Web Information Extraction via Web Views
2004
Abstract
ABSTRACT With the explosion of information on the Web, traditional ways of browsing and keyword searching of information over web pages no longer satisfy the demanding needs of web surfers. Web information extraction has emerged as an important research area that aims to automatically extract information from target web pages and convert them into a structured format for further processing.
References (262)
- Kaschek, R., Schewe, K.-D., Thalheim, B., & Zhang, L. (2003c). Integrating context in conceptual modeling for web information systems. WES'03 Proceedings.
- Linke, A., Nussbaumer, M., & Portmann, P. R. (2001). Studienbuch Linguistik. Reihe Germanistische Linguistik (4th ed.). Tübingen, Germany: Max Niemeyer Verlag GmbH.
- Longman Dictionary of Contemporary English. (1995). Munich: Langenscheidt-Longman GmbH.
- Matthews, C. (1998, March). Internet banking in New Zealand -A critique. New Zealand Banker (pp. 26-28).
- Mayr, H. C., Lockemann, P. C., & Bever, M. (1985). A framework for application systems engineering. Information Systems, 10(1), 97-111.
- McLaren, M. & Locker, K. (1995). Business and Administrative Commu- nication. Irwin, Australia.
- Melton, J. & Simon, A. R. (1993). Understanding the New SQL: A Complete Guide. San Francisco, CA: Morgan Kaufmann.
- Minsky, M. (1968). Matter, mind and models. In M. Minsky (Ed.), Semantic Information Processing (pp. 425-432). Cambridge, MA: MIT Press.
- Morgan, T. (2002). Business Rules and Information Systems: Aligning IT with Business Goals. Boston, MA.
- Morris, C. W. (1955). Signs, Language and Behavior. New York: George Braziller. (Original work published 1946 by Prentice Hall).
- Nersessian, N. J. (2002). The cognitive basis of model-based reasoning in science. In P. Carruthers, S. Stich, & M. Siegal (Eds.), The Cognitive Basis of Science (pp. 133-153). Cambridge, UK: Cambridge University Press.
- O'Grady, W., Archibald, J., Aronoff, M., & Rees-Miller, J. (2001). Contem- porary Linguistics (4th ed.). Boston, MA: Bedford/St. Martin's.
- Oberquelle, H. (1984). On models and modeling in human-computer co- operation. In G. C. Van der Meer, M. J. Tauber, T. R. G. Green, & P. Gorny (Eds.), Readings on Cognitive Ergonomics -Mind and Com- puters: Proceedings of the 2nd European Conference (pp. 26-43). Berlin: Springer-Verlag.
- Peirce, C. S. (1998). What is a sign? In Project Peirce edition (Ed.), The Essential Peirce: Selected Philosophical Writings (Vol. 2, pp. 4-10). Bloomington, IN: Indiana University Press.
- Polya, G. (1988). How to Solve It. Princeton, NJ: Princeton University Press.
- Quade, E. S. (1985). Predicting the consequences: Models and modeling. In H. Miser & E. S. Quade (Eds.), Handbook of Systems Analysis: Overview of Uses, Procedures, Applications and Practice (pp. 191- 218). New York: Elsevier Science Publishing.
- Rossi, G., Schwabe, D., & Lyardet, F. (1999). Web application models are more than conceptual models. In Advances in Conceptual Modeling (Vol. 1727 of LNCS, pp. 239-252). Berlin: Springer-Verlag.
- Rothenberg, J. (1989). The nature of modeling. In L. E. Widman, K. A. Loparo, & N. R. Nielson (Eds.), Artificial Intelligence, Simulation, and Modeling (pp. 75-92). New York: John Wiley & Sons.
- Schewe, B. (1996). Kooperative Softwareentwicklung. Wiesbaden, Ger- many: Deutscher Universitätsverlag.
- Schewe, B., Schewe, K.-D., & Thalheim, B. (1995). Objektorientierter Datenbankentwurf in der Entwicklung betrieblicher Informationssysteme. Informatik -Forschung und Entwicklung, 10, 115-127.
- Schewe, K.-D. & Schewe, B. (2000). Integrating database and dialogue design. Knowledge and Information Systems, 2(1), 1-32.
- Schewe, K.-D. & Thalheim, B. (2001). Modeling interaction and media objects. In E. Métais (Ed.), Advances in Conceptual Modeling (Vol. 1959 of LNCS, pp. 313-324). Berlin: Springer-Verlag.
- Schewe, K.-D. & Thalheim, B. (2003). Structural media types in the development of data-intensive web information systems.
- Schewe, K.-D., Kaschek, R., Matthews, C., & Wallace, C. (2002). Modeling web-based banking systems: Story boarding and user profiling. In H. Mayr & W.-J. Van den Heuvel (Eds.), Proceedings of the Workshop on Conceptual Modeling Approaches to E-commerce. Berlin: Springer- Verlag.
- Schulz von Thun, F. (2000). Miteinander reden: Störungen und Klärungen (Vol. 1). Hamburg, Germany: Rowohlt Taschenbuch Verlag GmbH.
- Schwabe, D. & Rossi, G. (1998). An object oriented approach to web-based application design. TAPOS, 4(4), 207-225.
- Sowa, J. F. (2000). Knowledge Representation. Pacific Grove, CA: Brooks/ Cole, a division of Thomson Learning.
- Sølvberg, A. & Kung, D. (1993). Information Systems Engineering. Berlin: Springer-Verlag.
- Srinivasa, S. (2001). A calculus of fixed-points for characterizing interac- tive behavior of information systems. PhD thesis. Cottbus, Germany: BTU Cottbus, Fachbereich Informatik.
- Stachowiak, H. (1973). Allgemeine Modelltheorie. Vienna: Springer-Verlag.
- Stachowiak, H. (1983). Erkenntnisstufen zum Systematischen Neopragmatismus und zur Allgemeinen Modelltheorie. In H. Stachowiak (Ed.), Modelle- REFERENCES
- Abiteboul, S., Buneman, P., & Suciu, D. (2000). Data on the Web: From Relations to Semistructured Data and XML. San Francisco, CA: Morgan Kaufmann.
- Atzeni, P., Gupta, A., & Sarawagi, S. (1998). Design and maintenance of data- intensive web-sites. In Proceedings of the EDBT'98 (Vol. 1377 of LNCS, pp. 436-450). Berlin: Springer-Verlag.
- Baresi, L., Garzotto, F., & Paolini, P. (2000). From web sites to web applications: New issues for conceptual modeling. In ER workshops 2000 (Vol. 1921 of LNCS, pp. 89-100). Berlin: Springer-Verlag.
- Bonifati, A., Ceri, S., Fraternali, P., & Maurino, A. (2000). Building multi- device, content-centric applications using WebML and the W3I3 tool suite. In ER workshops 2000 (Vol. 1921 of LNCS, pp. 64-75). Berlin: Springer-Verlag.
- Ceri, S., Fraternali, P., & Matera, M. (2002). Conceptual modeling of data- intensive web applications. IEEE Internet Computing, 6(4), 20-30.
- Düsterhöft, A. & Thalheim, B. (2001). SiteLang: Conceptual modeling of internet sites. In H. S. Kunii, S. Jajodia, & A. Sølvberg (Eds.), Concep- tual modeling -ER 2001 (Vol. 2224 of LNCS, pp. 179-192). Berlin: Springer-Verlag.
- Feyer, T. & Thalheim, B. (1999). E/R based scenario modeling for rapid prototyping of web information services. In P. P.-S. Chen (Ed.), Ad- vances in Conceptual Modeling (Vol. 1727 of LNCS, pp. 253-263). Berlin: Springer-Verlag.
- Feyer, T., Kao, O., Schewe, K.-D., & Thalheim, B. (2000). Design of data- intensive web-based information services. In Q. Li, Z. M. Ozsuyoglu, R. Wagner, Y. Kambayashi, & Y. Zhang (Eds.), Proceedings of the 1st International Conference on Web Information Systems Engineering (WISE 2000) (pp. 462-467). IEEE Computer Society.
- Feyer, T., Schewe, K.-D., & Thalheim, B. (1998). Conceptual modelling and development of information services. In T. Ling & S. Ram (Eds.), Conceptual Modeling -ER'98 (Vol. 1507 of LNCS, pp. 7-20). Berlin: Springer-Verlag.
- Fraternali, P. (1999). Tools and approaches for developing data-intensive web applications: A survey. ACM Computing Surveys, 31(3), 227-263.
- Kaschek, R., Schewe, K.-D., Wallace, C., & Matthews, C. (2003). Story boarding for web-based information systems. In W. Rahayu & D. Taniar (Eds.), Web Information Systems. Hershey, PA: Idea Group.
- Kirchberg, M., Schewe, K.-D., & Tretiakov, A. (2003). Using XML to support media types. Submitted for publication.
- Lobin, H. (2000). Informationsmodellierung in XML und SGML. Berlin: Springer-Verlag.
- Mecca, G., Merialdo, P., & Atzeni, P. (1999). ARANEUS in the era of XML. IEEE Data Engineering Bulletin.
- Rossi, G., Garrido, A., & Schwabe, D. (2000). Navigating between objects: Lessons from an object-oriented framework perspective. ACM Com- puting Surveys, 32(1).
- Rossi, G., Schwabe, D., & Lyardet, F. (1999). Web application models are REFERENCES
- A Paepcke, C.-C. C., Garcia-Molina, H., & Winograd, T. (1998). Interoperability for digital libraries worldwide. Communications of the ACM, 41(4), 33-43.
- Bisbal, J., Wu, D. L., & Grimson, J. (1999). Legacy information systems: Issues and directions. IEEE Software, 16(5), 103-111.
- Bordegoni, M. et al. (1997). A standard reference model for intelligent multimedia presentation systems. Computer Standards and Interfaces, 18, 477-496.
- Brodie, M. (1993). DARWIN: On the incremental migration of legacy information systems. GTE Labs. (Technical Report No. TR-022-10- 92-165).
- Chestnutt, D. (1997, July). The model editions partnership: "Smart text" and beyond. D-Lib Magazine.
- Feigenbaum, E. (1982). Knowledge Engineering in the 1980s. Stanford, CA: Stanford University, Department of Computer Science.
- Gitt, W. (1989). Information: The third fundamental quantity. Siemens Re- view, 6, 36-41.
- Horvath, G. K. et al. (2001, September). Communication model for the user interface of a shape conceptualisation system. Paper presented at the Proceedings of the ASME International Design Engineering Technical Conference, Pittsburgh, Pennsylvania.
- Lesk, M. (1997). How much information is there in the world? Available at: http://www.lesk.com/mlesk/ksg97/ksg.html.
- Macleod, I. (1990). Storage and retrieval of structured documents. Informa- tion Processing and Management, 26(2), 197-208.
- Munson, E. (1996, September). Towards an operational theory of media. Paper presented at the 3rd International Workshop on Principles of Document Processing, Palo Alto, California.
- Nunberg, G. (1996). The Future of the Book. Berkeley CA: University of California Press.
- Pfeiffer, E. M. a. M. (1997). A representation of media for multimedia authoring and browsing systems. Available at: http://citeseer.nj.nec.com/ 9760.html.
- Riley, J. G. G. (1998). EXPERT SYSTEMS: Principles and Programming (3rd ed.). Boston, MA: PWS Publishing.
- Searle, J. (1969). Speech Acts: An Essay in the Philosophy of Language. Cambridge: Cambridge University Press.
- Shannon, C. (1948). A mathematical theory of communication. The Bell System Technical Journal, 27, 379-423.
- Sornil, E. F. a. O. (1999). Digital Libraries. In R. B.-Y. & B. Ribeiro-Neto (Eds.), Modern Information Retrieval (chap. 11). UK: AWI. REFERENCES
- Akker, T., Snell, Q. O., & Clemant, M. J. (2001). The YGuard access control model: Set-based access control. Proceedings of the 6th ACM Sympo- sium on Access Control Models and Technologies, Chantilly, Virginia.
- Amer-Yahia, S. & Fernandez, M. (2002, February/March). Techniques for storing XML. Proceedings of the 18th International Conference on Data Engineering (ICDE 2002), San Jose, California.
- Banerjee, S., Krishnamurthy, V., Krishnaprasad, R., & Murthy, R. (2000, February/March). Oracle8i-The XML enabled data management system. Proceedings of the16th International Conference on Data Engineer- ing (ICDE), San Diego, California (pp. 561-568).
- Bertino, E., Castano, S., & Ferrari, E. (2001). On specifying security policies for web documents with an XML-based language. Proceedings of the 6th ACM symposium on access control models and technologies, Chantilly, Virginia (pp. 57-65).
- Bertino, E., Castano, S., & Ferrari, E. (2001, May/June). Securing XML documents with Author-X. IEEE Internet Computing, 5(3), 21-31.
- Bohannon, P., Freire, J., Roy, P., & Simeon, J. (2002, May/June). From XML schema to relations: A cost-based approach to XML storage. Proceed- ings of the 18th International Conference on Data Engineering (ICDE 2002), San Jose, California.
- Castano, S. & Ferrari, E. (2003). Protecting datasources over the web: Policies, models, and mechanisms. In Web-powered Databases (chap. 11, pp. 299-330). Hershey, PA: Idea Group.
- Castano, S., Fugini, M., Martella, G., & Samarati, P. (1994). Database Security. Reading, MA: Addison-Wesley.
- Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., & Samarati, P. (2000). Design and implementation of an access control processor for XML documents. Proceedings of the 9th World Wide Web Conference (WWW9), Amsterdam, Holland.
- Damiani, E., Samarati, P., De Capitani di Vimercati, S., & Paraboschi, S. (2001, November/December). Controlling access to XML documents. IEEE Internet Computing, 5(6), 18-28.
- Damiani, E., Vimercati, S. D. C., Paraboshi, S., & Samarati, P. (2000). Securing XML documents. Proceedings of the 7th International Con- ference on Extending Database Technology, Konstanz, Germany.
- Florescu, D. & Kossmann, D. (1999, May). A performance evaluation of alternative mapping schemes for storing XML data in a relational database. Rocquencourt, France: INRIA. (Technical Report No. 3680).
- Hess, A., Schulz, H., & Brossler, P. (2000). SHORE -A hypertext repository based on XML. Southfield, USA: Software Design and Management. (Technical Report).
- Howes, T. A., Smith, M. C., & Good, G. S. (1999). Understanding and Deploying LDAP Directory Services. USA: Macmillan Technical Pub- lishing.
- Johner, H., Brown, L., Hinner, F. S., Reis, W., & Westman, J. (1998, June). Understanding LDAP, International Technical Support Organization (Ed.), IBM.
- Kanne, C. C. & Moerkotte, G. (2000, February/March). Efficient storage of XML data. Proceedings of the 16th International Conference on Data Engineering (ICDE 2000), San Diego, California.
- Khan, L. & Rao, Y. (2001, November). A performance evaluation of storing XML data in relational DBMS. Proceedings of the 3rd ACM CIKM'01 Workshop on Web Information and Data Management (WIDM'01), Atlanta, Georgia.
- Kudo, M. & Hada, S. (2000). XML document security based on provisional authorization. Proceedings of the 7th ACM Conference on Computer and Communications Security, Athens, Greece.
- Marron, P. J. & Lausen, G. (2001). On processing XML in LDAP. In Proceedings of the 27th conference on very large data bases (VLDB 2001), Rome, Italy, September 2001 (pp. 601-610).
- McHugh, J., Abiteboul, S., Goldman, R., Quass, D., & Widom, J. (1997). Lore: A database management system for semi-structured data. ACM SIGMOD Record, 26(3), 54-66.
- Moyer, M. J. & Ahamad, M. (2001). Generalized role-based access control. Proceedings of the 21st International Conference on Distributed Computing Systems, Mesa, Arizona.
- Osborn, S., Sandhu, R., & Munawer, Q. (2000). Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security, 3(2), 85-106.
- Rys, M. (2001, April). Bringing the Internet to your database: Using SQL Server 2000 and XML to build loosely-coupled systems. Proceedings of the 17th International Conference on Data Engineering (ICDE), Heidelberg, Germany.
- Sandhu, R. S. & Mason, G. (1993, November). Lattice-based access control models. IEEE Computer, 26(11), 9-19.
- Bray, T., Paoli, J., & Sperberg-McQueen, C. M. (eds.). (1998). Extensible markup language (XML) 1.0. W3C. Available at: http://www.w3c.org/ TR/REC-xml.
- Conrad, R., Scheffner, D., & Freytag, J. C. (2000). XML Conceptual Modeling Using UML. Berlin: HU Berlin, Institute of Computer Science (Technical Report).
- Dillon, T. & Tan, P. L. (1993). Object-oriented Conceptual Models. New York: Prentice Hall.
- Fong, J., Pang, F., & Bloor, C. (2001). Converting relational database into XML document. In Proceedings of the 12th International Workshop on Database and Expert Systems Applications (pp. 61-65).
- Klettke, M. & Meyer, H. (2001). XML and object-relational database system. Lecture Notes in Computer Science (Vol. 1997, pp. 151-170). Berlin: Springer-Verlag.
- Mani, M., Lee, D., & Muntz, R. (2001). Semantic data modelling using XML schemas. Lecture Notes in Computer Science (Vol. 2224, pp. 149- 163). Berlin: Springer-Verlag.
- Shanmugasundaram, J. et al. (2001). Efficiently publishing relational data as XML documents. The VLDB Journal, 10, 133-154.
- Stonebraker, M. & Moore, D. (1996). Object-relational DBMSs: The Next Great Wave. San Francisco, CA: Morgan Kaufmann.
- Widjaya, N. D., Taniar, D., & Rahayu, J. W. (2003). Inheritance relationship transformation of XML schemas to object-relational databases. Pro- ceedings of the 4th International Conference on Intelligent Data Engineering and Automated Learning (IDEAL 2003), Hong Kong.
- Widjaya, N. D., Taniar, D., Rahayu, J. W., & Pardede, E. (2002). Association relationship transformation of XML schemas to object-relational data- bases. Proceedings of the 4th International Conference on Informa- tion Integration and Web-based Applications and Services (IIWAS 2002).
- Xiao, R., Dillon, T., Chang, E., & Feng, L. (2001). Modelling and transforma- tion of object-oriented conceptual models into XML schema. Lecture Notes in Computer Science (Vol. 2113, pp. 795-804). Berlin: Springer- Verlag.
- Yang, X. & Wang, G. (2001). Efficiently mapping referential integrity con- straints from relational databases to XML. Lecture Notes in Computer Science (Vol. 2151, pp. 338-351). Berlin: Springer-Verlag.
- Yang, X. & Wang, G. (2001). Mapping referential integrity constraints from relational databases to XML. Lecture Notes in Computer Science (Vol. 2118, pp. 329-340). Berlin: Springer-Verlag.
- Berners-Lee, T., et al. (2001). Reference description of the DAML+OIL ontology markup language.
- Biggs, N. L., Lloyd, E. K., & Wilson, R. J. (1976). Graph Theory 1736- 1936. Oxford, UK: Clarendon Press.
- Chen, P. P. (1976). The entity-relationship model: Toward a unified view of data. ACM Transaction on Database Systems, 1(1), 9-36.
- Colomb, R. M. & Weber, R. (1998). Completeness and quality of an ontology for an information system. Proceedings of the International Confer- ence on Formal Ontology in Information Systems, Trento, Italy.
- Dijkstra, E. (1959). A note on two problems in connection with graphs. Numerische Mathematik, 1, 269-271.
- Feng, L., Chang, E., & Dillon, T. (2002). A semantic network based design methodology for XML documents. ACM Transactions on Information Systems, 20(3).
- Fensel, D., et al. (2000). OIL in a nutshell. Proceedings of the 12th International Conference on Knowledge Engineering and Knowl- edge Management Methods, Juan-Les-Pins, France.
- Fensel, D., Decker, S., Erdmann, M., & Studer, R. (1998). Ontobroker: Or how to enable intelligent access to the WWW. Proceedings of the 11th Knowledge Acquisition for Knowledge-Based Systems Workshop, Banff, Canada.
- Genesereth, M. R. (1991). Knowledge interchange format. In Proceedings of the 2nd international conference on principles of knowledge repre- sentation and reasoning. San Francisco, CA: Morgan Kaufmann.
- Genesereth, M. R. & Fikes, R. (1992). Knowledge Interchange Format, version 3.0, Reference Manual. Stanford, CA: Stanford University, Computer Science Department.
- Gruber, T. R. (1992). Ontolingua: A Mechanism to Support Portable Ontologies. Stanford, CA: Stanford University, Knowledge Systems Laboratory.
- Gruber, T. R. (1993a). Toward principles for the design of ontologies used for knowledge sharing. In N. Guarino & R. Poli (Eds.), Formal Ontology in Conceptual Analysis and Knowledge Representation. Deventer: Kluwer Academic.
- Gruber, T. R. (1993b). A translation approach to portable ontology specifica- tions. Knowledge Acquisition.
- Guarino, N. & Welty, C. (2002). Evaluating ontological decisions with OntoClean. Communications of the ACM, 45(2), 61-65.
- Hahn, U. & Schnattinger, K. (1998). Towards text knowledge engineering. Proceedings of the 15th National Conference on Artificial Intelli- gence, Madison, Wisconsin.
- Halpin, T. (1995). Conceptual Schema and Relational Database Design (2nd ed.). New York: Prentice Hall.
- Harmelen, F. Van & Fensel, D. (1999). Practical knowledge representation for the web. Proceedings of the International Joint Conferences on Artificial Intelligence.
- Heflin, J. & Hendler, J. (2000). Dynamic ontologies on the web. Proceedings of the American Association for Artificial Intelligence Conference, Menlo Park, California.
- Heflin, J., Hendler, J., & Luke, S. (1999). Coping with changing ontologies in a distributed environment. In Proceedings of the American Association for Artificial Intelligence Conference, Workshop on Ontology Man- agement. Cambridge, MA: MIT Press.
- Heflin, J., Hendler, J., & Luke, S. (1999). SHOE: A Knowledge Represen- tation Language for Internet Applications. College Park, MD: Univer- sity of Maryland, Department of Computer Science.
- Holsapple, C. W. & Joshi, K. D. (2002). A collaborative approach to ontology design. Communications of the ACM, 45(2), 42-47.
- Hovy, E. H. (1998). Combining and standardizing large-scale, practical ontologies for machine translation and other uses. Proceedings of the First International Conference on Language Resources and Evalua- tion, Granada, Spain.
- Kaplan, A. N. (2001). Towards a consistent logical framework for ontological analysis. Proceedings of the International Conference on Formal Ontology in Information Systems.
- Klein, M. & Fensel, D. (2001). Ontology versioning for the semantic web. Proceedings of the International Semantic Web Working Sympo- sium, California.
- Klein, M., Fensel, D., Kiryakov, A., & Ognyanov, D. (2002). Ontology versioning and change detection on the web. In Proceedings of the 13th International Conference on Knowledge Engineering and Knowl- edge Management, Siguenza, Spain. Berlin: Springer-Verlag.
- Kruskal, J. B. J. (1956). On the shortest spanning subtree of a graph and the traveling salesman problem. In Proceedings of the American Math- ematics Society, 1956(7), 48-50.
- Lenat, D. B. (1995). Cyc: A large-scale investment in knowledge infrastruc- ture. Communications of the ACM, 38(11).
- McGuinness, D. L., Fikes, R., Rice, J., & Wilder, S. (2000). An environment for merging and testing large ontologies. In Proceedings of the Seventh International Conference on Principles of Knowledge Representa- tion and Reasoning. San Francisco, CA: Morgan Kaufmann. REFERENCES
- Adelberg, B. (1998). NoDoSE -A tool for semi-automatically extracting semi-structured data from text documents. In Proceedings of the 1998 ACM SIGMOD International Conference on Management of Data, Seattle, Washington, June 1998 (pp. 283-294).
- Appelt, D. E. & Israel, D. (1999). Introduction to information extraction technology. Tutorial of the 16th International Joint Conference on Artificial Intelligence (IJCAI-99).
- Ashish, N. & Knoblock, C. A. (1997). Semi-automatic wrapper generation for Internet information sources. ACM SIGMOD Record, 26(4), 8-15.
- Atzeni, P., Mecca, G., & Merialdo, P. (1997). To weave the web. In Proceedings of the international conference on very large data bases (VLDB 1997), Athens, Greece, August 1997 (pp. 206-215).
- Baumgartner, R., Flesca, S. & Gottlob, G. (2001). Visual web information extraction with Lixto. In Proceedings of the 27th International Confer- ence on Very Large Data Bases (VLDB 2001), Rome, Italy, September 2001 (pp. 119-128).
- Berry, M. W., Dumais, S. T., & Letsche, T. A. (1995, December). Compu- tational methods for intelligent information access. Proceedings of Supercomputing '95, San Diego, California.
- Bright, L., Gruser, J. R., Raschid, L., & Vidal, M. E. (1999). A wrapper generation toolkit to specify and construct wrappers for web accessible data sources (Web-Sources). International Journal of Computer Systems Science and Engineering, 14(2), 83-97.
- Cali, M. E. & Mooney, R. J. (1998). Relational learning of pattern-match rules for information extraction. Working Notes of the AAAI Spring Sympo- sium on Applying Machine Learning to Discourse Processing (pp. 6- 11). Menlo Park, CA: AAAI Press.
- Chang, C. H. & Lui, S. C. (2001). IEPAD: Information extraction based on pattern discovery. In Proceedings of the 10th International World Wide Web Conference (WWW 10), Hong Kong, China, May 1-5, 2001 (pp. 681-688). New York: ACM Press.
- Chidlovskii, B., Ragetli, J., & Rijke, M. D. (2000). Wrapper generation via grammar induction. In Proceedings of the 11th European Conference on Machine Learning, Barcelona, Spain, May 31-June 2, 2000 (Vol. 1810, pp. 96-108). Berlin: Springer-Verlag.
- Cohen, W. & Jensen, L. (2001, August). A structured wrapper induction system for extracting information from semi-structured documents. Pro- ceedings of the International Joint Conference on Artificial Intelli- gence (IJCAI-2001) Workshop on Adaptive Text Extraction and Mining, Seattle, Washington.
- Cohen, W. W. (1999). Recognizing structure in web pages using similarity queries. In Proceedings of the 16th National Conference on Artificial Intelligence and the 11th Conference on Innovative Applications of Artificial Intelligence (AAAI/IAAI), Orlando, Florida, July 18-22, 1999 (pp. 59-66).
- Crescenzi, V. & Mecca, G. (1998). Grammars have exceptions. Information Systems, 23(8), 539-565.
- Crescenzi, V., Mecca, G., & Merialdo, P. (2001). RoadRunner: Towards automatic data extraction from large web sites. In Proceedings of the 27th International Conference on Very Large Data Bases (VLDB 2001), Rome, Italy, September 2001 (pp. 109-118).
- Embley, D. et al. (1999). Conceptual-model-based data extraction from multiple record web pages. Data and Knowledge Engineering, 31(3), 227-251.
- Embley, D., Jiang, S., & Ng, Y. (1999). Record-boundary discovery in web documents. In Proceedings of the ACM SIGMOD International Con- ference on Management of Data (pp. 467-478).
- Florescu, D., Levy, A. Y., & Mendelzon, A. O. (1998). Database techniques for the world wide web: A survey. SIGMOD Record, 27(3), 59-74.
- Freitag, D. (1998). Multistrategy learning for information extraction. In Pro- ceedings of the 15th International Conference on Machine Learning (pp. 161-169). San Francisco, CA: Morgan Kaufmann.
- Freitag, D. & Kushmerick, N. (2000). Boosted wrapper induction. In AAAI/ IAAI, 577-583).
- Golgher, P. B., Silva, A. S. D., Laender, A. H. F., & Ribeiro-Neto, B. A. (2001). Bootstrapping for example-based data extraction. In Proceed- ings of the 2001 ACM CIKM International Conference on Informa- tion and Knowledge Management, Atlanta, Georgia, November 5-10, 2001 (pp. 371-378). New York: ACM Press.
- Gupta, A., Harinarayan, V., & Rajaraman, A. (1998). Virtual database technology. Proceedings of the 14th International Conference on Data Engineering, Orlando, Florida, February 23-27, 1998.
- Hammer, J., Molina, H. G., Cho, J., Crespo, A., & Aranha, R. (1997). Extracting semistructured information from the web. In Proceedings of the Workshop on Management of Semistructured Data, Tucson, Arizona, May 1997 (pp. 18-25).
- Hammer, J., Molina, H.G., Nestorov, S., Yerneni, S., Breunig, M., & Vassalos, V. (1997). Template-based wrappers in the TSIMMIS sys- tem. In Proceedings of the 1997 ACM SIGMOD International Confer- ence on Management of Data, Tucson, Arizona, May 1997 (pp. 532- 535).
- Hsu, C. N. & Dung, M. T. (1998). Generating finite-state transducers for semistructured data extraction from the web. Information Systems, 23(8), 521-538.
- Kistler, T. & Marais, H. (1998). WebL -a programming language for the web. In Proceedings of WWW7 (Vol. 30, 1-7) of Computer Networks, pp. 259-270).
- Kosala, R. & Blockeel, H. (2000). Instance-based wrapper induction. In Proceedings of the 10th Belgium-Dutch Conference on Machine Learning (pp. 61-68).
- Kosala, R., Bussche, J. V. D., Bruynooghe, M., & Blockeel, H. (2002). Information extraction in structured documents using tree automata induction. In Proceedings of the 6th European conference (PKDD-02) (LNCS, pp. 299-310).
- Kuhlins, S. & Tredwell, R. (2002, September). Toolkits for generating wrappers -A survey of software toolkits for automated data extraction from websites. Proceedings of Net.ObjectsDays 2002.
- Kushmerick, N. (1999). Gleaning the web. IEEE Intelligent Systems, 14(2), 20-22.
- Kushmerick, N. (1999). Regression testing for wrapper maintenance. In Proceedings of the 16th National Conference on Artificial Intelli- gence and the 11th Conference on Innovative Applications of Artifi- cial Intelligence (AAAI/IAAI), Orlando, Florida, July 18-22, 1999 (pp. 74-79).
- Kushmerick, N. (2000). Wrapper induction: Efficiency and expressiveness. Artificial Intelligence, 118(1-2), 15-68.
- Kushmerick, N. (2000). Wrapper verification. Proceedings of World Wide Web, 3(2), 79-94.
- Laender, A. H. F., Ribeiro-Neto, B. A., & Silva A. S. D. (2002). DEByE - Data extraction by example. Data and Knowledge Engineering, 40(2), 121-154.
- Laender, A. H. F., Ribeiro-Neto, B. A., Silva, A. S. D., & Teixeira, J. S. (2002). A brief survey of web data extraction tools. ACM SIGMOD Record, 31(2), 84-93.
- Lerman, K., Knoblock, C., & Minton, S. (2003). Wrapper maintenance: A machine learning approach. Journal of Artificial Intelligence Research, 18, 149-181.
- Li, F. F., Liu, Z. H., Huang, Y. F., & Ng, W. K. (2001). An information concierge for the web. In Proceedings of the 1st International Work- shop on Internet Bots: Systems and Applications (INBOSA 2001) and the 12th International Conference on Database and Expert System Applications (DEXA 2001), Munich, Germany, September 2001 (pp. 672-676).
- Lin, S. H. & Ho, J. M. (2002). Discovering informative content blocks from web documents. Proceedings of the International Conference on Knowledge Discovery and Data Mining (SIGKDD-02).
- Liu, Z., Li, F., & Ng, W. K. (2002). Wiccap data model: Mapping physical websites to logical views. In Proceedings of the 21st International Conference on Conceptual Modelling (ER 2002), Tempere, Finland, October 2002 (pp. 120-134).
- Liu, Z., Li, F., Ng, W. K., & Lim, E. P. (2002). A visual tool for building logical data models of websites. In Proceedings of the 4th ACM CIKM International Workshop on Web Information and Data Management (WIDM 2002), McLean, Virginia, November 2002 (pp. 92-95).
- Liu, L., Pu, C., & Han, W. (2000). XWRAP: An XML-enabled wrapper construction system for web information sources. In Proceedings of the 16th International Conference on Data Engineering (ICDE 2000), San Diego, California, February 2000 (pp. 611-621).
- May, W., Himmer¨oder, R., Lausen, G., & Lud¨ascher, B. (1999). A unified framework for wrapping, mediating and restructuring information from the web. In Advances in Conceptual Modeling: ER '99 Workshops on Evolution and Change in Data Management, Reverse Engineering in Information Systems, and the World Wide Web and Conceptual Modeling, Paris, France, November 15-18 1999 (Vol. 1727 of LNCS, pp. 307-320). Berlin: Springer-Verlag.
- Mecca, G. & Atzeni, P. (1999). Cut and Paste. Journal of Computer and System Sciences, 58(3), 453-482.
- Mecca, G., Atzeni, P., Masci, A., Merialdo, P., & Sindoni, G. (1998). The araneus web-base management system. In Proceedings of the SIGMOD conference, (pp. 544-546).
- Morrison, D. R. (1968). Patricia -practical algorithm to retrieve information coded in alphanumeric. Journal of the ACM, 15(4), 514-534.
- Muslea, I. (1998). Extraction patterns: From information extraction to wrapper generation. Los Angeles, CA: University of Southern Califor- nia, Information Sciences Institute. (Technical Report).
- Muslea, I. (1999). Extraction patterns for information extraction tasks: A survey. In Proceedings of the Workshop on Machine Learning for Information Extraction, Orlando, Florida, July 1999 (pp. 1-6).
- Muslea, I., Minton, S., & Knoblock, C. A. (1999). A hierarchical approach to wrapper induction. In Proceedings of the 3rd International Confer- ence on Autonomous Agents (Agents'99), Seattle, Washington (pp. 190-197). New York: ACM Press.
- Muslea, I., Minton, S., & Knoblock, C.A. (2001). Hierarchical wrapper induction for semi-structured information sources. Autonomous Agents and Multi-agent Systems, 4(1/2), 93-114.
- Rajaraman, A. & Ullman, J. D. (2001). Querying websites using compact skeletons. In Proceedings of the 20th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS), Santa Bar- bara, California, May 21-23, 2001. New York: ACM Press.
- Ribeiro-Neto, B. A., Laender, A. H. F., & Silva, A. S. D. (1999). Extracting semi-structured data through examples. Proceedings of the 1999 ACM International Conference on Information and Knowledge Manage- ment (CIKM) (pp. 94-101). New York: ACM Press.
- Sahuguet, A. & Azavant, F. (2001). Building intelligent web applications using lightweight wrappers. Data and Knowledge Engineering, 36(3), 283- 316.
- Seymore, K., McCallum, A., & Rosenfeld, R. (1999). Learning hidden Markov model structure for information extraction. AAAI'99 Work- shop on Machine Learning for Information Extraction.
- Soderland, S. (1997). Learning to extract text-based information from the world wide web. In Proceedings of Knowledge Discovery and Data Mining (pp. 251-254). REFERENCES
- Bassiliades, N. & Vlahavas, I. (1997). Processing production rules in DE- VICE, an active knowledge base system. Data and Knowledge Engi- neering, 24(2), 117-155.
- Bassiliades, N., Vlahavas, I., & Elmagarmid, A. K. (2000). E-DEVICE: An extensible active knowledge base system with multiple rule type support. IEEE Transactions on Knowledge and Data Engineering, 12(5), 824- 844.
- Bassiliades, N., Vlahavas, I., & Sampson, D. (2003a). Using logic for querying XML data. In D. Taniar & W. Rahayu (Eds.), Web-Powered Databases (pp. 1-35). Hershey, PA: Idea Group.
- Bassiliades, N., Vlahavas, I., Elmagarmid, A. K., & Houstis, E. N. (2003b). InterBase-KB: Integrating a knowledge base system with a multi-data- base system for data warehousing. IEEE Transactions on Knowledge and Data Engineering, 15(5), pp 1188-1205.
- Bellwood, T. et al. (2002). UDDI version 3.0. Retrieved May 15, 2003, from: http://uddi.org/pubs/uddi-v3.00-published-20020719.htm.
- Boag, S., Chamberlin, D., Fernandez, M. F., Florescu, D., Robie, J., & Simeon, J. (2002). XQuery 1.0: An XML query language. Retrieved May 15, 2003, from: http://www.w3.org/TR/xquery/.
- Botia, J. A., Gomez-Skarmeta, A. F., Velasco, J. R., & Garijo, M. (2001). A proposal for meta-learning through a MAS (multi-agent system). In T. Wagner & O. F. Rana (Eds.), Infrastructure for Agents (Vol. 1887 of LNAI, pp. 226-233).
- Box, D. et al. (2000). Simple Object Access Protocol (SOAP) version 1.1. Retrieved May 15, 2003, from: http://www.w3.org/TR/SOAP/.
- Brittenham, P. (2001). An overview of web services inspection language. Retrieved May 15, 2003, from: http://www.ibm.com/developerworks/ webservices/library/ws-wsilover.
- Champion, M., Ferris, C., Newcomer, E., & Orchard, D. (2003). Web services architecture. Retrieved May 15, 2003, from: http://www.w3.org/ TR/ws-arch/.
- Chinnici, R., Gudgin, M., Moreau, J., & Weerawarana, S. (2002). Web services description language (WSDL) version 1.2 working draft. Retrieved May 15, 2003, from: http://www.w3.org/TR/wsdll2/.
- Data Mining Group web site. (2002). Retrieved May 15, 2003, from: http:/ /www.dmg.org/.
- Diaz, O. & Jaime, A. (1997). EXACT: An extensible approach to active object-oriented databases. VLDB Journal, 6(4), 282-295.
- Gray, P. M. D., Kulkarni, K. G., & Paton, N. W. (1992). Object-oriented Databases: A Semantic Data Model Approach. New York: Prentice Hall.
- Huang, Y. S. & Suen, C. Y. (1995). A method for combining multiple experts for the recognition of unconstrained handwritten numericals. IEEE Trans- actions on Pattern Analysis and Machine Intelligence, 17, 90-93.
- Kaufmann, L. & Rousseeuw, P. J. (1990). Finding Groups in Data: An Introduction to Cluster Analysis. Hoboken, NJ: Wiley InterScience.
- Kittler, J., Hatef, M., Duin, R. P. W., & Matas, J. (1998). On combining classifiers. IEEE Transactions on Pattern Analysis and Machine Intelligence, 20(3), 226-238.
- Krzanowski, W. J. (1993). Principles of Multivariate Analysis: A User's Perspective. Oxford, UK: Oxford Science Publications.
- Kuncheva, L.I., Kounchev, R. K., & Zlatev, R. Z. (1995). Aggregation of multiple classification decisions by fuzzy templates. In Proceedings of the 3rd European Congress on Intelligent Technologies and Soft Com- puting (EUFIT'95) (pp. 1470-1474).
- Lam, L. & Suen, C. Y. (1995). Optimal combinations of pattern classifiers. Pattern Recognition Letters, 16, 945-954.
- Rogova, G. (1994). Combining the results of several neural network classifiers. Neural Networks, 7, 777-781.
- Saitta, L. (2000). Machine learning: A technological roadmap. Amsterdam: University of Amsterdam. (Technical Report)
- Shipp, C. A. & Kuncheva, L. I. (2002). Relationships between combination methods and measures of diversity in combining classifiers. Information Fusion, 3(2), 135-148.
- Stolfo, S. J., Prodromidis, A. L., Tselepis, S., Lee, W., & Fan, D. W. (1997). JAM: Java agents for meta-learning over distributed databases. In Pro- ceedings of the AAAI-97 Workshop on AI Methods in Fraud and Risk Management.
- Tahani, H. & Keller, J. M. (1990). Information fusion in computer vision using the fuzzy integral. IEEE Transaction on Systems, Man and Cybernet- ics, 20, 733-741.
- Tsoumakas, G. & Vlahavas, I. (2002). Effective stacking of distributed classifiers. In Proceedings of the 15th European Conference on Artificial Intelligence, (pp. 340-344).
- WebDisC web site. (2003). Retrieved May 15, 2003, from: http:// lpis.csd.auth.gr/systems/webdisc.html.
- Werges, S. C. & Naylor, D. L. (2002). Corba infrastructure for distributed learning and meta-learning. Knowledge-Based Systems, 15, 139-144.
- Wolpert, D. (1992). Stacked generalization. Neural Networks, 5, 241-259.
- Agrawal, R. & Srikant, R. (1995). Mining sequential patterns. In P. S. Yu & A. L. P. Chen (Eds.), Proceedings of the 11th International Confer- ence on Data Engineering (pp. 3-14). Taipei, Taiwan: IEEE Computer Society.
- Araujo, M. D., Navarro, G., & Ziviani, N. (1997). Large text searching allowing errors. In R. Baeza-Yates (Ed.), Proceedings of the 4th South American Workshop on String Processing, Valparaiso, Chile (pp. 2- 20). Quebec, Canada: Carleton University Press.
- Baeza-Yates, R. & Ribeiro-Neto, B. (1999). Modern Information Re- trieval. New York: Addison-Wesley.
- Bertino, E. & Kim, W. (1989). Indexing techniques for queries on nested objects. IEEE Transactions on Knowledge and Data Engineering, 1(2), 196-214.
- Bloom, B. H. (1970). Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 13(7), 422-426.
- Chan, C. Y. & Ioannidis, Y. E. (1998). Bitmap index design and evaluation. In L. M. Haas & A. Tiwary (Eds.), Proceedings of the 1998 ACM SIGMOD International Conference on Management of Data, Seattle, Washington (pp. 355-366). New York: ACM Press.
- Chen, M. S., Park, J. S., & Yu, P. S. (1998). Efficient data mining for path traversal patterns. IEEE Transactions on Knowledge and Data Engi- neering, 10(2), 209-221.
- Comer, D. (1979). The ubiquitous B-tree. ACM Computing Surveys, 11(2), 121-137.
- Cooley, R., Mobasher, B., & Srivastava, J. (1999). Data preparation for mining world wide web browsing patterns. Knowledge and Information Systems, 1(1), 5-32.
- Deppisch, U. (1986). S-tree: A dynamic balanced signature index for office retrieval. In Proceedings of the 9th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, Pisa, Italy (pp.77-87). New York: ACM Press.
- Faloutsos, C. & Christodoulakis, S. (1984). Signature files: An access method for documents and its analytical performance evaluation. ACM Transac- tions on Office Information Systems, 2(4), 267-288.
- Graefe, G. & Cole, R. L. (1995). Fast algorithms for universal quantification in large databases. ACM Transactions on Database Systems, 20(2), 187-236.
- Guttman, A. (1984). R-trees: A dynamic index structure for spatial searching. In B. Yormark (Ed.), SIGMOD'84, Proceedings of Annual Meeting, Boston, Massachusetts (pp. 47-57). New York: ACM Press.
- Hellerstein, J. M. & Pfeffer, A. (1994). The RD-tree: An index structure for sets. Madison, WI: University of Wisconsin at Madison. (Technical Report 1252)
- Helmer, S. (1997). Index structures for databases containing data items with set-valued attributes. Mannheim, Germany: Universität Mannheim. (Technical Report 2/97)
- Helmer, S. & Moerkotte, G. (1997). Evaluation of main memory join algo- rithms for joins with set comparison join predicates. In M. Jarke, M. J. Carey, K. R. Dittrich, Fr. H. Lochovsky, P. Loucopoulos, & M. A. Jeusfeld (Eds.), Proceedings of the 23rd International Conference on systems. In J. Eder, I. Rozman, & T. Welzer (Eds.), Advances in Databases and Information Systems, Proceedings of the 3rd East European Conference (ADBIS'99), Maribor, Slovenia, September 13- 16, 1999 (pp. 367-381). Berlin: Springer-Verlag.
- Pei, J., Han, J., Mortazavi-Asl, B., & Zhu, H. (2000). Mining access patterns efficiently from web logs. In T. Terano, H. Liu, & A. L. P. Chen (Eds.), Knowledge Discovery and Data Mining, Current Issues and New Applications, Proceedings of the 4th Pacific-Asia Conference (PAKDD 2000), Kyoto, Japan, April 18-20, 2000 (pp. 396-407). Berlin: Springer- Verlag.
- Spiliopoulou, M., & Faulstich, L. (1998). WUM -A tool for WWW ulitization analysis. In P. Atzeni, A. O. Mendelzon, & G. Mecca (Eds.), The World Wide Web and Databases, International Workshop (WebDB'98), Valencia, Spain, March 27-28, 1998, selected papers (pp. 184-203). Berlin: Springer-Verlag.
- Tousidou, E., Nanopoulos, A., & Manolopoulos, Y. (2000). Improved methods for signature tree construction. The Computer Journal, 43(4), 301-314.
- Zakrzewicz, M. (2001). Sequential index structure for content-based retrieval. In D. W.-L. Cheung, G. J. Williams, & Q. Li (Eds.), Knowledge Discovery and Data Mining -PAKDD 2001, Proceedings of the 5th Pacific-Asia Conference, Hong Kong, China, April 16-18, 2001 (pp. 306-311). Berlin: Springer-Verlag. REFERENCES
- Agrawal, R. & Shafer, J. C. (1996). Parallel mining of association rules. IEEE Transactions on Knowledge and Data Engineering, 8(6), 962-969.
- Agrawal, R. & Srikant, R. (1994). Fast algorithms for mining association rules in large databases. In Proceedings of the 20th International Confer- ence on Very Large Databases, Santiago, Chile (pp. 487-499).
- Agrawal, R., Imielinski, T.,& Swami, A. N. (1993, May). Mining association rules between sets of items in large databases. In Proceedings of the 1993 ACM SIGMOD international conference on management of data, Washington, DC (pp. 207-216).
- Buchner, A. G., Baumgarten, M., Anand, S. S., Mulvenna, M. D., & Hughes, J. G. (1999, August). Navigation pattern discovery from Internet data. In Workshop on Web Usage Analysis and User Profiling (WEBKDD- 99). Catledge, L. D. & Pitkow, J. E. (1995). Characterizing browsing strategies in the world wide web. Computer Networks and ISDN Systems, 27(6), 1065-1073.
- Chen, M.-S., Park, J. S., & Yu, P. S. Efficient data mining for path traversal patterns. (1998). IEEE Transactions on Knowledge and Data Engi- neering, 10(2), 209-221.
- Cohen, E., Krishnamurthy, B., & Rexford, J. (1998). Improving end-to-end performance of the web using server volumes and proxy filters. In SIGCOMM (pp. 241-253).
- Colet, E. (2002). Using data mining to detect fraud in auctions. DSStar.
- Cooley, R., Mobasher, B., & Srivastava, J. (1999). Data preparation for mining world wide web browsing patterns. Knowledge and Information Systems, 1(1), 5-32.
- Cooley, R., Tan, P.-N., & Srivastava, J. (1999, Aug.). WebSIFT: The web site information filter system. In Workshop on Web Usage Analysis and User Profiling (WEBKDD-99).
- Dokas, P., Ertoz, L., Kumar, V., Lazarevic, A., & Srivastava, J. (2002, November). Data mining for network intrusion detection. In Proceedings of the National Science Foundation Next Generation Data Mining Workshop, Baltimore, Maryland.
- Evfimievski, A., Srikant, R., Agrawal, R., & Gehrke, J. (2002, July). Privacy preserving mining of association rules. In Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Edmonton, Canada.
- Han, J., Pei, J., & Yin, Y. (2000). Mining frequent patterns without candidate generation. In Proceedings of the ACM SIGMOD Conference.
- Hjelm, J. (2001, June). Web characterization activity. Retrieved May 20, 2003, from: http://www.w3c.org/WCA.
- Kohavi, R. (2001). Mining e-commerce data: The good, the bad, the ugly. In Proceedings of the 2001 ACM SIGMOD International Conference on Management of Data, San Francisco, California.
- Lan, B., Bressan, S., & Ooi, B. C. (1999, Aug.). Making web servers pushier. In Workshop on Web Usage Analysis and User Profiling (WEBKDD- 99). Lee, W. & Stolfo, S. (1998). Data mining approaches for intrusion detection. In Proceedings of the 7th USENIX Security Symposium.
- Mannila, H., Toivonen, H., & Verkamo, A. I. (1995). Discovering frequent episodes in sequences. In Proceedings of the 1st International Confer- ence on Knowledge Discovery and Data Mining (KDD-95) (pp. 210- 215).
- Mannila, H., Toivonen, H., & Verkamo, A. I. (1997). Discovering frequent episodes in event sequences. Helsinki, Finland: University of Helsinki, Department of Computer Science. (Technical Report C-1997-15).
- Pandey, A., Srivastava, J. & Shekhar, S. (2001). A web intelligent prefetcher for dynamic pages using association rules -a summary of results. In Proceedings of the SIAM Workshop on Web Mining.
- Park, J. S., Chen, M.-S., & Yu, P. S. (1995, May). An effective hash-based algorithm for mining association rules. In M. J. Carey & D. A. Schneider (Eds.), Proceedings of the 1995 ACM SIGMOD International Con- ference on Management of Data, San Jose, California (pp. 175-186).
- Park, J. S., Chen, M.-S., & Yu, P. S. (1997). Using a hash-based method with transaction trimming for mining association rules. IEEE Transactions on Knowledge and Data Engineering, 9(5), 813-825.
- Pei, J., Han, J., Mortazavi-Asl, B., & Zhu, H. (2000, April). Mining access patterns efficiently from web logs. In Proceedings of the 2000 Pacific- Asia Conference on Knowledge Discovery and Data Mining (PAKDD- 00), Kyoto, Japan (p. 592).
- Perkowitz, M. & Etzioni, O. (1999). Adaptive web sites: Conceptual cluster mining. In Proceedings of the 16th International Joint Conference on Artificial Intelligence. Platform for Privacy Project (n.d.). Retrieved May 20, 2003, from: http:// www.w3c.org/P3P.
- Savasere, A., Omiecinski, E., & Navathe, S. B. (1995). An efficient algorithm for mining association rules in large databases. In Proceedings of the 21st International Conference on Very Large Databases, Zurich, Switzerland (pp. 432-444).
- Spiekermann, S., Grossklags, J., & Berendt, B. (2002). E-privacy in second generation e-commerce: Privacy preferences versus actual behavior. In Proceedings of the ACM Conference on Electronic Commerce, Tampa, Florida.
- Spiliopoulou, M. (2000). Web usage mining for web site evaluation. Commu- nications of the ACM, 43(8), 127-134.
- Spiliopoulou, M. & Faulstich, L. (1998). WUM: A web utilization miner. In Proceedings of the EDBT Workshop WebDB98. Valencia, Spain: Springer-Verlag.
- Srikant, R. & Agrawal, R. (1995). Mining generalized association rules. In Proceedings of the 21st International Conference on Very Large Databases, Zurich, Switzerland (pp. 407-419).
- Srikant, R. & Agrawal, R. (1996, March). Mining sequential patterns: Gener- alizations and performance improvements. In Proceedings of the 5th International Conference on Extending Database Technology, Avignon, France.
- Massey University's Turitea campus in Palmerston North (New Zealand). She teaches the theory, principles and practice of banking at both the undergraduate and post-graduate levels. Her research interests include the interaction between banks and customers, bank distribution channels, and internet bank- ing. Robert Meersman was awarded a PhD in Mathematics at the Free University of Brussels (VUB) (Belgium) in 1976. He was appointed full professor at VUB in 1995. Earlier positions include the University of Antwerp (UIA, 1975-1978)
- and Control Data Corp. (Data Management Lab, Brussels, Belgium, 1978- 1983). There, he worked on the definition of the NIAM (now ORM) method, as well as on languages (RIDL) and the first tools for this methodology. He has held chairs and founded the InfoLabs at University of Limburg (Belgium, 1983- 1986) and at the University of Tilburg (The Netherlands, 1986-1995). Profes- sor Meersman was a member and past chairman (1983-1992) of the IFIP WG2.6 on Database, past chairman of the IFIP TC 12 (Artificial Intelligence, 1987-1992), co-founder and current president of the International Foundation for Cooperative Information Systems (IFCIS, since 1994) and of the Distrib- uted Objects Applications Institute (DOA, since 2000). He founded the Systems Technology and Applications Research Laboratory (STAR Lab) at VUB in 1995, and has been the director of STARLab since. His current scientific interests include ontologies, database semantics, domain and data- base modeling, interoperability and use of databases in applications such as enterprise knowledge management and the semantic web.
- Mikolaj Morzy is a research assistant at the Institute of Computing Science at Poznan University of Technology, Poland. He received his MSc in Comput- ing Science in 1998. Currently, he is working on a PhD concerning the integration of data mining techniques with database systems. His research interests include database systems, data warehouses and data mining. Tadeusz Morzy received his MSc, PhD, and Polish Habilitation from Poznan University of Technology, Poland. He is professor of Computer Science at the Institute of Computing Science, Poznan University of Technology. He has held visiting positions at Loyola University, New Orleans, USA; Klagenfurt Univer- sity, Austria; University La Sapienza, Italy; and the Polish-Japanese Institute of Information Technology, Warsaw, Poland. He has authored and co-authored more than 70 papers on databases, data mining, and data warehousing. He is co-author of a book on Concurrency Control in Distributed Database