default search action
WISM 2012: Chengdu, China
- Fu Lee Wang, Jingsheng Lei, Zhiguo Gong, Xiangfeng Luo:
Web Information Systems and Mining - International Conference, WISM 2012, Chengdu, China, October 26-28, 2012. Proceedings. Lecture Notes in Computer Science 7529, Springer 2012, ISBN 978-3-642-33468-9
Applications of Web Information Systems
- Jie Zhao, Fang Yu, Minfeng Tang, Wenliao Du, Jin Yuan:
Study on the Design of Automatic Cotton Bale Inspecting Management System. 1-8 - Bingjun Li, Weijun Liu:
The Smallest Randić Index for Trees. 9-14 - Jingchang Pan, Guangwen Wang:
Design of Meridian and Acupoints Compatibility Analysis System. 15-21 - Mingxue Liu:
Invariant Subspaces for Operators with Thick Spectra. 22-25 - Hua Wang, Jiatian Li, Haixia Pu, Rui Li, Yufeng He:
Voronoi Feature Selection Model Considering Variable-Scale Map's Balance and Legibility. 26-35 - Haiyong Wang, Geng Yang, Jian Xu, Zhengyu Chen, Zhen Yang:
A Code Dissemination Protocol of Low Energy Consumption. 36-43 - Chuanhui Wu, Xiangling Gao, Pinxian Gao:
Dynamic Spectrum Analysis of High-Speed Train Passenger Compartment Luggage Rack Noise. 44-50 - Yujun Zhu, Zhongwei Xu, Meng Mei:
Port-Based Composable Modeling and Simulation for Safety Critical System Testbed. 51-58 - Qiuxiang Tao, Wei Nai, Haiming Gao, Jiliang Tu:
Risk Assessment Method of Radio Block Center in Fuzzy Uncertain Environment. 59-66 - Bing Wu, Pingping Chen:
Learning Research in Knowledge Transfer. 67-72 - Yaxun Wang:
A Post-filtering Technique for Enhancing Acoustic Echo Cancelation System. 73-80 - Yuxia Wang, Yi Qu, Rui Lv:
Packet Dropping Schemes and Quality Evaluation for H.264 Videos at High Packet Loss Rates. 81-89 - Junli Li, Chengxi Chu, Gang Li, Yang Lou:
A Blocked Statistics Method Based on Directional Derivative. 90-97 - Jun Li, Yan Niu, Jingliang Chen:
Study on Cooperative Game Model of Talent Training through School-Enterprise Coalition. 98-104
Applications of Web Mining
- Chunming Yang:
Research on Internet Public Opinion Detection System Based on Domain Ontology. 105-110 - Rongqi Liu, Shifen Zhong:
A Security Analysis Model Based on Artificial Neural Network. 111-116 - Hongjiang Yue:
Social Network Analyses on Knowledge Diffusion of China's Management Science. 117-124 - Zhigang Wang, Chi-she Wang:
A Parallel Association-Rule Mining Algorithm. 125-129 - Xin Zhang, Guangnan Guo, Lu Bai, Yu Zhang, Hao Wang:
An Algorithm of Parallel Programming Design Based on Problem Domain Model. 130-135
E-government and E-commerce
- Xiaoyong Zhao, Yang Yang, Li-li Sun, Han Huang:
Metadata-Aware Small Files Storage Architecture on Hadoop. 136-143 - Yunbiao Gu, Jian Liu:
Research on the Isomorphism of the Electronic-Government and Electronic-Commerce in Support System. 144-149 - Wen-Xiang Li, Ya-Jie Ma:
On the Deployment of Wireless Sensor Networks with Regular Topology Patterns. 150-158 - Xibao Zhang:
An Empirical Study on the Relationship among Trust and the Risky and Non-Risky Components of E-Commerce. 159-166 - Ning Zhang, Haifeng Li:
Process Modeling and Reengineering in the Integration Stage of Electronic Government. 167-174 - Jinghuai She, Xiaotong Xing:
Development of Vertical Industrial B2B in China: Based on Cases Study. 175-182 - Jianyang Li, Xiaoping Liu:
Personalized Recommendation System on Massive Content Processing Using Improved MFNN. 183-190
Information Security
- Fei Wang, KeXing Yan, Min Feng:
A Speaker Recognition Based Approach for Identifying Voice Spammer. 191-198 - Jinshan Zhu, Jiankang Guo, Yueguang Ruan:
Security Access Authentication System for IPv4/IPv6 Dual-Stack Campus Network Based on IpoE. 199-205 - Wei Zhu, Geng Yang, Jian Xu, Xiao-ling Yang:
Information Encryption Based on Virtual Optical Imaging System and Chen's Chaos. 206-213 - Sendong Zhao, Wu Yang, Ding Wang, Wenzhen Qiu:
A New Scheme with Secure Cookie against SSLStrip Attack. 214-221 - Chunxiang Gu, Li Chen, Yonghui Zheng:
ID-Based Signatures from Lattices in the Random Oracle Model. 222-230 - Fugeng Zeng, Chunxiang Xu, Xiujie Zhang, Jian Liu:
Strongly Secure Attribute-Based Authenticated Key Exchange with Traceability. 231-238 - Feng Yuan, Shangwei Zhao, Haiwen Ou, Shengwei Xu:
A New Public Key Signature Scheme Based on Multivariate Polynomials. 239-245 - Ding Wang, Ying Mei, Chunguang Ma, Zhen-shan Cui:
Comments on an Advanced Dynamic ID-Based Authentication Scheme for Cloud Computing. 246-253 - Yongchun Cao, Yabin Shao, Zhengqi Cai:
Research on Security Management in Active Network Node Operating Systems. 254-263 - La Zhang, Qingzhong Li, Yuliang Shi, Lin Li, Wenxiao He:
An Integrity Verification Scheme for Multiple Replicas in Clouds. 264-274 - Nurbol Luktarhan, Xue Jia, Liang Hu, Nannan Xie:
Multi-stage Attack Detection Algorithm Based on Hidden Markov Model. 275-282 - Mo-han Zhang, Chen-Guang Yang, Ding Wang:
Security Analysis of a Secure and Practical Dynamic Identity-Based Remote User Authentication Scheme. 283-290 - Xiaole Li, Lianggang Nie, Jianrong Yin, Yuanlu Lu:
Formal Construction of Secure Information Transmission in Office Automation System. 291-298 - Jie Hou, Baolong Guo, Jinfu Wu:
A Novel CBCD Scheme Based on Local Features Category. 299-305 - Jingbo Yuan, Shunli Ding:
Research and Improvement on Association Rule Algorithm Based on FP-Growth. 306-313 - Ali A. Yassin, Hai Jin, Ayad Ibrahim, Deqing Zou:
Encrypted Remote User Authentication Scheme by Using Smart Card. 314-323
Intelligent Networked Systems
- Yuwei Wang, Kaichao Wu, Danhuai Guo, Wenting Xiang, Baoping Yan:
A Web Visualization System of Cyberinfrastructure Resources. 324-332 - Rong Wu, Ruchuan Wang, Chao Sha, Liyang Qian:
A Novel Clustering Mechanism Based on Image-Oriented Correlation Coefficient for Wireless Multimedia Sensor Networks. 333-341 - Xin Xu, Ping Zheng, Lingling Li, Haisheng Chen, Jianping Ye, Jun Wang:
Design of Underground Miner Positioning System Based on ZigBee Technology. 342-349
Management Information Systems
- Rong Tan, Junzhong Gu, Zhou Zhong, Peng Chen:
Metadata Management of Context Resources in Context-Aware Middleware System. 350-357 - Dingsheng Wan, Juan Tang, Dazheng Yu, Yufeng Yu, Xingzhong Guan:
Research on Scientific Data Sharing Platform of Hydrology and Water Resources Based on Service Composition. 358-365 - Yunbiao Gu:
Study on the Scheme of Tianjin Area E-commerce Platform Construction. 366-371 - Yufeng Yu, Yuelong Zhu, Jianxin Zhang, Jingjin Jiang:
Research on Chinese Hydrological Data Quality Management. 372-379 - Yun Gu, Weili Han, Li-Rong Zheng, Bo Jin:
Using IoT Technologies to Resolve the Food Safety Problem - An Analysis Based on Chinese Food Standards. 380-392 - Jian Dai, Shuanzhu Du:
Towards Better Cross-Cloud Data Integration: Using P2P and ETL Together. 393-401 - Guangpei Cong, Jinji Gao, Bing Hou, Guochen Wang:
Design of Intelligent Maintenance Decision-Making System for Fixed Equipment in Petrochemical Plants. 402-413 - Hongbo Mei, Guangdao Hu:
Dimensional Modeling for Landslide Monitoring Data Warehouse. 414-421 - Qiansheng Zhang, Xia Li, Yirong Huang:
A New Fuzzy Risk Evaluation Method for Uncertain Network Public Sentiment Emergency. 422-430 - Ben Wang, Xingshe Zhou, Gang Yang, Yunfeng Lou:
Service Lifecycle Management in Distributed JBI Environment. 431-438
Mobile Computing
- Xiaojun Zhang, Min Jiang, Changle Zhou, Yijiang Hao:
Graded BDI Models for Agent Architectures Based on Łukasiewicz Logic and Propositional Dynamic Logic. 439-450 - Zhenguo Yang, Farong Zhong, Jinfang Zhang:
A Polymorphic Type System with Progress for Binary Sessions. 451-461 - Bo Pang, Zhiyi Fang, Hongyu Sun, Ming Han, Xiaohui Nie:
Energy Model of SARA and Its Performance Analysis. 462-471
Semantic Web and Ontologies
- Huiying Li:
Data Profiling for Semantic Web Data. 472-479 - Zhaohua Sheng, Xin Wang, Hong Shi, Zhiyong Feng:
Checking and Handling Inconsistency of DBpedia. 480-488 - Hao-ming Wang, Ye Guo, Xibing Shi, Fan Yang:
Conceptual Representing of Documents and Query Expansion Based on Ontology. 489-496
Web Information Extraction
- Donglan Liu, Xinjun Wang, Zhongmin Yan, Qiuyan Li:
Robust Web Data Extraction: A Novel Approach Based on Minimum Cost Script Edit Model. 497-509 - Junping Zhan, Guang Zheng, Miao Jiang, Cheng Lu, Hongtao Guo, Aiping Lu:
Rule-Based Text Mining of Chinese Herbal Medicines with Patterns in Traditional Chinese Medicine for Chronic Obstructive Pulmonary Disease. 510-520 - Lina Liu, Jihong Shen, Hui Zhao:
Fault Forecast of Electronic Equipment Based on ε -SVR. 521-527 - Hui Wen, Peiguang Lin, Yaobin Hu:
Analysis and Design of Internet Monitoring System on Public Opinion Based on Cloud Computing and NLP. 528-535 - Bin Li, Haibo Kuang, Yingjie Zhang, Jiajun Chen, Xuri Tang:
Using Similes to Extract Basic Sentiments across Languages. 536-542 - Rui Yang, Zhan Bu, Zhengyou Xia:
Automatic Summarization for Chinese Text Using Affinity Propagation Clustering and Latent Semantic Analysis. 543-550 - Xunxun Chen, Wei Wang, Dapeng Man, Shichang Xuan:
A Webpage Deletion Algorithm Based on Hierarchical Filtering. 551-557 - Bing Wu, Pingping Chen:
Research in Keyword Extraction. 558-563 - Xiaoling Yang, Jing Yang, Chao Chen:
Tuple Refinement Method Based on Relationship Keyword Extension. 564-571
Web Intelligence
- Qingshan Li, Yingcheng Sun:
An Agent Based Intelligent Meta Search Engine. 572-579 - Jiansong Yu, Donglin Cao, Shaozi Li, Dazhen Lin:
A Novel Image Annotation Feedback Model Based on Internet-Search. 580-588 - Wei Li, Xiaochuan Wang, Rongwu Li, Guoxia Li, Weijuan Zhao, Wenjun Zhao, Peiyu Guo:
The Design and Application of an Ancient Porcelain Online Identification Analysis System. 589-594 - Rui Sun, Peng Jin, Wei Xiang:
A Self-adaptive Strategy for Web Crawler in In-Site Search. 595-602 - Lei Luo, Rong-bo Wang, Xiaoxi Huang, Zhi-qun Chen:
A Novel Shark-Search Algorithm for Theme Crawler. 603-609 - Zhijie Ban, Sansan Wang:
A Framework of Online Proxy-Based Web Prefetching. 610-620 - Hongjiang Yue:
Mapping the Intellectual Structure by Co-word: A Case of International Management Science. 621-628 - Yong Zhang, Zhao-Jun Liu, Yun-Fu Cheng:
Study on Multi-sensor Information Fusion Technology in the Dynamic Monitoring of Coal Mine Roof. 629-636 - Weili Xu, Shi Feng, Lin Wang, Daling Wang, Ge Yu:
Detecting Hot Topics in Chinese Microblog Streams Based on Frequent Patterns Mining. 637-644 - Ruqian Lu, Yu Huang, Kai Sun, Zhongxiang Chen, Yiwen Chen, Songmao Zhang:
KACTL: Knowware Based Automated Construction of a Treelike Library from Web Documents. 645-656
Web Interfaces and Applications
- Baohua Qiang, Long Shi, Chunming Wu, Qian He, Chao Shen:
Associating Labels and Elements of Deep Web Query Interface Based on DOM. 657-663 - Guoyong Zhao, Zhiyu Zhou:
Design and Implementation of the Online Shopping System. 664-670 - Hanbin Cui, Zhiyu Zhou:
System Development of Residence Property Management Based on WEB. 671-677
XML and Semi-structured Data
- Binge Cui, Jie Zhang:
An Intelligent Metadata Extraction Approach Based on Programming by Demonstration. 678-685 - Junxue Liang, Zhaowen Lin, Yan Ma:
OF-NEDL: An OpenFlow Networking Experiment Description Language Based on XML. 686-697 - Chen-Ying Wang, Xiao-Jun Wu, Jia Li, Yi Ge:
Structural Similarity Evaluation of XML Documents Based on Basic Statistics. 698-705 - Zhaohui Xu, Jie Qin, Fuliang Yan:
An XML Data Query Method Based on Structure-Encoded. 706-713
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.