


default search action
3. ICDKE 2012: Wuyishan, Fujian, China
- Yang Xiang, Mukaddim Pathan, Xiaohui Tao, Hua Wang:

Data and Knowledge Engineering - Third International Conference, ICDKE 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings. Lecture Notes in Computer Science 7696, Springer 2012, ISBN 978-3-642-34678-1
ICDKE: Artificial Intelligence and Data Engineering
- Na Wang, Peiquan Jin, Shouhong Wan, Yinghui Zhang, Lihua Yue:

OR-Tree: An Optimized Spatial Tree Index for Flash-Memory Storage Systems. 1-14 - Eman El-Dawy, Hoda M. O. Mokhtar

, Ali El-Bastawissy:
Directional Skyline Queries. 15-28 - Rafiqul Haque, Nenad B. Krdzavac

, Tom Butler:
Transforming Nescient Activity into Intelligent Activity. 29-37 - Guo-Yan Meng, Chuan-Long Wang, Xi-Hong Yan:

Self-adaptive Non-stationary Parallel Multisplitting Two-Stage Iterative Methods for Linear Systems. 38-47 - Ahmed Maalel, Lassaâd Mejri, Habib Hadj Mabrouk

, Henda Hajjami Ben Ghézala:
Towards a Case-Based Reasoning Approach Based on Ontologies Application to Railroad Accidents. 48-55
ICDKE: Knowledge Discovery and Data Management
- Givanildo Santana do Nascimento, Adicinéia Aparecida de Oliveira:

An Agile Knowledge Discovery in Databases Software Process. 56-64 - Ji Zhang, Jie Cao, Xiaodong Zhu:

An Innovative Outlier Detection Method Using Localized Thresholds. 65-73 - Guangyuan Wang, Hua Wang

, Xiaohui Tao, Ji Zhang:
A Self-stabilizing Algorithm for Finding a Minimal K-Dominating Set in General Networks. 74-85 - Hongmin Cai

, Michael Kwok-Po Ng:
Optimal Combination of Feature Weight Learning and Classification Based on Local Approximation. 86-94 - Suqing Han, Guimei Yin:

A Model of User-Oriented Reduct Construction Based on Minimal Set Cover. 95-102
ICDKE: Information Extraction and Retrieval
- Maytiyanin Komkhao

, Jie Lu, Lichen Zhang:
Determining Pattern Similarity in a Medical Recommender System. 103-114 - Chao Liang, Zhao Lu:

Chinese Latent Relational Search Based on Relational Similarity. 115-127 - Mohamed Ali Hadj Taieb

, Mohamed Ben Aouicha
, Mohamed Tmar, Abdelmajid Ben Hamadou
:
Wikipedia Category Graph and New Intrinsic Information Content Metric for Word Semantic Relatedness Measuring. 128-140 - Jianyu Zhao, Peng Wang:

Nautilus: A Generic Framework for Crawling Deep Web. 141-151 - Cher Han Lau, Xiaohui Tao, Dian Tjondronegoro, Yuefeng Li:

Retrieving Information from Microblog Using Pattern Mining and Relevance Feedback. 152-160
ICDKE: Data Security I
- Kun Peng:

A Secure and Efficient Mix Network Especially Suitable for E-Voting. 161-174 - Ming Tang, Zhenlong Qiu, Weijie Li, Shubo Liu, Huanguo Zhang:

Power Analysis Based Reverse Engineering on the Secret Round Function of Block Ciphers. 175-188 - Md. Abdul Based

, Joe-Kai Tsay, Stig Fr. Mjølsnes
:
PEVS: A Secure Electronic Voting Scheme Using Polling Booths. 189-205
ICDKE: Data Security II
- Haiting Du, Jiguo Li, Yichen Zhang, Tao Li, Yuexin Zhang:

Certificate-Based Key-Insulated Signature. 206-220 - Zuling Chang, Dandan Li:

The Generalized Construction and Linear Complexity of Binary Sequences with Three-Level Autocorrelation Values. 221-229 - Yanli Ren, Shuozhong Wang, Xinpeng Zhang:

Anonymous Hierarchical Identity-Based Encryption in Prime Order Groups. 230-242 - Muhammad Khurram Khan

, Debiao He:
Weaknesses of "Security Analysis and Enhancement for Three-Party Password-Based Authenticated Key Exchange Protocol". 243-249

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














