


default search action
17. iiWAS 2015: Brussels, Belgium
- Gabriele Anderst-Kotsis, Maria Indrawan-Santiago:

Proceedings of the 17th International Conference on Information Integration and Web-based Applications & Services, iiWAS 2015, Brussels, Belgium, December 11-13, 2015. ACM 2015, ISBN 978-1-4503-3491-4
Web applications
- Marco Mesiti:

MergeGraphs: a web-based system for merging heterogeneous big graphs. 1:1-1:10 - Moeko Deguchi, Kazuhito Kita, Motomichi Toyama:

Web-based mailing list administration on RMX. 2:1-2:8 - Raihan Ul Islam

, Karl Andersson
, Mohammad Shahadat Hossain
:
A web based belief rule based expert system to predict flood. 3:1-3:8 - Martina Vancová, Zuzana Kovacicová:

Implementation of corporate e-learning: practical scenario. 4:1-4:7 - The-Vinh Phan, Hong-Quang Nguyen, Hoang-Minh Nguyen:

Multi-layered semantic search for open innovation needs. 5:1-5:9 - Eri Kataoka, Toshiyuki Amagasa

, Hiroyuki Kitagawa
:
A social reading system for EPUB publications. 6:1-6:10 - Asmaa Alsumait, Maha Faisal

, Sara Banian:
Improving literacy for deaf Arab children using interactive storytelling. 7:1-7:5 - Dan Johansson, Josefin Lassinantti, Mikael Wiberg:

Mobile e-services and open data in e-government processes: transforming citizen involvement. 8:1-8:10 - Werner Winiwarter:

JILL: Japanese incidental language learning. 9:1-9:9 - Naoko Kosugi, Makoto Onizuka

, Hiroaki Kazui, Manabu Ikeda:
Ninchisho Chienowa-net: a website to share good dementia care techniques. 10:1-10:5 - Werner Winiwarter:

JAMRED: a Japanese abstract meaning representation editor. 11:1-11:5 - Najd A. Al-Mouh, Hend S. Al-Khalifa

:
Towards accessible web browsing for visually impaired people using Google Glass. 12:1-12:3 - Maha H. Faisal

, Aisha W. AlAmeeri, Asmaa Alsumait:
An adaptive e-learning framework: crowdsourcing approach. 13:1-13:5 - Beniamino Di Martino, Antonio Esposito

, Stefania Nacchia
, Salvatore Augusto Maisto:
Semantic annotation of BPMN: current approaches and new methodologies. 14:1-14:5
Data analytics and learning
- Jianwei Zhang, Seiya Tomonaga, Shinsuke Nakajima, Yoichi Inagaki, Reyn Y. Nakamoto:

Finding prophets in the blogosphere: bloggers who predicted buzzwords before they become popular. 15:1-15:10 - Takayasu Fushimi

, Tetsuji Satoh, Kazumi Saito, Kazuhiro Kazama:
Comparison of influence measures on structural changes focused on node functions. 16:1-16:10 - Tetsuro Kakeshita, Kosuke Ohta:

Student log analysis functions for web-based programming education support tool pgtracer. 17:1-17:9 - Yuma Ito, Tsutomu Terada

, Masahiko Tsukamoto:
A system for memorizing chinese characters using a song based on strokes and structures of the character. 18:1-18:9 - Mihaela Porumb, Ioana Barbantan, Camelia Lemnaru

, Rodica Potolea:
REMed: automatic relation extraction from medical documents. 19:1-19:10 - Shuhei Yamamoto

, Kei Wakabayashi, Noriko Kando
, Tetsuji Satoh:
BUTE: bursty users tagging method estimated by time series data. 20:1-20:9 - Ryo Mashimo, Tomohiro Umetani

, Tatsuya Kitamura, Akiyo Nadamoto:
Automatic generation of Japanese traditional funny scenario from web content based on web intelligence. 21:1-21:9 - Padipat Sitkrongwong, Saranya Maneeroj, Pannawit Samatthiyadikun, Atsuhiro Takasu:

Bayesian probabilistic model for context-aware recommendations. 22:1-22:10 - Stefan Marschalek, Robert Luh, Manfred Kaiser, Sebastian Schrittwieser:

Classifying malicious system behavior using event propagation trees. 23:1-23:10 - Robert Ecker:

Multiple-views analysis of computer-mediated discourses. 24:1-24:10 - Vincenzo De Florio

, Arianit Pajaziti:
Tapping into the wells of social energy: a case study based on falls identification. 25:1-25:10 - Hiromitu Ohara, Yu Suzuki, Akiyo Nadamoto:

Detection of missing tweets based on browsing interval and topic granularity. 26:1-26:9 - Yuki Yamamoto, Tadahiko Kumamoto, Akiyo Nadamoto:

Followee recommendation based on topic extraction and sentiment analysis from tweets. 27:1-27:10 - Jungkyu Han, Hayato Yamana

:
Why people go to unfamiliar areas?: analysis of mobility pattern based on users' familiarity. 28:1-28:10 - Alexei Yatskov, Yasushi Kiyoki:

Restaurant search with predictive multispace queries. 29:1-29:9 - Andreas Mladenow, Christine Bauer, Christine Strauss:

Crowdsourcing in logistics: concepts and applications using the social crowd. 30:1-30:8 - Shunsuke Hanai, Hidetsugu Nanba, Akiyo Nadamoto:

Clustering for closely similar recipes to extract spam recipes in user-generated recipe sites. 31:1-31:5 - Rahma Dhaouadi

, Achraf Ben Miled
, Khaled Ghédira:
Agent based modeling and simulation for events hybrid recommendation: application to the handicraft domain. 32:1-32:5 - Robin G. Qiu

, Ramya R. Ravi, Lawrence L. Qiu:
Aggregating and visualizing public opinions and sentiment trends on the US higher education. 33:1-33:5 - Kosuke Sugano, Yu Fang, Kenta Oku, Kyoji Kawagoe:

A coarse-to-fine method for subsequence matching of human behavior using multi-dimensional time-series approximation. 34:1-34:9 - Phoey Lee Teh

, Paul Rayson
, Irina Pak
, Scott Piao
:
Sentiment analysis tools should take account of the number of exclamation marks!!! 35:1-35:6 - Thien Khai Tran

, Tuoi Thi Phan:
Constructing sentiment ontology for vietnamese reviews. 36:1-36:5 - Pierpaolo Baglietto, Martino Fornasa, Massimo Maresca, Michele Stecca:

Collaboration and real-time analysis in the spreadsheet space. 37:1-37:6 - Bartholomäus Wloka

:
Towards automated creation of high quality domain-specific machine translation resources. 38:1-38:4 - Kazuya Murao

, Junna Imai, Tsutomu Terada
, Masahiko Tsukamoto:
Recognizing activities and identifying users based on tabletop activities with load cells. 39:1-39:6 - Tetsuya Fukuda, Masayoshi Aritsugi

:
A feasibility study of POI recommendation based on bursts of visits. 40:1-40:5 - Koji Wajima, Tetsuji Satoh:

Urgent question detection based on the review points and sentiment words. 41:1-41:5 - Ermelinda Oro

, Massimo Ruffolo:
Using apps and rules in contextual workflows to semantically extract data from documents. 42:1-42:5 - Hamza Sellak

, Brahim Ouhbi, Bouchra Frikh
:
Using rule-based classifiers in systematic reviews: a semantic class association rules approach. 43:1-43:5
Semantic web
- Tuan-Dat Trinh, Peter Wetz, Ba-Lam Do

, Elmar Kiesling
, A Min Tjoa
:
Semantic mashup composition from natural language expressions: preliminary results. 44:1-44:9 - Asma Elmangoush

, Ronald Steinke, Thomas Magedanz:
AdM2M: adaptable machine-to-machine transport framework. 45:1-45:5 - Natacha Targino, Amanda Lopes, Damires Souza:

Making SPARQL query formulation more intuitive. 46:1-46:5 - Tatiana Sorrentino, Joaquim Macedo

, Alexandre J. T. Santos
, Cláudia Ribeiro:
An adaptative semantic model for internet accessibility visually impaired users. 47:1-47:5 - Ademar Crotti Junior

, Brian Walshe, Declan O'Sullivan
:
Enhanced faceted browsing of a WW1 dataset through ontology alignment. 48:1-48:5 - Takahiro Komamizu, Toshiyuki Amagasa

, Hiroyuki Kitagawa
:
SPOOL: a SPARQL-based ETL framework for OLAP over linked data. 49:1-49:10 - Christophe Debruyne

, Brian Walshe, Declan O'Sullivan
:
Towards a project centric metadata model and lifecycle for ontology mapping governance. 50:1-50:10 - Hind Lamharhar, Dalila Chiadmi, Laila Benhlima:

Ontology-based knowledge representation for e-government domain. 51:1-51:10 - Pedro Sernadela, Sérgio Matos

, José Luís Oliveira
:
Ann2RDF: moving annotations to semantic web. 52:1-52:5 - Gerrit Kahl, Matthias Klusch, Ingo Zinnikus, Jens Schimmelpfennig, Manuel Zapp:

ADIGE: semantic business process management for smart retail environments. 53:1-53:5
Web services and methodology
- C. Timurhan Sungur, Uwe Breitenbücher, Frank Leymann

, Johannes Wettinger:
Executing informal processes. 54:1-54:10 - Devis Bianchini, Valeria De Antonellis, Michele Melchiori:

Developers' networks contribution to web application design. 55:1-55:10 - Aymen Akremi

, Hassen Sallay
, Mohsen Rouached, Rafik Bouaziz
, Mohamed Abid:
Forensics-aware web services composition and ranking. 56:1-56:10 - Imen Khabou, Mohsen Rouached, Mohamed Abid, Rafik Bouaziz

:
Enhancing web services compositions with privacy capabilities. 57:1-57:9 - Hiroki Takatsuka, Seiki Tokunaga, Sachio Saiki, Shinsuke Matsumoto, Masahide Nakamura:

Integrating heterogeneous locating services for efficient development of location-based services. 58:1-58:10 - Nesat Efendioglu, Robert Woitsch

, Dimitris Karagiannis:
Modelling method design: a model-driven approach. 59:1-59:10 - Harald Wahl, Rudolf Galler, Werner Winiwarter:

Demonstration of the generic software framework for the integrated intelligent computer-assisted language learning (iiCALL) environment. 60:1-60:6 - Gregor Blichmann, Carsten Radeck, Sergej Hahn, Klaus Meißner:

Component-based workspace awareness support for composite web applications. 61:1-61:10 - Sihem Cherif, Raoudha Ben Djemaa

, Ikram Amous:
Adaptable web service registry for publishing context aware service composition. 62:1-62:8 - Michael Krug, Martin Gaedke

:
SmartComposition: bringing component-based software engineering to the web. 63:1-63:4 - Uwe Breitenbücher, Pascal Hirmer, Kálmán Képes

, Oliver Kopp
, Frank Leymann
, Matthias Wieland:
A situation-aware workflow modelling extension. 64:1-64:7
Query processing and search
- Mohammadreza Khelghati, Djoerd Hiemstra

, Maurice van Keulen
:
Towards complete coverage in focused web harvesting. 65:1-65:9 - Khadim Dramé

, Grégory Smits, Olivier Pivert:
Coarse to fine keyword queries with user interactions. 66:1-66:10 - Meng Zhao, Hiroaki Ohshima

, Katsumi Tanaka:
Sentential query rewriting via mutual reinforcement of paraphrase-coordinate relationships. 67:1-67:10 - Yusuke Takeda, Hiroaki Ohshima

, Katsumi Tanaka:
Web page revisiting by coordinate page discovery. 68:1-68:10 - Takamitsu Shioi

, Kenji Hatano
:
Query processing optimization using disk-based row-store and column-store. 69:1-69:9 - Alfredo Cuzzocrea, Guandong Xu, Giorgio Mario Grasso

:
OLAP-enabled web search of complex objects. 70:1-70:10 - Hazem Safwat, Normunds Gruzitis

, Ramona Enache, Brian Davis
:
Embedded controlled language to facilitate information extraction from eGov policies. 71:1-71:5
Database and distributed technology
- Long Niu, Sachio Saiki, Shinsuke Matsumoto, Masahide Nakamura:

Implementation and evaluation of cloud-based integration framework for indoor location. 72:1-72:10 - Claudio de Lima

, Ronaldo dos Santos Mello:
A workload-driven logical design approach for NoSQL document databases. 73:1-73:10 - Geomar André Schreiner

, Denio Duarte
, Ronaldo dos Santos Mello:
SQLtoKeyNoSQL: a layer for relational to key-based NoSQL database mapping. 74:1-74:9 - Vibhor Kant, Pragya Dwivedi

:
A fuzzy Bayesian approach to integrate user and item based collaborating filtering for enhanced recommendations. 75:1-75:7 - Matthias Steinbauer, Gabriele Anderst-Kotsis

:
Using DynamoGraph: application scenarios for large-scale temporal graph processing. 76:1-76:5 - Hiroki Sugimoto, Kenichi Kourai

, Saneyasu Yamaguchi:
Host OS page cache hit ratio improvement based on guest OS page drop. 77:1-77:4 - Justus Bogner

, Carolin Dehner, Tobias Vinçon
, Ilia Petrov:
Real time charging database benchmarking. 78:1-78:5 - Kei Kanaoka, Motomichi Toyama:

Browser GUI for generating web data extraction rules in Ducky. 79:1-79:5 - Jesús Manuel Almendros-Jiménez

, Antonio Becerra-Terón
:
Automatic validation of XQuery programs. 80:1-80:5
Security and privacy
- Hannes Trunde, Edgar R. Weippl:

WordPress security: an analysis based on publicly available exploits. 81:1-81:7 - Tiwalade Adelola, Ray Dawson, Firat Batmaz:

The urgent need for an enforced awareness programme to create internet security awareness in Nigeria. 82:1-82:7 - Christoph Rottermanner, Peter Kieseberg

, Markus Huber, Martin Schmiedecker, Sebastian Schrittwieser:
Privacy and data protection in smartphone messengers. 83:1-83:10 - Shouta Mochizuki, Tetsuji Takada

:
Client-oriented web alteration detection system using link change state of a web page based on past and current page content. 84:1-84:5 - Anna Scholtz, Stefan Wild, Martin Gaedke

:
Systematic composition of web-based applications with focus on security. 85:1-85:5 - Toon Degryse, Sucha Smanchat:

MapReduce scheduling in hybrid cloud with multi-level privacy. 86:1-86:4
Late breaking results
- Muhammad Farid Khan Minhas, Rabeeh Ayaz Abbasi

, Naif Radi Aljohani, Aiiad Ahmad Albeshri
, Mubashar Mushtaq:
INTWEEMS: a framework for incremental clustering of tweet streams. 87:1-87:4 - Emad A. Alghamdi, Naif R. Aljohani, Abdallah N. Alsaleh, Wafi Bedewi

, Mohammed Basheri
:
CrowdyQ: a virtual crowdsourcing platform for question items development in higher education. 88:1-88:4 - Amjed Al-Thuhli, Mohammed Al-Badawi, Youcef Baghdadi, Abdullah Al-Hamdani:

Migrating social business process to SOA. 89:1-89:5 - Ibtehal S. Baazeem

, Hend S. Al-Khalifa
:
Advancements in web accessibility evaluation methods: how far are we? 90:1-90:5 - Alexey Golubev, Ilya Chechetkin, Konstantin S. Solnushkin, Natalia Sadovnikova, Danila S. Parygin

, Maxim Shcherbakov:
Strategway: web solutions for building public transportation routes using big geodata analysis. 91:1-91:4 - Laura González, Raúl Ruggia:

A reference architecture for integration platforms supporting cross-organizational collaboration. 92:1-92:4 - Oksana Urikova

, Irena Ivanochko
, Zuzana Kovacicová:
SOA for customer-centric eBusiness. 93:1-93:4 - Irena Ivanochko

, Zuzana Kovacicová, Michal Gregus:
Case of SOA strategy for e-Health services: some conceptual suggestions. 94:1-94:4

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














