


default search action
IEEE Transactions on Knowledge and Data Engineering, Volume 15
Volume 15, Number 1, January/February 2003
- Philip S. Yu:

Editorial: New AE Introduction. 1 - Stefano Ceri, Claudio Gennaro

, Stefano Paraboschi
, Giuseppe Serazzi:
Effective Scheduling of Detached Rules in Active Databases. 2-13 - Sankar K. Pal, Sushmita Mitra

, Pabitra Mitra:
Rough-Fuzzy MLP: Modular Evolution, Rule Generation, and Evaluation. 14-25 - Yunyao Qu, Changzhou Wang, Like Gao, Xiaoyang Sean Wang:

Supporting Movement Pattern Queries in User-Specified Scales. 26-42 - Anthony K. H. Tung, Hongjun Lu, Jiawei Han, Ling Feng:

Efficient Mining of Intertransaction Association Rules. 43-56 - Edward Omiecinski:

Alternative Interest Measures for Mining Associations in Databases. 57-69 - Wen-Chih Peng, Ming-Syan Chen

:
Developing Data Allocation Schemes by Incremental Mining of User Moving Patterns in a Mobile Computing System. 70-85 - Ling Feng, Tharam S. Dillon:

Using Fuzzy Linguistic Representations to Provide Explanatory Semantics for Data Warehouses. 86-102 - S. Misbah Deen, C. A. Johnson:

Formalizing an Engineering Approach to Cooperating Knowledge-Based Systems. 103-117 - Chabane Djeraba:

Association and Content-Based Retrieval. 118-135 - Elina Megalou, Thanasis Hadzilacos:

Semantic Abstractions in the Multimedia Domain. 136-160 - Ming-Syan Chen

, Kun-Lung Wu, Philip S. Yu:
Optimizing Index Allocation for Sequential Data Broadcasting in Wireless Mobile Computing. 161-173 - Arturo Crespo, Orkut Buyukkokten, Hector Garcia-Molina:

Query Merging: Improving Query Subscription Processing in a Multicast Environment. 174-191 - Qun Ren, Margaret H. Dunham, Vijay Kumar:

Semantic Caching and Query Processing. 192-210 - Nikos Mamoulis, Dimitris Papadias:

Slot Index Spatial Join. 211-231
- Sally I. McClean

, Bryan W. Scotney, Kieran Greer:
A Scalable Approach to Integrating Heterogeneous Aggregate Views of Distributed Databases. 232-235 - Pável Calado

, Berthier A. Ribeiro-Neto:
An Information Retrieval Approach for Approximate Queries. 236-239 - Donald P. Ballou, Harold L. Pazer:

Modeling Completeness versus Consistency Tradeoffs in Information Decision Contexts. 240-243 - Jan Chomicki, Jorge Lobo, Shamim A. Naqvi:

Conflict Resolution Using Logic Programming. 244-249
Volume 15, Number 2, March/April 2003
- Sara Comai

, Letizia Tanca:
Termination and Confluence by Rule Prioritization. 257-270 - Luigi Palopoli

, Domenico Saccà
, Giorgio Terracina
, Domenico Ursino
:
Uniform Techniques for Deriving Similarities of Objects and Subschemes in Heterogeneous Databases. 271-294 - Xuan Liu, Shashi Shekhar, Sanjay Chawla:

Object-Based Directional Query Processing in Spatial Databases. 295-304 - Ning An

, Ji Jin, Anand Sivasubramaniam:
Toward an Accurate Analysis of Range Queries on Spatial Data. 305-323 - Sergey Brin, Rajeev Rastogi, Kyuseok Shim:

Mining Optimized Gain Rules for Numeric Attributes. 324-338 - Richard J. Povinelli

, Xin Feng:
A New Temporal Pattern Identification Method for Characterization and Prediction of Complex Time Series Events. 339-352 - Xindong Wu, Shichao Zhang:

Synthesizing High-Frequency Rules from Different Data Sources. 353-367 - Sergio Greco

:
Binding Propagation Techniques for the Optimization of Bound Disjunctive Queries. 368-385 - Barbara Catania, Elisa Bertino:

Static Analysis of Logical Languages with Deferred Update Semantics. 386-404 - Jeffrey J. P. Tsai, Eric Y. T. Juan

, Avinash Sahay:
Model and Algorithm for Efficient Verification of High-Assurance Properties of Real-Time Systems. 405-422 - Sourav S. Bhowmick

, Sanjay Kumar Madria, Wee Keong Ng
:
Detecting and Representing Relevant Web Deltas in WHOWEDA. 423-441 - M. Andrea Rodríguez

, Max J. Egenhofer:
Determining Semantic Similarity among Entity Classes from Different Ontologies. 442-456 - Stephen J. H. Yang

, Jeffrey J. P. Tsai, Chyun-Chyi Chen
:
Fuzzy Rule Base Systems Verification Using High-Level Petri Nets. 457-473 - Jianliang Xu, Xueyan Tang, Dik Lun Lee

:
Performance Analysis of Location-Dependent Cache Invalidation Schemes for Mobile Environments. 474-488 - Paolo Terenziani

:
Symbolic User-Defined Periodicity in Temporal Relational Databases. 489-509
- Gregory Vert, Ashley Morris, Molly Stock:

Converting a Fuzzy Data Model to an Object-Oriented Design for Managing GIS Data Files. 510-511
Volume 15, Number 3, May/June 2003
- Rajeev Rastogi:

Guest Editor Introduction: Special Section on Online Analysis and Querying of Continuous Data Streams. 513-514 - Sudipto Guha, Adam Meyerson, Nina Mishra, Rajeev Motwani, Liadan O'Callaghan:

Clustering Data Streams: Theory and Practice. 515-528 - Graham Cormode

, Mayur Datar, Piotr Indyk, S. Muthukrishnan:
Comparing Data Streams Using Hamming Norms (How to Zero In). 529-540 - Anna C. Gilbert, Yannis Kotidis, S. Muthukrishnan, Martin Strauss:

One-Pass Wavelet Decompositions of Data Streams. 541-554 - Peter A. Tucker

, David Maier, Tim Sheard, Leonidas Fegaras:
Exploiting Punctuation Semantics in Continuous Data Streams. 555-568 - Rohit Ananthakrishna, Abhinandan Das, Johannes Gehrke, Flip Korn, S. Muthukrishnan, Divesh Srivastava:

Efficient Approximation of Correlated Sums on Data Streams. 569-572
- Yangjun Chen:

On the Graph Traversal and Linear Binary-Chain Programs. 573-596 - Susan Darling Urban, Taoufik Ben Abdellatif, Suzanne W. Dietrich, Amy Sundermier:

Delta Abstractions: A Technique for Managing Database States in Runtime Debugging of Active Database Rules. 597-612 - Jiong Yang, Wei Wang

, Philip S. Yu:
Mining Asynchronous Periodic Patterns in Time Series Data. 613-628 - Clara Pizzuti, Domenico Talia

:
P-AutoClass: Scalable Parallel Clustering for Mining Large Data Sets. 629-641 - Ke Wang, Yu He, Jiawei Han:

Pushing Support Constraints Into Association Rules Mining. 642-658 - Chung-Min Chen, Randeep Bhatia, Rakesh K. Sinha:

Multidimensional Declustering Schemes Using Golden Ratio and Kronecker Sequences. 659-670 - Vittorio Castelli, Alexander Thomasian, Chung-Sheng Li:

CSVD: Clustering and Singular Value Decomposition for Approximate Similarity Search in High-Dimensional Spaces. 671-685 - Kin-pong Chan, Ada Wai-Chee Fu, Clement T. Yu:

Haar Wavelets for Efficient Similarity Search of Time-Series: With and Without Time Warping. 686-705 - Kazuhiko Kato:

Persistently Cached B-Trees. 706-720 - P. Krishna Reddy, Subhash Bhalla

:
Asynchronous Operations in Distributed Concurrency Control. 721-733 - Steven Walczak:

Knowledge-Based Search in Competitive Domains. 734-743 - Bongki Moon, Inés Fernando Vega López, Vijaykumar Immanuel:

Efficient Algorithms for Large-Scale Temporal Aggregation. 744-759
- Yang Wang, Andrew K. C. Wong:

From Association to Classification: Inference Using Weight of Evidence. 764-767
Volume 15, Number 4, July/August 2003
- Arun Iyengar, David De Roure

:
Guest Editors' Introduction. 769-770 - David J. Scott

, Richard Sharp:
Specifying and Enforcing Application-Level Web Security Policies. 771-783 - Taher H. Haveliwala:

Topic-Sensitive PageRank: A Context-Sensitive Ranking Algorithm for Web Search. 784-796 - Peter F. Patel-Schneider, Jérôme Siméon:

The Yin/Yang Web: A Unified Model for XML Syntax and RDF Semantics. 797-812 - Anoop George Ninan, Purushottam Kulkarni, Prashant J. Shenoy

, Krithi Ramamritham, Renu Tewari:
Scalable Consistency Maintenance in Content Distribution Networks Using Cooperative Leases. 813-828 - Hang Cui, Ji-Rong Wen, Jian-Yun Nie

, Wei-Ying Ma
:
Query Expansion by Mining User Logs. 829-839 - Ernesto Damiani

, Sabrina De Capitani di Vimercati
, Stefano Paraboschi
, Pierangela Samarati
:
Managing and Sharing Servents' Reputations in P2P Systems. 840-854 - Rakesh Agrawal, Ramakrishnan Srikant:

Searching with Numbers. 855-870
- Yuhua Li

, Zuhair Bandar, David McLean:
An Approach for Measuring Semantic Similarity between Words Using Multiple Information Sources. 871-882 - Arvind K. Bansal, Christopher Woolverton:

Applying Automatically Derived Gene-Groups to Automatically Predict and Refine Metabolic Pathways. 883-894 - Edward P. F. Chan:

Buffer Queries. 895-910 - Theodoros Evgeniou, Massimiliano Pontil, Constantine Papageorgiou

, Tomaso A. Poggio:
Image Representations and Feature Selection for Multimedia Database Search. 911-920 - Veronica Biazzo, Rosalba Giugno

, Thomas Lukasiewicz, V. S. Subrahmanian:
Temporal Probabilistic Object Bases. 921-939 - Jingyu Hou, Yanchun Zhang:

Effectively Finding Relevant Web Pages from Linkage Information. 940-951 - Ning Zhong

, Yiyu Yao, Muneaki Ohshima:
Peculiarity Oriented Multidatabase Mining. 952-960 - Per-Åke Larson:

External Sorting: Run Formation Revisited. 961-972 - Randal C. Burns

, Larry J. Stockmeyer, Darrell D. E. Long:
In-Place Reconstruction of Version Differences. 973-984 - Minghua He, Nicholas R. Jennings

, Ho-fung Leung
:
On Agent-Mediated Electronic Commerce. 985-1003 - Chang-Hung Lee, Ming-Syan Chen

, Cheng-Ru Lin:
Progressive Partition Miner: An Efficient Algorithm for Mining General Temporal Association Rules. 1004-1017 - Bettina Kemme, Fernando Pedone

, Gustavo Alonso, André Schiper, Matthias Wiesmann:
Using Optimistic Atomic Broadcast in Transaction Processing Systems. 1018-1032
- Yi-Fan Wang:

On-Demand Forecasting of Stock Prices Using a Real-Time Predictor. 1033-1037 - Liang Chen, Naoyuki Tokuda:

Stability Analysis of Regional and National Voting Schemes by a Continuous Model. 1037-1042 - Stephen Lee Hansen, Sumitra Mukherjee:

A Polynomial Algorithm for Optimal Univariate Microaggregation. 1043-1044 - Khanh Vu, Kien A. Hua, Wallapak Tavanapong:

Image Retrieval Based on Regions of Interest. 1045-1049 - Qiang Yang, Henry Haining Zhang:

Web-Log Mining for Predictive Web Caching. 1050-1053 - Xun Yi, Yiming Ye:

Security of Tzeng's Time-Bound Key Assignment Scheme for Access Control in a Hierarchy. 1054-1055 - Agostino Dovier

, Carla Piazza
:
The Subgraph Bisimulation Problem. 1055-1056
Volume 15, Number 5, September/October 2003
- Philip S. Yu:

Editorial: AE Introduction. 1057-1058
- Marion G. Ceruti:

Data Management Challenges and Development for Military Information Systems. 1059-1068 - George Paschos, Ivan Radev, Nagarajan Prabakar

:
Image Content-Based Retrieval Using Chromaticity Moments. 1069-1072 - Victoria J. Hodge

, Jim Austin:
A Comparison of Standard Spell Checking Algorithms and a Novel Binary Neural Approach. 1073-1081 - Marian H. Nodine, Anne H. H. Ngu, Anthony R. Cassandra, William Bohrer:

Scalable Semantic Brokering over Dynamic Heterogeneous Data Sources in InfoSleuthTM. 1082-1098 - Yi Deng, Jiacun Wang

, Jeffrey J. P. Tsai, Konstantin Beznosov:
An Approach for Modeling and Analysis of Security System Architectures. 1099-1119 - Philip Bohannon, Rajeev Rastogi, S. Seshadri, Abraham Silberschatz, S. Sudarshan:

Detection and Recovery Techniques for Database Corruption. 1120-1136 - Murat Koyuncu

, Adnan Yazici
:
IFOOD: An Intelligent Fuzzy Object-Oriented Database Architecture. 1137-1154 - Alexandros Nanopoulos, Dimitrios Katsaros, Yannis Manolopoulos:

A Data Mining Algorithm for Generalized Web Prefetching. 1155-1169 - George Kollios

, Dimitrios Gunopulos
, Nick Koudas, Stefan Berchtold:
Efficient Biased Sampling for Approximate Clustering and Outlier Detection in Large Data Sets. 1170-1187 - Nick Bassiliades

, Ioannis P. Vlahavas
, Ahmed K. Elmagarmid, Elias N. Houstis:
InterBase-KB: Integrating a Knowledge Base System with a Multidatabase System for Data Warehousing. 1188-1205 - Luís E. T. Rodrigues, Michel Raynal:

Atomic Broadcast in Asynchronous Crash-Recovery Distributed Systems and Its Use in Quorum-Based Replication. 1206-1217 - JoAnne Holliday, Robert C. Steinke, Divyakant Agrawal, Amr El Abbadi:

Epidemic Algorithms for Replicated Databases. 1218-1238 - Jean-Michel Hélary, Michel Raynal, Giovanna Melideo, Roberto Baldoni:

Efficient Causality-Tracking Timestamping. 1239-1250 - Guohong Cao:

A Scalable Low-Latency Cache Invalidation Strategy for Mobile. 1251-1265 - Venkata Duvvuri, Prashant J. Shenoy

, Renu Tewari:
Adaptive Leases: A Strong Consistency Mechanism for the World Wide Web. 1266-1276 - Kyong-Ho Lee

, Yoon-Chul Choy, Sung-Bae Cho:
Logical Structure Analysis and Generation for Structured Documents: A Syntactic Approach. 1277-1294 - Vitaliy L. Khizder, Grant E. Weddell:

Reasoning about Uniqueness Constraints in Object Relational Databases. 1295-1306 - Robert N. Smith, Yu Chen, Sourav Bhattacharya:

Cascade of Distributed and Cooperating Firewalls in a Secure Data Network. 1307-1315 - Dantong Yu, Aidong Zhang:

ClusterTree: Integration of Cluster Representation and Nearest-Neighbor Search for Large Data Sets with High Dimensions. 1316-1337
- Baogang Wei, Yonghuai Liu, Yunhe Pan:

Using Hybrid Knowledge Engineering and Image Processing in Color Virtual Restoration of Ancient Murals. 1338-1343
Volume 15, Number 6, November/December 2003
- Minghua He, Ho-fung Leung

, Nicholas R. Jennings
:
A Fuzzy-Logic Based Bidding Strategy for Autonomous Agents in Continuous Double Auctions. 1345-1363 - Samuel H. Huang:

Dimensionality Reduction in Automatic Knowledge Acquisition: A Simple Greedy Search Approach. 1364-1373 - Nojun Kwak, Chong-Ho Choi:

Feature Extraction Based on ICA for Binary Classification Problems. 1374-1388 - Gianluigi Greco, Sergio Greco

, Ester Zumpano:
A Logical Framework for Querying and Repairing Inconsistent Databases. 1389-1408 - Dmitry Pavlov, Heikki Mannila, Padhraic Smyth

:
Beyond Independence: Probabilistic Models for Query Approximation on Binary Transaction Data. 1409-1421 - Jan Chomicki, Dina Q. Goldin, Gabriel M. Kuper, David Toman:

Variable Independence in Constraint Databases. 1422-1436 - Mark A. Hall, Geoffrey Holmes

:
Benchmarking Attribute Selection Techniques for Discrete Class Data Mining. 1437-1447 - Sam Yuan Sung, Zhao Li, Chew Lim Tan, Peter A. Ng:

Forecasting Association Rules Using Existing Data Sets. 1448-1459 - Li Yang:

Visual Exploration of Large Relational Data Sets through 3D Projections and Footprint Splatting. 1460-1471 - Dong-Ho Lee, Hyoung-Joo Kim:

An Efficient Technique for Nearest-Neighbor Query Processing on the SPY-TEC. 1472-1486 - Bharadwaj Veeravalli:

Network Caching Strategies for a Shared Data Distribution for a Predefined Service Demand Sequence. 1487-1497 - Ahmed K. Elmagarmid, Jin Jing, Abdelsalam Helal

, Choonhwa Lee:
Scalable Cache Invalidation Algorithms for Mobile Data Access. 1498-1511 - Srinivasan Parthasarathy

, Charu C. Aggarwal:
On the Use of Conceptual Reconstruction for Mining Massively Incomplete Data Sets. 1512-1521 - Miroslav Kubat, Aladdin Hafez, Vijay V. Raghavan, Jayakrishna R. Lekkala, Wei Kian Chen:

Itemset Trees for Targeted Association Querying. 1522-1534 - Sang Ho Lee, Kyu-Young Whang, Yang-Sae Moon, Wook-Shin Han, Il-Yeol Song:

Dynamic Buffer Allocation in Video-on-Demand Systems. 1535-1551 - Min-Shiang Hwang, Eric Jui-Lin Lu, Iuon-Chang Lin:

A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. 1552-1560 - Hyoseop Shin, Bongki Moon, Sukho Lee:

Adaptive and Incremental Processing for Distance Join Queries. 1561-1578
- SangKeun Lee, Chong-Sun Hwang, Masaru Kitsuregawa:

Using Predeclaration for Efficient Read-Only Transaction Processing in Wireless Data Broadcast. 1579-1583

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














