Scheduled System Maintenance
On Saturday, October 21, single article sales and account management will be unavailable until 6 PM ET.
Notice: There is currently an issue with the citation download feature. Learn more.

2010 Seventh Web Information Systems and Applications Conference

20-22 Aug. 2010

Filter Results

Displaying Results 1 - 25 of 53
  • [Front cover]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (732 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (87 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (154 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (114 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (157 KB)
    Freely Available from IEEE
  • Message from the General Chairs

    Publication Year: 2010, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (105 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Committee Chairs

    Publication Year: 2010, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (102 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference organization

    Publication Year: 2010, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (112 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2010, Page(s):xii - xiii
    Request permission for commercial reuse | PDF file iconPDF (104 KB)
    Freely Available from IEEE
  • Location-Dependent Skyline Query Processing in Mobile Databases

    Publication Year: 2010, Page(s):3 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (187 KB) | HTML iconHTML

    Skyline query processing has received considerable attention from database and information retrieval research communities. However, the existing work on skyline queries mainly assumes data objects contain only non-spatial attributes. In this paper, we address the problem of answering location-dependent skyline queries efficiently over data objects with both spatial locations and non-spatial attrib... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Document Clustering in Personal Dataspace

    Publication Year: 2010, Page(s):9 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (170 KB) | HTML iconHTML

    In Personal Dataspace (PDS), documents containing a lot of useful information play an important role in our daily work. However, it is difficult to manage the information in these documents efficiently. In this paper, we first extract some frequent terms from documents, and then cluster these documents based on the terms. Thus users can query the documents based on their contents conveniently. The... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Elimination Algorithm of Redundant Association Rules Based on Domain Knowledge

    Publication Year: 2010, Page(s):13 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (155 KB) | HTML iconHTML

    Many association rule mining algorithms have been developed to extract interesting patterns from large databases. However, a large amount of knowledge explicitly represented in domain knowledge has not been used to reduce the number of association rules. A significant number of known associations are unnecessarily extracted by association rule mining algorithms. The result is the generation of hun... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Hotspot Data in Mobile Broadcasting Based on Data Mining

    Publication Year: 2010, Page(s):17 - 20
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (171 KB) | HTML iconHTML

    Mobile computing is becoming a popular computing method. Data broadcasting, an effective data accessing method, is an important technique to improve the scalability. And hotspot data is the key of data broadcasting. In this article, based on the discovery of hotspot data, the ID3 algorithm with multi-value bias has been improved. A data broadcasting algorithm based on improved NewDtree has been in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Feature Distribution Based Quick Image Retrieval

    Publication Year: 2010, Page(s):23 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB) | HTML iconHTML

    Query by image example is still a challenge in image retrieval. The goal of similarity retrieval in images is to get the similar images quickly and accurately in high-dimension space. The accuracy of similarity retrieval in high-dimension space is mainly decided by the features representing images and the method used for similar calculation. Our main goal in this paper is to improve the retrieval ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extracting and Clustering Method of Web Bipartite Cores

    Publication Year: 2010, Page(s):29 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (210 KB) | HTML iconHTML

    The paper focuses on some key problems in Web communities' discovery. Based on topic-oriented communities discovery, we analyze some insufficiencies of CBG (complete bipartite graph) in trawling method. The conception of x-core-set is introduced, instead of CBG, it is more reasonable as a signature of core of community. We construct a bipartite graph from a node x and then (i, j)pruning the graph ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improved LAM Feature Selection Algorithm

    Publication Year: 2010, Page(s):35 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (181 KB) | HTML iconHTML

    In text categorization, feature selection is an effective feature dimension-reduction methods. To solve the problems of unadaptable high original feature space dimension, too much irrelevance, data redundancy and difficulties in selecting a threshold, we propose an improved LAM feature selection algorithm (ILAMFS). Firstly, combining the gold segmentation and the LAM algorithm based on the charact... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Two-Level Programming Model Based on Spreadsheet and Data Flow Chart

    Publication Year: 2010, Page(s):39 - 42
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (235 KB) | HTML iconHTML

    This paper proposes a two-level programming model based on spreadsheet and data flow chart for end-user programming, which adopts spreadsheet-based top-down construction pattern and dataflow-based bottom-up modification pattern to compose mashup applications. The model can not only provide users with spreadsheet-like programming style, but also provide flexible modification operators for mashups t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TwigFilter: An Efficient Holistic Approach of XML Twig Pattern Matching

    Publication Year: 2010, Page(s):43 - 46
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB) | HTML iconHTML

    This paper presents a new approach to evaluate XML twig queries, named TwigFilter, the algorithm based on DataGuide considers that a query usually have only a few nodes to output, and it is a single-phase algorithm without the merge stage. The experimental results show that TwigFilter is superior to the previous algorithms, especially for only AD relationship in XPath expression. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Algorithm of Resource Evaluation and Selection Based on Multi-QoS Constraints

    Publication Year: 2010, Page(s):49 - 52
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    While most of the work on resource scheduling in Grid computing has focused on optimal make span of the whole systems, our work addresses this problem from the resource consumer's point of view by providing multi QoS constraints and related methods. An algorithm of resource evaluation and selection, RESA, is presented, applying multiple attribute decision making (MADM) and hierarchical analysis me... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Policy Generation for Privacy Protection Based on Granular Computing

    Publication Year: 2010, Page(s):53 - 58
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (286 KB) | HTML iconHTML

    Privacy is an increasingly cited concept in the large-scale deployment of web services in pervasive computing. The necessity of putting data-owners' personal information online and unwanted intentions to access data-owners' information augment the risk of privacy disclosure. To address this problem, we propose a policy-based privacy protection mechanism that protects personal information by policy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling Users' Visiting Behaviors for Web Load Testing by Continuous Time Markov Chain

    Publication Year: 2010, Page(s):59 - 64
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (234 KB) | HTML iconHTML

    Virtual users with high quality are the preconditions to ensure the effect of load testing for Web applications. The existed tools for load testing usually generate virtual users with randomly choosing user sessions, manually generating user sessions or mining Log files, which causing such problems as non-real workload, subjectivity or difficult to update. Therefore we set each virtual user with a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Protecting Location Privacy Using Cloaking Subgraphs on Road Network

    Publication Year: 2010, Page(s):65 - 68
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (409 KB) | HTML iconHTML

    Mobile users traveling over roads often issue KNN queries based on their current locations with their mobile terminals (e.g. where is the nearest gas station?). However, exact location information transmitted to an unsecure server will easily lead the mobile user to be tracked. Thus it is important to protect mobile users' location privacy while providing location-based services. People traveling ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Practice of Web-Based Sustainable Preservation Risk Management System for Digital Libraries in China

    Publication Year: 2010, Page(s):69 - 72
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB) | HTML iconHTML

    While many research projects in the world have been addressing challenges posed by digital preservation, digital libraries in China have their own native problems that have never been addressed before. Similar problems may occur in other countries, and their memory institutions may be less prepared to handle them. Quite often, information in the native special digital objects is also unique in wor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CQIG: An Improved Web Search Results Clustering Algorithm

    Publication Year: 2010, Page(s):75 - 78
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (399 KB) | HTML iconHTML

    Massive linear search results returned from traditional search engines bring much inconvenience to users when extract the information they need. Search result clustering is of critical need for grouping similar topics of documents. The existing algorithm has drawbacks in clustering labels screening, cluster quality assessment, overlapping clusters controlling. The improved clustering algorithm-CQI... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Crawling Result Pages for Data Extraction Based on URL Classification

    Publication Year: 2010, Page(s):79 - 84
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (242 KB) | HTML iconHTML

    In Web database integration, crawling data pages is important for data extraction. The fact that data are contained by multiple result pages increases the difficulty of accessing data for integration. Thus, it is necessary to accurately and automatically crawl query result pages from Web database. To address this problem, we propose a novel approach based on URL classification to effectively ident... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.