo Mendoza González, Fabio Armando García-Toribio:
A requirements taxonomy and rating model for secure and usable B2C/C2C e-commerce websites. 367-372 - Katharina Hahn:

Adaptive workflow management to ensure transactional service composition. 373-378 - Fahad Abdulaziz Aleid, Simon Rogerson

, N. Ben Fairweather:
A suppliers' perspective on e-commerce: Suppliers responses to consumers' perspectives on e-commerce adoption in developing countries - A Saudi Arabian empirical study. 379-383 - Lubomir Stanchev:

On index merging for semantic web data. 384-391 - Koya Tamura, Kenji Hatano

, Hiroshi Yadohisa
:
Characterizing Web pages based on the query likelihoods of neighboring pages. 392-397 - T. Hoang Ngan Le

, Kim Hung Nguyen, Hoai Bac Le:
A robust biometric watermark-based authentication scheme. 398-403 - Elvis Pontes, Wagner L. Zucchi:

Fibonacci sequence and EWMA for intrusion forecasting system. 404-411 - Shahriar Mohammadi, Soulmaz Pourdavar:

Penetration test: A case study on remote command execution security hole. 412-416 - Riaz Ahmed Shaikh

, Kamel Adi
, Luigi Logrippo, Serge Mankovski:
Detecting incompleteness in access control policies using data classification schemes. 417-422 - Raheel Ali Baloch, Noël Crespi:

Formal model for analysis of context dependencies in ubiquitous systems. 431-436 - Seokhoon Ko, Seman Oh:

Dynamic reconfigurable screen keyboard generation method using probe key test. 437-441 - Yu-Ling Chang, Eduardo S. Barrenechea, Paulo S. C. Alencar:

Dynamic user-centric mobile context model. 442-447 - Pawan Kumar Verma

, Deepak Dahiya
, Pooja Jain:
Using aspect oriented software architecture for enterprise systems development. 448-453 - Jawad Berri

:
Towards a framework for Collective Intelligence. 454-459 - Ali Aljumaah:

Modeling students acceptance of E-learning: A case of the KS university. 460-464 - Salah Al-Sharhan

, Ahmed Al-Hunaiyyan
, Hanaa Al-sharah:
A new efficient blended e-learning model and framework for K12 and higher education: Design and implementation success factors. 465-471 - Jinan Fiaidhi, Sabah Mohammed

, David A. J. Thomas, Lyle F. Chamarette:
Securing AJAX-enriched mobile environment for exchanging SVG-based learning materials. 472-477 - Ali Sajedi Badashian, Asghar Dehghani Firouzabadi, Morteza Ashurzad Delcheh, Hamidreza Afzali, Mehregan Mahdavi:

Designing a collaborative educational system: A competitive approach to e-learning. 478-483 - Rachel H. Ellaway, Jeremy R. Cooperstock, Bruce Spencer:

Simulation integration for healthcare education, training and assessment. 484-489 - Rachel H. Ellaway:

OpenLabyrinth: An abstract pathway-based serious game engine for professional education. 490-495 - Hamdi Yahyaoui

, Mohammed Almulla
:
Context-based specification of Web service policies using WSPL. 496-501 - Mubarak Obaid AlQahtani, Muhammad Ghulam

, Yousef Ajami Alotaibi
:
Environment sound recognition using zero crossing features and MPEG-7. 502-506 - Amel Boubendir, Allaoua Chaoui

:
Towards a generic technique for analysing interactions between aspects at requirement phase. 507-512 - Tetsuya Suzuki, Kazuyuki Hayashi:

Text data compression ratio as a text attribute for a language-independent text art extraction method. 513-518 - (Withdrawn) Patient Data Management System - Periodic Model using GSM. 519-524

- Ali Al-Haj, Christina Twal, Ahmad A. Mohammad

:
Hybrid DWT-SVD audio watermarking. 525-529 - Stelios Sotiriadis, Nik Bessis

, Ye Huang, Paul Sant
, Carsten Maple:
Towards decentralized grid agent models for continuous resource discovery of interoperable grid Virtual Organisations. 530-535 - Ejaz Ahmed, Nik Bessis

, Yong Yue
:
Customizing interactive patient's diagnosis user interface. 536-539 - Mehmet Emin Aydin

:
Collaboration of heterogenous metaheuristic agents. 540-545 - Salima Ouadfel

, Mohamed Batouche
, Abdelmalik Taleb-Ahmed:
A new particle swarm optimization algorithm for dynamic image clustering. 546-551 - Said Talhi, Salima Ouadfel

, Amel Behaz, Mahieddine Djoudi:
Co-authoring an Adaptive Educational Hypermedia. 552-557 - Ji Ma, Kamel Adi

, Luigi Logrippo, Serge Mankovski:
Risk management in dynamic role based access control systems. 1-8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














