Amazon cover image
Image from Amazon.com

Advances in Web and Network Technologies, and Information Management [electronic resource] : APWeb/WAIM 2007 International Workshops: DBMAN 2007, WebETrends 2007, PAIS 2007 and ASWAN 2007, Huang Shan, China, June 16-18, 2007, Proceedings /

Contributor(s): Material type: TextTextSeries: Information Systems and Applications, incl. Internet/Web, and HCI ; 4537Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2007Edition: 1st ed. 2007Description: XXIII, 707 p. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783540729099
Subject(s): Additional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification:
  • 004.6 23
LOC classification:
  • TK5105.5-5105.9
Online resources:
Contents:
Information Access and Dissemination I -- Cost Framework for a Heterogeneous Distributed Semi-structured Environment -- Cost-Based Vertical Fragmentation for XML -- Efficiently Crawling Strategy for Focused Searching Engine -- QoS-Guaranteed Ring Replication Management with Strong Consistency -- A Mobile Database Sharing Protocol to Increase Data Availability in Mobile Environments -- Data Mining -- Mining Recent Frequent Itemsets over Data Streams with a Time-Sensitive Sliding Window -- Mining Web Transaction Patterns in an Electronic Commerce Environment -- Mining Purpose-Based Authorization Strategies in Database System -- RSP-DS: Real Time Sequential Pattern Analysis over Data Streams -- Sensor, P2P, and Grid Networks I -- Investigative Queries in Sensor Networks -- A Taxonomy-Based Approach for Constructing Semantics-Based Super-Peer Networks -- A Comparative Study of Replica Placement Strategies in Data Grids -- A Workload Balancing Based Approach to Discourage Free Riding in Peer-to-Peer Network -- QoS-Based Services Selecting and Optimizing Algorithms on Grid -- Information access and Dissemination 2 -- Bayesian Method Based Trusted Overlay for Information Retrieval over Networks -- Managing a Geographic Database from Mobile Devices Through OGC Web Services -- Real-Time Creation Method of Personalized Mobile Web Contents for Ubiquitous Contents Access -- Stream Data Management -- The Golden Mean Operator Scheduling Strategy in Data Stream Systems -- Continuous Skyline Tracking on Update Data Streams -- A Hybrid Algorithm for Web Document Clustering Based on Frequent Term Sets and k-Means -- Sensor, P2P, and Grid Networks 2 -- OMSI-Tree: Power-Awareness Query Processing over Sensor Networks by Removing Overlapping Regions -- On Studying Front-Peer Attack-Resistant Trust and Reputation Mechanisms Based on Enhanced Spreading Activation Model in P2P Environments -- A Load Balancing Method Using Ring Network in the Grid Database -- Design and Implementation of a System for Environmental Monitoring Sensor Network -- Policy Based Scheduling for Resource Allocation on Grid -- Potpourri -- Characterizing DSS Workloads from the Processor Perspective -- Exploiting Connection Relation to Compress Data Graph -- Indexing the Current Positions of Moving Objects on Road Networks -- Keynote Talk -- DBMSs with Native XML Support: Towards Faster, Richer, and Smarter Data Management -- A Personalized Re-ranking Algorithm Based on Relevance Feedback -- An Investigation and Conceptual Models of Podcast Marketing -- A User Study on the Adoption of Location Based Services -- Email Community Detection Using Artificial Ant Colony Clustering -- EviRank: An Evidence Based Content Trust Model for Web Spam Detection -- A Novel Factoid Ranking Model for Information Retrieval -- Dynamic Composition of Web Service Based on Coordination Model -- An Information Retrieval Method Based on Knowledge Reasoning -- Research on Personalized Recommendation Algorithm in E-Supermarket System -- XML Normal Forms Based on Constraint-Tree-Based Functional Dependencies -- Untyped XQuery Canonization -- Web Search Tailored Ontology Evaluation Framework -- Full Paper -- An Overview of the Business Process Maturity Model (BPMM) -- Process Mining: Extending ?-Algorithm to Mine Duplicate Tasks in Process Logs -- A Distributed Genetic Algorithm for Optimizing the Quality of Grid Workflow -- Safety Analysis and Performance Evaluation of Time WF-nets -- Dual Workflow Nets: Mixed Control/Data-Flow Representation for Workflow Modeling and Verification -- Bridging Organizational Structure and Information System Architecture ThroughProcess -- Relation-Driven Business Process-Oriented Service Discovery -- Workflow Message Queue’s Performance Effect Measurements on an EJB-Based Workflow Management System -- Short Paper -- RFID Application Model and Performance for Postal Logistics -- An Organization and Task Based Access Control Model for Workflow System -- A Method of Web Services Composition Based on Service Alliance -- Toward a Lightweight Process-Aware Middleware -- Automatic Generation of Web Service Workflow Using a Probability Based Process-Semantic Repository -- A Three-Dimensional Customer Classification Model Based on Knowledge Discovery and Empirical Study -- QoS-Driven Global Optimization of Services Selection Supporting Services Flow Re-planning -- SOA-Based Collaborative Modeling Method for Cross-Organizational Business Process Integration -- Model Checking for BPEL4WS with Time -- A Version Management of Business Process Models in BPMS -- Research on Architecture and Key Technology for Service-Oriented Workflow Performance Analysis -- WPE Models and Applications -- The Study on Internet-Based Face Recognition System Using Principal Component Analysis -- Semantic Representation of RTBAC: Relationship-Based Access Control Model -- A Code-Based Multi-match Packet Classification with TCAM -- Security and Services of WPE -- Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile -- P-IDC: Information Security and Consideration in Building Internet Data Centers for Pervasive Environment -- Improvement of an Authenticated Key Agreement Protocol -- A Mechanism for Securing Digital Evidences in Pervasive Environments -- A Secure Chaotic Hash-Based Biometric Remote User Authentication Scheme Using Mobile Devices -- WSN/RFID/Web Services -- Adapting Web Services SecurityStandards for Mobile and Wireless Environments -- Coexistence Proof Using Chain of Timestamps for Multiple RFID Tags -- A Design of Authentication Protocol for Multi-key RFID Tag -- An Efficient Fragile Watermarking for Web Pages Tamper-Proof -- Classification of Key Management Schemes for Wireless Sensor Networks -- Data Management and Access Control for WPE -- An Efficient Algorithm for Proportionally Fault-Tolerant Data Mining -- SOGA: Fine-Grained Authorization for Self-Organizing Grid -- Permission-Centric Hybrid Access Control.
In: Springer Nature eBook
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Information Access and Dissemination I -- Cost Framework for a Heterogeneous Distributed Semi-structured Environment -- Cost-Based Vertical Fragmentation for XML -- Efficiently Crawling Strategy for Focused Searching Engine -- QoS-Guaranteed Ring Replication Management with Strong Consistency -- A Mobile Database Sharing Protocol to Increase Data Availability in Mobile Environments -- Data Mining -- Mining Recent Frequent Itemsets over Data Streams with a Time-Sensitive Sliding Window -- Mining Web Transaction Patterns in an Electronic Commerce Environment -- Mining Purpose-Based Authorization Strategies in Database System -- RSP-DS: Real Time Sequential Pattern Analysis over Data Streams -- Sensor, P2P, and Grid Networks I -- Investigative Queries in Sensor Networks -- A Taxonomy-Based Approach for Constructing Semantics-Based Super-Peer Networks -- A Comparative Study of Replica Placement Strategies in Data Grids -- A Workload Balancing Based Approach to Discourage Free Riding in Peer-to-Peer Network -- QoS-Based Services Selecting and Optimizing Algorithms on Grid -- Information access and Dissemination 2 -- Bayesian Method Based Trusted Overlay for Information Retrieval over Networks -- Managing a Geographic Database from Mobile Devices Through OGC Web Services -- Real-Time Creation Method of Personalized Mobile Web Contents for Ubiquitous Contents Access -- Stream Data Management -- The Golden Mean Operator Scheduling Strategy in Data Stream Systems -- Continuous Skyline Tracking on Update Data Streams -- A Hybrid Algorithm for Web Document Clustering Based on Frequent Term Sets and k-Means -- Sensor, P2P, and Grid Networks 2 -- OMSI-Tree: Power-Awareness Query Processing over Sensor Networks by Removing Overlapping Regions -- On Studying Front-Peer Attack-Resistant Trust and Reputation Mechanisms Based on Enhanced Spreading Activation Model in P2P Environments -- A Load Balancing Method Using Ring Network in the Grid Database -- Design and Implementation of a System for Environmental Monitoring Sensor Network -- Policy Based Scheduling for Resource Allocation on Grid -- Potpourri -- Characterizing DSS Workloads from the Processor Perspective -- Exploiting Connection Relation to Compress Data Graph -- Indexing the Current Positions of Moving Objects on Road Networks -- Keynote Talk -- DBMSs with Native XML Support: Towards Faster, Richer, and Smarter Data Management -- A Personalized Re-ranking Algorithm Based on Relevance Feedback -- An Investigation and Conceptual Models of Podcast Marketing -- A User Study on the Adoption of Location Based Services -- Email Community Detection Using Artificial Ant Colony Clustering -- EviRank: An Evidence Based Content Trust Model for Web Spam Detection -- A Novel Factoid Ranking Model for Information Retrieval -- Dynamic Composition of Web Service Based on Coordination Model -- An Information Retrieval Method Based on Knowledge Reasoning -- Research on Personalized Recommendation Algorithm in E-Supermarket System -- XML Normal Forms Based on Constraint-Tree-Based Functional Dependencies -- Untyped XQuery Canonization -- Web Search Tailored Ontology Evaluation Framework -- Full Paper -- An Overview of the Business Process Maturity Model (BPMM) -- Process Mining: Extending ?-Algorithm to Mine Duplicate Tasks in Process Logs -- A Distributed Genetic Algorithm for Optimizing the Quality of Grid Workflow -- Safety Analysis and Performance Evaluation of Time WF-nets -- Dual Workflow Nets: Mixed Control/Data-Flow Representation for Workflow Modeling and Verification -- Bridging Organizational Structure and Information System Architecture ThroughProcess -- Relation-Driven Business Process-Oriented Service Discovery -- Workflow Message Queue’s Performance Effect Measurements on an EJB-Based Workflow Management System -- Short Paper -- RFID Application Model and Performance for Postal Logistics -- An Organization and Task Based Access Control Model for Workflow System -- A Method of Web Services Composition Based on Service Alliance -- Toward a Lightweight Process-Aware Middleware -- Automatic Generation of Web Service Workflow Using a Probability Based Process-Semantic Repository -- A Three-Dimensional Customer Classification Model Based on Knowledge Discovery and Empirical Study -- QoS-Driven Global Optimization of Services Selection Supporting Services Flow Re-planning -- SOA-Based Collaborative Modeling Method for Cross-Organizational Business Process Integration -- Model Checking for BPEL4WS with Time -- A Version Management of Business Process Models in BPMS -- Research on Architecture and Key Technology for Service-Oriented Workflow Performance Analysis -- WPE Models and Applications -- The Study on Internet-Based Face Recognition System Using Principal Component Analysis -- Semantic Representation of RTBAC: Relationship-Based Access Control Model -- A Code-Based Multi-match Packet Classification with TCAM -- Security and Services of WPE -- Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile -- P-IDC: Information Security and Consideration in Building Internet Data Centers for Pervasive Environment -- Improvement of an Authenticated Key Agreement Protocol -- A Mechanism for Securing Digital Evidences in Pervasive Environments -- A Secure Chaotic Hash-Based Biometric Remote User Authentication Scheme Using Mobile Devices -- WSN/RFID/Web Services -- Adapting Web Services SecurityStandards for Mobile and Wireless Environments -- Coexistence Proof Using Chain of Timestamps for Multiple RFID Tags -- A Design of Authentication Protocol for Multi-key RFID Tag -- An Efficient Fragile Watermarking for Web Pages Tamper-Proof -- Classification of Key Management Schemes for Wireless Sensor Networks -- Data Management and Access Control for WPE -- An Efficient Algorithm for Proportionally Fault-Tolerant Data Mining -- SOGA: Fine-Grained Authorization for Self-Organizing Grid -- Permission-Centric Hybrid Access Control.

There are no comments on this title.

to post a comment.
© 2024 IIIT-Delhi, library@iiitd.ac.in