


default search action
24th ADC 2013: Adelaide, Australia
- Hua Wang, Rui Zhang:
Twenty-Fourth Australasian Database Conference, ADC 2013, Adelaide, Australia, February 2013. CRPIT 137, Australian Computer Society 2013, ISBN 978-1-921770-22-7 - Ling Chen, Xue Li, Jiawei Han:
MedRank: Discovering Influential Medical Treatments from Literature by Information Network Analysis. 3-13 - Haozhou Wang, Han Su, Kai Zheng, Shazia Sadiq, Xiaofang Zhou:
An Effectiveness Study on Trajectory Similarity Measures. 13-22 - Dat T. Huynh, Xiaofang Zhou:
Exploiting a Proximity-based Positional Model to Improve the Quality of Information Extraction by Text Segmentation. 23-32 - Daniel Ohene-Kwofie, Ekow J. Otoo, Gideon Nimako:
Concurrent Operations of O2-Tree on Shared Memory Multicore Architectures. 33-42 - R. Uday Kiran, Masaru Kitsuregawa:
An Improved Neighborhood-Restricted Association Rule-based Recommender System. 43-50 - Xiaohui Tao, Yuefeng Li, Ji Zhang, Jianming Yong:
Mapping Semantic Knowledge for Unsupervised Text Categorisation. 51-60 - Norah Saleh Alghamdi, J. Wenny Rahayu, Eric Pardede:
Semantic-based Construction of Content and Structure XML Index. 61-70 - William M. Shui, Raymond K. Wong:
JetXSLT: A Resource-Conscious XSLT Processor. 71-80 - Uwe Röhm, Michael J. Cahill, Alan D. Fekete, Hyungsoo Jung, Seung Woo Baek, Mathew Rodley:
Robust Snapshot Replication. 91-92 - Guangyuan Wang, Hua Wang, Xiaohui Tao, Ji Zhang:
A Self-Stabilizing Algorithm for Finding a Minimal Positive Influence Dominating Set in Social Networks. 93-100 - Walter Cerroni, Gianluca Moro, Tommaso Pirini, Marco Ramilli:
Peer-to-Peer Data Mining Classi ers for Decentralized Detection of Network Attacks. 101-108 - Rahul Bharuka, P. Sreenivasa Kumar:
Finding Skylines for Incomplete Data. 109-119 - Lili Sun, Hua Wang, Elisa Bertino:
Role-based access control to outsourced data in could computing. 119-128

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.