dblp: APWeb/WAIM 2007: Workshops (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches


9th APWeb/WAIM Workshops 2007: Huang Shan (Yellow Mountain), China

jump to- International Workshop on DataBase Management and Application over Networks (DBMAN 2007)
- International Workshop on Emerging Trends of Web Technologies and Applications (WebETrends 2007)
- International Workshop on Process Aware Information Systems (PAIS 2007)
- International Workshop on Application and Security Service in Web and Pervasive Environments (ASWAN 2007)

- > Home > Conferences and Workshops > APWeb
- > Home > Conferences and Workshops > WAIM
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as

Kevin Chen-Chuan Chang, Wei Wang, Lei Chen, Clarence A. Ellis, Ching-Hsien Hsu, Ah Chung Tsoi, Haixun Wang:
Advances in Web and Network Technologies, and Information Management, APWeb/WAIM 2007 International Workshops: DBMAN 2007, WebETrends 2007, PAIS 2007 and ASWAN 2007, Huang Shan, China, June 16-18, 2007, Proceedings. Lecture Notes in Computer Science 4537, Springer 2007, ISBN 978-3-540-72908-2
International Workshop on DataBase Management and Application over Networks (DBMAN 2007)
Information Access and Dissemination I

Tianxiao Liu, Tuyet-Tram Dang-Ngoc, Dominique Laurent:
Cost Framework for a Heterogeneous Distributed Semi-structured Environment. 1-11

Sven Hartmann, Hui Ma, Klaus-Dieter Schewe:
Cost-Based Vertical Fragmentation for XML. 12-24

Liu Huilin, Kou Chunhua, Wang Guangxing:
Efficiently Crawling Strategy for Focused Searching Engine. 25-36

Wei Fu, Nong Xiao, Xicheng Lu:
QoS-Guaranteed Ring Replication Management with Strong Consistency. 37-49

Hien Nam Le, Mads Nygård:
A Mobile Database Sharing Protocol to Increase Data Availability in Mobile Environments. 50-61
Data Mining

Long Jin, Duckjin Chai, Jun Wook Lee, Keun Ho Ryu:
Mining Recent Frequent Itemsets over Data Streams with a Time-Sensitive Sliding Window. 62-73

Yue-Shi Lee
, Show-Jane Yen:
Mining Web Transaction Patterns in an Electronic Commerce Environment. 74-85

Jie Song, Daling Wang, Yubin Bao, Ge Yu, Wen Qi:
Mining Purpose-Based Authorization Strategies in Database System. 86-98

Ho Seok Kim, Jae-Jyn Shin, Yong-Il Jang, Gyoung Bae Kim, Hae-Young Bae:
RSP-DS: Real Time Sequential Pattern Analysis over Data Streams. 99-110
Sensor, P2P, and Grid Networks I

Madhan Karky Vairamuthu, Sudarsanan Nesamony, Maria E. Orlowska, Shazia W. Sadiq
:
Investigative Queries in Sensor Networks. 111-121

Baiyou Qiao, Guoren Wang, Kexin Xie:
A Taxonomy-Based Approach for Constructing Semantics-Based Super-Peer Networks. 122-134

Qaisar Rasool, Jianzhong Li, George S. Oreku, Ehsan Ullah Munir, Donghua Yang:
A Comparative Study of Replica Placement Strategies in Data Grids. 135-143

Qing Zhu, Shan Wang, Guorong Li, Guangqiang Liu, Xiaoyong Du:
QoS-Based Services Selecting and Optimizing Algorithms on Grid. 156-167
Information access and Dissemination 2
Stream Data Management

Huafeng Deng, Yunsheng Liu, Yingyuan Xiao:
The Golden Mean Operator Scheduling Strategy in Data Stream Systems. 186-191

Le Wang, Li Tian, Yan Jia, Weihong Han:
A Hybrid Algorithm for Web Document Clustering Based on Frequent Term Sets and k-Means. 198-203
Sensor, P2P, and Grid Networks 2

Wei Zha, Sang Hun Eo, Byeong-Seob You, Dong-Wook Lee, Hae-Young Bae:
OMSI-Tree: Power-Awareness Query Processing over Sensor Networks by Removing Overlapping Regions. 204-210

Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai:
On Studying Front-Peer Attack-Resistant Trust and Reputation Mechanisms Based on Enhanced Spreading Activation Model in P2P Environments. 211-216

Yong-Il Jang, Ho Seok Kim, Sook-Kyoung Cho, Young-Hwan Oh, Hae-Young Bae:
A Load Balancing Method Using Ring Network in the Grid Database. 217-222

Yang Koo Lee, Young Jin Jung, Keun Ho Ryu:
Design and Implementation of a System for Environmental Monitoring Sensor Network. 223-228

Sunghoon Cho, Moo-hun Lee, Jang-uk In, Bong-hoi Kim, Eui-In Choi:
Policy Based Scheduling for Resource Allocation on Grid. 229-234
Potpourri

Dawei Liu, Shan Wang, Biao Qin, Weiwei Gong:
Characterizing DSS Workloads from the Processor Perspective. 235-240

Jun Zhang, Zhaohui Peng, Shan Wang, Jiang Zhan:
Exploiting Connection Relation to Compress Data Graph. 241-246

Kyoung Soo Bok, Ho Won Yoon, Dong Min Seo, Su Min Jang, Myoung-Ho Kim, Jae Soo Yoo:
Indexing the Current Positions of Moving Objects on Road Networks. 247-252
International Workshop on Emerging Trends of Web Technologies and Applications (WebETrends 2007)
Keynote Talk

Min Wang:
DBMSs with Native XML Support: Towards Faster, Richer, and Smarter Data Management. 253-254
Session I

Bihong Gong, Bo Peng, Xiaoming Li:
A Personalized Re-ranking Algorithm Based on Relevance Feedback. 255-263

Shuchih Ernest Chang, Muharrem Cevher
:
An Investigation and Conceptual Models of Podcast Marketing. 264-275

Shuchih Ernest Chang, Ying-Jiun Hsieh, Tzong-Ru Lee
, Chun-Kuei Liao, Shiau-Ting Wang:
A User Study on the Adoption of Location Based Services. 276-286

Yan Liu, QingXian Wang, Qiang Wang, Qing Yao, Yao Liu:
Email Community Detection Using Artificial Ant Colony Clustering. 287-298

Wei Wang, Guosun Zeng, Mingjun Sun, Huanan Gu, Quan Zhang:
EviRank: An Evidence Based Content Trust Model for Web Spam Detection. 299-307

Youcong Ni, Wei Wang:
A Novel Factoid Ranking Model for Information Retrieval. 308-316
Session II

Limin Shen, Feng Li, Shangping Ren, Yunfeng Mu:
Dynamic Composition of Web Service Based on Coordination Model. 317-327

Xiang Mei, Junliang Chen, Xiangwu Meng, Meng Xu:
An Information Retrieval Method Based on Knowledge Reasoning. 328-339

Feng Xiong, Qi Luo:
Research on Personalized Recommendation Algorithm in E-Supermarket System. 340-347

Nicolas Travers
, Tuyet-Tram Dang-Ngoc, Tianxiao Liu:
Untyped XQuery Canonization. 358-371

Darijus Strasunskas, Stein L. Tomassen:
Web Search Tailored Ontology Evaluation Framework. 372-383
International Workshop on Process Aware Information Systems (PAIS 2007)
Full Paper

Jihyun Lee, Danhyung Lee, Sungwon Kang:
An Overview of the Business Process Maturity Model (BPMM). 384-395

Hongxia Tong, Jian Cao, Shensheng Zhang:
A Distributed Genetic Algorithm for Optimizing the Quality of Grid Workflow. 408-419

Wei Song, Wan-Chun Dou, Jinjun Chen, Shaokun Fan:
Safety Analysis and Performance Evaluation of Time WF-nets. 420-432

Shaokun Fan, Wan-Chun Dou, Jinjun Chen:
Dual Workflow Nets: Mixed Control/Data-Flow Representation for Workflow Modeling and Verification. 433-444

Vladimír Modrák:
Bridging Organizational Structure and Information System Architecture Through Process. 445-455

Hyung-Jin Ahn, Kiwon Lee, Taewook Kim, Haksung Kim, Ilkyeun Ra:
Workflow Message Queue's Performance Effect Measurements on an EJB-Based Workflow Management System. 467-478
Short Paper

Jeong-Hyun Park, Boo-Hyung Lee:
RFID Application Model and Performance for Postal Logistics. 479-484

Baoyi Wang, Shaomin Zhang:
An Organization and Task Based Access Control Model for Workflow System. 485-490

Chunming Gao, Liping Wan, Huowang Chen:
A Method of Web Services Composition Based on Service Alliance. 491-496

Weihai Yu:
Toward a Lightweight Process-Aware Middleware. 497-503

Dong Yuan, Miao Du, Haiyang Wang, Li-zhen Cui:
Automatic Generation of Web Service Workflow Using a Probability Based Process-Semantic Repository. 504-509

Guoling Lao, Zhaohui Zhang:
A Three-Dimensional Customer Classification Model Based on Knowledge Discovery and Empirical Study. 510-515

Chunming Gao, Meiling Cai, Huowang Chen:
QoS-Driven Global Optimization of Services Selection Supporting Services Flow Re-planning. 516-521

Hongjun Sun, Shuangxi Huang, Yushun Fan:
SOA-Based Collaborative Modeling Method for Cross-Organizational Business Process Integration. 522-527

Chunming Gao, Jin Li, Zhoujun Li, Huowang Chen:
Model Checking for BPEL4WS with Time. 528-533

Hyerim Bae, Eunmi Cho, Joonsoo Bae:
A Version Management of Business Process Models in BPMS. 534-539

Bo Liu, Yushun Fan:
Research on Architecture and Key Technology for Service-Oriented Workflow Performance Analysis. 540-545
International Workshop on Application and Security Service in Web and Pervasive Environments (ASWAN 2007)
WPE Models and Applications

Myung A. Kang, Jong-Min Kim:
The Study on Internet-Based Face Recognition System Using Principal Component Analysis. 546-553

Song-hwa Chae, Wonil Kim:
Semantic Representation of RTBAC: Relationship-Based Access Control Model. 554-563

Zhiwen Zhang, Mingtian Zhou:
A Code-Based Multi-match Packet Classification with TCAM. 564-572
Security and Services of WPE

Yun-kyung Lee, Deok-Gyu Lee, Jong Wook Han, Kyo-Il Chung:
Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile. 573-582

Jae-min Yang, Jong-Geun Kim, Jongin Lim:
P-IDC: Information Security and Consideration in Building Internet Data Centers for Pervasive Environment. 583-592

Yongping Zhang, Wei Wei, Tianjie Cao:
Improvement of an Authenticated Key Agreement Protocol. 593-601

Jae-Hyeok Jang, Myung-Chan Park, Young-Shin Park, Byoung-Soo Koh, Yong-Rak Choi:
A Mechanism for Securing Digital Evidences in Pervasive Environments. 602-611

Eun-Jun Yoon, Kee-Young Yoo:
A Secure Chaotic Hash-Based Biometric Remote User Authentication Scheme Using Mobile Devices. 612-623
WSN/RFID/Web Services

Nelly A. Delessy, Eduardo B. Fernández:
Adapting Web Services Security Standards for Mobile and Wireless Environments. 624-633

Chih-Chung Lin
, Yuan-Cheng Lai, J. D. Tygar, Chuan-Kai Yang, Chi-Lung Chiang:
Coexistence Proof Using Chain of Timestamps for Multiple RFID Tags. 634-643

Ji-Yeon Kim, Jongjin Jung, Hoon Ko, Boyeon Kim, Susan Joe, Yongjun Lee, Yunseok Chang, Kyoon Ha Lee:
A Design of Authentication Protocol for Multi-key RFID Tag. 644-653

Chia-Chi Wu, Chin-Chen Chang, Shang-Ru Yang:
An Efficient Fragile Watermarking for Web Pages Tamper-Proof. 654-663

Hwaseong Lee, Yong Ho Kim, Dong Hoon Lee, Jongin Lim:
Classification of Key Management Schemes for Wireless Sensor Networks. 664-673
Data Management and Access Control for WPE

Tianding Chen:
An Efficient Algorithm for Proportionally Fault-Tolerant Data Mining. 674-683

Ming Guo, Yong Zhu, Yuheng Hu, Weishuai Yang:
SOGA: Fine-Grained Authorization for Self-Organizing Grid. 684-693

Sejong Oh:
Permission-Centric Hybrid Access Control. 694-703

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:






