Web Information Systems and Mining International Conference, WISM 2012, Chengdu, China, October 26-28, 2012. Proceedings /

The volume LNCS 7529 constitutes the refereed proceedings of the International Conference on Web Information Systems and Mining, WISM 2012, held in Chengdu, China, in October 2012. The 87 revised full papers presented were carefully reviewed and selected from 418 submissions. The papers are organize...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Wang, Fu Lee (Επιμελητής έκδοσης), Lei, Jingsheng (Επιμελητής έκδοσης), Gong, Zhiguo (Επιμελητής έκδοσης), Luo, Xiangfeng (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2012.
Σειρά:Lecture Notes in Computer Science, 7529
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 09423nam a22006015i 4500
001 978-3-642-33469-6
003 DE-He213
005 20151030041112.0
007 cr nn 008mamaa
008 121009s2012 gw | s |||| 0|eng d
020 |a 9783642334696  |9 978-3-642-33469-6 
024 7 |a 10.1007/978-3-642-33469-6  |2 doi 
040 |d GrThAP 
050 4 |a QA76.76.A65 
072 7 |a UNH  |2 bicssc 
072 7 |a UDBD  |2 bicssc 
072 7 |a COM032000  |2 bisacsh 
082 0 4 |a 005.7  |2 23 
245 1 0 |a Web Information Systems and Mining  |h [electronic resource] :  |b International Conference, WISM 2012, Chengdu, China, October 26-28, 2012. Proceedings /  |c edited by Fu Lee Wang, Jingsheng Lei, Zhiguo Gong, Xiangfeng Luo. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2012. 
300 |a XVIII, 718 p. 271 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 7529 
505 0 |a Study on the Design of Automatic Cotton Bale Inspecting Management System -- The Smallest Randi´c Index for Trees -- Design of Meridian and Acupoints Compatibility Analysis System -- Invariant Subspaces for Operators with Thick Spectra -- Voronoi Feature Selection Model Considering Variable-Scale Map’s Balance and Legibility -- A Code Dissemination Protocol of Low Energy Consumption -- Dynamic Spectrum Analysis of High-Speed Train Passenger Compartment Luggage Rack Noise -- Port-Based Composable Modeling and Simulation for Safety Critical System Testbed -- Risk Assessment Method of Radio Block Center in Fuzzy Uncertain Environment -- Learning Research in Knowledge Transfer -- A Post-filtering Technique for Enhancing Acoustic Echo Cancelation System -- Packet Dropping Schemes and Quality Evaluation for H.264 Videos at High Packet Loss Rates -- A Blocked Statistics Method Based on Directional Derivative -- Study on Cooperative Game Model of Talent Training through School-Enterprise Coalition -- Research on Internet Public Opinion Detection System Based on Domain Ontology -- A Security Analysis Model Based on Artificial Neural Network -- Social Network Analyses on Knowledge Diffusion of China’s Management Science -- A Parallel Association-Rule Mining Algorithm -- An Algorithm of Parallel Programming Design Based on Problem Domain Model -- Metadata-Aware Small Files Storage Architecture on Hadoop -- Research on the Isomorphism of the Electronic-Government and Electronic-Commerce in Support System -- On the Deployment of Wireless Sensor Networks with Regular Topology Patterns -- An Empirical Study on the Relationship among Trust and the Risky and Non-Risky Components of E-Commerce -- Process Modeling and Reengineering in the Integration Stage of Electronic Government -- Development of Vertical Industrial B2B in China: Based on Cases Study -- Personalized Recommendation System on Massive Content Processing Using Improved MFNN -- A Speaker Recognition Based Approach for Identifying Voice Spammer -- Security Access Authentication System for IPv4/IPv6 Dual-Stack Campus Network Based on IpoE -- Information Encryption Based on Virtual Optical Imaging System and Chen’s Chaos -- A New Scheme with Secure Cookie against SSLStrip Attack -- ID-Based Signatures from Lattices in the Random Oracle Model -- Strongly Secure Attribute-Based Authenticated Key Exchange with Traceability -- A New Public Key Signature Scheme Based on Multivariate Polynomials -- Comments on an Advanced Dynamic ID-Based Authentication Scheme for Cloud Computing -- Research on Security Management in Active Network Node Operating Systems -- An Integrity Verification Scheme for Multiple Replicas in Clouds -- Multi-stage Attack Detection Algorithm Based on Hidden Markov Model -- Security Analysis of a Secure and Practical Dynamic Identity-Based Remote User Authentication Scheme -- Formal Construction of Secure Information Transmission in Office Automation System -- A Novel CBCD Scheme Based on Local Features Category -- Research and Improvement on Association Rule Algorithm Based on FP-Growth -- Encrypted Remote User Authentication Scheme by Using Smart Card -- A Web Visualization System of Cyberinfrastructure Resources -- A Novel Clustering Mechanism Based on Image-Oriented Correlation Coefficient for Wireless Multimedia Sensor Networks -- Design of Underground Miner Positioning System Based on ZigBee Technology -- Metadata Management of Context Resources in Context-Aware Middleware System -- Research on Scientific Data Sharing Platform of Hydrology and Water Resources Based on Service Composition -- Study on the Scheme of Tianjin Area E-commerce Platform Construction -- Research on Chinese Hydrological Data Quality Management -- Using IoT Technologies to Resolve the Food Safety Problem – An Analysis Based on Chinese Food Standards -- Towards Better Cross-Cloud Data Integration: Using P2P and ETL Together -- Design of Intelligent Maintenance Decision-Making System for Fixed Equipment in Petrochemical Plants -- Dimensional Modeling for Landslide Monitoring Data Warehouse -- A New Fuzzy Risk Evaluation Method for Uncertain Network Public Sentiment Emergency -- Service Lifecycle Management in Distributed JBI Environment -- Graded BDI Models for Agent Architectures Based on _Lukasiewicz Logic and Propositional Dynamic Logic -- Energy Model of SARA and Its Performance Analysis -- Data Profiling for Semantic Web Data -- Checking and Handling Inconsistency of DBpedia -- Conceptual Representing of Documents and Query Expansion Based on Ontology -- Robust Web Data Extraction: A Novel Approach Based on Minimum Cost Script Edit Model -- Rule-Based Text Mining of Chinese Herbal Medicines with Patterns in Traditional Chinese Medicine for Chronic Obstructive Pulmonary Disease -- Fault Forecast of Electronic Equipment Based on ε – SVR -- Analysis and Design of Internet Monitoring System on Public Opinion Based on Cloud Computing and NLP -- Using Similes to Extract Basic Sentiments across Languages -- Automatic Summarization for Chinese Text Using Affinity Propagation Clustering and Latent Semantic Analysis -- A Webpage Deletion Algorithm Based on Hierarchical Filtering -- Research in Keyword Extraction -- Tuple Refinement Method Based on Relationship Keyword Extension -- An Agent Based Intelligent Meta Search Engine -- A Novel Image Annotation Feedback Model Based on Internet-Search -- The Design and Application of an Ancient Porcelain Online Identification Analysis System --  Web Crawler in In-Site Search -- A Novel Shark-Search Algorithm for Theme Crawler -- A Framework of Online Proxy-Based Web Prefetching -- Mapping the Intellectual Structure by Co-word: A Case of International Management Science -- Study on Multi-sensor Information Fusion Technology in the Dynamic Monitoring of Coal Mine Roof -- Detecting Hot Topics in Chinese Microblog Streams Based on Frequent Patterns Mining -- KACTL: Knowware Based Automated Construction of a Treelike Library from Web Documents -- Associating Labels and Elements of Deep Web Query Interface Based on DOM -- Design and Implementation of the Online Shopping System -- System Development of Residence Property Management Based on WEB -- An Intelligent Metadata Extraction Approach Based on Programming by Demonstration -- OF-NEDL: An OpenFlow Networking Experiment Description Language Based on XML -- Structural Similarity Evaluation of XML Documents Based on Basic Statistics -- An XML Data Query Method Based on Structure-Encoded. 
520 |a The volume LNCS 7529 constitutes the refereed proceedings of the International Conference on Web Information Systems and Mining, WISM 2012, held in Chengdu, China, in October 2012. The 87 revised full papers presented were carefully reviewed and selected from 418 submissions. The papers are organized in topical sections on applications of Web information systems; applications of Web mining; e-government and e-commerce; information security; intelligent networked systems; management information systems; mobile computing; semantic Web and ontologies; Web information extraction; Web intelligence; Web interfaces and applications; and XML and semi-structured data. 
650 0 |a Computer science. 
650 0 |a Computer security. 
650 0 |a Data mining. 
650 0 |a Information storage and retrieval. 
650 0 |a Management information systems. 
650 0 |a E-commerce. 
650 1 4 |a Computer Science. 
650 2 4 |a Information Systems Applications (incl. Internet). 
650 2 4 |a Information Storage and Retrieval. 
650 2 4 |a Data Mining and Knowledge Discovery. 
650 2 4 |a e-Commerce/e-business. 
650 2 4 |a Systems and Data Security. 
650 2 4 |a Management of Computing and Information Systems. 
700 1 |a Wang, Fu Lee.  |e editor. 
700 1 |a Lei, Jingsheng.  |e editor. 
700 1 |a Gong, Zhiguo.  |e editor. 
700 1 |a Luo, Xiangfeng.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783642334689 
830 0 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 7529 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-33469-6  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (Springer-11645)