default search action
9th WAIM 2008: Zhangjiajie, China
- The Ninth International Conference on Web-Age Information Management, WAIM 2008, July 20-22, 2008, Zhangjiajie, China. IEEE Computer Society 2008, ISBN 978-0-7695-3185-4
Search
- Yue Kou, Derong Shen, Ge Yu, Tiezheng Nie:
LG-ERM: An Entity-Level Ranking Mechanism for Deep Web Query. 1-8 - Yi Zhang, Yexin Wang, Lidong Bing, Yan Zhang:
Weighting Links Using Lexical and Positional Analysis in Web Ranking. 9-16 - Youngdae Kim, Seung-won Hwang:
Approximate Boolean + Ranking Query Answering Using Wavelets. 17-24 - Tsubasa Takahashi, Hiroyuki Kitagawa:
S-BITS : Social-Bookmarking Induced Topic Search. 25-30 - Xiaoming Song, Jianhua Feng, Guoliang Li, Qin Hong:
LCA-Based Keyword Search for Effectively Retrieving "Information Unit" from Web Pages. 31-36
Ontology and Semantic Web
- Qian Zhong, Juanzi Li, Jie Tang, Yi Li, Lizhu Zhou:
Path Similarity Based Directory Ontology Matching. 37-44 - Li Yu:
Using Ontology to Enhance Collaborative Recommendation Based on Community. 45-49 - Zhiqiang Gao, Wanying Zhu, Yuzhong Qu, Zhisheng Huang:
Analyzing Distribution and Evolution of Research Interests by Term Extraction and Ontology Learning. 50-55 - Aihua Bao, Li Yao, Wei Ming Zhang, Jinping Yuan:
Approach to the Formal Representation of OWL-S Ontology Maintenance Requirements. 56-61 - Gang Wu, Juanzi Li, Jianqiang Hu, Kehong Wang:
System II: A Native RDF Repository Based on the Hypergraph Representation for RDF Data Model. 62-69
Query Processing
- Le Liu, Jianhua Feng, Guoliang Li, Qian Qian, Jianhui Li:
Parallel Structural Join Algorithm on Shared-Memory Multi-Core Systems. 70-77 - Yongxuan Lai, Yilong Chen, Hong Chen:
In-Network Execution of External Join for Sensor Networks. 78-85 - Jieping Wang, Xiaoyong Du:
LOB: Bucket Based Index for Range Queries. 86-92 - Xiang Li, Da Zhou, Xiaofeng Meng:
A New Dynamic Hash Index for Flash-Based Storage. 93-98 - Shaojie Qiao, Changjie Tang, Jing Peng, Hongjun Li, Shengqiao Ni:
Efficient k-Closest-Pair Range-Queries in Spatial Databases. 99-104
XML and Index Structures
- Wenxin Liang, Haruo Yokota:
Exploiting Path Information for Syntax-Based XML Subtree Matching in RDBs. 105-112 - Bo Zhang, Zhihua Geng, Aoying Zhou:
SIMP: Efficient XML Structural Index for Multiple Query Processing. 113-118 - Yingjie Fan, Shuyun Wang, Chenghong Zhang, Haibing Ma, Yunfa Hu:
An Efficient Structural Index for Branching Path Queries. 119-126 - Xuhui Liu, Guoliang Li, Jianhua Feng, Lizhu Zhou:
Effective Indices for Efficient Approximate String Search and Similarity Join. 127-134 - Jinqing Zhu, Wei Wang, Xiaofeng Meng:
Efficient Processing of Complex Twig Pattern Matching. 135-140
Data Stream
- Hongya Wang, LihChyun Shu, Zhidong Qin, Xiaoqiang Liu, Jing Cong, Hui Song:
Exploiting Application Semantics in Monitoring Real-Time Data Streams. 141-148 - Huang Cheng, Li Jun, Michel de Rougemont:
Approximate Validity of XML Streaming Data. 149-156 - Li Tian, Peng Zou, Li Zhang, Aiping Li:
Cost-Efficient Processing of Continuous Extreme Queries over Distributed Data Streams. 157-164 - Yang Sun, Jiuyang Tang, Daquan Tang, Weidong Xiao:
Advanced Star Coordinates. 165-170
Web Services and Service Applications
- An Liu, Qing Li, Liusheng Huang, Mingjun Xiao, Hai Liu:
QoS-Aware Scheduling of Web Services. 171-178 - Hai Liu, Qing Li, Naijie Gu, An Liu:
Modeling and Reasoning about Semantic Web Services Contract Using Description Logic. 179-186 - Yu Gu, Yanfei Lv, Ge Yu, Jia Xu:
Modeling and Service Capability Evaluation for RFID Complex Event Processing. 187-194 - Jianrong Wang, Tianbiao Yu, Wanshan Wang, Ge Yu:
Research on Web-Based Multi-Agent System for Aeroengine Fault Diagnosis. 195-202
Classification
- Kishore Varma Indukuri, Pranav Prabhakar Mirajkar, Ashish Sureka:
An Algorithm for Classifying Articles and Patent Documents Using Link Structure. 203-210 - Jingbo Yu, Na Ye:
Automatic Web Query Classification Using Large Unlabeled Web Pages. 211-215 - Hang Guo, Lizhu Zhou, Ling Feng:
Self-Switching Classification Framework for Titled Documents. 216-223 - Tiezheng Nie, Derong Shen, Ge Yu, Yue Kou:
Subject-Oriented Classification Based on Scale Probing in the Deep Web. 224-229
KNN and Top-N Queries
- Yang Lu, Bin Cui, Jiakui Zhao, Hua Lu, Jialie Shen:
Towards Efficient and Flexible KNN Query Processing in Real-Life Road Networks. 230-237 - Huan-Liang Sun, Chao Jiang, Jun-Ling Liu, Limei Sun:
Continuous Reverse Nearest Neighbor Queries on Moving Objects in Road Networks. 238-245 - Liang Zhu, Chunnian Liu, Yanchao Feng, Shenda Ji:
Evaluation of a Stream of Top-N Selection Queries in Relational Databases. 246-253 - Li Zhang, Li Tian, Peng Zou, Aiping Li:
A Cost-Efficient Method for Continuous Top-k Processing over Data Stream. 254-261
Information Retrieval
- Weijian Ni, Yalou Huang, Maoqiang Xie:
A Query Dependent Approach to Learning to Rank for Information Retrieval. 262-269 - Sangkyum Kim, Jaebum Kim, Younhee Ko, Seung-won Hwang, Jiawei Han:
PerRank: Personalized Rank Retrieval with Categorical and Numerical Attributes. 270-277 - Miao He, Michal Cutler, Kelvin Wu:
Categorizing Queries by Topic Directory. 278-284 - Jinjie Lin, Yubin Yang, Tong Lu, Jiabin Ruan, Wei Wei:
A New Performance Benchmark for Content-Based 3D Model Retrieval. 285-292
Social Networks and Community
- Yize Li, Jie Tang:
Expertise Search in a Time-Varying Social Network. 293-300 - Chen Lin, Haofeng Zhou, Zhenhua Huang, Wei Wang:
REC: A Novel Model to Rank Experts in Communities. 301-308 - Jing Zhang, Jie Tang, Bangyong Liang, Zi Yang, Sijie Wang, Jingjing Zuo, Juanzi Li:
Recommendation over a Heterogeneous Social Network. 309-316 - Eirini Giannakidou, Vassiliki A. Koutsonikola, Athena Vakali, Yiannis Kompatsiaris:
Co-Clustering Tags and Social Data Sources. 317-324
Privacy and Security
- Yu Liu, Dapeng Lv, Yang Ye, Jianhua Feng, Qin Hong:
Set-Expression Based Method for Effective Privacy Preservation. 325-332 - Zhihui Wang, Wei Wang, Baile Shi:
A New Approach for Detecting Anonymity of Patterns. 333-340 - Xiaojun Ye, Yawei Zhang, Ming Liu:
A Personalized (a, k)-Anonymity Model. 341-348 - Artem Chebotko, Seunghan Chang, Shiyong Lu, Farshad Fotouhi, Ping Yang:
Scientific Workflow Provenance Querying with Security Views. 349-356
Data Mining
- Feng Wang, Juanzi Li, Jie Tang, Jing Zhang, Kehong Wang:
Name Disambiguation Using Atomic Clusters. 357-364 - Qiang Wang, Yunming Ye, Joshua Zhexue Huang:
Fuzzy K-Means with Variable Weighting in High Dimensional Data Analysis. 365-372 - Kazuyo Narita, Hiroyuki Kitagawa:
Outlier Detection for Transaction Databases Using Association Rules. 373-380 - Zhemin Zhu, Chen Wang, Li Ma, Yue Pan, Zhiming Ding:
Scalable Community Discovery of Large Networks. 381-388
Invited Papers
- Kathleen Tsoukalas, Bin Zhou, Jian Pei, Davor Cubranic:
PLEDS: A Personalized Entity Detection System Based on Web Log Mining Techniques. 389-396 - Deepak Rajan, Philip S. Yu:
Temperature-Aware Scheduling: When is System-Throttling Good Enough? 397-404 - Wenjie Zhang, Xuemin Lin, Jian Pei, Ying Zhang:
Managing Uncertain Data: Probabilistic Approaches. 405-412
Correlation Analysis and Security
- Bo Wang, Liang Su, Aiping Li, Peng Zou:
Finding Correlated Item Pairs through Efficient Pruning with a Given Threshold. 413-420 - Gouchol Pok, Keun Ho Ryu:
Co-Occurring Patterns of Amino Acid Physicochemical Properties in Proteins. 421-428 - Wei Cao, Xiongpai Qin, Shan Wang:
COCA: More Accurate Multidimensional Histograms out of More Accurate Correlations Detection. 429-434 - Chi Chen, Dengguo Feng, Min Zhang, De-Sheng Zhang, He-qun Xian:
Research on Malicious Transaction Processing Method of Database System. 435-440
Distributed Systems and User Profile
- Li Tian, Peng Zou, Feng Wu, Aiping Li:
Research on Communication-Efficient Method for Distributed Threshold Monitoring. 441-448 - Junpei Kawamoto, Qiang Ma, Masatoshi Yoshikawa:
Reducing Data Decryption Cost by Broadcast Encryption and Account Assignment for Web Applications. 449-454 - Guangping Xu, Wenhui Ma, Gang Wang, Xiaoguang Liu, Jing Liu:
Churn Impact on Replicated Data Duration in Structured P2P Networks. 455-460 - Dingming Wu, Dongyan Zhao, Xue Zhang:
An Adaptive User Profile Based on Memory Model. 461-468
Demo Sessions
- Xinbiao Zhou, Gaoshan Miao, Hongyan Li, Xin Wei, Lv-an Tang:
PEDS-VM: A Variation Management Prototype for Pattern Evolving Data Streams. 469-470 - Jia Yu, Fanyu Kong, Rong Hao, Zhen Cheng:
A Publicly Verifiable Dynamic Sharing Protocol for Data Secure Storage. 471-472 - Bin Zhou, Hongyan Li, Lei Wang, Huaqiang Zhang, Meimei Li:
PASE: A Prototype for Ad-hoc Process-Aware Information System Declaratively Constructing Environment. 473-474
Workshop on Internet Security
- Tianning Zang, Xiao-chun Yun, Yongzheng Zhang:
A Survey of Alert Fusion Techniques for Security Incident. 475-481 - Dongbin Wang, Mingzeng Hu, Hui Zhi:
A Survey of Secure Routing in Ad Hoc Networks. 482-486 - Yuan Liang, Hai-Xin Duan:
An Admission Control Policy Based on Social Networks for P2P Systems. 487-492 - Jian-Wei Ye, Binxing Fang, Jinqiao Shi, Zhi-Gang Wu:
Protecting Mobile Codes Using the Decentralized Label Model. 493-500 - Jia Zhang, Yuntao Guan, Xiaoxin Jiang, Hai-Xin Duan, Jianping Wu:
AMCAS: An Automatic Malicious Code Analysis System. 501-507 - Shuzhuang Zhang, Binxing Fang, Hao Luo:
A Scalable Framework of Network Traffic Identification. 508-511 - Zhijian Yuan, Jiajia Miao, Yan Jia, Le Wang:
Counting Data Stream Based on Improved Counting Bloom Filter. 512-519 - Dai Lei, Xiaochun Yun, Xiao Jun:
Optimizing Traffic Classification Using Hybrid Feature Selection. 520-525 - Guangjun Wu, Xiao-chun Yun, Shupeng Wang:
Design and Implementation of Multi-Version Disk Backup Data Merging Algorithm. 526-531 - Wencong Cheng, Xishan Xu, Yan Jia, Peng Zou:
Network Dynamic Risk Assessment Based on the Threat Stream Analysis. 532-538 - Jianlong Tan, Yanbing Liu, Ping Liu:
Accelerating Multiple String Matching by Using Cache-Efficient Strategy. 539-545 - Hui Liu, Zhitang Li:
Methodology of Network Intrusion Detection System Penetration Testing. 546-551 - Tao Zhang, Chong Wu:
Network Security Analysis Based on Security Status Space. 552-557 - Wei-ling Chang, Xiao-chun Yun, Binxing Fang, Shupeng Wang, Shuhao Li:
A Quasi Word-Based Compression Method of English Text Using Byte-Oriented Coding Scheme. 558-563
First International Workshop on Self-Adaptive Information Management
- Xiaolei Guo, Zhiguang Shan, Cong Wang:
Research on Web QoS Control Strategy Based on User Behaviour. 564-568 - Jian-quan Ouyang, Bo Ding, Huaimin Wang, Dian-xi Shi:
Component Based Context Model. 569-574 - Yadan Deng, Ning Jing, Wei Xiong:
A New Database Adaptive Buffer Replacement Algorithm Based on Call Graph Optimization. 575-582
Workshop on Information System Security for the Web Age
- Hong Zhu, Jie Shi, Yuanzhen Wang, Yucai Feng:
Controlling Information Leakage of Fine-Grained Access Model in DBMSs. 583-590 - Zhiwen Bai, Liming Wang, Jinglin Chen, Lin Xu, Jian Liu, Xiyang Liu:
DTAD: A Dynamic Taint Analysis Detector for Information Security. 591-597 - Ying Liang, Huiqiang Wang, Yonggang Pang:
A Kind of Formal Modelling for Network Security Situational Awareness Based on HMM. 598-605 - Wang Xiaoqing, Gu Tianyang, Guo Yong, Zheng Yanxing, Zong Jianjian:
An Efficient Algorithm of Role Mapping across Security Domains in Data-Sharing Environments. 606-611 - Qi Liu, Jiwu Jing, Yuewu Wang:
An Improved Method of Hybrid Worm Simulation. 612-618 - Shengli Liu, Wenbing Wang, Yuefei Zhu:
A New-Style Domain Integrating Management of Windows and UNIX. 619-624 - Wentao Zhao, Jianping Yin, Jun Long:
A Prediction Model of DoS Attack's Distribution Discrete Probability. 625-628 - Jie-Ying Chen, Yong-Jun Wang, Yi Xiao:
SOA-Based Service Recovery Framework. 629-635 - Guosheng Zhao, Huiqiang Wang, Jian Wang:
A Strategy Selection Model for Network Survivability Based on Fuzzy Matrix Game. 636-639 - Yulong Wang, Fangchun Yang, Qibo Sun:
Measuring Network Vulnerability Based on Pathology. 640-646 - Gang Zhao, Hua Chen, Dongxia Wang:
Data-Flow Based Analysis of Java Bytecode Vulnerability. 647-653 - Fengtao Xiao, Huaping Hu, Xin Chen, Bo Liu:
ASG Automated Signature Generation for Worm-Like P2P Traffic Patterns. 654-660 - Jun Ma, Jiangchun Ren, Zhiying Wang, Yaokai Zhu:
Research of a Secure File System for Protection of Intellectual Property Right. 661-665
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.