Filter
Conference contribution

Search results

  • Conference contribution

    Regression for Radioactive Source Detection

    Cordone, G., Brooks, R. R., Sen, S., Rao, N. S. V., Wu, C. Q., Berry, M. L. & Grieme, K. M., Nov 12 2018, 2017 IEEE Nuclear Science Symposium and Medical Imaging Conference, NSS/MIC 2017 - Conference Proceedings. Institute of Electrical and Electronics Engineers Inc., 8532726. (2017 IEEE Nuclear Science Symposium and Medical Imaging Conference, NSS/MIC 2017 - Conference Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    2 Scopus citations
  • Relational mathematics for relative correctness

    Desharnais, J., Diallo, N., Ghardallou, W., Frias, M. F., Jaoua, A. & Mili, A., 2015, Relational and Algebraic Methods in Computer Science - 15th International Conference, RAMiCS 2015, Proceedings. Kahl, W., Winter, M. & Oliveira, J. N. (eds.). Springer Verlag, p. 191-208 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9348).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    12 Scopus citations
  • Relational methods in the analysis of while loops: Observations of versatility

    Louhichi, A., Mraihi, O., Jilani, L. L., Bsaies, K. & Mili, A., 2009, Relations and Kleene Algebra in Computer Science - 11th Int. Conference on Relational Methods in Computer Science, RelMiCS 2009 and 6th Int. Conference on Applications of Kleene Algebra, AKA 2009, Proc.. p. 242-259 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5827 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Reliable gender prediction based on users' video viewing behavior

    Zhang, J., Du, K., Cheng, R., Wei, Z., Qin, C., You, H. & Hu, S., Jul 2 2016, Proceedings - 16th IEEE International Conference on Data Mining, ICDM 2016. Bonchi, F., Domingo-Ferrer, J., Baeza-Yates, R., Zhou, Z-H. & Wu, X. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 649-658 10 p. 7837889. (Proceedings - IEEE International Conference on Data Mining, ICDM; vol. 0).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • REMOLD: An efficient model-based clustering algorithm for large datasets with spark

    Liang, M., Li, Q., Geng, Y. A., Wang, J. & Wei, Z., Jul 2 2017, Proceedings - 2017 IEEE 23rd International Conference on Parallel and Distributed Systems, ICPADS 2017. IEEE Computer Society, p. 376-383 8 p. (Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS; vol. 2017-December).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • Remote data checking for network coding-based distributed storage systems

    Chen, B., Curtmola, R., Ateniese, G. & Burns, R., 2010, Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, CCSW '10, Co-located with CCS'10. p. 31-42 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    154 Scopus citations
  • Representing transitive relationships with parallel node sets

    Lee, E. & Geller, J., 1993, Proceedings of the IEEE Workshop on Advances in Parallel and Distributed Systems, APADS 1993. Bhargava, B. (ed.). Institute of Electrical and Electronics Engineers Inc., p. 140-145 6 p. 588919. (Proceedings of the IEEE Workshop on Advances in Parallel and Distributed Systems, APADS 1993).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Reservation-Based Federated Scheduling for Parallel Real-Time Tasks

    Ueter, N., Von Der Brüggen, G., Chen, J. J., Li, J. & Agrawal, K., Jan 4 2019, Proceedings - 39th IEEE Real-Time Systems Symposium, RTSS 2018. Institute of Electrical and Electronics Engineers Inc., p. 482-494 13 p. 8603237. (Proceedings - Real-Time Systems Symposium; vol. 2018-December).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    27 Scopus citations
  • Reserve price failure rate prediction with header bidding in display advertising

    Kalra, A., Borcea, C., Wang, C. & Chen, Y., Jul 25 2019, KDD 2019 - Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Association for Computing Machinery, p. 2819-2827 9 p. (Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    6 Scopus citations
  • Reserve Price optimization in First-Price Auctions via Multi-Task Learning

    Kalra, A., Wang, C., Borcea, C. & Chen, Y., 2023, Proceedings - 23rd IEEE International Conference on Data Mining, ICDM 2023. Chen, G., Khan, L., Gao, X., Qiu, M., Pedrycz, W. & Wu, X. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 200-209 10 p. (Proceedings - IEEE International Conference on Data Mining, ICDM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Resource-aware routing and scheduling in multi-radio multi-channel wireless mesh networks

    Cao, Z., Wu, C. Q., Berry, M. L. & Wang, Y., May 29 2018, 2018 IEEE Wireless Communications and Networking Conference Workshops, WCNCW 2018. Institute of Electrical and Electronics Engineers Inc., p. 248-253 6 p. (2018 IEEE Wireless Communications and Networking Conference Workshops, WCNCW 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Resource-Constrained Knowledge Diffusion Processes Inspired by Human Peer Learning

    Beikihassan, E., Hoover, A. K., Koutis, I., Parviz, A. & Aghaieabiane, N., Sep 28 2023, ECAI 2023 - 26th European Conference on Artificial Intelligence, including 12th Conference on Prestigious Applications of Intelligent Systems, PAIS 2023 - Proceedings. Gal, K., Gal, K., Nowe, A., Nalepa, G. J., Fairstein, R. & Radulescu, R. (eds.). IOS Press BV, p. 214-222 9 p. (Frontiers in Artificial Intelligence and Applications; vol. 372).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Restoration of binary and gray-scale images using the contour mid-crack codes description

    Shih, F. Y. & Wong, W. T., 1992, IAPR 1992 - 11th IAPR International Conference on Pattern Recognition: Image, Speech, and Signal Analysis. Institute of Electrical and Electronics Engineers Inc., p. 725-728 4 p. 202089. (Proceedings - International Conference on Pattern Recognition; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Rethinking multicore application scalability on big virtual machines

    Shan, J., Jia, W. & Ding, X., Jul 2 2017, Proceedings - 2017 IEEE 23rd International Conference on Parallel and Distributed Systems, ICPADS 2017. IEEE Computer Society, p. 694-701 8 p. (Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS; vol. 2017-December).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Revenue-Optimized Webpage Recommendation

    Wang, C., Kalra, A., Borcea, C. & Chen, Y., Jan 29 2016, Proceedings - 15th IEEE International Conference on Data Mining Workshop, ICDMW 2015. Wu, X., Tuzhilin, A., Xiong, H., Dy, J. G., Aggarwal, C., Zhou, Z-H. & Cui, P. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 1558-1559 2 p. 7395860. (Proceedings - 15th IEEE International Conference on Data Mining Workshop, ICDMW 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Reverse Engineering Gene Regulatory Networks Using Graph Mining

    Jiang, H., Turki, T., Zhang, S. & Wang, J. T. L., 2018, Machine Learning and Data Mining in Pattern Recognition - 14th International Conference, MLDM 2018, Proceedings. Perner, P. (ed.). Springer Verlag, p. 335-349 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10934 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Reverse engineering gene regulatory networks using sampling and boosting techniques

    Turki, T. & Wang, J. T. L., 2017, Machine Learning and Data Mining in Pattern Recognition - 13th International Conference, MLDM 2017, Proceedings. Perner, P. (ed.). Springer Verlag, p. 63-77 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10358 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Reverse engineering regulatory networks in cells using a dynamic Bayesian network and mutual information scoring function

    Jiang, H., Turki, T. & Wang, J. T. L., Jan 1 2017, Proceedings - 16th IEEE International Conference on Machine Learning and Applications, ICMLA 2017. Chen, X., Luo, B., Luo, F., Palade, V. & Wani, M. A. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 761-764 4 p. (Proceedings - 16th IEEE International Conference on Machine Learning and Applications, ICMLA 2017; vol. 2017-December).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Revisiting Homomorphic Encryption Schemes for Finite Fields

    Kim, A., Polyakov, Y. & Zucca, V., 2021, Advances in Cryptology – ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, Part 3. Tibouchi, M. & Wang, H. (eds.). Springer Science and Business Media Deutschland GmbH, p. 608-639 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13092 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    28 Scopus citations
  • Risk assessment methodology based on the NISTIR 7628 guidelines

    Abercrombie, R. K., Sheldon, F. T., Hauser, K. R., Lantz, M. W. & Mili, A., 2013, Proceedings of the 46th Annual Hawaii International Conference on System Sciences, HICSS 2013. p. 1802-1811 10 p. 6480058. (Proceedings of the Annual Hawaii International Conference on System Sciences).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Scopus citations
  • RM-NET: Rasterizing Markov Signals to Images for Deep Learning

    Gupta, K. & Wei, Z., 2023, ICCSI 2023 - 2023 International Conference on Cyber-Physical Social Intelligence. Institute of Electrical and Electronics Engineers Inc., p. 654-659 6 p. (ICCSI 2023 - 2023 International Conference on Cyber-Physical Social Intelligence).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Roadside infrastructure planning for vehicle trajectory collection

    Yan, T. & Wang, G., 2012, 35th IEEE Sarnoff Symposium, SARNOFF 2012 - Conference Proceedings. 6222765. (35th IEEE Sarnoff Symposium, SARNOFF 2012 - Conference Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Robust face recognition using color information

    Liu, Z. & Liu, C., 2009, Advances in Biometrics - Third International Conference, ICB 2009, Proceedings. p. 122-131 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5558 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    29 Scopus citations
  • Robust remote data checking

    Curtmola, R., Khan, O. & Burns, R., 2008, Proceedings of the 4th ACM International Workshop on Storage Security and Survivability, StorageSS'08, Co-located with the 15th ACM Computer and Communications Security Conference, CCS'08. p. 63-68 6 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    66 Scopus citations
  • Route caching in DTNs interconnected by infrastructure

    Haque, M. E., Hassan, Y. K., Aziz, A., Borcea, C. & Yamada, S., 2013, 2013 Australasian Telecommunication Networks and Applications Conference, ATNAC 2013. IEEE Computer Society, p. 77-82 6 p. 6705360. (2013 Australasian Telecommunication Networks and Applications Conference, ATNAC 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    2 Scopus citations
  • Run-length variability of two-stage multiple comparisons with the best for steady-state simulations and its implications for choosing first-stage run lengths

    Nakayama, M. K., 2008, Proceedings of the 2008 Winter Simulation Conference, WSC 2008. p. 252-259 8 p. 4736075. (Proceedings - Winter Simulation Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Safe and flexible adaptation via alternate data structure representations

    Kusum, A., Neamtiu, I. & Gupta, R., Mar 17 2016, Proceedings of CC 2016: The 25th International Conference on Compiler Construction. Association for Computing Machinery, Inc, p. 34-44 11 p. (Proceedings of CC 2016: The 25th International Conference on Compiler Construction).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • SafeLight: A Reinforcement Learning Method toward Collision-Free Traffic Signal Control

    Du, W., Ye, J., Gu, J., Li, J., Wei, H. & Wang, G., Jun 27 2023, AAAI-23 Special Tracks. Williams, B., Chen, Y. & Neville, J. (eds.). AAAI press, p. 14801-14810 10 p. (Proceedings of the 37th AAAI Conference on Artificial Intelligence, AAAI 2023; vol. 37).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • Satem: Trusted service code execution across transactions

    Gang, X., Borcea, C. & Iftode, L., 2006, Proceedings - 25th IEEE Symposium on Reliable Distributed Systems, SRDS 2006. p. 321-334 14 p. 4032493. (Proceedings of the IEEE Symposium on Reliable Distributed Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Scopus citations
  • SAWACMMM'17: The 1st workshop on multi media applications within the South African context

    Du Preez, J., Wolhuter, R., Herbst, B., Sebe, N. & Oria, V., Oct 23 2017, MM 2017 - Proceedings of the 2017 ACM Multimedia Conference. Association for Computing Machinery, Inc, p. 1965-1966 2 p. (MM 2017 - Proceedings of the 2017 ACM Multimedia Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Scalable fair clustering

    Backurs, A., Indyk, P., Onak, K., Schieber, B., Vakilian, A. H. & Wagner, T., Jan 1 2019, 36th International Conference on Machine Learning, ICML 2019. International Machine Learning Society (IMLS), p. 623-634 12 p. (36th International Conference on Machine Learning, ICML 2019; vol. 2019-June).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    43 Scopus citations
  • Scene image classification: Some novel descriptors

    Banerji, S., Sinha, A. & Liu, C., 2012, Proceedings 2012 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2012. p. 2294-2299 6 p. 6378083. (Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • Scene image classification using a wigner-based Local Binary Patterns descriptor

    Sinha, A., Banerji, S. & Liu, C., Sep 3 2014, Proceedings of the International Joint Conference on Neural Networks. Institute of Electrical and Electronics Engineers Inc., p. 1614-1621 8 p. 6889660. (Proceedings of the International Joint Conference on Neural Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Scheduling for energy efficiency and throughput maximization in a faulty cloud environment

    Alrammah, H., Gu, Y., Wu, C. & Ju, S., Jul 2 2017, Proceedings - 2017 IEEE 23rd International Conference on Parallel and Distributed Systems, ICPADS 2017. IEEE Computer Society, p. 561-569 9 p. (Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS; vol. 2017-December).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Scheduling parallelizable jobs online to maximize throughput

    Agrawal, K., Li, J., Lu, K. & Moseley, B., 2018, LATIN 2018: Theoretical Informatics - 13th Latin American Symposium, Proceedings. Mosteiro, M. A., Bender, M. A. & Farach-Colton, M. (eds.). Springer Verlag, p. 755-776 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10807 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • Scraping Sticky Leftovers: App User Information Left on Servers After Account Deletion

    Santhanam, P., Dang, H., Shan, Z. & Neamtiu, I., 2022, Proceedings - 43rd IEEE Symposium on Security and Privacy, SP 2022. Institute of Electrical and Electronics Engineers Inc., p. 2145-2160 16 p. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2022-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Searching musical audio datasets by a batch of multi-variant tracks

    Yu, Y., Downie, J. S., Chen, L., Oria, V. & Joe, K., 2008, Proceedings of the 1st International ACM Conference on Multimedia Information Retrieval, MIR2008, Co-located with the 2008 ACM International Conference on Multimedia, MM'08. p. 121-127 7 p. (Proceedings of the 1st International ACM Conference on Multimedia Information Retrieval, MIR2008, Co-located with the 2008 ACM International Conference on Multimedia, MM'08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Secure access delegation of encrypted medical information

    Deb Gupta, A., Polyakov, Y. & Rohloff, K., Jun 23 2016, 2016 10th International Symposium on Medical Information and Communication Technology, ISMICT 2016. IEEE Computer Society, 7498900. (International Symposium on Medical Information and Communication Technology, ISMICT; vol. 2016-June).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Secure and Efficient Agreement Signing Atop Blockchain and Decentralized Identity

    He, S., Sun, T., Tang, Q., Wu, C., Lipka, N., Wigington, C. & Jain, R., 2022, Blockchain and Trustworthy Systems - 4th International Conference, BlockSys 2022, Revised Selected Papers. Svetinovic, D., Zhang, Y., Huang, X., Luo, X. & Chen, X. (eds.). Springer Science and Business Media Deutschland GmbH, p. 3-17 15 p. (Communications in Computer and Information Science; vol. 1679 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Securely Sharing Encrypted Medical Information

    Gupta, A. D., Polyakov, Y., Rohloff, K. & Ryan, G., Aug 16 2016, Proceedings - 2016 IEEE 1st International Conference on Connected Health: Applications, Systems and Engineering Technologies, CHASE 2016. Institute of Electrical and Electronics Engineers Inc., p. 330-331 2 p. 7545851. (Proceedings - 2016 IEEE 1st International Conference on Connected Health: Applications, Systems and Engineering Technologies, CHASE 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Secure Proxy-Reencryption-Based Inter-Network Key Exchange

    Greenwald, L., Rohloff, K. & Stott, D., Jul 2 2018, 2018 IEEE Military Communications Conference, MILCOM 2018. Institute of Electrical and Electronics Engineers Inc., p. 780-785 6 p. 8599794. (Proceedings - IEEE Military Communications Conference MILCOM; vol. 2019-October).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Secure storage with replication and transparent deduplication

    Leontiadis, I. & Curtmola, R., Mar 13 2018, CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 13-23 11 p. (CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy; vol. 2018-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    13 Scopus citations
  • Selection and multiple-comparison procedures for regenerative systems

    Nakayama, M. K., 2006, Proceedings of the 2006 Winter Simulation Conference, WSC. p. 287-293 7 p. 4117617. (Proceedings - Winter Simulation Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Self-hiding behavior in Android apps: Detection and characterization

    Shan, Z., Neamtiu, I. & Samuel, R., May 27 2018, Proceedings of the 40th International Conference on Software Engineering, ICSE 2018. IEEE Computer Society, p. 728-739 12 p. (Proceedings - International Conference on Software Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    24 Scopus citations
  • Self-organization architecture for clustering analysis

    Shih, F. Y. & Moh, J., 1990, Proceedings of the Hawaii International Conference on System Science. Hoevel, L. W., Shriver, B. D., Nunamaker, J. F. J., Sprague, R. H. J. & Milutinovic, V. (eds.). Publ by Western Periodicals Co, p. 196-201 6 p. (Proceedings of the Hawaii International Conference on System Science; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Semantic deep web: Automatic attribute extraction from the deep web data sources

    An, Y. J., Geller, J., Wu, Y. T. & Chun, S. A., 2007, Proceedings of the 2007 ACM Symposium on Applied Computing. p. 1667-1672 6 p. (Proceedings of the ACM Symposium on Applied Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    30 Scopus citations
  • Semantic integration and querying of heterogeneous data sources using a hypergraph data model

    Theodoratos, D., 2002, Advances in Databases - 19th British National Conference on Databases, BNCOD 19, Proceedings. Eaglestone, B., North, S. & Poulovassilis, A. (eds.). Springer Verlag, p. 166-182 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2405).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Scopus citations
  • Semantic integration of schema conforming XML data sources

    Theodoratos, D., Dalamagas, T. & Liu, I. T., 2005, Web Information Systems Engineering, WISE 2005 - 6th International Conference on Web Information Systems Engineering, Proceedings. p. 588-589 2 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3806 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Semantic integration of tree-structured data using dimension graphs

    Dalamagas, T., Theodoratos, D., Koufopoulos, A. & Liu, I. T., 2005, Journal on Data Semantics IV. Springer Verlag, p. 250-279 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3730 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Semantic querying of tree-structured data sources using partially specified tree patterns

    Theodoratos, D., Dalamagas, T., Koufopoulos, A. & Gehani, N., 2005, CIKM'05 - Proceedings of the 14th ACM International Conference on Information and Knowledge Management. p. 712-719 8 p. (International Conference on Information and Knowledge Management, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    16 Scopus citations