Abstract is missing.
- Keynote Speech: Technological Breakthroughs in Environmental Sensor NetworksPaulo de Souza. 1 [doi]
- A New Formal Description Model of Network Attacking and Defence Knowledge of Oil and Gas Field SCADA SystemLi Yang, Xiedong Cao, Jie Li, Cundang Wei, Shiyong Cao, Dan Zhang, Zhidi Chen, Gang Tang. 2-10 [doi]
- An Efficient Overload Control Strategy in CloudXiling Sun, Jiajie Xu, Zhiming Ding, Xu Gao, Kuien Liu. 11-18 [doi]
- The Geological Disasters Defense Expert System of the Massive Pipeline Network SCADA System Based on FNNXiedong Cao, Cundang Wei, Jie Li, Li Yang, Dan Zhang, Gang Tang. 19-26 [doi]
- TDSC: A Two-phase Duplicate String Compression AlgorithmZhuoluo Yang, Jinguo You, Min Zhou. 27-34 [doi]
- Twig Pattern Matching Running on XML StreamsZiqiang Deng, Husheng Liao, Hongyu Gao. 35-42 [doi]
- A Novel Method for Extension Transformation Knowledge DiscoveringXingsen Li, Zhongbiao Xiang, Hao Lan Zhang, Zhengxiang Zhu. 43-50 [doi]
- A Flexible Parallel Runtime for Large Scale Block-Based Matrix MultiplicationKeyan Liu, Shaohua Song, Ningnan Zhou, Yanyu Ma. 51-59 [doi]
- Group Detection and Relation Analysis Research for Web Social NetworkYang Li, Kefu Xu, Jianlong Tan, Li Guo. 60-67 [doi]
- Worm Propagation Control Based on Spatial Correlation in Wireless Sensor NetworkWei Guo, Lidong Zhai, Li Guo, Jinqiao Shi. 68-77 [doi]
- PointBurst: Towards a Trust-Relationship Framework for Improved Social RecommendationsHongchen Wu, Xinjun Wang, Zhaohui Peng, Qingzhong Li, Lin Lin. 78-88 [doi]
- Analysis Framework for Electric Vehicle Sharing Systems Using Vehicle Movement Data StreamJunghoon Lee, Hye-Jin Kim, Gyung-Leen Park, Ho-Young Kwak, Moo Yong Lee. 89-94 [doi]
- Research on Customer Segmentation Based on Extension ClassificationChunyan Yang, Xiaomei Li, Weihua Li. 95-105 [doi]
- An Incremental Mining Algorithm for Association Rules Based on Minimal Perfect Hashing and PruningChuang-Kai Chiou, Judy C. R. Tseng. 106-113 [doi]
- LDA-Based Topic Modeling in Labeling Blog Posts with Wikipedia EntriesDaisuke Yokomoto, Kensaku Makita, Hiroko Suzuki, Daichi Koike, Takehito Utsuro, Yasuhide Kawada, Tomohiro Fukuhara. 114-124 [doi]
- The Correlation between Semantic Visual Similarity and Ontology-Based Concept Similarity in Effective Web Image SearchClement H. C. Leung, Yuanxi Li. 125-130 [doi]
- An Adaptive Design Pattern for Invocation of Synchronous and Asynchronous Web Services in Autonomic Computing SystemsVishnuvardhan Mannava, T. Ramesh. 131-142 [doi]
- Mining Tribe-Leaders Based on the Frequent Pattern of PropagationZhaoyun Ding, Yan Jia, Bin Zhou, Yi Han. 143-153 [doi]
- Research on Semantic Label Extraction of Domain Entity Relation Based on CRF and RulesJianyi Guo, Jun Zhao, Zhengtao Yu, Lei Su, Nianshu Jiang. 154-162 [doi]
- Recognition of Chinese Personal Names Based on CRFs and Law of NamesLvexing Zheng, Xueqiang Lv, Kun Liu, Yuncheng Du. 163-170 [doi]
- An Academic Search and Analysis Prototype for Specific DomainZhiqiang Gao, Yaocheng Gui, Man Zhu, Zhisheng Huang. 171-178 [doi]
- Learning Chinese Entity Attributes from Online EncyclopediaYidong Chen, Liwei Chen, Kun Xu. 179-186 [doi]
- A Mathematical Model for Human Flesh Search EngineLei Zhang, Yuankang Liu, Juanzi Li. 187-198 [doi]
- A New Dynamic ID-Based Remote User Authentication Scheme with Forward SecrecyChunguang Ma, Ding Wang, Ping Zhao, Yu-Heng Wang. 199-211 [doi]
- Reconstructing Unsound Data Provenance View in Scientific WorkflowHua Hu, Zhanchen Liu, HaiYang Hu. 212-220 [doi]
- A Process Distance Metric Based on Alignment of Process Structure TreesXiaodong Fu, Kun Yue, Ping Zou, Feng Wang, Kaifan Ji. 221-232 [doi]
- Adoption of Cloud Computing in Supply Chain Management Solutions: A SCOR-Aligned AssessmentHolger Schrödl. 233-244 [doi]
- Exploiting Space-Time Status for Service RecommendationChangjian Fang, Bo Mao, Jie Cao, Zhiang Wu. 245-256 [doi]
- Invariant Analysis for Ordering Constraints of Multi-view Business Process ModelJiDong Ge, HaiYang Hu, Hao Hu, Xianglin Fei. 257-268 [doi]