Keynote Talks | |
Enabling Real Time Data Analysis | p. 1 |
A New Paradigm of Thinking and Architecture for Real-Time Information Processing at Fingertips | p. 2 |
Query Processing and Optimization | |
Improving the Accuracy of Histograms for Geographic Data Objects | p. 3 |
Improving Online Aggregation Performance for Skewed Data Distribution | p. 18 |
A Relational-Based Approach for Aggregated Search in Graph Databases | p. 33 |
Data Semantics and Interoperability | |
Discovery of Keys from SQL Tables | p. 48 |
A Framework for Realizing Artifact-Centric Business Processes in Service-Oriented Architecture | p. 63 |
Appearance-Order-Based Schema Matching | p. 79 |
XML and Semi-structured Data I | |
Fast Result Enumeration for Keyword Queries on XML Data | p. 95 |
Stars on Steroids: Fast Evaluation of Multi-source Star Twig Queries in RDBMS | p. 110 |
Updating Typical XML Views | p. 126 |
XML and Semi-structured Data II | |
Partitioned Indexes for Entity Search over RDF Knowledge Bases | p. 141 |
Sinbad: Towards Structures-Independent Querying of Common Neighbors in XML Databases | p. 156 |
Top-Down SLCA Computation Based on List Partition | p. 172 |
Efficiently Identifying Contributors for XML Keyword Search | p. 185 |
Data Mining and Knowledge Discovery I | |
Semi-supervised Clustering of Graph Objects: A Subgraph Mining Approach | p. 197 |
Plink-LDA: Using Link as Prior Information in Topic Modeling | p. 213 |
Any Out: Anytime Outlier Detection on Streaming Data | p. 228 |
Data Mining and Knowledge Discovery II | |
Ensemble Based Positive Unlabeled Learning for Time Series Classification | p. 243 |
Efficient Mining Regularly Frequent Patterns in Transactional Databases | p. 258 |
Fast Tree-Based Mining of Frequent Itemsets from Uncertain Data | p. 272 |
Data Mining and Knowledge Discovery III | |
On the Decidability and Complexity of Identity Knowledge Representation | p. 288 |
Privacy Preserving Mining Maximal Frequent Patterns in Transactional Databases | p. 303 |
Data Privacy against Composition Attack | p. 320 |
Privacy and Anonymity | |
Protecting Sensitive Relationships against Inference Attacks in Social Networks | p. 335 |
You Can Walk Alone: Trajectory Privacy-Preserving through Significant Stays Protection | p. 351 |
Semi-Edge Anonymity: Graph Publication when the Protection Algorithm Is Available | p. 367 |
Data Management in the Web | |
On-the-Fly Generation of Facets as Navigation Signs for Web Objects | p. 382 |
Searching for Quality Microblog Posts: Filtering and Ranking Based on Content Analysis and Implicit Links | p. 397 |
HotDigg: Finding Recent Hot Topics from Digg | p. 414 |
Assessing Web Article Quality by Harnessing Collective Intelligence | p. 428 |
Graphs and Data Mining Applications | |
Context Sensitive Tag Expansion with Information Inference | p. 440 |
Efficient Subgraph Similarity All-Matching | p. 455 |
Efficient Algorithm for Mining Correlated Protein-DNA Binding Cores | p. 470 |
A Novel Approach for Finding Alternative Clusterings Using Feature Selection | p. 482 |
Temporal and Spatial Data I | |
General Spatial Skyline Operator | p. 494 |
Top-k Similarity Join over Multi-valued Objects | p. 509 |
Indexing Network Voronoi Diagrams | p. 526 |
Temporal and Spatial Data II | |
On Efficient Reverse k-Skyband Query Processing | p. 544 |
Co-spatial Searcher: Efficient Tag-Based Collaborative Spatial Search on Geo-social Network | p. 560 |
Traffic Aware Route Planning in Dynamic Road Networks | p. 576 |
Author Index | p. 593 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.