Atjaunināt sīkdatņu piekrišanu

E-grāmata: Web Information Systems and Mining: International Conference, WISM 2011, Taiyuan, China, September 24-25, 2011, Proceedings, Part I

Edited by , Edited by , Edited by , Edited by , Edited by
  • Formāts - PDF+DRM
  • Cena: 53,52 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

The two-volume set LNCS 6987 and LNCS 6988 constitutes the refereed proceedings of the International Conference on Web Information Systems and Mining, WISM 2011, held in Taiyuan, China, in September 2011. The 112 revised full papers presented were carefully reviewed and selected from 472 submissions. The first volume includes 56 papers organized in the following topical sections: applications on Web information systems; applications of Web mining; distributed systems; e-government and e-commerce; geographic information systems; information security; and intelligent networked systems.
Applications of Web Information Systems
Research on Electromagnetic Wave Through-The-Earth Wireless Communication for Coal Mine Disaster
1(10)
Jinyi Tao
The Investigation of WEB Software System Based on Domain-Driven Design
11(8)
Fei Wang
Li Hua Yan
Peng Zhou
Wei Sun
Yuan Ding
MediaCRM: Enabling Customer Relationship Management in the Broadcast
19(8)
Robbie De Sutter
Mike Matton
Niels Laukens
Dieter Van Rijsselbergen
Rik Van de Walle
Jordan Triple Multiplicative Maps on the Symmetric Matrices
27(8)
Haifeng Zhang
Yuying Li
International Collaborations in Brain-Computer Interface (BCI) Research
35(8)
Brahim Hamadicharef
A Classification of Cluster Validity Indexes Based on Membership Degree and Applications
43(8)
Nannan Xie
Liang Hu
Nurbol Luktarhan
Kuo Zhao
Several Methods of Calculating the Distribution of Linear Combinations of Two-Dimensional Random Variables
51(8)
Yuying Li
Haifeng Zhang
Propagation in LHM Slab Loaded Rectangular Waveguide
59(7)
Rui-lian Li
The Study of Images Emotion Based on fMRI
66(7)
Xiaoyan Qiao
Haifang Li
Jie Xiang
Hongxia Deng
The Communication Protocol Design of Electro-Hydraulic Control System for Hydraulic Supports at Coal Mine
73(6)
Jingguo Wen
Zisheng Lian
Temperature Characteristics and Compensation Method of Capacitive Ice Layer Thickness Sensor
79(7)
Dou Yinke
Chang Xiaomin
False Alarm Probability of the Digital Channelized Receiver Based CA-CFAR Detector
86(6)
Miao He
Kexin Jia
Ting Cheng
Strong Solution of Initial-Boundary Value Problem for a Class of Nonlinear Thermoelastic Couple Beam Equations
92(6)
Cai-xian Wang
Jian-Wen Zhang
Initial-Boundary Value Problem for Viscoelastic Rectangular Plate Equation
98(6)
Dongbao Wang
Yinzhu Wang
An Invariant Subspace Theorem for Sequentially Subdecomposable Operators
104(5)
Mingxue Liu
The Genetic Algorithm in the Test Paper Generation
109(5)
Jian-Jun Hu
Yue-Hong Sun
Qing-Zhen Xu
Applications of Web Mining
CDMA Mobile Internet User Behavior Analysis Based on RP Interface
114(10)
Kai Yu
Dazhong He
Yinan Dou
Zhenming Lei
Personalizing Group Recommendation to Social Network Users
124(10)
Leila Esmaeili
Mahdi Nasiri
Behrouz Minaei-Bidgoli
A Novel Frequent Trajectory Mining Method Based on GSP
134(7)
Junhuai Li
Jinqin Wang
Lei Yu
Jing Zhang
Study of a Fuzzy Clustering Algorithm Based on Interval Value
141(7)
Hai Zhou Du
The Influence of the Fourth-Order Dispersion Coefficient for the Information Transmission in Fiber
148(7)
Jiang Xingfang
Shao Kai
Distributed Systems
A Research of Resource Scheduling Strategy with SLA Restriction for Cloud Computing Based on Pareto Optimality MxN Production Model
155(11)
Huixi Li
Hao Li
A Distributed Processing Method for Design Patent Retrieval System
166(9)
Jiang-Zhong Cao
Jian-Wei Zhu
Xian-Wei Wang
Qing-Yun Dai
An Adaptive Distribution Model for Multi-dimensional Data in Decentralized Environments
175(9)
Wei He
Lizhen Cui
Research on SOA Business Process Disaster Tolerance Recovery Method
184(8)
Xinfeng Zhang
Junfeng Sun
Pengyu Guo
Admission Control for WebServices in Enterprise Systems Using Expert Systems
192(8)
Arash Jodeiri Salimi
Ayaz Isazadeh
Jaber Karimpour
An Improved Lookup Algorithm on Over-DHT Paradigm Based P2P Network
200(8)
Youming Fu
Ruimin Hu
Jun Chen
Zhongyuan Wang
Gang Tian
Maximizing the Lifetime of Daley-Tolerant Wireless Sensor Networks Using Fuzzy System
208(8)
Vahide Rafati Porshokooh
Abolfazl Toroghi Haghighat
Farzad Tashtarian
e-Government and e-Commerce
Structural Equation Modeling for Evaluating the Public Value of Service Delivery through e-Government: A Case Study from Sri Lanka
216(10)
Kanishka Karunasena
Hepu Deng
Anuradha Karunasena
W-entropy Index: The Impact of the Members on Social Networks
226(8)
Weigang Li
Jianya Zheng
Daniel Lezhi Li
Improving Security of SET Protocol Based on ECC
234(8)
Lai-Cheng Cao
Geographic Information Systems
The Constrained Computing and Application for Intelligent Generalization of Settlements
242(9)
Li Wang
Jin Zhang
Integrating Landsat TM Imagery and See5 Decision-Tree Software for Identifying Croplands: A Case Study in Shunyi District, Beijing
251(8)
Jinling Zhao
Dongyan Zhang
Dacheng Wang
Wenjiang Huang
Information Security
An Authenticated Key Exchange to Improve the Security of Shi et al. and Kim et al.'s Protocols
259(12)
Mijin Kim
Changyoung Kwon
Dongho Won
A Fast and Tolerant Voting Mechanism in Wireless Sensor Networks
271(12)
Jian-hua Huang
Yong-hong Shi
The Strategy of Proactive-Reactive Intrusion Tolerance Recovery Based on Hierarchical Model
283(11)
Jian-hua Huang
Fei-fei Wang
A Network-Flow-Based Method for Embedding Rectification
294(10)
Wanqi Li
Heng Wang
Zhiwei He
An Approach of Authentication Base on Modified Digital Identity Metasystem in Service-Oriented Architecture
304(8)
Peng Li
Junhao Wen
Junping Dong
Fangfang Tang
Defense against DNS Man-In-The-Middle Spoofing
312(8)
Xiaolong Bai
Liang Hu
Zixing Song
Feiyan Chen
Kuo Zhao
Defensive Steganography: A Novel Way against Steganalysis
320(8)
Wanqi Li
Heng Wang
Zhiwei He
A New Privacy-Preserving Scheme DOSPA for SaaS
328(8)
Lin Li
Qingzhong Li
Yuliang Shi
Kun Zhang
Performance Evaluation of Digital Audio Watermarking Algorithm under Low Bits Rates
336(8)
Guilan Yu
Jinglong Zuo
Delong Cui
An Anti-collusion Trust Model in P2P Networks
344(8)
Xin Tang
Ruchuan Wang
Haiping Huang
An Alerts Correlation Technology for Large-Scale Network Intrusion Detection
352(8)
Jingbo Yuan
Shunli Ding
Dynamic Authorization of Grid Based on Trust Mechanism
360(8)
Rui-ping Niu
Xiao-fang Mu
Gao-feng Sun
Timestamp Based Authentication Protocol for Smart Card Using ECC
368(8)
Kakali Chatterjee
Asok De
Daya Gupta
Data Privacy Preservation during Schema Evolution for Multi-tenancy Applications in Cloud Computing
376(8)
Kun Zhang
Qingzhong Li
Yuliang Shi
A Simple (v, t, n)-Fairness Secret Sharing Scheme with One Shadow for Each Participant
384(6)
Yung-Cheng Lee
An Encrypted Data-Transportation Method for Distributed System
390(7)
Hongqian Chen
Yi Chen
Jian Cao
Yuehong Sun
Study on Grid Access Control Strategy Based on Trust and Security Grade
397(5)
Yihe Liu
Intelligent Networked Systems
Self-adaptive QoS Control Mechanism in Cognitive Networks Based on Intelligent Service Awareness
402(9)
Chengjie Gu
Shunyi Zhang
Robustness Promotion of High Speed Network Content Auditing Integrated System Based on Machine Learning Method
411(8)
Jie Yang
Yuanhao Wu
Yinan Dou
Kun Zhang
Diagnosis Method of Combing Feature Extraction Based on Time-Frequency Analysis and Intelligent Classifier
419(7)
Baolu Gao
Junjie Chen
Xiaoyan Xiong
Shibo Xiong
Performance Analysis of Sleep-Mode with Uplink/Downlink Traffics in IEEE 802.16m
426(8)
Zhanqiang Huo
Xiaoke Liu
LMI Conditions for Stability of Impulsive Stochastic Neural Networks with Unbounded Time-Varying Delays
434(7)
Lizi Yin
Dianwu Yang
Queuing System M/M/1/T with Priority Dropping Packets Mechanism Based on Living Time
441(6)
Wei Wen
Yequn Wang
Henyang Zhang
Author Index 447