Journal: World Wide Web

Volume 21, Issue 6

1449 -- 1452Xiaofeng Zhu, Gerard Sanroma, Jilian Zhang, Brent C. Munsell. Editorial: Deep Mining Big Social Data
1453 -- 1471Dinesh Komarasamy, Muthuswamy Vijayalakshmi. Priority scheduling with consolidation based backfilling algorithm in cloud
1473 -- 1490Qinghua Huang, Zhoufan Kong, Yanshan Li, Jie Yang 0002, Xuelong Li. Discovery of trading points based on Bayesian modeling of trading rules
1491 -- 1504Qinghua Huang, Fan Zhang, Xuelong Li. A new breast tumor ultrasonography CAD system based on decision tree and BI-RADS features
1505 -- 1522Yunbo Rao, Wei Liu, Bojiang Fan, Jiali Song, Yang Yang. A novel relevance feedback method for CBIR
1523 -- 1543Yao Wan, Liang Chen 0001, Guandong Xu, Zhou Zhao, Jie Tang, Jian Wu 0001. SCSMiner: mining social coding sites for software developer recommendation with relevance propagation
1545 -- 1562Shichao Zhang, Debo Cheng, Rongyao Hu, Zhenyun Deng. Supervised feature selection algorithm via discriminative ridge regression
1563 -- 1573Guoqiu Wen, Yonghua Zhu, Zhiguo Cai, Wei Zheng. Self-tuning clustering for high-dimensional data
1575 -- 1600Ruili Wang, Wanting Ji, Baoyan Song. Durable relationship prediction and description using a large dynamic graph
1601 -- 1616Sandeep K. Sood. SNA based QoS and reliability in fog and cloud framework
1617 -- 1635Xin Liu, Yongjian Liu, Qing Xie 0002, Lin Li, Zhixu Li. A potential-based clustering method with hierarchical optimization
1637 -- 1653Jianmin Li, Yan Wang, Ying Zhong, Danhuai Guo, Shunzhi Zhu. Aggregate location recommendation in dynamic transportation networks
1655 -- 1673Qing Xie 0002, Feng Xiong, Tian Han, Yongjian Liu, Lin Li, Zhifeng Bao. Interactive resource recommendation algorithm based on tag information
1675 -- 1688Yonghua Zhu, Xuejun Zhang, Ruili Wang, Wei Zheng, Yingying Zhu. Self-representation and PCA embedding for unsupervised feature selection
1689 -- 1703Gang Hu, Jie Shao, Zhiyang Ni, Dongxiang Zhang. A graph based method for constructing popular routes with check-ins
1705 -- 1719Yanhui Gu, Min Gu, Yi Long, Guandong Xu, Zhenglu Yang, Junsheng Zhou, Weiguang Qu. An enhanced short text categorization model with deep abundant representation
1721 -- 1743Xipeng Pan, Dengxian Yang, Lingqiao Li, Zhenbing Liu, Huihua Yang, Zhiwei Cao, Yubei He, Zhen Ma, Yiyi Chen. Cell detection in pathology and microscopy images with multi-scale fully convolutional neural networks
1745 -- 1758Ruili Wang, Ming Zong. Joint self-representation and subspace learning for unsupervised feature selection
1759 -- 1771Jianliang Gao, Qing-ping, Jianxin Wang. Resisting re-identification mining on social graph data
1773 -- 1785Soumia Menasria, Jianxin Wang, Mingming Lu. The purpose driven privacy preservation for accelerometer-based activity recognition
1787 -- 1800Shichao Zhang. Multiple-scale cost sensitive decision tree learning

Volume 21, Issue 5

1165 -- 1185Yi-Chung Chen, Ming-Yeh Tsai, Chiang Lee. Recommending topics in dialogue
1187 -- 1221Gizem Korkmaz, Chris J. Kuhlman, S. S. Ravi, Fernando Vega-Redondo. Spreading of social contagions without key players
1223 -- 1257Mehdi Naseriparsa, Md. Saiful Islam 0003, Chengfei Liu, Irene Moser. No-but-semantic-match: computing semantically matched xml keyword search results
1259 -- 1284Xingzhong Du, Hongzhi Yin, Zi Huang, Yi Yang 0001, Xiaofang Zhou. Exploiting detected visual objects for frame-level video filtering
1285 -- 1321Vinti Agarwal, K. K. Bharadwaj. Recommending diverse friends in signed social networks based on adaptive soft consensus paradigm using variable length genetic algorithm
1323 -- 1347Dingqi Yang, Terence Heaney, Alberto Tonon, Leye Wang, Philippe Cudré-Mauroux. CrimeTelescope: crime hotspot prediction based on urban and social media data fusion
1349 -- 1376Bin Wang, Xiaochun Yang 0001, Guoren Wang. ACRES: efficient query answering on large compressed sequences
1377 -- 1398Nai Yue Chen, Yun Liu, Junjun Cheng, Qing Liu. A novel parallel community detection scheme based on label propagation
1399 -- 1423Dongjing Wang, ShuiGuang Deng, Xin Zhang, Guandong Xu. Learning to embed music and metadata for context-aware music recommendation
1425 -- 1448Wen Zhou 0005, Kai Tang, Jinyuan Jia. S-LPM: segmentation augmented light-weighting and progressive meshing for the interactive visualization of large man-made Web3D models

Volume 21, Issue 4

849 -- 874Qinzhe Zhang, Jia Wu, Qin Zhang 0011, Peng Zhang 0001, Guodong Long, Chengqi Zhang. Dual influence embedded social recommendation
875 -- 914Yan Dai, Jie Shao, Chengbo Wei, Dongxiang Zhang, Heng Tao Shen. Personalized semantic trajectory privacy preservation through trajectory reconstruction
915 -- 938Zongda Wu, Guandong Xu, Chenglang Lu, Enhong Chen, Fang Jiang, Guiling Li. An effective approach for the protection of privacy text data in the CloudDB
939 -- 959Cheng-Te Li, Mei-Yuan Huang, Rui Yan. Team formation with influence maximization for influential event organization on social networks
961 -- 984Jinkun Wang, Yuanchun Jiang, Jianshan Sun, Yezheng Liu, Xiao Liu 0004. Group recommendation based on a bidirectional tensor factorization model
985 -- 1013Xiaoyao Zheng, Yonglong Luo, Liping Sun, Xintao Ding, Ji Zhang. A novel social network hybrid recommender system based on hypergraph topologic structure
1015 -- 1035Wei Emma Zhang, Quan Z. Sheng, Yongrui Qin, Kerry Taylor, Lina Yao. Learning-based SPARQL query performance modeling and prediction
1037 -- 1039Wojciech Cellary, Hua Wang 0002, Yanchun Zhang. Guest Editorial: WWWJ Special Issue of the 17th International Conference on Web Information Systems Engineering (WISE 2016)
1041 -- 1067Adit Krishnan, Deepak P, Sayan Ranu, Sameep Mehta. Leveraging semantic resources in diversified query expansion
1069 -- 1092Chengyu Wang, Xiaofeng He, Aoying Zhou. Event phase oriented news summarization
1093 -- 1116Zhenkun Zhou, Ke Xu 0001, Jichang Zhao. Tales of emotion and stock in China: volatility, causality and prediction
1117 -- 1139Peng Liu, Jon Atle Gulla, Lemei Zhang. A joint model for analyzing topic and sentiment dynamics from large-scale online news
1141 -- 1163Yonghong Yu, Yang Gao 0001, Hao Wang, Ruili Wang. Joint user knowledge and matrix factorization for recommender systems

Volume 21, Issue 3

573 -- 594Zhihu Qian, Jiajie Xu, Kai Zheng 0001, Pengpeng Zhao, Xiaofang Zhou. Semantic-aware top-k spatial keyword queries
595 -- 607Hanshu Hong, Zhixin Sun. Sharing your privileges securely: a key-insulated attribute based proxy re-encryption scheme for IoT
609 -- 627Yue Huang, Chao Shen, Tao Li 0001. Event summarization for sports games using twitter streams
629 -- 661Brice Nédelec, Julian Tanke, Davide Frey, Pascal Molli, Achour Mostéfaoui. An adaptive peer-sampling protocol for building networks of browsers
663 -- 685Rajkumar Das, Joarder Kamruzzaman, Gour C. Karmakar. Modelling majority and expert influences on opinion formation in online social networks
687 -- 712Chaluka Salgado, Muhammad Aamir Cheema, Mohammed Eunus Ali. Continuous monitoring of range spatial keyword query over moving objects
713 -- 738Guanfeng Liu, Yi Liu, An Liu 0002, Zhixu Li, Kai Zheng 0001, Yan Wang, Xiaofang Zhou. Context-aware trust network extraction in large-scale trust-oriented social networks
739 -- 740Bin Guo, Xing Xie 0001, Raghu K. Ganti, Daqing Zhang, Zhu Wang. Guest editorial: special issue on mobile crowdsourcing - Preface to the special issue on mobile crowdsourcing
741 -- 758Zhiyong Yu, Jie Zhou, Wenzhong Guo, Longkun Guo, Zhiwen Yu. Participant selection for t-sweep k-coverage crowd sensing tasks
759 -- 782Jiangtao Wang, Yasha Wang, Leye Wang, Yuanduo He. GP-selector: a generic participant selection framework for mobile crowdsourcing systems
783 -- 802Fan Li, Zhuo Li, Kashif Sharif, Yang Liu, Yu Wang. Multi-layer-based opportunistic data collection in mobile crowdsourcing networks
803 -- 823Wenbin Hu, ZhenYu Qiu, Cong Nie, Bo Du. Channel dynamic adjustment in data broadcast
825 -- 847Xiangjie Kong, Ximeng Song, Feng Xia, Haochen Guo, Jinzhong Wang, Amr Tolba. LoTAD: long-term traffic anomaly detection based on crowdsourced bus trajectory data

Volume 21, Issue 2

241 -- 260Lihua Yin, Yunchuan Guo, FengHua Li, Yanwei Sun, Junyan Qian, Athanasios Vasilakos. A game-theoretic approach to advertisement dissemination in ephemeral networks
261 -- 287Zeyi Wen, Rui Zhang 0003, Kotagiri Ramamohanarao, Li Yang. Scalable and fast SVM regression using modern hardware
289 -- 310Zhihui Yang, Huixin Ma, Zhenying He, X. Sean Wang. Finding maximal ranges with unique topics in a text database
311 -- 343Yihong Zhang, Claudia Szabo, Quan Z. Sheng, Xiu Susie Fang. SNAF: Observation filtering and location inference for event monitoring on twitter
345 -- 371Pavlos Kefalas, Panagiotis Symeonidis, Yannis Manolopoulos. Recommendations based on a heterogeneous spatio-temporal social network
373 -- 394Lina Yao, Quan Z. Sheng, Xianzhi Wang, Shengrui Wang, Xue Li, Sen Wang. Collaborative text categorization via exploiting sparse coefficients
395 -- 419Niladri Sett, Saptarshi Basu, Sukumar Nandi, Sanasam Ranbir Singh. Temporal link prediction in multi-relational network
421 -- 453Liang Zheng, Yuzhong Qu, Gong Cheng. Leveraging link pattern for entity-centric exploration over Linked Data
455 -- 485Bolong Zheng, Haozhou Wang, Kai Zheng 0001, Han Su, Kuien Liu, Shuo Shang. SharkDB: an in-memory column-oriented storage for trajectory analysis
487 -- 513Yang Yang, Feifei Wang, Junni Zhang, Jin Xu, Philip S. Yu. A topic model for co-occurring normal documents and short texts
515 -- 536Lu Deng, Yan Jia, Bin Zhou, Jiuming Huang, Yi Han. User interest mining via tags and bidirectional interactions on Sina Weibo
537 -- 555Bin Wang, Rui Zhu, Xiaochun Yang 0001, Guoren Wang. Top-K representative documents query over geo-textual data stream
557 -- 572Tahere Shakiba, Sajjad Zarifzadeh, Vali Derhami. Spam query detection using stream clustering

Volume 21, Issue 1

1 -- 6Hua Wang, Zonghua Zhang, Tarek Taleb. Editorial: Special Issue on Security and Privacy of IoT
7 -- 32Richard K. Lomotey, Joseph C. Pry, Chenshean Chai. Traceability and visual analytics for the Internet-of-Things (IoT) architecture
33 -- 57Fulong Chen, Yonglong Luo, Ji Zhang, Junru Zhu, Ziyang Zhang, Chuanxin Zhao, Taochun Wang. An infrastructure framework for privacy protection of community medical internet of things - Transmission protection, storage protection and access control
59 -- 88Letian Sha, Fu Xiao, Wei Chen, Jing Sun. IIoT-SIDefender: Detecting and defense against the sensitive information leakage in industry IoT
89 -- 104Min Peng, Guanyin Zeng, Zhaoyu Sun, Jiajia Huang, Hua Wang, Gang Tian. Personalized app recommendation based on app permissions
105 -- 126Xing Liu, Jiqiang Liu, Wei Wang, Yongzhong He, Xiangliang Zhang. Discovering and understanding android sensor usage behaviors with data flow analysis
127 -- 150Yang Liu, Chaoshun Zuo, Zonghua Zhang, Shanqing Guo, Xin-Shun Xu. An automatically vetting mechanism for SSL error-handling vulnerability in android hybrid Web apps
151 -- 167Qinlong Huang, Licheng Wang, Yixian Yang. DECENT: Secure and fine-grained data access control with policy updating for constrained IoT devices
169 -- 183Kim Thuat Nguyen, Nouha Oualha, Maryline Laurent. Securely outsourcing the ciphertext-policy attribute-based encryption
185 -- 200Tao Zhang, Lele Zheng, Yongzhi Wang, Yulong Shen, Ning Xi, Jianfeng Ma, Jianming Yong. Trustworthy service composition with secure data transmission in sensor networks
201 -- 217Hui Wang, Wei Guo, Jizeng Wei. Practical chosen-message CPA attack on message blinding exponentiation algorithm and its efficient countermeasure
219 -- 240Zi Li, Qingqi Pei, Yao Liu. Spoofing attacks and countermeasures in fm indoor localization system