Limit search to available items
Book Cover
E-book
Author WISM (Conference) (2011 : Taiyuan Shi, China)

Title Web information systems and mining : international conference, WISM 2011, Taiyuan, China, September 24-25, 2011, proceedings. Part I / Zhiguo Gong [and others] (eds.)
Published Berlin ; New York : Springer, ©2011

Copies

Description 1 online resource (xxi, 450 pages)
Series Lecture notes in computer science, 0302-9743 ; 6987
LNCS sublibrary. SL 3, Information systems and application, incl. Internet/Web and HCI
Lecture notes in computer science ; 6987.
LNCS sublibrary. SL 3, Information systems and applications, incl. Internet/Web, and HCI.
Contents Machine generated contents note: Applications of Web Information Systems -- Research on Electromagnetic Wave Through-The-Earth Wireless Communication for Coal Mine Disaster / Jinyi Tao -- Investigation of WEB Software System Based on Domain-Driven Design / Yuan Ding -- MediaCRM: Enabling Customer Relationship Management in the Broadcast / Rik Van de Walle -- Jordan Triple Multiplicative Maps on the Symmetric Matrices / Yuying Li -- International Collaborations in Brain-Computer Interface (BCI) Research / Brahim Hamadicharef -- Classification of Cluster Validity Indexes Based on Membership Degree and Applications / Kuo Zhao -- Several Methods of Calculating the Distribution of Linear Combinations of Two-Dimensional Random Variables / Haifeng Zhang -- Propagation in LHM Slab Loaded Rectangular Waveguide / Rui-lian Li -- Study of Images Emotion Based on fMRI / Hongxia Deng -- Communication Protocol Design of Electro-Hydraulic Control System for Hydraulic Supports at Coal Mine / Zisheng Lian -- Temperature Characteristics and Compensation Method of Capacitive Ice Layer Thickness Sensor / Chang Xiaomin -- False Alarm Probability of the Digital Channelized Receiver Based CA-CFAR Detector / Ting Cheng -- Strong Solution of Initial-Boundary Value Problem for a Class of Nonlinear Thermoelastic Couple Beam Equations / Jian-Wen Zhang -- Initial-Boundary Value Problem for Viscoelastic Rectangular Plate Equation / Yinzhu Wang -- Invariant Subspace Theorem for Sequentially Subdecomposable Operators / Mingxue Liu -- Genetic Algorithm in the Test Paper Generation / Qing-Zhen Xu -- Applications of Web Mining -- CDMA Mobile Internet User Behavior Analysis Based on RP Interface / Zhenming Lei -- Personalizing Group Recommendation to Social Network Users / Behrouz Minaei-Bidgoli -- Novel Frequent Trajectory Mining Method Based on GSP / Jing Zhang
Note continued: Study of a Fuzzy Clustering Algorithm Based on Interval Value / Hai Zhou Du -- Influence of the Fourth-Order Dispersion Coefficient for the Information Transmission in Fiber / Shao Kai -- Distributed Systems -- Research of Resource Scheduling Strategy with SLA Restriction for Cloud Computing Based on Pareto Optimality MxN Production Model / Hao Li -- Distributed Processing Method for Design Patent Retrieval System / Qing-Yun Dai -- Adaptive Distribution Model for Multi-dimensional Data in Decentralized Environments / Lizhen Cui -- Research on SOA Business Process Disaster Tolerance Recovery Method / Pengyu Guo -- Admission Control for WebServices in Enterprise Systems Using Expert Systems / Jaber Karimpour -- Improved Lookup Algorithm on Over-DHT Paradigm Based P2P Network / Gang Tian -- Maximizing the Lifetime of Daley-Tolerant Wireless Sensor Networks Using Fuzzy System / Farzad Tashtarian -- e-Government and e-Commerce -- Structural Equation Modeling for Evaluating the Public Value of Service Delivery through e-Government: A Case Study from Sri Lanka / Anuradha Karunasena -- W-entropy Index: The Impact of the Members on Social Networks / Daniel Lezhi Li -- Improving Security of SET Protocol Based on ECC / Lai-Cheng Cao -- Geographic Information Systems -- Constrained Computing and Application for Intelligent Generalization of Settlements / Jin Zhang -- Integrating Landsat TM Imagery and See5 Decision-Tree Software for Identifying Croplands: A Case Study in Shunyi District, Beijing / Wenjiang Huang -- Information Security -- Authenticated Key Exchange to Improve the Security of Shi et al. and Kim et al.'s Protocols / Dongho Won -- Fast and Tolerant Voting Mechanism in Wireless Sensor Networks / Yong-hong Shi -- Strategy of Proactive-Reactive Intrusion Tolerance Recovery Based on Hierarchical Model / Fei-fei Wang
Note continued: Network-Flow-Based Method for Embedding Rectification / Zhiwei He -- Approach of Authentication Base on Modified Digital Identity Metasystem in Service-Oriented Architecture / Fangfang Tang -- Defense against DNS Man-In-The-Middle Spoofing / Kuo Zhao -- Defensive Steganography: A Novel Way against Steganalysis / Zhiwei He -- New Privacy-Preserving Scheme DOSPA for SaaS / Kun Zhang -- Performance Evaluation of Digital Audio Watermarking Algorithm under Low Bits Rates / Delong Cui -- Anti-collusion Trust Model in P2P Networks / Haiping Huang -- Alerts Correlation Technology for Large-Scale Network Intrusion Detection / Shunli Ding -- Dynamic Authorization of Grid Based on Trust Mechanism / Gao-feng Sun -- Timestamp Based Authentication Protocol for Smart Card Using ECC / Daya Gupta -- Data Privacy Preservation during Schema Evolution for Multi-tenancy Applications in Cloud Computing / Yuliang Shi -- ̂ Simple (v, t, n)-Fairness Secret Sharing Scheme with One Shadow for Each Participant / Yung-Cheng Lee -- Encrypted Data-Transportation Method for Distributed System / Yuehong Sun -- Study on Grid Access Control Strategy Based on Trust and Security Grade / Yihe Liu -- Intelligent Networked Systems -- Self-adaptive QoS Control Mechanism in Cognitive Networks Based on Intelligent Service Awareness / Shunyi Zhang -- Robustness Promotion of High Speed Network Content Auditing Integrated System Based on Machine Learning Method / Kun Zhang -- Diagnosis Method of Combing Feature Extraction Based on Time-Frequency Analysis and Intelligent Classifier / Shibo Xiong -- Performance Analysis of Sleep-Mode with Uplink/Downlink Traffics in IEEE 802.16m / Xiaoke Liu -- LMI Conditions for Stability of Impulsive Stochastic Neural Networks with Unbounded Time-Varying Delays / Dianwu Yang -- ̂ Queuing System M/M/1/T with Priority Dropping Packets Mechanism Based on Living Time / Henyang Zhang
Summary The two-volume set LNCS 6987 and LNCS 6988 constitutes the refereed proceedings of the International Conference on Web Information Systems and Mining, WISM 2011, held in Taiyuan, China, in September 2011. The 112 revised full papers presented were carefully reviewed and selected from 472 submissions. The first volume includes 56 papers organized in the following topical sections: applications on Web information systems; applications of Web mining; distributed systems; e-government and e-commerce; geographic information systems; information security; and intelligent networked systems
Analysis Computer science
Software engineering
Database management
Data mining
Information storage and retrieval systems
Information Storage and Retrieval
Data Mining and Knowledge Discovery
Multimedia Information Systems
Notes International conference proceedings
Bibliography Includes bibliographical references and author index
Subject Semantic Web -- Congresses
Web services -- Congresses
Data mining -- Congresses
World Wide Web -- Congresses
Data mining
Semantic Web
Web services
World Wide Web
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Gong, Zhiguo
ISBN 9783642239717
3642239714