Data Warehouse I -- A Tree Comparison Approach to Detect Changes in Data Warehouse Structures -- Extending the UML for Designing Association Rule Mining Models for Data Warehouses -- Event-Feeded Dimension Solution -- XML-OLAP: A Multidimensional Analysis Framework for XML Warehouses -- Data Warehouse II -- Graph-Based Modeling of ETL Activities with Multi-level Transformations and Updates -- E…
Overview -- to Data Mining in Bioinformatics -- Survey of Biodata Analysis from a Data Mining Perspective -- Sequence and Structure Alignment -- AntiClustAl: Multiple Sequence Alignment by Antipole Clustering -- RNA Structure Comparison and Alignment -- Biological Data Mining -- Piecewise Constant Modeling of Sequential Data Using Reversible Jump Markov Chain Monte Carlo -- Gene Mapping by Patt…
Keynote Lectures -- Visualization-Based Data Mining Tool and Its Web Application -- Knowledge Management, Habitual Domains, and Innovation Dynamics -- Knowledge-Information Circulation Through the Enterprise: Forward to the Roots of Knowledge Management -- Data Mining Methodology -- A Hybrid Nonlinear Classifier Based on Generalized Choquet Integrals -- Fuzzy Classification Using Self-Organizin…
MOTIVATION AND MODELING ISSUES -- Databases: The Integrative Force in Cyberspace -- Federating Location-Based Data Services -- An Agent-Based Approach to Correctness in Databases -- INFRASTRUCTURAL SERVICES -- Thirty Years of Server Technology — From Transaction Processing to Web Services -- Caching over the Entire User-to-Data Path in the Internet -- Reweaving the Tapestry: Integrating Datab…
Keynotes -- Challenges in Biological Data Integration in the Post-genome Sequence Era -- Curated Databases -- User Applications -- A User-Centric Framework for Accessing Biological Sources and Tools -- BioLog: A Browser Based Collaboration and Resource Navigation Assistant for BioMedical Researchers -- Learning Layouts of Biological Datasets Semi-automatically -- Ontologies -- Factors Affecting…
General Security Issues -- IT Security Development -- A Case for Public and Private Review of Developing it Security Standards -- Assuring Critical Information Infrastructure -- Systemic Challenges for Critical Information Infrastructure Protection -- Decentralized Energy Supply to Secure Computer Systems -- Dependability -- Safety Analysis Methods—Software Development Questions -- Trust Case…
Keynote and Invited Talks -- Research Session 1: XML -- Research Session 2: Performance and Query Evaluation -- Research Session 3: Data Mining (I) -- Research Session 4: Semantic Web and Web Ontology -- Research Session 5: Data Management (I) -- Research Session 6: Information Systems -- Research Session 7: Web Services and Workflow (I) -- Research Session 8: Data Management (II) -- Research S…
Keynote Lectures -- How Much Intelligence in the Semantic Web? -- The Wisdom Web – A Grand Intellectual Undertaking -- Measuring Attractiveness of Rules from the Viewpoint of Knowledge Representation, Prediction and Efficiency of Intervention -- Web Intelligence Meets Brain Informatics: An Impending Revolution in WI and Brain Sciences -- Case Studies -- Hybrid Computational Intelligence for A…
Query Optimization and Simulation -- Selectivity Estimation of High Dimensional Window Queries via Clustering -- Spatio-temporal Histograms -- GAMMA: A Framework for Moving Object Simulation -- Advanced Query Processing I -- Medoid Queries in Large Spatial Databases -- The Islands Approach to Nearest Neighbor Querying in Spatial Networks -- Estimating the Overlapping Area of Polygon Join -- Spa…
Session I: March 18, 2004, Heraklion, Crete, Greece -- Querying Sliding Windows Over Online Data Streams -- MIRA: Multilingual Information Processing on Relational Architecture -- Index-Based Keyword Search in Mediator Systems -- Concept-Based Search on Semi-structured Data Exploiting Mined Semantic Relations -- Distributed and Scalable Similarity Searching in Metric Spaces -- Pattern Based Man…