Atjaunināt sīkdatņu piekrišanu

E-grāmata: Web-Age Information Management: 11th International Conference, WAIM 2010, Jiuzhaigou, China, July 15-17, 2010, Proceedings

Edited by , Edited by , Edited by , Edited by
  • Formāts - PDF+DRM
  • Cena: 106,47 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Lecture Notes in Computer Science

The LNCS series reports state-of-the-art results in computer science research, development, and education, at a high level and in both printed and electronic form. Enjoying tight cooperation with the R&D community, with numerous individuals, as well as with prestigious organizations and societies, LNCS has grown into the most comprehensive computer science research forum available.

The scope of LNCS, including its subseries LNAI and LNBI, spans the whole range of computer science and information technology including interdisciplinary topics in a variety of application fields. The type of material published traditionally includes

proceedings (published in time for the respective conference)

post-proceedings (consisting of thoroughly revised final full papers)

research monographs (which may be based on outstanding Phi) work, research projects, technical reports, etc.)

More recently, several color-cover sublines have been added featuring, beyond a collection of papers, various added-value components; these sublines include

tutorials (textbook-like monographs or collections of lectures given at advanced courses)

state-of-the-art surveys (offering complete and mediated coverage of a topic)

hot topics (introducing emergent topics to the broader community)

WAIM is a leading international conference on research, development, and appli- tions of Web technologies, database systems, and information management. Tra- tionally, WAIM has drawn the strongest participation from the Asia-Pacific region. The previous WAIM conferences were held in Shanghai (2000), Xi'an (2001), Beijing (2002), Chengdu (2003), Dalian (2004), Hangzhou (2005), Hong Kong (2006), Huangshan (2007), Zhangjiajie (2008), and Suzhou (2009). In 2010, WAIM was held in Jiuzhaigou, Sichuan, China. This high-quality program would not have been possible without the authors who chose WAIM for disseminating their contributions. Out of 205 submissions from 16 countries and regions, including Australia, Canada, France, Germany, Hong Kong, Japan, Korea, Macau, Malaysia, Mainland China, Saudi Arabia, Singapore, Taiwan, Thailand, UK, and USA, we selected 58 full papers and 11 short papers for publi- tion. The acceptance rate for regular full papers was 28%. The contributed papers addressed a wide range of topics such as Web, XML, and multimedia data, data pr- essing in the cloud or on new hardware, data mining and knowledge discovery, inf- mation integration and extraction, networked data and social networks, graph and stream processing, similarity search, etc. We are also grateful to our distinguished keynote speakers Prof. Jianzhong Li, Dr. Divesh Srivastava, Prof. Katsumi Tanaka, and Prof. Xiaofang Zhou. A conference like WAIM can only succeed as a team effort. We want to thank the Program Committee members and the reviewers for their invaluable efforts.
Analyzing Data Quality Using Data Auditor.- Analyzing Data Quality Using
Data Auditor.- Rebuilding the World from Views.- Approximate Query Processing
in Sensor Networks.- Web Data I.- Duplicate Identification in Deep Web Data
Integration.- Learning to Detect Web Spam by Genetic Programming.- Semantic
Annotation of Web Objects Using Constrained Conditional Random Fields.- Time
Graph Pattern Mining for Web Analysis and Information Retrieval.- Networked
Data.- FISH: A Novel Peer-to-Peer Overlay Network Based on Hyper-deBruijn.-
Continuous Summarization of Co-evolving Data in Large Water Distribution
Network.- Proactive Replication and Search for Rare Objects in Unstructured
Peer-to-Peer Networks.- SWORDS: Improving Sensor Networks Immunity under Worm
Attacks.- Efficient Multiple Objects-Oriented Event Detection Over RFID Data
Streams.- Social Networks.- CW2I: Community Data Indexing for Complex Query
Processing.- Clustering Coefficient Queries on Massive Dynamic Social
Networks.- Predicting Best Answerers for New Questions in Community Question
Answering.- Semantic Grounding of Hybridization for Tag Recommendation.- Rich
Ontology Extraction and Wikipedia Expansion Using Language Resources.- Cloud
Computing.- Fine-Grained Cloud DB Damage Examination Based on Bloom Filters.-
XML Structural Similarity Search Using MapReduce.- Comparing Hadoop and
Fat-Btree Based Access Method for Small File I/O Applications.- Data Mining
I.- Mining Contrast Inequalities in Numeric Dataset.- Users Book-Loan
Behaviors Analysis and Knowledge Dependency Mining.- An Extended Predictive
Model Markup Language for Data Mining.- A Cross-Media Method of Stakeholder
Extraction for News Contents Analysis.- Stream Processing.- An Efficient
Approach for Mining Segment-Wise Intervention Rules inTime-Series Streams.-
Automated Recognition of Sequential Patterns in Captured Motion Streams.-
Online Pattern Aggregation over RFID Data Streams.- Cleaning Uncertain
Streams by Parallelized Probabilistic Graphical Models.- Graph Processing.-
Taming Computational Complexity: Efficient and Parallel SimRank Optimizations
on Undirected Graphs.- DSI: A Method for Indexing Large Graphs Using Distance
Set.- K-Radius Subgraph Comparison for RDF Data Cleansing.- Query
Processing.- A Novel Framework for Processing Continuous Queries on Moving
Objects.- Group Visible Nearest Neighbor Queries in Spatial Databases.- iPoc:
A Polar Coordinate Based Indexing Method for Nearest Neighbor Search in High
Dimensional Space.- Join Directly on Heavy-Weight Compressed Data in
Column-Oriented Database.- Potpourri.- Exploiting Service Context for Web
Service Search Engine.- Building Business Intelligence Applications Having
Prescriptive and Predictive Capabilities.- FileSearchCube: A File Grouping
Tool Combining Multiple Types of Interfile-Relationships.- Trustworthy
Information: Concepts and Mechanisms.- Web Data II.- How to Design Kansei
Retrieval Systems?.- Detecting Hot Events from Web Search Logs.- Evaluating
Truthfulness of Modifiers Attached to Web Entity Names.- Searching the Web
for Alternative Answers to Questions on WebQA Sites.- Domain-Independent
Classification for Deep Web Interfaces.- Data Mining II.- Data Selection for
Exact Value Acquisition to Improve Uncertain Clustering.- Exploring the
Sentiment Strength of User Reviews.- Semantic Entity Detection by Integrating
CRF and SVM.- An Incremental Method for Causal Network Construction.- DCUBE:
CUBE on Dirty Databases.- XML and Images.- An Algorithm for Incremental
Maintenance of Materialized XPath View.- Query Processing in INM Database
System.- Fragile Watermarking for Color Image Recovery Based on Color Filter
Array Interpolation.- A Hybrid-Feature-Based Efficient Retrieval over Chinese
Calligraphic Manuscript Image Repository.- Efficient Filtering of XML
Documents with XPath Expressions Containing Ancestor Axis.- New Hardware.-
ACAR: An Adaptive Cost Aware Cache Replacement Approach for Flash Memory.-
GPU-Accelerated Predicate Evaluation on Column Store.- MOSS-DB: A
Hardware-Aware OLAP Database.- Similarity Search.- Efficient Duplicate Record
Detection Based on Similarity Estimation.- A Novel Composite Kernel for
Finding Similar Questions in CQA Services.- Efficient Similarity Query in
RFID Trajectory Databases.- Information Extraction.- Context-Aware Basic
Level Concepts Detection in Folksonomies.- Extracting 5W1H Event Semantic
Elements from Chinese Online News.- Automatic Domain Terminology Extraction
Using Graph Mutual Reinforcement.- Knowledge Discovery.- Semi-supervised
Learning from Only Positive and Unlabeled Data Using Entropy.- Margin Based
Sample Weighting for Stable Feature Selection.- Associative Classifier for
Uncertain Data.- Information Integration.- Automatic Multi-schema Integration
Based on User Preference.- EIF: A Framework of Effective Entity
Identification.- A Multilevel and Domain-Independent Duplicate Detection
Model for Scientific Database.- Extending Databases.- Generalized UDF for
Analytics Inside Database Engine.- Efficient Continuous Top-k Keyword Search
in Relational Databases.- V Locking Protocol for Materialized Aggregate Join
Views on B-Tree Indices.- Web Information Credibility.