Online Library TheLib.net » Web Information Systems and Mining: International Conference, WISM 2012, Chengdu, China, October 26-28, 2012. Proceedings

The volume LNCS 7529 constitutes the refereed proceedings of the International Conference on Web Information Systems and Mining, WISM 2012, held in Chengdu, China, in October 2012. The 87 revised full papers presented were carefully reviewed and selected from 418 submissions. The papers are organized in topical sections on applications of Web information systems; applications of Web mining; e-government and e-commerce; information security; intelligent networked systems; management information systems; mobile computing; semantic Web and ontologies; Web information extraction; Web intelligence; Web interfaces and applications; and XML and semi-structured data.




The volume LNCS 7529 constitutes the refereed proceedings of the International Conference on Web Information Systems and Mining, WISM 2012, held in Chengdu, China, in October 2012.
The 87 revised full papers presented were carefully reviewed and selected from 418 submissions. The papers are organized in topical sections on applications of Web information systems; applications of Web mining; e-government and e-commerce; information security; intelligent networked systems; management information systems; mobile computing; semantic Web and ontologies; Web information extraction; Web intelligence; Web interfaces and applications; and XML and semi-structured data.


The volume LNCS 7529 constitutes the refereed proceedings of the International Conference on Web Information Systems and Mining, WISM 2012, held in Chengdu, China, in October 2012.
The 87 revised full papers presented were carefully reviewed and selected from 418 submissions. The papers are organized in topical sections on applications of Web information systems; applications of Web mining; e-government and e-commerce; information security; intelligent networked systems; management information systems; mobile computing; semantic Web and ontologies; Web information extraction; Web intelligence; Web interfaces and applications; and XML and semi-structured data.
Content:
Front Matter....Pages -
Study on the Design of Automatic Cotton Bale Inspecting Management System....Pages 1-8
The Smallest Randi? Index for Trees....Pages 9-14
Design of Meridian and Acupoints Compatibility Analysis System....Pages 15-21
Invariant Subspaces for Operators with Thick Spectra....Pages 22-25
Voronoi Feature Selection Model Considering Variable-Scale Map’s Balance and Legibility....Pages 26-35
A Code Dissemination Protocol of Low Energy Consumption....Pages 36-43
Dynamic Spectrum Analysis of High-Speed Train Passenger Compartment Luggage Rack Noise....Pages 44-50
Port-Based Composable Modeling and Simulation for Safety Critical System Testbed....Pages 51-58
Risk Assessment Method of Radio Block Center in Fuzzy Uncertain Environment....Pages 59-66
Learning Research in Knowledge Transfer....Pages 67-72
A Post-filtering Technique for Enhancing Acoustic Echo Cancelation System....Pages 73-80
Packet Dropping Schemes and Quality Evaluation for H.264 Videos at High Packet Loss Rates....Pages 81-89
A Blocked Statistics Method Based on Directional Derivative....Pages 90-97
Study on Cooperative Game Model of Talent Training through School-Enterprise Coalition....Pages 98-104
Research on Internet Public Opinion Detection System Based on Domain Ontology....Pages 105-110
A Security Analysis Model Based on Artificial Neural Network....Pages 111-116
Social Network Analyses on Knowledge Diffusion of China’s Management Science....Pages 117-124
A Parallel Association-Rule Mining Algorithm....Pages 125-129
An Algorithm of Parallel Programming Design Based on Problem Domain Model....Pages 130-135
Metadata-Aware Small Files Storage Architecture on Hadoop....Pages 136-143
Research on the Isomorphism of the Electronic-Government and Electronic-Commerce in Support System....Pages 144-149
On the Deployment of Wireless Sensor Networks with Regular Topology Patterns....Pages 150-158
An Empirical Study on the Relationship among Trust and the Risky and Non-Risky Components of E-Commerce....Pages 159-166
Process Modeling and Reengineering in the Integration Stage of Electronic Government....Pages 167-174
Development of Vertical Industrial B2B in China: Based on Cases Study....Pages 175-182
Personalized Recommendation System on Massive Content Processing Using Improved MFNN....Pages 183-190
A Speaker Recognition Based Approach for Identifying Voice Spammer....Pages 191-198
Security Access Authentication System for IPv4/IPv6 Dual-Stack Campus Network Based on IpoE....Pages 199-205
Information Encryption Based on Virtual Optical Imaging System and Chen’s Chaos....Pages 206-213
A New Scheme with Secure Cookie against SSLStrip Attack....Pages 214-221
ID-Based Signatures from Lattices in the Random Oracle Model....Pages 222-230
Strongly Secure Attribute-Based Authenticated Key Exchange with Traceability....Pages 231-238
A New Public Key Signature Scheme Based on Multivariate Polynomials....Pages 239-245
Comments on an Advanced Dynamic ID-Based Authentication Scheme for Cloud Computing....Pages 246-253
Research on Security Management in Active Network Node Operating Systems....Pages 254-263
An Integrity Verification Scheme for Multiple Replicas in Clouds....Pages 264-274
Multi-stage Attack Detection Algorithm Based on Hidden Markov Model....Pages 275-282
Security Analysis of a Secure and Practical Dynamic Identity-Based Remote User Authentication Scheme....Pages 283-290
Formal Construction of Secure Information Transmission in Office Automation System....Pages 291-298
A Novel CBCD Scheme Based on Local Features Category....Pages 299-305
Research and Improvement on Association Rule Algorithm Based on FP-Growth....Pages 306-313
Encrypted Remote User Authentication Scheme by Using Smart Card....Pages 314-323
A Web Visualization System of Cyberinfrastructure Resources....Pages 324-332
A Novel Clustering Mechanism Based on Image-Oriented Correlation Coefficient for Wireless Multimedia Sensor Networks....Pages 333-341
Design of Underground Miner Positioning System Based on ZigBee Technology....Pages 342-349
Metadata Management of Context Resources in Context-Aware Middleware System....Pages 350-357
Research on Scientific Data Sharing Platform of Hydrology and Water Resources Based on Service Composition....Pages 358-365
Study on the Scheme of Tianjin Area E-commerce Platform Construction....Pages 366-371
Research on Chinese Hydrological Data Quality Management....Pages 372-379
Using IoT Technologies to Resolve the Food Safety Problem – An Analysis Based on Chinese Food Standards....Pages 380-392
Towards Better Cross-Cloud Data Integration: Using P2P and ETL Together....Pages 393-401
Design of Intelligent Maintenance Decision-Making System for Fixed Equipment in Petrochemical Plants....Pages 402-413
Dimensional Modeling for Landslide Monitoring Data Warehouse....Pages 414-421
A New Fuzzy Risk Evaluation Method for Uncertain Network Public Sentiment Emergency....Pages 422-430
Service Lifecycle Management in Distributed JBI Environment....Pages 431-438
Graded BDI Models for Agent Architectures Based on ?ukasiewicz Logic and Propositional Dynamic Logic....Pages 439-450
A Polymorphic Type System with Progress for Binary Sessions....Pages 451-461
Energy Model of SARA and Its Performance Analysis....Pages 462-471
Data Profiling for Semantic Web Data....Pages 472-479
Checking and Handling Inconsistency of DBpedia....Pages 480-488
Conceptual Representing of Documents and Query Expansion Based on Ontology....Pages 489-496
Robust Web Data Extraction: A Novel Approach Based on Minimum Cost Script Edit Model....Pages 497-509
Rule-Based Text Mining of Chinese Herbal Medicines with Patterns in Traditional Chinese Medicine for Chronic Obstructive Pulmonary Disease....Pages 510-520
Fault Forecast of Electronic Equipment Based on ? –SVR....Pages 521-527
Analysis and Design of Internet Monitoring System on Public Opinion Based on Cloud Computing and NLP....Pages 528-535
Using Similes to Extract Basic Sentiments across Languages....Pages 536-542
Automatic Summarization for Chinese Text Using Affinity Propagation Clustering and Latent Semantic Analysis....Pages 543-550
A Webpage Deletion Algorithm Based on Hierarchical Filtering....Pages 551-557
Research in Keyword Extraction....Pages 558-563
Tuple Refinement Method Based on Relationship Keyword Extension....Pages 564-571
An Agent Based Intelligent Meta Search Engine....Pages 572-579
A Novel Image Annotation Feedback Model Based on Internet-Search....Pages 580-588
The Design and Application of an Ancient Porcelain Online Identification Analysis System....Pages 589-594
A Self-adaptive Strategy for Web Crawler in In-Site Search....Pages 595-602
A Novel Shark-Search Algorithm for Theme Crawler....Pages 603-609
A Framework of Online Proxy-Based Web Prefetching....Pages 610-620
Mapping the Intellectual Structure by Co-word: A Case of International Management Science....Pages 621-628
Study on Multi-sensor Information Fusion Technology in the Dynamic Monitoring of Coal Mine Roof....Pages 629-636
Detecting Hot Topics in Chinese Microblog Streams Based on Frequent Patterns Mining....Pages 637-644
KACTL: Knowware Based Automated Construction of a Treelike Library from Web Documents....Pages 645-656
Associating Labels and Elements of Deep Web Query Interface Based on DOM....Pages 657-663
Design and Implementation of the Online Shopping System....Pages 664-670
System Development of Residence Property Management Based on WEB....Pages 671-677
An Intelligent Metadata Extraction Approach Based on Programming by Demonstration....Pages 678-685
OF-NEDL: An OpenFlow Networking Experiment Description Language Based on XML....Pages 686-697
Structural Similarity Evaluation of XML Documents Based on Basic Statistics....Pages 698-705
An XML Data Query Method Based on Structure-Encoded....Pages 706-713
Back Matter....Pages -


The volume LNCS 7529 constitutes the refereed proceedings of the International Conference on Web Information Systems and Mining, WISM 2012, held in Chengdu, China, in October 2012.
The 87 revised full papers presented were carefully reviewed and selected from 418 submissions. The papers are organized in topical sections on applications of Web information systems; applications of Web mining; e-government and e-commerce; information security; intelligent networked systems; management information systems; mobile computing; semantic Web and ontologies; Web information extraction; Web intelligence; Web interfaces and applications; and XML and semi-structured data.
Content:
Front Matter....Pages -
Study on the Design of Automatic Cotton Bale Inspecting Management System....Pages 1-8
The Smallest Randi? Index for Trees....Pages 9-14
Design of Meridian and Acupoints Compatibility Analysis System....Pages 15-21
Invariant Subspaces for Operators with Thick Spectra....Pages 22-25
Voronoi Feature Selection Model Considering Variable-Scale Map’s Balance and Legibility....Pages 26-35
A Code Dissemination Protocol of Low Energy Consumption....Pages 36-43
Dynamic Spectrum Analysis of High-Speed Train Passenger Compartment Luggage Rack Noise....Pages 44-50
Port-Based Composable Modeling and Simulation for Safety Critical System Testbed....Pages 51-58
Risk Assessment Method of Radio Block Center in Fuzzy Uncertain Environment....Pages 59-66
Learning Research in Knowledge Transfer....Pages 67-72
A Post-filtering Technique for Enhancing Acoustic Echo Cancelation System....Pages 73-80
Packet Dropping Schemes and Quality Evaluation for H.264 Videos at High Packet Loss Rates....Pages 81-89
A Blocked Statistics Method Based on Directional Derivative....Pages 90-97
Study on Cooperative Game Model of Talent Training through School-Enterprise Coalition....Pages 98-104
Research on Internet Public Opinion Detection System Based on Domain Ontology....Pages 105-110
A Security Analysis Model Based on Artificial Neural Network....Pages 111-116
Social Network Analyses on Knowledge Diffusion of China’s Management Science....Pages 117-124
A Parallel Association-Rule Mining Algorithm....Pages 125-129
An Algorithm of Parallel Programming Design Based on Problem Domain Model....Pages 130-135
Metadata-Aware Small Files Storage Architecture on Hadoop....Pages 136-143
Research on the Isomorphism of the Electronic-Government and Electronic-Commerce in Support System....Pages 144-149
On the Deployment of Wireless Sensor Networks with Regular Topology Patterns....Pages 150-158
An Empirical Study on the Relationship among Trust and the Risky and Non-Risky Components of E-Commerce....Pages 159-166
Process Modeling and Reengineering in the Integration Stage of Electronic Government....Pages 167-174
Development of Vertical Industrial B2B in China: Based on Cases Study....Pages 175-182
Personalized Recommendation System on Massive Content Processing Using Improved MFNN....Pages 183-190
A Speaker Recognition Based Approach for Identifying Voice Spammer....Pages 191-198
Security Access Authentication System for IPv4/IPv6 Dual-Stack Campus Network Based on IpoE....Pages 199-205
Information Encryption Based on Virtual Optical Imaging System and Chen’s Chaos....Pages 206-213
A New Scheme with Secure Cookie against SSLStrip Attack....Pages 214-221
ID-Based Signatures from Lattices in the Random Oracle Model....Pages 222-230
Strongly Secure Attribute-Based Authenticated Key Exchange with Traceability....Pages 231-238
A New Public Key Signature Scheme Based on Multivariate Polynomials....Pages 239-245
Comments on an Advanced Dynamic ID-Based Authentication Scheme for Cloud Computing....Pages 246-253
Research on Security Management in Active Network Node Operating Systems....Pages 254-263
An Integrity Verification Scheme for Multiple Replicas in Clouds....Pages 264-274
Multi-stage Attack Detection Algorithm Based on Hidden Markov Model....Pages 275-282
Security Analysis of a Secure and Practical Dynamic Identity-Based Remote User Authentication Scheme....Pages 283-290
Formal Construction of Secure Information Transmission in Office Automation System....Pages 291-298
A Novel CBCD Scheme Based on Local Features Category....Pages 299-305
Research and Improvement on Association Rule Algorithm Based on FP-Growth....Pages 306-313
Encrypted Remote User Authentication Scheme by Using Smart Card....Pages 314-323
A Web Visualization System of Cyberinfrastructure Resources....Pages 324-332
A Novel Clustering Mechanism Based on Image-Oriented Correlation Coefficient for Wireless Multimedia Sensor Networks....Pages 333-341
Design of Underground Miner Positioning System Based on ZigBee Technology....Pages 342-349
Metadata Management of Context Resources in Context-Aware Middleware System....Pages 350-357
Research on Scientific Data Sharing Platform of Hydrology and Water Resources Based on Service Composition....Pages 358-365
Study on the Scheme of Tianjin Area E-commerce Platform Construction....Pages 366-371
Research on Chinese Hydrological Data Quality Management....Pages 372-379
Using IoT Technologies to Resolve the Food Safety Problem – An Analysis Based on Chinese Food Standards....Pages 380-392
Towards Better Cross-Cloud Data Integration: Using P2P and ETL Together....Pages 393-401
Design of Intelligent Maintenance Decision-Making System for Fixed Equipment in Petrochemical Plants....Pages 402-413
Dimensional Modeling for Landslide Monitoring Data Warehouse....Pages 414-421
A New Fuzzy Risk Evaluation Method for Uncertain Network Public Sentiment Emergency....Pages 422-430
Service Lifecycle Management in Distributed JBI Environment....Pages 431-438
Graded BDI Models for Agent Architectures Based on ?ukasiewicz Logic and Propositional Dynamic Logic....Pages 439-450
A Polymorphic Type System with Progress for Binary Sessions....Pages 451-461
Energy Model of SARA and Its Performance Analysis....Pages 462-471
Data Profiling for Semantic Web Data....Pages 472-479
Checking and Handling Inconsistency of DBpedia....Pages 480-488
Conceptual Representing of Documents and Query Expansion Based on Ontology....Pages 489-496
Robust Web Data Extraction: A Novel Approach Based on Minimum Cost Script Edit Model....Pages 497-509
Rule-Based Text Mining of Chinese Herbal Medicines with Patterns in Traditional Chinese Medicine for Chronic Obstructive Pulmonary Disease....Pages 510-520
Fault Forecast of Electronic Equipment Based on ? –SVR....Pages 521-527
Analysis and Design of Internet Monitoring System on Public Opinion Based on Cloud Computing and NLP....Pages 528-535
Using Similes to Extract Basic Sentiments across Languages....Pages 536-542
Automatic Summarization for Chinese Text Using Affinity Propagation Clustering and Latent Semantic Analysis....Pages 543-550
A Webpage Deletion Algorithm Based on Hierarchical Filtering....Pages 551-557
Research in Keyword Extraction....Pages 558-563
Tuple Refinement Method Based on Relationship Keyword Extension....Pages 564-571
An Agent Based Intelligent Meta Search Engine....Pages 572-579
A Novel Image Annotation Feedback Model Based on Internet-Search....Pages 580-588
The Design and Application of an Ancient Porcelain Online Identification Analysis System....Pages 589-594
A Self-adaptive Strategy for Web Crawler in In-Site Search....Pages 595-602
A Novel Shark-Search Algorithm for Theme Crawler....Pages 603-609
A Framework of Online Proxy-Based Web Prefetching....Pages 610-620
Mapping the Intellectual Structure by Co-word: A Case of International Management Science....Pages 621-628
Study on Multi-sensor Information Fusion Technology in the Dynamic Monitoring of Coal Mine Roof....Pages 629-636
Detecting Hot Topics in Chinese Microblog Streams Based on Frequent Patterns Mining....Pages 637-644
KACTL: Knowware Based Automated Construction of a Treelike Library from Web Documents....Pages 645-656
Associating Labels and Elements of Deep Web Query Interface Based on DOM....Pages 657-663
Design and Implementation of the Online Shopping System....Pages 664-670
System Development of Residence Property Management Based on WEB....Pages 671-677
An Intelligent Metadata Extraction Approach Based on Programming by Demonstration....Pages 678-685
OF-NEDL: An OpenFlow Networking Experiment Description Language Based on XML....Pages 686-697
Structural Similarity Evaluation of XML Documents Based on Basic Statistics....Pages 698-705
An XML Data Query Method Based on Structure-Encoded....Pages 706-713
Back Matter....Pages -
....
Download the book Web Information Systems and Mining: International Conference, WISM 2012, Chengdu, China, October 26-28, 2012. Proceedings for free or read online
Read Download
Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen