Abstract is missing.
- The Research on Chinese Coreference Resolution Based on Maximum Entropy Model and RulesYihao Zhang, Jianyi Guo, Zhengtao Yu, Zhikun Zhang, Xianming Yao. 1-8 [doi]
- Performance Improvement in Automatic Question Answering System Based on Dependency TermJianxing Shi, Xiaojie Yuan, Shitao Yu, Hua Ning, Chenying Wang. 9-18 [doi]
- An Expert System Based Approach to Modeling and Selecting Requirement Engineering TechniquesYan Tang, Kunwu Feng. 19-30 [doi]
- Web Access Latency Reduction Using CRF-Based Predictive CachingYong Zhen Guo, Kotagiri Ramamohanarao, Laurence A. F. Park. 31-44 [doi]
- A Property Restriction Based Knowledge Merging MethodHaiyan Che, Wei Chen, Tie Feng, Jiachen Zhang. 45-52 [doi]
- A Multi-view Approach for Relation ExtractionJunsheng Zhou, Qian Xu, Jiajun Chen, Weiguang Qu. 53-62 [doi]
- Self-similarity Clustering Event Detection Based on Triggers GuidanceXianfei Zhang, Bi-Cheng Li, Yuxuan Tian. 63-70 [doi]
- Analysis and Interpretation of Semantic HTML TablesWensheng Yin, Feifei Guo, Fan Xu, Xiuguo Chen. 71-79 [doi]
- An Improved Feature Selection for Categorization Based on Mutual InformationHaifeng Liu, Zhan Su, Zeqing Yao, Shousheng Liu. 80-87 [doi]
- A Feature Selection Method Based on Fisher s Discriminant Ratio for Text Sentiment ClassificationSuge Wang, Deyu Li, Yingjie Wei, Hongxia Li. 88-97 [doi]
- Mining Preferred Traversal Paths with HITSJieh-Shan Yeh, Ying-Lin Lin, Yu-Cheng Chen. 98-107 [doi]
- Link Analysis on Government Website Based-on FactorChangling Li, Xinjin Fu. 108-115 [doi]
- WAPS: An Audio Program Surveillance System for Large Scale Web Data StreamJie Gao, Yanqing Sun, Hongbin Suo, QingWei Zhao, YongHong Yan. 116-128 [doi]
- Hot Topic Detection on BBS Using Aging TheoryDonghui Zheng, Fang Li. 129-138 [doi]
- A Heuristic Algorithm Based on Iteration for Semantic Telecommunications Service DiscoveryDong Cao, Xiaofeng Li, Xiuquan Qiao, Luoming Meng. 139-148 [doi]
- An Improved Storage and Inference Method for Ontology Based Remote Sensing Interpretation SystemXiaoguang Jia, Zhengwei Lin, Ning Huang. 149-157 [doi]
- SASL: A Semantic Annotation System for LiteraturePingpeng Yuan, Guoyin Wang, Qin Zhang, Hai Jin. 158-166 [doi]
- Multi-issue Agent Negotiation Based on FairnessBaohe Zuo, Sue Zheng, Hong Wu. 167-176 [doi]
- A Hemodynamic Predict of an Intra-Aorta Pump Application in Vitro Using Numerical AnalysisBin Gao, Ningning Chen, Yu Chang. 177-185 [doi]
- The Sampling Synchronization of the Chaotic System with Different Structures Based on T-S ModelAiping Li, Dongsheng Yang, Aimin Wu, Enjia Wang. 186-194 [doi]
- A Layered Overlay Multicast Algorithm with PSO for Routing Web StreamsYuHui Zhao, Junwei Wang, Yuyan An, Fan Xia. 205-213 [doi]
- Solving University Course Timetabling Problems by a Novel Genetic Algorithm Based on FlowZhenhua Yue, Shanqiang Li, Long Xiao. 214-223 [doi]
- Indexing Temporal XML Using FIXTiankun Zheng, Xinjun Wang, Yingchun Zhou. 224-231 [doi]
- Semantic Structural Similarity Measure for Clustering XML DocumentsLing Song, Jun Ma, Jingsheng Lei, Dongmei Zhang, Zhen Wang. 232-241 [doi]
- A Bloom Filter Based Approach for Evaluating Structural Similarity of XML DocumentsDunlu Peng, Huan Hou, Jing Lu. 242-251 [doi]
- Similarity Based Semantic Web Service MatchHui Peng, Wenjia Niu, Ronghuai Huang. 252-260 [doi]
- Clustering-Based Semantic Web Service Matchmaking with Automated Knowledge AcquisitionPeng Liu, Jingyu Zhang, Xueli Yu. 261-270 [doi]
- An Efficient Approach to Web Service SelectionXiaoqin Fan, Changjun Jiang, Xianwen Fang. 271-280 [doi]
- Constraint Web Service Composition Based on Discrete Particle Swarm OptimizationXianwen Fang, Xiaoqin Fan, Zhixiang Yin. 281-288 [doi]
- A QoS-Aware Service Selection Approach on P2P Network for Dynamic Cross-Organizational Workflow DevelopmentJielong Zhou, Wanchun Dou. 289-298 [doi]
- Semantic Model Driven Architecture Based Method for Enterprise Application DevelopmentMinghui Wu, Jing Ying, Hui Yan. 299-308 [doi]
- Modeling and Analyzing Web Service Behavior with Regular Flow NetsJinGang Xie, Qingping Tan, GuoRong Cao. 309-319 [doi]
- Research on Passive Optical Network Based on Ant Colony Algorithms for Bandwidth Distribution in Uplink DirectionYanping Zhu, Yongsheng Ma, Dezhong Zheng, Lulu Zhao, Xu Han. 320-327 [doi]
- Multifactor-Driven Hierarchical Routing on Enterprise Service BusXueqiang Mi, Xinhuai Tang, Xiaozhou Yuan, Delai Chen, Xiangfeng Luo. 328-336 [doi]
- A Mechanism of Modeling and Verification for SaaS Customization Based on TLAShuai Luan, Yuliang Shi, Haiyang Wang. 337-344 [doi]
- EPN-Based Web Service Composition ApproachMin Gao, Zhongfu Wu. 345-354 [doi]
- Quantum CSMA/CD Synchronous Communication Protocol with EntanglementNanrun Zhou, Binyang Zeng, Lihua Gong. 355-362 [doi]
- Development of EPA Protocol Information Enquiry Service System Based on Embedded ARM LinuxDaogang Peng, Hao Zhang, Jiannian Weng, Hui Li, Fei Xia. 363-372 [doi]
- EasyKSORD: A Platform of Keyword Search Over Relational DatabasesZhaohui Peng, Jing Li, Shan Wang. 373-382 [doi]
- Real-Time and Self-adaptive Method for Abnormal Traffic Detection Based on Self-similarityZhengmin Xia, Songnian Lu, Jianhua Li, Jin Ma. 383-392 [doi]
- Trust-Based Fuzzy Access Control Model ResearchRina Su, Yongping Zhang, Zhongkun He, Shaojing Fan. 393-399 [doi]
- An Evaluation Model of CNO Intelligence Information ConfidenceYunyun Sun, Shan Yao, Xiaojian Li, Chunhe Xia, Songmei Zhang. 400-412 [doi]
- A Verified Group Key Agreement Protocol for Resource-Constrained Sensor NetworksMi Wen, Jingsheng Lei, Zhong Tang, Xiuxia Tian, Kefei Chen, Weidong Qiu. 413-425 [doi]
- A Bulk Email Oriented Multi-party Non-repudiation Exchange ProtocolLu Bai, Chunhe Xia, Xiaojian Li, Haiquan Wang. 426-438 [doi]
- Software Fault Feature Clustering Algorithm Based on Sequence PatternJiadong Ren, Changzhen Hu, Kunsheng Wang, Dongmei Zhang. 439-447 [doi]
- Identification of Malicious Web Pages by Inductive LearningPeishun Liu, Xuefang Wang. 448-457 [doi]
- The Handicap Principle for Trust in Computer Security, the Semantic Web and Social NetworkingZhanshan (Sam) Ma, Axel W. Krings, Chih-Cheng Hung. 458-468 [doi]
- Formal Analysis of Fairness in E-Payment Protocol Based on Strand SpaceHong Wang, Jianping Ma, Bo Chen. 469-478 [doi]
- Research for Data Mining Applying in the Architecture of Web-LearningChaonan Wang, Youtian Qu, Lili Zhong, Tianzhou Chen. 479-488 [doi]
- Design E-learning Recommendation System Using PIRT and VPRS ModelAyad R. Abbas, Liu Juan. 489-498 [doi]
- Dynamic Content Manager - A New Conceptual Model for E-LearningTerje Kristensen, Yngve Lamo, Kristin Ran Choi Hinna, Grete Oline Hole. 499-507 [doi]
- A User Behavior Perception Model Based on Markov ProcessZhan Shi, Yuhong Li, Li Han, Jian Ma. 508-517 [doi]
- The Knowledge Sharing Based on PLIB Ontology and XML for Collaborative Product CommerceJun Ma, Guofu Luo, Hao Li, Yanqiu Xiao. 518-526 [doi]
- Reinforcement Learning Based Web Service Compositions for Mobile BusinessJuan Zhou, Shouming Chen. 527-534 [doi]
- Will Commodity Properties Affect Seller s Creditworthy: Evidence in C2C E-commerce Market in ChinaHui Peng, Min Ling. 535-544 [doi]
- Trust Model Based on M-CRGs in Emergency ResponseShasha Deng, Pengzhu Zhang, Zhaoqing Jia. 545-553 [doi]
- Research on a Queue Scheduling Algorithm in Wireless Communications NetworkWenchuan Yang, Yuanmei Hu, Qiancai Zhou. 554-562 [doi]
- Mixed ::::H::::::2::/::::H:::::: INFINITY :: Control for Networked Control Systems (NCSs) with Markovian Packet-LossJie Fu, Yaping Dai. 563-575 [doi]
- Research on the Trust-Adaptive Scheduling for Data-Intensive Applications on Data GridsWei Liu, Wei Du. 576-585 [doi]
- Robust Stability of Multi-variable Networked Control Systems with Random Time DelayLisheng Wei, Ming Jiang, Minrui Fei. 586-595 [doi]