By Topic

Advances in Databases, Knowledge, and Data Applications, 2009. DBKDA '09. First International Conference on

Date 1-6 March 2009

Filter Results

Displaying Results 1 - 25 of 36
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (326 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (11 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (87 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (125 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (172 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2009, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (61 KB) | HTML iconHTML
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2009, Page(s):ix - x
    Request permission for commercial reuse | PDF file iconPDF (67 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2009, Page(s):xi - xii
    Request permission for commercial reuse | PDF file iconPDF (66 KB)
    Freely Available from IEEE
  • IRCDB: A Database of Inter-residues Contacts in Protein Chains

    Publication Year: 2009, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (382 KB) | HTML iconHTML

    In protein structure prediction, identifying the inter-residue contacts is a very important task to understand the mechanism of complicated protein folding and therefore to predict three-dimensional structures of proteins. So far, many methods were developed to predict inter-residue contacts. However, no special database consisting of detailed inter-residue contacts for each PDB protein chain has ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Range-Sum Queries along Dimensional Hierarchies in Data Cubes

    Publication Year: 2009, Page(s):7 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (319 KB) | HTML iconHTML

    Fast response to userspsila query and update requests continues to be one of the key requirements for OLAP systems. We outline the generalization of a space-efficient data structure, which makes it particularly suited for cubes with hierarchically structured dimensions. For a large class of range-sum queries - roll-up and drill-down along dimension hierarchies - the structure requires only a const... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-level Topological Relations of the Spatial Reasoning System RCC-8

    Publication Year: 2009, Page(s):13 - 21
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB) | HTML iconHTML

    Queries in geospatial databases, such as geographic information systems (GIS), image databases, are often based upon the relations among spatial objects. Spatial relations are the basis of many queries that GIS perform such as the topological relations. The general description of region-region topological relations in details is still an unsolved issue although much effort has been done. The eight... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Extension of XQuery for Graph Analysis of Biological Pathways

    Publication Year: 2009, Page(s):22 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB) | HTML iconHTML

    The vast quantity of scientific data produced in life sciences demands the use of sophisticated storage and analysis techniques. In particular, for biological pathways graph analysis plays an important role and data is commonly available in XML-based formats. Thus, there is a growing need to make analysis capabilities available through query languages for XML. This paper presents an approach to ex... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Replay the Execution History of Rule-Based Information

    Publication Year: 2009, Page(s):28 - 35
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (326 KB) | HTML iconHTML

    Software systems in health care, such as disease and medical-record management, or financial applications, such as customer relationship and portfolio management, have very often a temporal nature. Information is specified in form of rules as a pre-step for monitoring the changes of interest in the application. Managing such applications requires to provide replay support for managed information a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Classification of Object-Relational Impedance Mismatch

    Publication Year: 2009, Page(s):36 - 43
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (286 KB) | HTML iconHTML

    Object and relational technologies are grounded in different paradigms. Each technology mandates that those who use it take a particular view of a universe of discourse. Incompatibilities between these views manifest as problems of an object-relational impedance mismatch. In this paper we propose a conceptual framework for the problem space of object-relational impedance mismatch and consequently ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effective Snippet Clustering with Domain Knowledge

    Publication Year: 2009, Page(s):44 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (517 KB) | HTML iconHTML

    Clustering Web search result is a promising way to help alleviate the information overload for Web users. In this paper, we focus on clustering snippets returned by Google Scholar. We propose a novel similarity function based on mining domain knowledge and an outlier-conscious clustering algorithm. Experimental results showed improved effectiveness of the proposed approach compared with existing m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Input Buffers for Streaming XSLT Processing

    Publication Year: 2009, Page(s):50 - 55
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (221 KB) | HTML iconHTML

    We present a buffering streaming engine for processing top-down XSLT transformations. It consists of an analyzer and a transformer.The analyzer examines given top-down XSLT and XSD, and generates fragments which identify parts of XSD need to be buffered when XSLT is applied. The fragments are passed to the transformer which processes XSLT on an input XML document conforming to XSD. It uses auxilia... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed Key Management in Dynamic Outsourced Databases: A Trie-Based Approach

    Publication Year: 2009, Page(s):56 - 61
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (345 KB) | HTML iconHTML

    The decision to outsource databases is strategic in many organizations due to the increasing costs of internally managing large volumes of information. The sensitive nature of this information raises the need for powerful mechanisms to protect it against unauthorized disclosure. Centralized encryption to access control at the data owner level has been proposed as one way of handling this issue. Ho... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying Map-Reduce Paradigm for Parallel Closed Cube Computation

    Publication Year: 2009, Page(s):62 - 67
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB) | HTML iconHTML

    After many years of studies, efficient data cube computation remains an open field of research due to ever-growing amounts of data. One of the most efficient algorithms (quotient cubes) is based on the notion of cube cells closure, condensing groups of cells into equivalence classes, which allows to loss lessly decrease amount of data to be stored. Recently developed parallel computation framework... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Pseudo Object Database Model and Its Applications on a Highly Complex Distributed Architecture

    Publication Year: 2009, Page(s):68 - 73
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (260 KB) | HTML iconHTML

    Developing, maintaining and accessing complex information repositories are some of the main concerns of todaypsilas information society. In huge distributed systems, guaranteeing good performances and data integrity is a real challenge when using standard relational databases. This paper presents a database concept methodology that addresses these concerns under the form of an ldquoRDBMS independe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MyMIDP: An JDBC Driver for Accessing MySQL from Mobile Devices

    Publication Year: 2009, Page(s):74 - 80
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (162 KB) | HTML iconHTML

    Cell phones are no longer merely used to make phone calls or to send short or multimedia messages. They more and more become information systems clients. Recent developments in the areas of mobile computing, wireless networks and information systems provide access to data at almost every place and anytime by using this kind of lightweight mobile device. But even though mobile clients support the J... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assessing Quality of Derived Non Atomic Data by Considering Conflict Resolution Function

    Publication Year: 2009, Page(s):81 - 86
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (326 KB) | HTML iconHTML

    We present a data quality manager (DQM) prototype providing information regarding the elements of derived non-atomic data values. Users are able to make effective decisions by trusting data according to the description of the conflict resolution function that was utilized for fusing data along with the quality properties of data ancestor. The assessment and ranking of non-atomic data is possible b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transaction Processing in Mobile Computing Using Semantic Properties

    Publication Year: 2009, Page(s):87 - 94
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB) | HTML iconHTML

    Transaction processing is of growing importance for mobile computing. Booking tickets, flight reservation, banking, ePayment, and booking holiday arrangements are just a few examples for mobile transactions. Due to temporarily disconnected situations the synchronisation and consistent transaction processing are key issues. Serializability is a too strong criteria for correctness when the semantics... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a Combination of Three Representation Techniques for Conceptual Data Modeling

    Publication Year: 2009, Page(s):95 - 100
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB) | HTML iconHTML

    Conceptual modeling for database design needs simple and easy to use techniques for gathering and presenting information. Furthermore these approaches must be a means for communication between different kinds of stakeholders. In this paper a combination of such techniques are presented. It will be proposed how a glossary based representation, a graphical representation as well as a verbalization o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Querying Trajectory Data Warehouses

    Publication Year: 2009, Page(s):101 - 107
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (245 KB) | HTML iconHTML

    With the fast development in mobile and communication technology, the need for moving object databases increases. Moving object databases constitute a major ingredient in many applications that are location sensitive. Traffic control, fleet management, m-commerce, and E-911 are among those emerging location based services (LBSs). Along with the vast increase of location information, and the need t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing Malware Log Data to Support Security Information and Event Management: Some Research Results

    Publication Year: 2009, Page(s):108 - 113
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB) | HTML iconHTML

    Enterprise information infrastructures are generally characterized by a multitude of information systems which support decision makers in fulfilling their duties. The object of information security management is the protection of these systems, whereas security information and event management (SIEM) addresses those information management tasks which focus on the short term handling of events, as ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.