|
|
|
|
LEADER |
08482nam a22006135i 4500 |
001 |
978-3-540-72909-9 |
003 |
DE-He213 |
005 |
20151204143225.0 |
007 |
cr nn 008mamaa |
008 |
100301s2007 gw | s |||| 0|eng d |
020 |
|
|
|a 9783540729099
|9 978-3-540-72909-9
|
024 |
7 |
|
|a 10.1007/978-3-540-72909-9
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a TK5105.5-5105.9
|
072 |
|
7 |
|a UKN
|2 bicssc
|
072 |
|
7 |
|a COM075000
|2 bisacsh
|
082 |
0 |
4 |
|a 004.6
|2 23
|
245 |
1 |
0 |
|a Advances in Web and Network Technologies, and Information Management
|h [electronic resource] :
|b APWeb/WAIM 2007 International Workshops: DBMAN 2007, WebETrends 2007, PAIS 2007 and ASWAN 2007, Huang Shan, China, June 16-18, 2007. Proceedings /
|c edited by Kevin Chen-Chuan Chang, Wei Wang, Lei Chen, Clarence A. Ellis, Ching-Hsien Hsu, Ah Chung Tsoi, Haixun Wang.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg,
|c 2007.
|
300 |
|
|
|a XXIII, 707 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 4537
|
505 |
0 |
|
|a Information Access and Dissemination I -- Cost Framework for a Heterogeneous Distributed Semi-structured Environment -- Cost-Based Vertical Fragmentation for XML -- Efficiently Crawling Strategy for Focused Searching Engine -- QoS-Guaranteed Ring Replication Management with Strong Consistency -- A Mobile Database Sharing Protocol to Increase Data Availability in Mobile Environments -- Data Mining -- Mining Recent Frequent Itemsets over Data Streams with a Time-Sensitive Sliding Window -- Mining Web Transaction Patterns in an Electronic Commerce Environment -- Mining Purpose-Based Authorization Strategies in Database System -- RSP-DS: Real Time Sequential Pattern Analysis over Data Streams -- Sensor, P2P, and Grid Networks I -- Investigative Queries in Sensor Networks -- A Taxonomy-Based Approach for Constructing Semantics-Based Super-Peer Networks -- A Comparative Study of Replica Placement Strategies in Data Grids -- A Workload Balancing Based Approach to Discourage Free Riding in Peer-to-Peer Network -- QoS-Based Services Selecting and Optimizing Algorithms on Grid -- Information access and Dissemination 2 -- Bayesian Method Based Trusted Overlay for Information Retrieval over Networks -- Managing a Geographic Database from Mobile Devices Through OGC Web Services -- Real-Time Creation Method of Personalized Mobile Web Contents for Ubiquitous Contents Access -- Stream Data Management -- The Golden Mean Operator Scheduling Strategy in Data Stream Systems -- Continuous Skyline Tracking on Update Data Streams -- A Hybrid Algorithm for Web Document Clustering Based on Frequent Term Sets and k-Means -- Sensor, P2P, and Grid Networks 2 -- OMSI-Tree: Power-Awareness Query Processing over Sensor Networks by Removing Overlapping Regions -- On Studying Front-Peer Attack-Resistant Trust and Reputation Mechanisms Based on Enhanced Spreading Activation Model in P2P Environments -- A Load Balancing Method Using Ring Network in the Grid Database -- Design and Implementation of a System for Environmental Monitoring Sensor Network -- Policy Based Scheduling for Resource Allocation on Grid -- Potpourri -- Characterizing DSS Workloads from the Processor Perspective -- Exploiting Connection Relation to Compress Data Graph -- Indexing the Current Positions of Moving Objects on Road Networks -- Keynote Talk -- DBMSs with Native XML Support: Towards Faster, Richer, and Smarter Data Management -- A Personalized Re-ranking Algorithm Based on Relevance Feedback -- An Investigation and Conceptual Models of Podcast Marketing -- A User Study on the Adoption of Location Based Services -- Email Community Detection Using Artificial Ant Colony Clustering -- EviRank: An Evidence Based Content Trust Model for Web Spam Detection -- A Novel Factoid Ranking Model for Information Retrieval -- Dynamic Composition of Web Service Based on Coordination Model -- An Information Retrieval Method Based on Knowledge Reasoning -- Research on Personalized Recommendation Algorithm in E-Supermarket System -- XML Normal Forms Based on Constraint-Tree-Based Functional Dependencies -- Untyped XQuery Canonization -- Web Search Tailored Ontology Evaluation Framework -- Full Paper -- An Overview of the Business Process Maturity Model (BPMM) -- Process Mining: Extending ?-Algorithm to Mine Duplicate Tasks in Process Logs -- A Distributed Genetic Algorithm for Optimizing the Quality of Grid Workflow -- Safety Analysis and Performance Evaluation of Time WF-nets -- Dual Workflow Nets: Mixed Control/Data-Flow Representation for Workflow Modeling and Verification -- Bridging Organizational Structure and Information System Architecture Through Process -- Relation-Driven Business Process-Oriented Service Discovery -- Workflow Message Queue’s Performance Effect Measurements on an EJB-Based Workflow Management System -- Short Paper -- RFID Application Model and Performance for Postal Logistics -- An Organization and Task Based Access Control Model for Workflow System -- A Method of Web Services Composition Based on Service Alliance -- Toward a Lightweight Process-Aware Middleware -- Automatic Generation of Web Service Workflow Using a Probability Based Process-Semantic Repository -- A Three-Dimensional Customer Classification Model Based on Knowledge Discovery and Empirical Study -- QoS-Driven Global Optimization of Services Selection Supporting Services Flow Re-planning -- SOA-Based Collaborative Modeling Method for Cross-Organizational Business Process Integration -- Model Checking for BPEL4WS with Time -- A Version Management of Business Process Models in BPMS -- Research on Architecture and Key Technology for Service-Oriented Workflow Performance Analysis -- WPE Models and Applications -- The Study on Internet-Based Face Recognition System Using Principal Component Analysis -- Semantic Representation of RTBAC: Relationship-Based Access Control Model -- A Code-Based Multi-match Packet Classification with TCAM -- Security and Services of WPE -- Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile -- P-IDC: Information Security and Consideration in Building Internet Data Centers for Pervasive Environment -- Improvement of an Authenticated Key Agreement Protocol -- A Mechanism for Securing Digital Evidences in Pervasive Environments -- A Secure Chaotic Hash-Based Biometric Remote User Authentication Scheme Using Mobile Devices -- WSN/RFID/Web Services -- Adapting Web Services Security Standards for Mobile and Wireless Environments -- Coexistence Proof Using Chain of Timestamps for Multiple RFID Tags -- A Design of Authentication Protocol for Multi-key RFID Tag -- An Efficient Fragile Watermarking for Web Pages Tamper-Proof -- Classification of Key Management Schemes for Wireless Sensor Networks -- Data Management and Access Control for WPE -- An Efficient Algorithm for Proportionally Fault-Tolerant Data Mining -- SOGA: Fine-Grained Authorization for Self-Organizing Grid -- Permission-Centric Hybrid Access Control.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Data mining.
|
650 |
|
0 |
|a Information storage and retrieval.
|
650 |
|
0 |
|a User interfaces (Computer systems).
|
650 |
|
0 |
|a Artificial intelligence.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Data Mining and Knowledge Discovery.
|
650 |
2 |
4 |
|a Information Systems Applications (incl. Internet).
|
650 |
2 |
4 |
|a Information Storage and Retrieval.
|
650 |
2 |
4 |
|a User Interfaces and Human Computer Interaction.
|
650 |
2 |
4 |
|a Artificial Intelligence (incl. Robotics).
|
700 |
1 |
|
|a Chang, Kevin Chen-Chuan.
|e editor.
|
700 |
1 |
|
|a Wang, Wei.
|e editor.
|
700 |
1 |
|
|a Chen, Lei.
|e editor.
|
700 |
1 |
|
|a Ellis, Clarence A.
|e editor.
|
700 |
1 |
|
|a Hsu, Ching-Hsien.
|e editor.
|
700 |
1 |
|
|a Tsoi, Ah Chung.
|e editor.
|
700 |
1 |
|
|a Wang, Haixun.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783540729082
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 4537
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-540-72909-9
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|