Content Computing Advanced Workshop on Content Computing, AWCC 2004, Zhen Jiang, Jiang Su, China, November 15-17, 2004, Proceedings /
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2004.
|
Έκδοση: | 1st ed. 2004. |
Σειρά: | Lecture Notes in Computer Science,
3309 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Session 1: Mobile Code and Agent Technology
- Mobility Prediction-Based Wireless Resource Allocation and Reservation
- An Agent-Enabled Content-Explicit Authorization Model for OGSA-Compliant Grid
- A Predictable Mobile Agent Computation Model and Its Fabric Architecture
- A Novel Reverse Rerouting Mechanism in Mobile Wireless Internet
- An Agents Based Grid Infrastructure of Social Intelligence
- Agent Aided Workflow Modeling
- Session 2: Content Sharing and Consistency Management
- An Improved Hybrid Method of Maintaining Content Consistency
- Advanced Architecture for Distributed Systems with a Network Infrastructure Based on CAN and Internet for Content Distribution
- Distributed Document Sharing with Text Classification over Content-Addressable Network
- Content Distribution Stochastic Fluid Models for Multi-regions P2P Networks
- Construct Campus Peer-to-Peer Networks
- Session 3: Networking Infrastructure and Performance
- Fractional Gaussian Noise: A Tool of Characterizing Traffic for Detection Purpose
- Performance Analysis of Virtual Time Optimistic Transaction Processing
- A Measurement-Based TCP Congestion Control Scheme
- BM-VF-SBD: An Efficient Data Channel Scheduling Algorithm to Support QoS for Optical Burst Switching Networks
- A Predictive Controller for AQM Router Supporting TCP with ECN
- Session 4: Content Aware Security (I)
- Enhancing the Content of the Intrusion Alerts Using Logic Correlation
- Real-Time Emulation of Intrusion Victim in HoneyFarm
- On the Formal Characterization of Covert Channel
- Availability Analysis and Comparison of Different Intrusion-Tolerant Systems
- Security Analysis of User Efficient Blind Signatures
- Session 5: Content Aware Security (II)
- A Novel DDoS Attack Detecting Algorithm Based on the Continuous Wavelet Transform
- Enhancing the Scalability of the Community Authorization Service for Virtual Organizations
- Securing Multicast Groups in Ad Hoc Networks
- Improved Privacy-Protecting Proxy Signature Scheme
- Improving Security Architecture Development Based on Multiple Criteria Decision Making
- Session 6: Multimedia Content
- A LSB Substitution Oriented Image Hiding Strategy Using Genetic Algorithms
- A Prediction Scheme for Image Vector Quantization Based on Mining Association Rules
- Fuzzy Logic-Based Image Retrieval
- Deriving Facial Patterns for Specifying Korean Young Men's 3D Virtual Face from Muscle Based Features
- A Content-Based Fragile Watermarking Scheme for Image Authentication
- Session 7: Content Mining and Knowledge Extraction
- A New FP-Tree Algorithm for Mining Frequent Itemsets
- Evaluation Incompleteness of Knowledge in Data Mining
- The Variable Precision Rough Set Model for Data Mining in Inconsistent Information System
- Rule Discovery with Particle Swarm Optimization
- Data Mining Service Based on MDA
- Session 8: Web Services and Content Applications (I)
- Web Service Composition Based on BPWS-Net
- Testing Web Services Using Progressive Group Testing
- XFCM - XML Based on Fuzzy Clustering and Merging - Method for Personalized User Profile Based on Recommendation System of Category and Product
- Analyzing Web Interfaces of Databases for Retrieving Web Information
- A New Universally Verifiable and Receipt-Free Electronic Voting Scheme Using One-Way Untappable Channels
- Session 9: Web Services and Content Applications (II)
- Ontology-Based Conceptual Modeling of Policy-Driven Control Framework: Oriented to Multi-agent System for Web Services Management
- An Approach to Dynamically Reconfiguring Service-Oriented Applications from a Business Perspective
- Dynamically Reconfiguring Sitemaps Using RDF
- A General Model for Heterogeneous Web Services Integration
- Methodology for Semantic Representing of Product Data in XML
- Semantic Based Web Services Discovery
- Session 10: Content Retrieval and Management (I)
- What Are People Looking for in Your Web Page?
- The Impact of OCR Accuracy on Automatic Text Classification
- TSS: A Hybrid Web Searches
- Determining the Number of Probability-Based Clustering: A Hybrid Approach
- Categorizing XML Documents Based on Page Styles
- Session 11: Content Retrieval and Management (II)
- Generating Different Semantic Spaces for Document Classification
- A Component Retrieval Method Based on Facet-Weight Self-learning
- The Algorithm About Division and Reducts of Information System Based on Discernibility Index of Attribute
- An Effective Document Classification System Based on Concept Probability Vector
- Accuracy Improvement of Automatic Text Classification Based on Feature Transformation and Multi-classifier Combination
- Session 12: Ontology and Knowledge Conceptualization
- Risk Minimization Based Ontology Mapping
- Evolutionary Parameter Estimation Algorithm for Combined Kernel Function in Support Vector Machine
- Enriching Domain Ontology from Domain-Specific Documents with HowNet
- A Framework of Extracting Sub-ontology
- Ontology Based Sports Video Annotation and Summary.