2014 11th Web Information System and Application Conference

12-14 Sept. 2014

Filter Results

Displaying Results 1 - 25 of 62
  • Cover Art

    Publication Year: 2014, Page(s): C4
    Request permission for reuse | PDF file iconPDF (1293 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2014, Page(s): i
    Request permission for reuse | PDF file iconPDF (98 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2014, Page(s): iii
    Request permission for reuse | PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • Copyright Page

    Publication Year: 2014, Page(s): iv
    Request permission for reuse | PDF file iconPDF (117 KB)
    Freely Available from IEEE
  • Table of Contents

    Publication Year: 2014, Page(s):v - viii
    Request permission for reuse | PDF file iconPDF (120 KB)
    Freely Available from IEEE
  • Message from the General Chairs

    Publication Year: 2014, Page(s): ix
    Request permission for reuse | PDF file iconPDF (127 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Committee Chairs

    Publication Year: 2014, Page(s): x
    Request permission for reuse | PDF file iconPDF (125 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Organization

    Publication Year: 2014, Page(s): xi
    Request permission for reuse | PDF file iconPDF (123 KB)
    Freely Available from IEEE
  • Program Committee Members

    Publication Year: 2014, Page(s):xii - xiii
    Request permission for reuse | PDF file iconPDF (152 KB)
    Freely Available from IEEE
  • A Multi-tenant Level Lightweight Lock Mechanism for Multi-tenant Database

    Publication Year: 2014, Page(s):3 - 7
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (166 KB) | HTML iconHTML

    For SaaS applications, tenants usually share a sparse table, and the lock is used to ensure concurrency control. With the development of the hardware upgrade, lock management is increasingly becoming a performance bottleneck. Traditional lock manager does not practical to multi-tenant database because of high concurrency. This paper discusses the provision of a new method - MLLL which is based on ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Implementation of Heterogeneous Internet of Things Identifier Recognition System

    Publication Year: 2014, Page(s):8 - 11
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (169 KB) | HTML iconHTML

    In Internet of Things (IoT), both physical things (such as devices, gateways and commodities etc.) and virtual things (like multimedia content and application software) are assigned unique IoT identifiers (IoT ID), which are similar to the domain name used for locating online resources in Internet. However, until now the format of IoT ID is not globally unified due to all kinds of reasons and thus... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a Lay-User Interface for Querying DBpedia

    Publication Year: 2014, Page(s):12 - 17
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (2259 KB) | HTML iconHTML

    As an RDF representation of information extracted from Wikipedia, DBpedia has been serving as an interlinking hub for many other RDF data sets in the Linked Open Data cloud on the Web of Data. Therefore, accessing the DBpedia data set is a common task for various Semantic Web applications. Given the fact that DBpedia is currently accessed through public SPARQL endpoints, which requires the users t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web Data Extraction Based on Visual Information and Partial Tree Alignment

    Publication Year: 2014, Page(s):18 - 23
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (445 KB) | HTML iconHTML

    Web databases contain a huge amount of structured data which are easily obtained via their query interfaces only. The query results are presented in dynamically generated web pages, usually in the form of data records, for human use. The automatical web data extraction is critical in web integration. A number of approaches have been proposed. The early work are most based on the source code or the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Geometry-Based Spatial Skyline Query in Wireless Sensor Network

    Publication Year: 2014, Page(s):27 - 32
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (226 KB) | HTML iconHTML

    The skyline query method in the wireless sensor network has been widely used in the field of environmental monitoring, the field is mostly related to the spatial distance. For the multidimension of space location, it brings enormous computational cost for the general skyline query method in terms of the property calculation. In order to improve the efficient use of sensor energy, the paper propose... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Multimodal Multimedia Retrieval Model Based on pLSA

    Publication Year: 2014, Page(s):33 - 36
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (157 KB) | HTML iconHTML

    In this paper, we propose a multimodal multimedia retrieval model based on probabilistic Latent Semantic analysis (pLSA) to achieve multimodal retrieval. Firstly, We employ pLSA, to respectively simulate the generative processes of texts and images in the same documents. Then we employ the multivariate linear regression method to analyze the correlation between representations of texts and images ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a Media Fragment URI Aware User Agent

    Publication Year: 2014, Page(s):37 - 42
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    The W3C's Media Fragments URI 1.0 specification provides for a media-format independent, standard means of addressing media fragments on the Web using Uniform Resource Identifiers (URIs). Thus, a key requirement is for the User Agent (UA) to efficiently retrieve media fragments identified by URIs from the regular media server over the HTTP protocol. This paper addresses the issue of how to constru... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Method of Same Name Disambiguation towards Literature Search

    Publication Year: 2014, Page(s):43 - 46
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (172 KB) | HTML iconHTML

    The issue that many authors share the same name results in many problems for paper search and the study of the Scientists Collaboration Network. In this paper, we study the problem of name ambiguities towards author-based search, propose a framework on same name disambiguation towards literatures searching, and propose a method to classify author-based searching results based on researchers of the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discovering Evolution of Complex Event Based on Correlations Between Events

    Publication Year: 2014, Page(s):47 - 50
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    There are large numbers of news articles on Web pages every day. Each article usually reports some aspects of a complex event, but they do not report the whole picture of the event. People are often interested in not only a single event but also the correlations between events and the evolution of the complex event, if they want to be aware of the whole picture of the complex event, they have to b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Driver and Riders Matching Approach

    Publication Year: 2014, Page(s):53 - 60
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (391 KB) | HTML iconHTML

    Dependence on personal automobiles is becoming increasingly costly due to accelerating climate change and rising gasoline prices. It is particularly wasteful when one realizes that most car seats are typically empty. With the advancement of mobile social networking technologies, it is necessary to reconsider the principles and desired characteristics of ride-sharing systems. Ride-sharing systems c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application Performance Monitoring and Analyzing Based on Bayesian Network

    Publication Year: 2014, Page(s):61 - 64
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (212 KB) | HTML iconHTML

    Application performance monitoring and analyzing system has been widely used in online applications and services, to obtain high performance and reliability. However, existing performance monitoring systems only raise an alarm when certain parameter exceeds its threshold and do not provide further analysis. This paper presents an application performance monitoring and analyzing model based on Baye... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Static Type Analysis for Python

    Publication Year: 2014, Page(s):65 - 68
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (147 KB) | HTML iconHTML

    Python is a kind of dynamic-typed language which provides flexibility but leaves the programmer without the benefits of static typing. This paper describes Type, a tool that works for static type annotation and inference for python. It could simulate the built-in modules, transform the Python source code to IR(Intermediate representation) which we design and annotate, infer and reduce the IR into ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Design of the SIMPLE Programming Language

    Publication Year: 2014, Page(s):69 - 74
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    Thousands of programming languages have been designed to meet different demands of application. Among the languages, many have been proposed merely for research exploration, while others have been developed for industrial software productions. Whatever the languages are targeted for, they are vehicles for implementing solutions in software engineering. Therefore, it is vital criteria to evaluate a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GIF to HTML5 Video -- Optimizing GIF for Modern Browsers

    Publication Year: 2014, Page(s):75 - 78
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (213 KB) | HTML iconHTML

    The paper presents a method of bridging the gap between GIF and HTML5 Video by providing both - allowing much faster content delivery and saved bandwidth. It's been over 25 years since the GIF format was introduced, and we've since then made significant progress in video compression. By converting GIF to video formats, you not only gain the possibility of user interaction, but you also reduce its ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • HuaVideo: Towards a Secure, Scalable and Compatible HTML5 Video Providing System

    Publication Year: 2014, Page(s):81 - 85
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (212 KB) | HTML iconHTML

    Video is able to convey huge amount of information and it is now one of the most popular media of content service on Internet. After HTML5 emerged, supporting playing video files by using the "" tag becomes the new standard. Nowadays, most of the devices and browsers have already supports playing video online by HTML5 player. Unlike the traditional stream video service, the video tag in HTML5 requ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research of Workflow Access Control Strategy based on Trust

    Publication Year: 2014, Page(s):86 - 90
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (575 KB) | HTML iconHTML

    The traditional workflow access control strategy has often found to be inadequate to detect and restrain malicious behavior effectively. With the aim to solve this problem, this paper presents a new workflow access control model based on trust, and a new access control strategy with an authorization process. This strategy introduces user behavior evaluation, trust computation and role hierarchy in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.