default search action
WISM 2011: Taiyuan, China
- Zhiguo Gong, Xiangfeng Luo, Junjie Chen, Jingsheng Lei, Fu Lee Wang:
Web Information Systems and Mining - International Conference, WISM 2011, Taiyuan, China, September 24-25, 2011, Proceedings, Part I. Lecture Notes in Computer Science 6987, Springer 2011, ISBN 978-3-642-23970-0
Applications of Web Information Systems
- Jinyi Tao:
Research on Electromagnetic Wave Through-The-Earth Wireless Communication for Coal Mine Disaster. 1-10 - Fei Wang, Lihua Yan, Peng Zhou, Wei Sun, Yuan Ding:
The Investigation of WEB Software System Based on Domain-Driven Design. 11-18 - Robbie De Sutter, Mike Matton, Niels Laukens, Dieter Van Rijsselbergen, Rik Van de Walle:
MediaCRM: Enabling Customer Relationship Management in the Broadcast. 19-26 - Haifeng Zhang, Yuying Li:
Jordan Triple Multiplicative Maps on the Symmetric Matrices. 27-34 - Brahim Hamadicharef:
International Collaborations in Brain-Computer Interface (BCI) Research. 35-42 - Nannan Xie, Liang Hu, Nurbol Luktarhan, Kuo Zhao:
A Classification of Cluster Validity Indexes Based on Membership Degree and Applications. 43-50 - Yuying Li, Haifeng Zhang:
Several Methods of Calculating the Distribution of Linear Combinations of Two-Dimensional Random Variables. 51-58 - Rui-lian Li:
Propagation in LHM Slab Loaded Rectangular Waveguide. 59-65 - Xiaoyan Qiao, Haifang Li, Jie Xiang, Hongxia Deng:
The Study of Images Emotion Based on fMRI. 66-72 - Jingguo Wen, Zisheng Lian:
The Communication Protocol Design of Electro-Hydraulic Control System for Hydraulic Supports at Coal Mine. 73-78 - Yinke Dou, Xiaomin Cheng:
Temperature Characteristics and Compensation Method of Capacitive Ice Layer Thickness Sensor. 79-85 - Miao He, Kexin Jia, Ting Cheng:
False Alarm Probability of the Digital Channelized Receiver Based CA-CFAR Detector. 86-91 - Cai-xian Wang, Jian-Wen Zhang:
Strong Solution of Initial-Boundary Value Problem for a Class of Nonlinear Thermoelastic Couple Beam Equations. 92-97 - Dongbao Wang, Yinzhu Wang:
Initial-Boundary Value Problem for Viscoelastic Rectangular Plate Equation. 98-103 - Mingxue Liu:
An Invariant Subspace Theorem for Sequentially Subdecomposable Operators. 104-108 - Jian-Jun Hu, Yue-Hong Sun, Qingzhen Xu:
The Genetic Algorithm in the Test Paper Generation. 109-113
Applications of Web Mining
- Kai Yu, Dazhong He, Yinan Dou, Zhenming Lei:
CDMA Mobile Internet User Behavior Analysis Based on RP Interface. 114-123 - Leila Esmaeili, Mahdi Nasiri, Behrouz Minaei-Bidgoli:
Personalizing Group Recommendation to Social Network Users. 124-133 - Junhuai Li, Jinqin Wang, Lei Yu, Jing Zhang:
A Novel Frequent Trajectory Mining Method Based on GSP. 134-140 - Haizhou Du:
Study of a Fuzzy Clustering Algorithm Based on Interval Value. 141-147 - Jiang Xingfang, Shao Kai:
The Influence of the Fourth-Order Dispersion Coefficient for the Information Transmission in Fiber. 148-154
Distributed Systems
- Huixi Li, Hao Li:
A Research of Resource Scheduling Strategy with SLA Restriction for Cloud Computing Based on Pareto Optimality M×N Production Model. 155-165 - Jiang-Zhong Cao, Jian-Wei Zhu, Xian-Wei Wang, Qingyun Dai:
A Distributed Processing Method for Design Patent Retrieval System. 166-174 - Wei He, Li-zhen Cui:
An Adaptive Distribution Model for Multi-dimensional Data in Decentralized Environments. 175-183 - Xinfeng Zhang, Junfeng Sun, Pengyu Guo:
Research on SOA Business Process Disaster Tolerance Recovery Method. 184-191 - Arash Jodeiri Salimi, Ayaz Isazadeh, Jaber Karimpour:
Admission Control for WebServices in Enterprise Systems Using Expert Systems. 192-199 - Youming Fu, Ruimin Hu, Jun Chen, Zhongyuan Wang, Gang Tian:
An Improved Lookup Algorithm on Over-DHT Paradigm Based P2P Network. 200-207 - Vahide Rafati Porshokooh, Abolfazl Toroghi Haghighat, Farzad Tashtarian:
Maximizing the Lifetime of Daley-Tolerant Wireless Sensor Networks Using Fuzzy System. 208-215
e-Government and e-Commerce
- Kanishka Karunasena, Hepu Deng, Anuradha Karunasena:
Structural Equation Modeling for Evaluating the Public Value of Service Delivery through e-Government: A Case Study from Sri Lanka. 216-225 - Weigang Li, Jianya Zheng, Daniel LeZhi Li:
W-entropy Index: The Impact of the Members on Social Networks. 226-233 - Lai-Cheng Cao:
Improving Security of SET Protocol Based on ECC. 234-241
Geographic Information Systems
- Li Wang, Jin Zhang:
The Constrained Computing and Application for Intelligent Generalization of Settlements. 242-250 - Jinling Zhao, Dongyan Zhang, Dacheng Wang, Wenjiang Huang:
Integrating Landsat TM Imagery and See5 Decision-Tree Software for Identifying Croplands: A Case Study in Shunyi District, Beijing. 251-258
Information Security
- Mijin Kim, Changyoung Kwon, Dongho Won:
An Authenticated Key Exchange to Improve the Security of Shi et al. and Kim et al.'s Protocols. 259-270 - Jian-Hua Huang, Yong-Hong Shi:
A Fast and Tolerant Voting Mechanism in Wireless Sensor Networks. 271-282 - Jian-Hua Huang, Fei-Fei Wang:
The Strategy of Proactive-Reactive Intrusion Tolerance Recovery Based on Hierarchical Model. 283-293 - Wanqi Li, Heng Wang, Zhiwei He:
A Network-Flow-Based Method for Embedding Rectification. 294-303 - Peng Li, Junhao Wen, Junping Dong, Fangfang Tang:
An Approach of Authentication Base on Modified Digital Identity Metasystem in Service-Oriented Architecture. 304-311 - Xiaolong Bai, Liang Hu, Zixing Song, Feiyan Chen, Kuo Zhao:
Defense against DNS Man-In-The-Middle Spoofing. 312-319 - Wanqi Li, Heng Wang, Zhiwei He:
Defensive Steganography: A Novel Way against Steganalysis. 320-327 - Lin Li, Qingzhong Li, Yuliang Shi, Kun Zhang:
A New Privacy-Preserving Scheme DOSPA for SaaS. 328-335 - Guilan Yu, Jinglong Zuo, Delong Cui:
Performance Evaluation of Digital Audio Watermarking Algorithm under Low Bits Rates. 336-343 - Xin Tang, Ruchuan Wang, Haiping Huang:
An Anti-collusion Trust Model in P2P Networks. 344-351 - Jingbo Yuan, Shunli Ding:
An Alerts Correlation Technology for Large-Scale Network Intrusion Detection. 352-359 - Rui-ping Niu, Xiaofang Mu, Gao-feng Sun:
Dynamic Authorization of Grid Based on Trust Mechanism. 360-367 - Kakali Chatterjee, Asok De, Daya Gupta:
Timestamp Based Authentication Protocol for Smart Card Using ECC. 368-375 - Kun Zhang, Qingzhong Li, Yuliang Shi:
Data Privacy Preservation during Schema Evolution for Multi-tenancy Applications in Cloud Computing. 376-383 - Yung-Cheng Lee:
A Simple (v, t, n)-Fairness Secret Sharing Scheme with One Shadow for Each Participant. 384-389 - Hongqian Chen, Yi Chen, Jian Cao, Yuehong Sun:
An Encrypted Data-Transportation Method for Distributed System. 390-396 - Yihe Liu:
Study on Grid Access Control Strategy Based on Trust and Security Grade. 397-401
Intelligent Networked Systems
- Chengjie Gu, Shunyi Zhang:
Self-Adaptive QoS Control Mechanism in Cognitive Networks Based on Intelligent Service Awareness. 402-410 - Jie Yang, Yuanhao Wu, Yinan Dou, Kun Zhang:
Robustness Promotion of High Speed Network Content Auditing Integrated System Based on Machine Learning Method. 411-418 - Baolu Gao, Junjie Chen, Xiaoyan Xiong, Shibo Xiong:
Diagnosis Method of Combing Feature Extraction Based on Time-Frequency Analysis and Intelligent Classifier. 419-425 - Zhanqiang Huo, Xiaoke Liu:
Performance Analysis of Sleep-Mode with Uplink/Downlink Traffics in IEEE 802.16m. 426-433 - Lizi Yin, Dianwu Yang:
LMI Conditions for Stability of Impulsive Stochastic Neural Networks with Unbounded Time-Varying Delays. 434-440 - Wei Wen, Yequn Wang, Henyang Zhang:
Queuing System M/M/1/T with Priority Dropping Packets Mechanism Based on Living Time. 441-446
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.