Advances in Web and Network Technologies, and Information Management APWeb/WAIM 2007 International Workshops: DBMAN 2007, WebETrends 2007, PAIS 2007 and ASWAN 2007, Huang Shan, China, June 16-18, 2007. Proceedings /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Chang, Kevin Chen-Chuan (Επιμελητής έκδοσης), Wang, Wei (Επιμελητής έκδοσης), Chen, Lei (Επιμελητής έκδοσης), Ellis, Clarence A. (Επιμελητής έκδοσης), Hsu, Ching-Hsien (Επιμελητής έκδοσης), Tsoi, Ah Chung (Επιμελητής έκδοσης), Wang, Haixun (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2007.
Σειρά:Lecture Notes in Computer Science, 4537
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Information Access and Dissemination I
  • Cost Framework for a Heterogeneous Distributed Semi-structured Environment
  • Cost-Based Vertical Fragmentation for XML
  • Efficiently Crawling Strategy for Focused Searching Engine
  • QoS-Guaranteed Ring Replication Management with Strong Consistency
  • A Mobile Database Sharing Protocol to Increase Data Availability in Mobile Environments
  • Data Mining
  • Mining Recent Frequent Itemsets over Data Streams with a Time-Sensitive Sliding Window
  • Mining Web Transaction Patterns in an Electronic Commerce Environment
  • Mining Purpose-Based Authorization Strategies in Database System
  • RSP-DS: Real Time Sequential Pattern Analysis over Data Streams
  • Sensor, P2P, and Grid Networks I
  • Investigative Queries in Sensor Networks
  • A Taxonomy-Based Approach for Constructing Semantics-Based Super-Peer Networks
  • A Comparative Study of Replica Placement Strategies in Data Grids
  • A Workload Balancing Based Approach to Discourage Free Riding in Peer-to-Peer Network
  • QoS-Based Services Selecting and Optimizing Algorithms on Grid
  • Information access and Dissemination 2
  • Bayesian Method Based Trusted Overlay for Information Retrieval over Networks
  • Managing a Geographic Database from Mobile Devices Through OGC Web Services
  • Real-Time Creation Method of Personalized Mobile Web Contents for Ubiquitous Contents Access
  • Stream Data Management
  • The Golden Mean Operator Scheduling Strategy in Data Stream Systems
  • Continuous Skyline Tracking on Update Data Streams
  • A Hybrid Algorithm for Web Document Clustering Based on Frequent Term Sets and k-Means
  • Sensor, P2P, and Grid Networks 2
  • OMSI-Tree: Power-Awareness Query Processing over Sensor Networks by Removing Overlapping Regions
  • On Studying Front-Peer Attack-Resistant Trust and Reputation Mechanisms Based on Enhanced Spreading Activation Model in P2P Environments
  • A Load Balancing Method Using Ring Network in the Grid Database
  • Design and Implementation of a System for Environmental Monitoring Sensor Network
  • Policy Based Scheduling for Resource Allocation on Grid
  • Potpourri
  • Characterizing DSS Workloads from the Processor Perspective
  • Exploiting Connection Relation to Compress Data Graph
  • Indexing the Current Positions of Moving Objects on Road Networks
  • Keynote Talk
  • DBMSs with Native XML Support: Towards Faster, Richer, and Smarter Data Management
  • A Personalized Re-ranking Algorithm Based on Relevance Feedback
  • An Investigation and Conceptual Models of Podcast Marketing
  • A User Study on the Adoption of Location Based Services
  • Email Community Detection Using Artificial Ant Colony Clustering
  • EviRank: An Evidence Based Content Trust Model for Web Spam Detection
  • A Novel Factoid Ranking Model for Information Retrieval
  • Dynamic Composition of Web Service Based on Coordination Model
  • An Information Retrieval Method Based on Knowledge Reasoning
  • Research on Personalized Recommendation Algorithm in E-Supermarket System
  • XML Normal Forms Based on Constraint-Tree-Based Functional Dependencies
  • Untyped XQuery Canonization
  • Web Search Tailored Ontology Evaluation Framework
  • Full Paper
  • An Overview of the Business Process Maturity Model (BPMM)
  • Process Mining: Extending ?-Algorithm to Mine Duplicate Tasks in Process Logs
  • A Distributed Genetic Algorithm for Optimizing the Quality of Grid Workflow
  • Safety Analysis and Performance Evaluation of Time WF-nets
  • Dual Workflow Nets: Mixed Control/Data-Flow Representation for Workflow Modeling and Verification
  • Bridging Organizational Structure and Information System Architecture Through Process
  • Relation-Driven Business Process-Oriented Service Discovery
  • Workflow Message Queue’s Performance Effect Measurements on an EJB-Based Workflow Management System
  • Short Paper
  • RFID Application Model and Performance for Postal Logistics
  • An Organization and Task Based Access Control Model for Workflow System
  • A Method of Web Services Composition Based on Service Alliance
  • Toward a Lightweight Process-Aware Middleware
  • Automatic Generation of Web Service Workflow Using a Probability Based Process-Semantic Repository
  • A Three-Dimensional Customer Classification Model Based on Knowledge Discovery and Empirical Study
  • QoS-Driven Global Optimization of Services Selection Supporting Services Flow Re-planning
  • SOA-Based Collaborative Modeling Method for Cross-Organizational Business Process Integration
  • Model Checking for BPEL4WS with Time
  • A Version Management of Business Process Models in BPMS
  • Research on Architecture and Key Technology for Service-Oriented Workflow Performance Analysis
  • WPE Models and Applications
  • The Study on Internet-Based Face Recognition System Using Principal Component Analysis
  • Semantic Representation of RTBAC: Relationship-Based Access Control Model
  • A Code-Based Multi-match Packet Classification with TCAM
  • Security and Services of WPE
  • Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile
  • P-IDC: Information Security and Consideration in Building Internet Data Centers for Pervasive Environment
  • Improvement of an Authenticated Key Agreement Protocol
  • A Mechanism for Securing Digital Evidences in Pervasive Environments
  • A Secure Chaotic Hash-Based Biometric Remote User Authentication Scheme Using Mobile Devices
  • WSN/RFID/Web Services
  • Adapting Web Services Security Standards for Mobile and Wireless Environments
  • Coexistence Proof Using Chain of Timestamps for Multiple RFID Tags
  • A Design of Authentication Protocol for Multi-key RFID Tag
  • An Efficient Fragile Watermarking for Web Pages Tamper-Proof
  • Classification of Key Management Schemes for Wireless Sensor Networks
  • Data Management and Access Control for WPE
  • An Efficient Algorithm for Proportionally Fault-Tolerant Data Mining
  • SOGA: Fine-Grained Authorization for Self-Organizing Grid
  • Permission-Centric Hybrid Access Control.