Ebook: Data and Knowledge Engineering: Third International Conference, ICDKE 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings
- Tags: Information Systems Applications (incl. Internet), Computer Communication Networks, Artificial Intelligence (incl. Robotics), Information Storage and Retrieval, Algorithm Analysis and Problem Complexity, Database Management
- Series: Lecture Notes in Computer Science 7696
- Year: 2012
- Publisher: Springer-Verlag Berlin Heidelberg
- Edition: 1
- Language: English
- pdf
This book constitutes the refereed proceedings of the International Conference on Data and Knowledge Engineering, ICDKE 2012, held in Wuyishan, Fujian, China, in November 2012. The conference was co-located with the 6th International Conference on Network and System Security, NSS 2012. The 13 revised full papers of ICDKE 2012 were carefully reviewed and selected from 53 submissions. The papers cover the following topics: artificial intelligence and data engineering; knowledge discovery and data management; information extraction and retrieval and data security.
This book constitutes the refereed proceedings of the International Conference on Data and Knowledge Engineering, ICDKE 2012, held in Wuyishan, Fujian, China, in November 2012. The conference was co-located with the 6th International Conference on Network and System Security, NSS 2012. The 13 revised full papers of ICDKE 2012 were carefully reviewed and selected from 53 submissions. The papers cover the following topics: artificial intelligence and data engineering; knowledge discovery and data management; information extraction and retrieval; and data security.
This book constitutes the refereed proceedings of the International Conference on Data and Knowledge Engineering, ICDKE 2012, held in Wuyishan, Fujian, China, in November 2012. The conference was co-located with the 6th International Conference on Network and System Security, NSS 2012. The 13 revised full papers of ICDKE 2012 were carefully reviewed and selected from 53 submissions. The papers cover the following topics: artificial intelligence and data engineering; knowledge discovery and data management; information extraction and retrieval; and data security.
Content:
Front Matter....Pages -
OR-Tree: An Optimized Spatial Tree Index for Flash-Memory Storage Systems....Pages 1-14
Directional Skyline Queries....Pages 15-28
Transforming Nescient Activity into Intelligent Activity....Pages 29-37
Self-adaptive Non-stationary Parallel Multisplitting Two-Stage Iterative Methods for Linear Systems....Pages 38-47
Towards a Case-Based Reasoning Approach Based on Ontologies Application to Railroad Accidents....Pages 48-55
An Agile Knowledge Discovery in Databases Software Process....Pages 56-64
An Innovative Outlier Detection Method Using Localized Thresholds....Pages 65-73
A Self-stabilizing Algorithm for Finding a Minimal K-Dominating Set in General Networks....Pages 74-85
Optimal Combination of Feature Weight Learning and Classification Based on Local Approximation....Pages 86-94
A Model of User-Oriented Reduct Construction Based on Minimal Set Cover....Pages 95-102
Determining Pattern Similarity in a Medical Recommender System....Pages 103-114
Chinese Latent Relational Search Based on Relational Similarity....Pages 115-127
Wikipedia Category Graph and New Intrinsic Information Content Metric for Word Semantic Relatedness Measuring....Pages 128-140
Nautilus: A Generic Framework for Crawling Deep Web....Pages 141-151
Retrieving Information from Microblog Using Pattern Mining and Relevance Feedback....Pages 152-160
A Secure and Efficient Mix Network Especially Suitable for E-Voting....Pages 161-174
Power Analysis Based Reverse Engineering on the Secret Round Function of Block Ciphers....Pages 175-188
PEVS: A Secure Electronic Voting Scheme Using Polling Booths....Pages 189-205
Certificate-Based Key-Insulated Signature....Pages 206-220
The Generalized Construction and Linear Complexity of Binary Sequences with Three-Level Autocorrelation Values....Pages 221-229
Anonymous Hierarchical Identity-Based Encryption in Prime Order Groups....Pages 230-242
Weaknesses of “Security Analysis and Enhancement for Three-Party Password-Based Authenticated Key Exchange Protocol”....Pages 243-249
Back Matter....Pages -
This book constitutes the refereed proceedings of the International Conference on Data and Knowledge Engineering, ICDKE 2012, held in Wuyishan, Fujian, China, in November 2012. The conference was co-located with the 6th International Conference on Network and System Security, NSS 2012. The 13 revised full papers of ICDKE 2012 were carefully reviewed and selected from 53 submissions. The papers cover the following topics: artificial intelligence and data engineering; knowledge discovery and data management; information extraction and retrieval; and data security.
Content:
Front Matter....Pages -
OR-Tree: An Optimized Spatial Tree Index for Flash-Memory Storage Systems....Pages 1-14
Directional Skyline Queries....Pages 15-28
Transforming Nescient Activity into Intelligent Activity....Pages 29-37
Self-adaptive Non-stationary Parallel Multisplitting Two-Stage Iterative Methods for Linear Systems....Pages 38-47
Towards a Case-Based Reasoning Approach Based on Ontologies Application to Railroad Accidents....Pages 48-55
An Agile Knowledge Discovery in Databases Software Process....Pages 56-64
An Innovative Outlier Detection Method Using Localized Thresholds....Pages 65-73
A Self-stabilizing Algorithm for Finding a Minimal K-Dominating Set in General Networks....Pages 74-85
Optimal Combination of Feature Weight Learning and Classification Based on Local Approximation....Pages 86-94
A Model of User-Oriented Reduct Construction Based on Minimal Set Cover....Pages 95-102
Determining Pattern Similarity in a Medical Recommender System....Pages 103-114
Chinese Latent Relational Search Based on Relational Similarity....Pages 115-127
Wikipedia Category Graph and New Intrinsic Information Content Metric for Word Semantic Relatedness Measuring....Pages 128-140
Nautilus: A Generic Framework for Crawling Deep Web....Pages 141-151
Retrieving Information from Microblog Using Pattern Mining and Relevance Feedback....Pages 152-160
A Secure and Efficient Mix Network Especially Suitable for E-Voting....Pages 161-174
Power Analysis Based Reverse Engineering on the Secret Round Function of Block Ciphers....Pages 175-188
PEVS: A Secure Electronic Voting Scheme Using Polling Booths....Pages 189-205
Certificate-Based Key-Insulated Signature....Pages 206-220
The Generalized Construction and Linear Complexity of Binary Sequences with Three-Level Autocorrelation Values....Pages 221-229
Anonymous Hierarchical Identity-Based Encryption in Prime Order Groups....Pages 230-242
Weaknesses of “Security Analysis and Enhancement for Three-Party Password-Based Authenticated Key Exchange Protocol”....Pages 243-249
Back Matter....Pages -
....
Download the book Data and Knowledge Engineering: Third International Conference, ICDKE 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings for free or read online
Continue reading on any device:
Last viewed books
Related books
{related-news}
Comments (0)