9. WAIM 2008:
Zhangjiajie,
China
The Ninth International Conference on Web-Age Information Management, WAIM 2008, July 20-22, 2008, Zhangjiajie, China.
IEEE 2008, ISBN 978-0-7695-3185-4
Search
- Yue Kou, Derong Shen, Ge Yu, Tiezheng Nie:
LG-ERM: An Entity-Level Ranking Mechanism for Deep Web Query.
1-8
- Yi Zhang, Yexin Wang, Lidong Bing, Yan Zhang:
Weighting Links Using Lexical and Positional Analysis in Web Ranking.
9-16
- Youngdae Kim, Seung-won Hwang:
Approximate Boolean + Ranking Query Answering Using Wavelets.
17-24
- Tsubasa Takahashi, Hiroyuki Kitagawa:
S-BITS : Social-Bookmarking Induced Topic Search.
25-30
- Xiaoming Song, Jianhua Feng, Guoliang Li, Qin Hong:
LCA-Based Keyword Search for Effectively Retrieving "Information Unit" from Web Pages.
31-36
Ontology and Semantic Web
- Qian Zhong, Juanzi Li, Jie Tang, Yi Li, Lizhu Zhou:
Path Similarity Based Directory Ontology Matching.
37-44
- Li Yu:
Using Ontology to Enhance Collaborative Recommendation Based on Community.
45-49
- Zhiqiang Gao, Wanying Zhu, Yuzhong Qu, Zhisheng Huang:
Analyzing Distribution and Evolution of Research Interests by Term Extraction and Ontology Learning.
50-55
- Aihua Bao, Li Yao, Weiming Zhang, Jinping Yuan:
Approach to the Formal Representation of OWL-S Ontology Maintenance Requirements.
56-61
- Gang Wu, Juanzi Li, Jianqiang Hu, Kehong Wang:
System II: A Native RDF Repository Based on the Hypergraph Representation for RDF Data Model.
62-69
Query Processing
- Le Liu, Jianhua Feng, Guoliang Li, Qian Qian, Jianhui Li:
Parallel Structural Join Algorithm on Shared-Memory Multi-Core Systems.
70-77
- Yongxuan Lai, Yilong Chen, Hong Chen:
In-Network Execution of External Join for Sensor Networks.
78-85
- Jieping Wang, Xiaoyong Du:
LOB: Bucket Based Index for Range Queries.
86-92
- Xiang Li, Zhou Da, Xiaofeng Meng:
A New Dynamic Hash Index for Flash-Based Storage.
93-98
- Shaojie Qiao, Changjie Tang, Jing Peng, Hongjun Li, Shengqiao Ni:
Efficient k-Closest-Pair Range-Queries in Spatial Databases.
99-104
XML and Index Structures
- Wenxin Liang, Haruo Yokota:
Exploiting Path Information for Syntax-Based XML Subtree Matching in RDBs.
105-112
- Bo Zhang, Zhihua Geng, Aoying Zhou:
SIMP: Efficient XML Structural Index for Multiple Query Processing.
113-118
- Yingjie Fan, Shuyun Wang, Chenghong Zhang, Haibing Ma, Yunfa Hu:
An Efficient Structural Index for Branching Path Queries.
119-126
- Xuhui Liu, Guoliang Li, Jianhua Feng, Lizhu Zhou:
Effective Indices for Efficient Approximate String Search and Similarity Join.
127-134
- Jinqing Zhu, Wei Wang, Xiaofeng Meng:
Efficient Processing of Complex Twig Pattern Matching.
135-140
Data Stream
- Hongya Wang, LihChyun Shu, Zhidong Qin, Xiaoqiang Liu, Jing Cong, Hui Song:
Exploiting Application Semantics in Monitoring Real-Time Data Streams.
141-148
- Huang Cheng, Li Jun, Michel de Rougemont:
Approximate Validity of XML Streaming Data.
149-156
- Li Tian, Peng Zou, Li Zhang, Aiping Li:
Cost-Efficient Processing of Continuous Extreme Queries over Distributed Data Streams.
157-164
- Yang Sun, Jiuyang Tang, Daquan Tang, Weidong Xiao:
Advanced Star Coordinates.
165-170
Web Services and Service Applications
- An Liu, Qing Li, Liusheng Huang, Mingjun Xiao, Hai Liu:
QoS-Aware Scheduling of Web Services.
171-178
- Hai Liu, Qing Li, Naijie Gu, An Liu:
Modeling and Reasoning about Semantic Web Services Contract Using Description Logic.
179-186
- Yu Gu, Yanfei Lv, Ge Yu, Jia Xu:
Modeling and Service Capability Evaluation for RFID Complex Event Processing.
187-194
- Jianrong Wang, Tianbiao Yu, Wanshan Wang, Ge Yu:
Research on Web-Based Multi-Agent System for Aeroengine Fault Diagnosis.
195-202
Classification
KNN and Top-N Queries
- Yang Lu, Bin Cui, Jiakui Zhao, Hua Lu, Jialie Shen:
Towards Efficient and Flexible KNN Query Processing in Real-Life Road Networks.
230-237
- Huan-Liang Sun, Chao Jiang, Jun-Ling Liu, Limei Sun:
Continuous Reverse Nearest Neighbor Queries on Moving Objects in Road Networks.
238-245
- Liang Zhu, Chunnian Liu, Yanchao Feng, Shenda Ji:
Evaluation of a Stream of Top-N Selection Queries in Relational Databases.
246-253
- Li Zhang, Li Tian, Peng Zou, Aiping Li:
A Cost-Efficient Method for Continuous Top-k Processing over Data Stream.
254-261
Information Retrieval
- Weijian Ni, Yalou Huang, Maoqiang Xie:
A Query Dependent Approach to Learning to Rank for Information Retrieval.
262-269
- Sangkyum Kim, Jaebum Kim, Younhee Ko, Seung-won Hwang, Jiawei Han:
PerRank: Personalized Rank Retrieval with Categorical and Numerical Attributes.
270-277
- Miao He, Michal Cutler, Kelvin Wu:
Categorizing Queries by Topic Directory.
278-284
- Jinjie Lin, Yubin Yang, Tong Lu, Jiabin Ruan, Wei Wei:
A New Performance Benchmark for Content-Based 3D Model Retrieval.
285-292
Social Networks and Community
- Yize Li, Jie Tang:
Expertise Search in a Time-Varying Social Network.
293-300
- Chen Lin, Haofeng Zhou, Zhenhua Huang, Wei Wang:
REC: A Novel Model to Rank Experts in Communities.
301-308
- Jing Zhang, Jie Tang, Bangyong Liang, Zi Yang, Sijie Wang, Jingjing Zuo, Juanzi Li:
Recommendation over a Heterogeneous Social Network.
309-316
- Eirini Giannakidou, Vassiliki A. Koutsonikola, Athena Vakali, Yiannis Kompatsiaris:
Co-Clustering Tags and Social Data Sources.
317-324
Privacy and Security
- Yu Liu, Dapeng Lv, Yang Ye, Jianhua Feng, Qin Hong:
Set-Expression Based Method for Effective Privacy Preservation.
325-332
- Zhihui Wang, Wei Wang, Baile Shi:
A New Approach for Detecting Anonymity of Patterns.
333-340
- Xiaojun Ye, Yawei Zhang, Ming Liu:
A Personalized (a, k)-Anonymity Model.
341-348
- Artem Chebotko, Seunghan Chang, Shiyong Lu, Farshad Fotouhi, Ping Yang:
Scientific Workflow Provenance Querying with Security Views.
349-356
Data Mining
- Feng Wang, Juanzi Li, Jie Tang, Jing Zhang, Kehong Wang:
Name Disambiguation Using Atomic Clusters.
357-364
- Qiang Wang, Yunming Ye, Joshua Zhexue Huang:
Fuzzy K-Means with Variable Weighting in High Dimensional Data Analysis.
365-372
- Kazuyo Narita, Hiroyuki Kitagawa:
Outlier Detection for Transaction Databases Using Association Rules.
373-380
- Zhemin Zhu, Chen Wang, Li Ma, Yue Pan, Zhiming Ding:
Scalable Community Discovery of Large Networks.
381-388
Invited Papers
Correlation Analysis and Security
- Bo Wang, Liang Su, Aiping Li, Peng Zou:
Finding Correlated Item Pairs through Efficient Pruning with a Given Threshold.
413-420
- Gouchol Pok, Keun Ho Ryu:
Co-Occurring Patterns of Amino Acid Physicochemical Properties in Proteins.
421-428
- Wei Cao, Xiongpai Qin, Shan Wang:
COCA: More Accurate Multidimensional Histograms out of More Accurate Correlations Detection.
429-434
- Chi Chen, Dengguo Feng, Min Zhang, De-sheng Zhang, He-qun Xian:
Research on Malicious Transaction Processing Method of Database System.
435-440
Distributed Systems and User Profile
- Li Tian, Peng Zou, Feng Wu, Aiping Li:
Research on Communication-Efficient Method for Distributed Threshold Monitoring.
441-448
- Junpei Kawamoto, Qiang Ma, Masatoshi Yoshikawa:
Reducing Data Decryption Cost by Broadcast Encryption and Account Assignment for Web Applications.
449-454
- Guangping Xu, Wenhui Ma, Gang Wang, Xiaoguang Liu, Jing Liu:
Churn Impact on Replicated Data Duration in Structured P2P Networks.
455-460
- Dingming Wu, Dongyan Zhao, Xue Zhang:
An Adaptive User Profile Based on Memory Model.
461-468
Demo Sessions
- Xinbiao Zhou, Gaoshan Miao, Hongyan Li, Xin Wei, Lv-an Tang:
PEDS-VM: A Variation Management Prototype for Pattern Evolving Data Streams.
469-470
- Jia Yu, Fanyu Kong, Rong Hao, Zhen Cheng:
A Publicly Verifiable Dynamic Sharing Protocol for Data Secure Storage.
471-472
- Bin Zhou, Hongyan Li, Lei Wang, Huaqiang Zhang, Meimei Li:
PASE: A Prototype for Ad-hoc Process-Aware Information System Declaratively Constructing Environment.
473-474
Workshop on Internet Security
- Tianning Zang, Xiao-chun Yun, Yongzheng Zhang:
A Survey of Alert Fusion Techniques for Security Incident.
475-481
- Dongbin Wang, Mingzeng Hu, Hui Zhi:
A Survey of Secure Routing in Ad Hoc Networks.
482-486
- Yuan Liang, Hai-Xin Duan:
An Admission Control Policy Based on Social Networks for P2P Systems.
487-492
- Jian-Wei Ye, Binxing Fang, Jin-Qiao Shi, Zhi-Gang Wu:
Protecting Mobile Codes Using the Decentralized Label Model.
493-500
- Jia Zhang, Yuntao Guan, Xiaoxin Jiang, Hai-Xin Duan, Jianping Wu:
AMCAS: An Automatic Malicious Code Analysis System.
501-507
- Zhang Shuzhuang, Fang Binxing, Luo Hao:
A Scalable Framework of Network Traffic Identification.
508-511
- Zhijian Yuan, Jiajia Miao, Yan Jia, Le Wang:
Counting Data Stream Based on Improved Counting Bloom Filter.
512-519
- Dai Lei, Xiaochun Yun, Xiao Jun:
Optimizing Traffic Classification Using Hybrid Feature Selection.
520-525
- Guangjun Wu, Xiao-chun Yun, Shupeng Wang:
Design and Implementation of Multi-Version Disk Backup Data Merging Algorithm.
526-531
- Wencong Cheng, Xishan Xu, Yan Jia, Peng Zou:
Network Dynamic Risk Assessment Based on the Threat Stream Analysis.
532-538
- Jianlong Tan, Yanbing Liu, Ping Liu:
Accelerating Multiple String Matching by Using Cache-Efficient Strategy.
539-545
- Hui Liu, Zhitang Li:
Methodology of Network Intrusion Detection System Penetration Testing.
546-551
- Tao Zhang, Chong Wu:
Network Security Analysis Based on Security Status Space.
552-557
- Wei-ling Chang, Xiao-chun Yun, Binxing Fang, Shupeng Wang, Shuhao Li:
A Quasi Word-Based Compression Method of English Text Using Byte-Oriented Coding Scheme.
558-563
First International Workshop on Self-Adaptive Information Management
Workshop on Information System Security for the Web Age
- Hong Zhu, Jie Shi, Yuanzhen Wang, Yucai Feng:
Controlling Information Leakage of Fine-Grained Access Model in DBMSs.
583-590
- Zhiwen Bai, Liming Wang, Jinglin Chen, Lin Xu, Jian Liu, Xiyang Liu:
DTAD: A Dynamic Taint Analysis Detector for Information Security.
591-597
- Ying Liang, Huiqiang Wang, Yonggang Pang:
A Kind of Formal Modelling for Network Security Situational Awareness Based on HMM.
598-605
- Wang Xiaoqing, Gu Tianyang, Guo Yong, Zheng Yanxing, Zong Jianjian:
An Efficient Algorithm of Role Mapping across Security Domains in Data-Sharing Environments.
606-611
- Qi Liu, Jiwu Jing, Yuewu Wang:
An Improved Method of Hybrid Worm Simulation.
612-618
- Shengli Liu, Wenbing Wang, Yuefei Zhu:
A New-Style Domain Integrating Management of Windows and UNIX.
619-624
- Wentao Zhao, Jianping Yin, Jun Long:
A Prediction Model of DoS Attack's Distribution Discrete Probability.
625-628
- Jie-Ying Chen, Yong-Jun Wang, Yi Xiao:
SOA-Based Service Recovery Framework.
629-635
- Guo-sheng Zhao, Huiqiang Wang, Jian Wang:
A Strategy Selection Model for Network Survivability Based on Fuzzy Matrix Game.
636-639
- Yulong Wang, Fangchun Yang, Qibo Sun:
Measuring Network Vulnerability Based on Pathology.
640-646
- Gang Zhao, Hua Chen, Dongxia Wang:
Data-Flow Based Analysis of Java Bytecode Vulnerability.
647-653
- Fengtao Xiao, Huaping Hu, Xin Chen, Bo Liu:
ASG Automated Signature Generation for Worm-Like P2P Traffic Patterns.
654-660
- Jun Ma, Jiang-chun Ren, Zhiying Wang, Yaokai Zhu:
Research of a Secure File System for Protection of Intellectual Property Right.
661-665
Copyright © Fri Mar 12 17:23:15 2010
by Michael Ley (ley@uni-trier.de)