By Topic

2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery

10-12 Oct. 2011

Filter Results

Displaying Results 1 - 25 of 109
  • [Front cover]

    Publication Year: 2011, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (1883 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2011, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (19 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2011, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (49 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (121 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s):v - xii
    Request permission for commercial reuse | PDF file iconPDF (136 KB)
    Freely Available from IEEE
  • Welcome

    Publication Year: 2011, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (123 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Steering Committee Chair

    Publication Year: 2011, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (66 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Technical Program Chairs

    Publication Year: 2011, Page(s):xv - xvi
    Request permission for commercial reuse | PDF file iconPDF (95 KB) | HTML iconHTML
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2011, Page(s):xvii - xviii
    Request permission for commercial reuse | PDF file iconPDF (79 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2011, Page(s):xix - xxiv
    Request permission for commercial reuse | PDF file iconPDF (95 KB)
    Freely Available from IEEE
  • Keynote speakers

    Publication Year: 2011, Page(s):xxv - xxx
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (163 KB)

    The following topics are dealt with: distributed control; database; data mining; mobile communication; network communication; quality of service; user experience; system management; authentication; privacy; reliability; cloud computing and healthcare computing. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Social-Knowledge-Directed Query Suggestion Approach for Exploratory Search

    Publication Year: 2011, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (351 KB) | HTML iconHTML

    Existing query suggestion techniques mainly revolve around mining existing queries that are most similar to a given query. If the query fails to precisely capture a user's real intent, for example, in most exploratory search tasks, suggested queries are likely to fail as well. If suggested queries are not only relevant to the query but also diverse in nature, it is likely that some of them are clo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Two-Layer SVM Classification Mechanism for Chinese Blog Article

    Publication Year: 2011, Page(s):9 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (286 KB) | HTML iconHTML

    In Taiwan, the famous bloggers can be regard as professional writers now. More and more people subscribe their RSS (Really Simple Syndication) to receive updated information. But readers might only interest in few categories of articles, readers need to filter other articles by themselves. In order to help people select the information they want, this research proposed a two-layer SVM classificati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An AHP-Based Recommendation System for Exclusive or Specialty Stores

    Publication Year: 2011, Page(s):16 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (281 KB) | HTML iconHTML

    Recommendation system is an important method of solving the problem of information overload. It also helps consumers to save time while searching for goods. Numerous recommendation techniques are proposed. However, they still have to confront some weaknesses such as cold-start, gray sheep and matrix sparsity problems. The purpose of this paper is to propose a method to overcome the cold-start prob... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Can Collective Use Help for Searching?

    Publication Year: 2011, Page(s):24 - 31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (390 KB) | HTML iconHTML

    In this paper we propose a "find similar" method intended to extend the searching capabilities of digital collections targeting educational and academic domains. Given a document, the described algorithm finds similar documents that may be of interest to the user. It exploits the metadata typical for the participatory web. In the adopted model, documents are viewed as objects associated with a set... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Approach for Repeated Patterns Mining Based on Indent Shape of HTML Documents

    Publication Year: 2011, Page(s):32 - 39
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (503 KB) | HTML iconHTML

    Mining of repeated patterns from HTML documents is the key step towards Web-based data mining and knowledge extraction. Many web crawling applications need efficient repeated patterns mining techniques to generate their wrapper automatically. Existing approaches such as tree matching and string matching can detect repeated patterns with high precision, but their performance is still a challenge fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploring Event Evolution Patterns at the Atomic Level

    Publication Year: 2011, Page(s):40 - 47
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (298 KB) | HTML iconHTML

    The event evolution mining for news corpus is beneficial for people who are less interested in the set of documents related by a topic rather than the underlying stories. Most of state-of-the-art approaches which derived from the TDT field considered events at the document level, which made different granularity for each event in evolution graph. In this paper, we consider events from a unified pe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Frequent Items Mining on Data Stream Based on Weighted Counts

    Publication Year: 2011, Page(s):48 - 54
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (198 KB) | HTML iconHTML

    Frequent items mining is an important data mining task with many real-world applications. By considering different weights of the items, weighted frequent items mining can discover more important knowledge compared to traditional frequent patterns mining. In this paper, we presented a new algorithm called count-MH to discover weighted frequent items over data streams, the proposed method is based ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Iterative Multivariate Regression Model for Correlated Responses Prediction

    Publication Year: 2011, Page(s):55 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (267 KB) | HTML iconHTML

    In the service oriented industry, a group of customers may be targeted for a set of marketing interests, and these interests are usually inter-correlated. For example, churn, upselling and appetency are often considered together, and decisions on how to retain customers, and to promote or to upgrade services are associated. Instead of predicting them separately as univariate models, we propose an ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Router: A Message Passing Model for Large-Scale Graph Mining

    Publication Year: 2011, Page(s):60 - 67
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (409 KB) | HTML iconHTML

    Many parallel computational models have been employed in many papers to process the large-scale graph. In this paper, we propose a message passing model Router which could be invoked by most of current parallel computational models to process the large graph. The model is good at solving the multi-source traversal problem which often occurs in many complex graph algorithms. As the model can traver... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Cross-Platform Runtime Environment for Mobile Widget-Based Application

    Publication Year: 2011, Page(s):68 - 71
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB) | HTML iconHTML

    In recent years, the market of mobile device keeps growing dramatically. Apple iPhone and Google Android are the two representatives of this kind of devices. However, the mobile applications of these platforms can only be executed on some specific platforms; these applications are not portable to other platforms. Another kind of application is Web-based widget, such as Yahoo! Mobile Widget. This k... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Performance Analysis of Deflection Routing and FDLs with Wavelength-Based QoS in OBS Networks

    Publication Year: 2011, Page(s):72 - 78
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (516 KB) | HTML iconHTML

    In Optical Burst Switching Network, contention is one of the challenging problems. Contention occurs when more than one burst demand for same output wavelength channel in same time. The deflection routing, fiber delay line (FDL) and wavelength conversion are the methods used to resolve contention in OBS Networks. With deflection routing, contending bursts in send in another route rather than prima... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Access Control for the Smart Meters Based on ABE

    Publication Year: 2011, Page(s):79 - 82
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (185 KB) | HTML iconHTML

    As more granular sensitive metering data are available in the demand response system, privacy issues are getting more and more attentions recently. The users' habits, behaviors and lifestyles can be deduced by the malicious entities from the energy information such as energy usage data, distributed energy generation and consumption, billing information and so on. In this paper we propose an access... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PCRLB-Based Cluster Selection for Target Tracking in Wireless Sensor Networks

    Publication Year: 2011, Page(s):83 - 87
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    To deal with the problem of tracking a maneuvering target in range-based sensor networks, we firstly derive the expression that describes the relation of the PCRLB and the distance from the sensor to the target, and on the basis of this expression, choose the sensor subset that may attend the incoming tracking event. Secondly, we design the cluster head selection strategy under communication const... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Aspect-Oriented Web Service Composition: A Petri Net Based Approach

    Publication Year: 2011, Page(s):88 - 95
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (493 KB) | HTML iconHTML

    In the various approaches of web service compositions proposed by the researcher, Aspect Oriented Web Service Composition (AOWSC) is the most formal way of composition. Composition is a set of relevant candidate web service, synchronously tied up with each other, delivered to the requestor at run time based on the service request. In par with aspect orientation, the candidate web services are deve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.