By Topic

Web Information Systems and Mining (WISM), 2010 International Conference on

Date 23-24 Oct. 2010

Go

Filter Results

Displaying Results 1 - 25 of 97
  • [Front cover - Vol 2]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (7536 KB)
    Freely Available from IEEE
  • [Title page i - Volume 2]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (95 KB)
    Freely Available from IEEE
  • [Title page iii - Volume 2]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (149 KB)
    Freely Available from IEEE
  • [Copyright notice - Volume 2]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • Table of contents - Volume 2

    Publication Year: 2010, Page(s):v - xi
    Request permission for commercial reuse | PDF file iconPDF (165 KB)
    Freely Available from IEEE
  • Preface - Volume 2

    Publication Year: 2010, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (131 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee - Volume 2

    Publication Year: 2010, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (154 KB)
    Freely Available from IEEE
  • Program Committee - Volume 2

    Publication Year: 2010, Page(s):xiv - xv
    Request permission for commercial reuse | PDF file iconPDF (141 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2010, Page(s):xvi - xviii
    Request permission for commercial reuse | PDF file iconPDF (89 KB)
    Freely Available from IEEE
  • Improvement of Running Tunnel Based on OSPF TE

    Publication Year: 2010, Page(s):3 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (396 KB) | HTML iconHTML

    In the existing traffic engineering, information can only be transmitted in a single OSPF area. When there are multiple OSPF areas, the tunnel is difficult to establish. For this problem, combined with the existing OSPF technology on three categories LSA processing flow, in the right less impact on the relevant modules of the situation, solutions are proposed to achieve a particular area of traffi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Investigation of Security and Defense System for Home Based on Internet of Things

    Publication Year: 2010, Page(s):8 - 12
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (277 KB) | HTML iconHTML

    As the traditional security and defense systems appear some defects, such as wiring problems, higher construction and maintenance expense and delay of receiving alarm messages, a scheme based on Internet of Things is proposed. Embedded ARM9 S3C2440A micro controller is adopted as system master controller, which carries out receiving and processing the transmission alarm message of RF chip worked a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Multi-colony Diploid Genetic Algorithm for Production Logistics Scheduling Optimization

    Publication Year: 2010, Page(s):13 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (599 KB) | HTML iconHTML

    In this paper, we present a Multi-Colony Diploid Genetic Algorithm (MCDGA) for Flexible Job-Scheduling Problem (FJSP), a simulation model is presented to solve the FJSP. The proposed model has been coded by Matlab which is a special mathematical computation language. After modeling the pending problem, the model is validated by a representative instances based on practical data. The result obtaine... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Security Models of Highway Toll Network

    Publication Year: 2010, Page(s):18 - 21
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (307 KB) | HTML iconHTML

    With the development of national economy, the construction of highway network makes astounding advances. The province highway network is evolving after some years' construction. With the formation of the road network, the security issue of highway toll network is becoming prominent. In this paper, the status and the network security issue of the current highway toll network charge, combined with Z... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on the CAD/CAE Integrated System for Mass Customization

    Publication Year: 2010, Page(s):22 - 25
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (367 KB) | HTML iconHTML

    A CAD/CAE integrated method of customization product is proposed under mass customization environment. To improve product family design methods for mass customization, scale-based modular method is put forward. It includes two processes of product family modeling and customization product design. First of all, customization product can be achieved by changing the values of scale factors and replac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RFID and GSM Technology Building Intelligent Relief Supplies Distribution and Monitoring System

    Publication Year: 2010, Page(s):26 - 29
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB) | HTML iconHTML

    Taking advantage of the technology of wireless sensor networks (WSNs), the radio frequency identification (RFID) and global system for mobile communication(GSM), this paper constructs a wireless communication and intelligent application system. WSNs combines with RFID system collect basic materials property data, materials environmental data perceived by all kinds of sensors and materials coordina... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Agents Screening Model Based on Fairness Preference in Knowledge Networks

    Publication Year: 2010, Page(s):30 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (279 KB) | HTML iconHTML

    The article combines agents screening model with F-S unfairness aversion model to investigate the influence of fairness preference on agents' competence screening contracts design in knowledge networks. We suggest that principal with fairness preference will cut down information rent to increase his utility. If efficient agents possess fairness preference, principal will increase the output of ine... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Application of Wireless Sensor Networking in Environmental Monitoring Based on LEACH Protocol

    Publication Year: 2010, Page(s):35 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (318 KB) | HTML iconHTML

    Integration of sensors, embedded operating systems, wireless networking technology, wireless sensor networks, is a new information gathering and processing technologies, in environmental monitoring has a very good application and advantages. This paper introduced a method model based on ZigBee-technology. Depending on specific situation in environment, LEACH communication protocol was chosen. The ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Research in Real-Time Protected Management System of Broadband Network Information Safety

    Publication Year: 2010, Page(s):39 - 42
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (151 KB) | HTML iconHTML

    With the development of computer network technology, people gradually pay more attention to the network information security. More and more advanced technologies are being used to solve this issue. In this paper, the real-time protected management system of broadband network information safety in unified controlling platform is presented. This system possesses the ability of intelligent detection.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A (t,n)-Threshold Group Signature Scheme Based on Compartmented Secret Sharing

    Publication Year: 2010, Page(s):45 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (183 KB) | HTML iconHTML

    A compartmented access structure is an access structure that does not distinguish between participants belonging to the same compartment. In this paper, we design an ideal secret sharing scheme for a compartmented threshold access structure. A secure (t,n)-threshold group signature scheme based on the secret sharing scheme is proposed. We achieve this result by combining mature signature primitive... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Digital Image Watermarking Method Based on Tight Framelet

    Publication Year: 2010, Page(s):49 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (731 KB) | HTML iconHTML

    Compared with wavelet, tight frame let has good time-frequency analysis ability. In this paper, we propose anew digital image watermarking algorithm based on tight frame let. In our method, the host image is firstly decomposed by frame let. Secondly, the watermark image is transformed by Arnold scrambling and then is embedded in the lowest frequency sub band of the host image. Experimental results... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Certificateless Proxy Re-encryption Scheme

    Publication Year: 2010, Page(s):53 - 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (411 KB) | HTML iconHTML

    In a proxy re-encryption (PRE) scheme, a semi-trusted proxy is given special information that allows it to transform cipher texts encrypted under Alice's public key into the different cipher texts that can be decrypted by Bob's secret key. In 2006, Green and Ateniese proposed identity-based proxy re-encryption schemes, in which cipher texts are transformed from one identity to another. Based on th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Temporal Model for Group-Centric Secure Information Sharing

    Publication Year: 2010, Page(s):59 - 62
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (353 KB) | HTML iconHTML

    Traditional approach to information sharing focuses on attaching attributes and policies to an object as it is disseminated from producers to consumers in a system. In contrast, group-centric sharing brings subjects and objects together in a group to facilitate sharing. The metaphor “secure meeting room” characterize the Group-Centric approach where participants and information come ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Cryptography Application of Conjugate Quasigroups

    Publication Year: 2010, Page(s):63 - 65
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (218 KB) | HTML iconHTML

    In this article, we design a stream cipher based on the the conjugates of quasigroups. According to the analysis given in the article the method is extremely secure. Beside that, the plaintext and its cipher text are of the same length, and the stream cipher needs small storage in memory since one quasigroup can be used as three different quasigroups. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Optimization of Rekeying Scheme for Secure Multicast

    Publication Year: 2010, Page(s):66 - 70
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (291 KB) | HTML iconHTML

    The security management of group key is essential to secure multicast. This paper analyzes the advantages and disadvantages of a key management scheme for secure multicast, and proposes a new rekeying scheme based on it. By adding one-way hash function, some users can calculate the keys along the path from their own point to root by themselves, and during a departure procedure, one user is selecte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discrete Chaotic Exclusive OR Encryption of Digital Image

    Publication Year: 2010, Page(s):71 - 73
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (383 KB) | HTML iconHTML

    According to the particular properties of discrete chaotic sequences, and combining the structure characters of digital images, obeying the common encryption principles of digital images, a discrete chaotic exclusive OR encryption scheme of digital images is carefully studied and proposed. In the light of the size of a digital image which needs to be encrypted, and producing a corresponding binary... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.