|
The 1st International Workshop on Sensor Networks and Data Engineering (SenDe 2012) |
|
|
|
Keynote Speech: Technological Breakthroughs in Environmental Sensor Networks |
|
|
1 | (1) |
|
|
A New Formal Description Model of Network Attacking and Defence Knowledge of Oil and Gas Field SCADA System |
|
|
2 | (9) |
|
|
|
|
|
|
|
|
|
An Efficient Overload Control Strategy in Cloud |
|
|
11 | (8) |
|
|
|
|
|
|
The Geological Disasters Defense Expert System of the Massive Pipeline Network SCADA System Based on FNN |
|
|
19 | (8) |
|
|
|
|
|
|
|
TDSC: A Two-phase Duplicate String Compression Algorithm |
|
|
27 | (8) |
|
|
|
|
Twig Pattern Matching Running on XML Streams |
|
|
35 | (8) |
|
|
|
|
A Novel Method for Extension Transformation Knowledge Discovering |
|
|
43 | (8) |
|
|
|
|
|
A Flexible Parallel Runtime for Large Scale Block-Based Matrix Multiplication |
|
|
51 | (9) |
|
|
|
|
|
Group Detection and Relation Analysis Research for Web Social Network |
|
|
60 | (8) |
|
|
|
|
|
Worm Propagation Control Based on Spatial Correlation in Wireless Sensor Network |
|
|
68 | (10) |
|
|
|
|
|
PointBurst: Towards a Trust-Relationship Framework for Improved Social Recommendations |
|
|
78 | (11) |
|
|
|
|
|
|
The 1st International Workshop on Intelligent Data Processing (IDP 2012) |
|
|
|
Analysis Framework for Electric Vehicle Sharing Systems Using Vehicle Movement Data Stream |
|
|
89 | (6) |
|
|
|
|
|
|
Research on Customer Segmentation Based on Extension Classification |
|
|
95 | (11) |
|
|
|
|
An Incremental Mining Algorithm for Association Rules Based on Minimal Perfect Hashing and Pruning |
|
|
106 | (8) |
|
|
|
LDA-Based Topic Modeling in Labeling Blog Posts with Wikipedia Entries |
|
|
114 | (11) |
|
|
|
|
|
|
|
|
The Correlation between Semantic Visual Similarity and Ontology-Based Concept Similarity in Effective Web Image Search |
|
|
125 | (6) |
|
|
|
An Adaptive Design Pattern for Invocation of Synchronous and Asynchronous Web Services in Autonomic Computing Systems |
|
|
131 | (12) |
|
|
|
Mining Tribe-Leaders Based on the Frequent Pattern of Propagation |
|
|
143 | (11) |
|
|
|
|
|
Workshop on Information Extraction and Knowledge Base Building (IEKB 2012) |
|
|
|
Research on Semantic Label Extraction of Domain Entity Relation Based on CRF and Rules |
|
|
154 | (9) |
|
|
|
|
|
|
Recognition of Chinese Personal Names Based on CRFs and Law of Names |
|
|
163 | (8) |
|
|
|
|
|
An Academic Search and Analysis Prototype for Specific Domain |
|
|
171 | (8) |
|
|
|
|
|
Learning Chinese Entity Attributes from Online Encyclopedia |
|
|
179 | (8) |
|
|
|
|
A Mathematical Model for Human Flesh Search Engine |
|
|
187 | (12) |
|
|
|
|
The 2nd International Workshop on Mobile Business Collaboration (MBC 2012) |
|
|
|
A New Dynamic ID-Based Remote User Authentication Scheme with Forward Secrecy |
|
|
199 | (13) |
|
|
|
|
|
Reconstructing Unsound Data Provenance View in Scientific Workflow |
|
|
212 | (9) |
|
|
|
|
A Process Distance Metric Based on Alignment of Process Structure Trees |
|
|
221 | (12) |
|
|
|
|
|
|
Adoption of Cloud Computing in Supply Chain Management Solutions: A SCOR-Aligned Assessment |
|
|
233 | (12) |
|
|
Exploiting Space-Time Status for Service Recommendation |
|
|
245 | (12) |
|
|
|
|
|
Invariant Analysis for Ordering Constraints of Multi-view Business Process Model |
|
|
257 | (12) |
|
|
|
|
Author Index |
|
269 | |