Abstract is missing.
- LG-ERM: An Entity-Level Ranking Mechanism for Deep Web QueryYue Kou, Derong Shen, Ge Yu, Tiezheng Nie. 1-8 [doi]
- Weighting Links Using Lexical and Positional Analysis in Web RankingYi Zhang, Yexin Wang, Lidong Bing, Yan Zhang. 9-16 [doi]
- Approximate Boolean + Ranking Query Answering Using WaveletsYoungdae Kim, Seung-won Hwang. 17-24 [doi]
- S-BITS : Social-Bookmarking Induced Topic SearchTsubasa Takahashi, Hiroyuki Kitagawa. 25-30 [doi]
- LCA-Based Keyword Search for Effectively Retrieving Information Unit from Web PagesXiaoming Song, Jianhua Feng, Guoliang Li, Qin Hong. 31-36 [doi]
- Path Similarity Based Directory Ontology MatchingQian Zhong, Juanzi Li, Jie Tang, Yi Li, Lizhu Zhou. 37-44 [doi]
- Using Ontology to Enhance Collaborative Recommendation Based on CommunityLi Yu. 45-49 [doi]
- Analyzing Distribution and Evolution of Research Interests by Term Extraction and Ontology LearningZhiqiang Gao, Wanying Zhu, Yuzhong Qu, Zhisheng Huang. 50-55 [doi]
- Approach to the Formal Representation of OWL-S Ontology Maintenance RequirementsAihua Bao, Li Yao, Weiming Zhang, Jinping Yuan. 56-61 [doi]
- System II: A Native RDF Repository Based on the Hypergraph Representation for RDF Data ModelGang Wu, Juanzi Li, Jianqiang Hu, Kehong Wang. 62-69 [doi]
- Parallel Structural Join Algorithm on Shared-Memory Multi-Core SystemsLe Liu, Jianhua Feng, Guoliang Li, Qian Qian, Jianhui Li. 70-77 [doi]
- In-Network Execution of External Join for Sensor NetworksYongxuan Lai, Yilong Chen, Hong Chen. 78-85 [doi]
- LOB: Bucket Based Index for Range QueriesJieping Wang, Xiaoyong Du. 86-92 [doi]
- A New Dynamic Hash Index for Flash-Based StorageXiang Li, Zhou Da, Xiaofeng Meng. 93-98 [doi]
- Efficient k-Closest-Pair Range-Queries in Spatial DatabasesShaojie Qiao, Changjie Tang, Jing Peng, Hongjun Li, Shengqiao Ni. 99-104 [doi]
- Exploiting Path Information for Syntax-Based XML Subtree Matching in RDBsWenxin Liang, Haruo Yokota. 105-112 [doi]
- SIMP: Efficient XML Structural Index for Multiple Query ProcessingBo Zhang, Zhihua Geng, Aoying Zhou. 113-118 [doi]
- An Efficient Structural Index for Branching Path QueriesYingjie Fan, Shuyun Wang, Chenghong Zhang, Haibing Ma, Yunfa Hu. 119-126 [doi]
- Effective Indices for Efficient Approximate String Search and Similarity JoinXuhui Liu, Guoliang Li, Jianhua Feng, Lizhu Zhou. 127-134 [doi]
- Efficient Processing of Complex Twig Pattern MatchingJinqing Zhu, Wei Wang, Xiaofeng Meng. 135-140 [doi]
- Exploiting Application Semantics in Monitoring Real-Time Data StreamsHongya Wang, LihChyun Shu, Zhidong Qin, Xiaoqiang Liu, Jing Cong, Hui Song. 141-148 [doi]
- Approximate Validity of XML Streaming DataHuang Cheng, Li Jun, Michel de Rougemont. 149-156 [doi]
- Cost-Efficient Processing of Continuous Extreme Queries over Distributed Data StreamsLi Tian, Peng Zou, Li Zhang, Aiping Li. 157-164 [doi]
- Advanced Star CoordinatesYang Sun, Jiuyang Tang, Daquan Tang, Weidong Xiao. 165-170 [doi]
- QoS-Aware Scheduling of Web ServicesAn Liu, Qing Li, Liusheng Huang, Mingjun Xiao, Hai Liu. 171-178 [doi]
- Modeling and Reasoning about Semantic Web Services Contract Using Description LogicHai Liu, Qing Li, Naijie Gu, An Liu. 179-186 [doi]
- Modeling and Service Capability Evaluation for RFID Complex Event ProcessingYu Gu, Yanfei Lv, Ge Yu, Jia Xu. 187-194 [doi]
- Research on Web-Based Multi-Agent System for Aeroengine Fault DiagnosisJianrong Wang, Tianbiao Yu, Wanshan Wang, Ge Yu. 195-202 [doi]
- An Algorithm for Classifying Articles and Patent Documents Using Link StructureKishore Varma Indukuri, Pranav Prabhakar Mirajkar, Ashish Sureka. 203-210 [doi]
- Automatic Web Query Classification Using Large Unlabeled Web PagesJingbo Yu, Na Ye. 211-215 [doi]
- Self-Switching Classification Framework for Titled DocumentsHang Guo, Lizhu Zhou, Ling Feng. 216-223 [doi]
- Subject-Oriented Classification Based on Scale Probing in the Deep WebTiezheng Nie, Derong Shen, Ge Yu, Yue Kou. 224-229 [doi]
- Towards Efficient and Flexible KNN Query Processing in Real-Life Road NetworksYang Lu, Bin Cui, Jiakui Zhao, Hua Lu, Jialie Shen. 230-237 [doi]
- Continuous Reverse Nearest Neighbor Queries on Moving Objects in Road NetworksHuan-Liang Sun, Chao Jiang, Jun-Ling Liu, Limei Sun. 238-245 [doi]
- Evaluation of a Stream of Top-N Selection Queries in Relational DatabasesLiang Zhu, Chunnian Liu, Yanchao Feng, Shenda Ji. 246-253 [doi]
- A Cost-Efficient Method for Continuous Top-k Processing over Data StreamLi Zhang, Li Tian, Peng Zou, Aiping Li. 254-261 [doi]
- A Query Dependent Approach to Learning to Rank for Information RetrievalWeijian Ni, Yalou Huang, Maoqiang Xie. 262-269 [doi]
- PerRank: Personalized Rank Retrieval with Categorical and Numerical AttributesSangkyum Kim, Jaebum Kim, Younhee Ko, Seung-won Hwang, Jiawei Han. 270-277 [doi]
- Categorizing Queries by Topic DirectoryMiao He, Michal Cutler, Kelvin Wu. 278-284 [doi]
- A New Performance Benchmark for Content-Based 3D Model RetrievalJinjie Lin, Yubin Yang, Tong Lu, Jiabin Ruan, Wei Wei. 285-292 [doi]
- Expertise Search in a Time-Varying Social NetworkYize Li, Jie Tang. 293-300 [doi]
- REC: A Novel Model to Rank Experts in CommunitiesChen Lin, Haofeng Zhou, Zhenhua Huang, Wei Wang. 301-308 [doi]
- Recommendation over a Heterogeneous Social NetworkJing Zhang, Jie Tang, Bangyong Liang, Zi Yang, Sijie Wang, Jingjing Zuo, Juanzi Li. 309-316 [doi]
- Co-Clustering Tags and Social Data SourcesEirini Giannakidou, Vassiliki A. Koutsonikola, Athena Vakali, Yiannis Kompatsiaris. 317-324 [doi]
- Set-Expression Based Method for Effective Privacy PreservationYu Liu, Dapeng Lv, Yang Ye, Jianhua Feng, Qin Hong. 325-332 [doi]
- A New Approach for Detecting Anonymity of PatternsZhihui Wang, Wei Wang, Baile Shi. 333-340 [doi]
- A Personalized (a, k)-Anonymity ModelXiaojun Ye, Yawei Zhang, Ming Liu. 341-348 [doi]
- Scientific Workflow Provenance Querying with Security ViewsArtem Chebotko, Seunghan Chang, Shiyong Lu, Farshad Fotouhi, Ping Yang. 349-356 [doi]
- Name Disambiguation Using Atomic ClustersFeng Wang, Juanzi Li, Jie Tang, Jing Zhang, Kehong Wang. 357-364 [doi]
- Fuzzy K-Means with Variable Weighting in High Dimensional Data AnalysisQiang Wang, Yunming Ye, Joshua Zhexue Huang. 365-372 [doi]
- Outlier Detection for Transaction Databases Using Association RulesKazuyo Narita, Hiroyuki Kitagawa. 373-380 [doi]
- Scalable Community Discovery of Large NetworksZhemin Zhu, Chen Wang, Li Ma, Yue Pan, Zhiming Ding. 381-388 [doi]
- PLEDS: A Personalized Entity Detection System Based on Web Log Mining TechniquesKathleen Tsoukalas, Bin Zhou 0002, Jian Pei, Davor Cubranic. 389-396 [doi]
- Temperature-Aware Scheduling: When is System-Throttling Good Enough?Deepak Rajan, Philip S. Yu. 397-404 [doi]
- Managing Uncertain Data: Probabilistic ApproachesWenjie Zhang, Xuemin Lin, Jian Pei, Ying Zhang. 405-412 [doi]
- Finding Correlated Item Pairs through Efficient Pruning with a Given ThresholdBo Wang, Liang Su, Aiping Li, Peng Zou. 413-420 [doi]
- Co-Occurring Patterns of Amino Acid Physicochemical Properties in ProteinsGouchol Pok, Keun Ho Ryu. 421-428 [doi]
- COCA: More Accurate Multidimensional Histograms out of More Accurate Correlations DetectionWei Cao, Xiongpai Qin, Shan Wang. 429-434 [doi]
- Research on Malicious Transaction Processing Method of Database SystemChi Chen, Deng-guo Feng, Min Zhang, De-sheng Zhang, He-qun Xian. 435-440 [doi]
- Research on Communication-Efficient Method for Distributed Threshold MonitoringLi Tian, Peng Zou, Feng Wu, Aiping Li. 441-448 [doi]
- Reducing Data Decryption Cost by Broadcast Encryption and Account Assignment for Web ApplicationsJunpei Kawamoto, Qiang Ma, Masatoshi Yoshikawa. 449-454 [doi]
- Churn Impact on Replicated Data Duration in Structured P2P NetworksGuangping Xu, Wenhui Ma, Gang Wang, Xiaoguang Liu, Jing Liu. 455-460 [doi]
- An Adaptive User Profile Based on Memory ModelDingming Wu, Dongyan Zhao, Xue Zhang. 461-468 [doi]
- PEDS-VM: A Variation Management Prototype for Pattern Evolving Data StreamsXinbiao Zhou, Gaoshan Miao, Hongyan Li, Xin Wei, Lv-an Tang. 469-470 [doi]
- A Publicly Verifiable Dynamic Sharing Protocol for Data Secure StorageJia Yu, Fanyu Kong, Rong Hao, Zhen Cheng. 471-472 [doi]
- PASE: A Prototype for Ad-hoc Process-Aware Information System Declaratively Constructing EnvironmentBin Zhou, Hongyan Li, Lei Wang, Huaqiang Zhang, Meimei Li. 473-474 [doi]
- A Survey of Alert Fusion Techniques for Security IncidentTianning Zang, Xiao-chun Yun, Yongzheng Zhang. 475-481 [doi]
- A Survey of Secure Routing in Ad Hoc NetworksDongbin Wang, Mingzeng Hu, Hui Zhi. 482-486 [doi]
- An Admission Control Policy Based on Social Networks for P2P SystemsYuan Liang, Hai-Xin Duan. 487-492 [doi]
- Protecting Mobile Codes Using the Decentralized Label ModelJian-Wei Ye, Binxing Fang, Jin-Qiao Shi, Zhi-Gang Wu. 493-500 [doi]
- AMCAS: An Automatic Malicious Code Analysis SystemJia Zhang, Yuntao Guan, Xiaoxin Jiang, Hai-Xin Duan, Jianping Wu. 501-507 [doi]
- A Scalable Framework of Network Traffic IdentificationZhang Shuzhuang, Fang Binxing, Luo Hao. 508-511 [doi]
- Counting Data Stream Based on Improved Counting Bloom FilterZhijian Yuan, Jiajia Miao, Yan Jia, Le Wang. 512-519 [doi]
- Optimizing Traffic Classification Using Hybrid Feature SelectionDai Lei, Yun Xiaochun, Xiao Jun. 520-525 [doi]
- Design and Implementation of Multi-Version Disk Backup Data Merging AlgorithmGuangjun Wu, Xiao-chun Yun, Shupeng Wang. 526-531 [doi]
- Network Dynamic Risk Assessment Based on the Threat Stream AnalysisWencong Cheng, Xishan Xu, Yan Jia, Peng Zou. 532-538 [doi]
- Accelerating Multiple String Matching by Using Cache-Efficient StrategyJianlong Tan, Yanbing Liu, Ping Liu. 539-545 [doi]
- Methodology of Network Intrusion Detection System Penetration TestingHui Liu, Zhitang Li. 546-551 [doi]
- Network Security Analysis Based on Security Status SpaceTao Zhang, Chong Wu. 552-557 [doi]
- A Quasi Word-Based Compression Method of English Text Using Byte-Oriented Coding SchemeWei-ling Chang, Xiao-chun Yun, Binxing Fang, Shupeng Wang, Shuhao Li. 558-563 [doi]
- Research on Web QoS Control Strategy Based on User BehaviourXiaolei Guo, Zhiguang Shan, Cong Wang. 564-568 [doi]
- Component Based Context ModelJian-quan Ouyang, Bo Ding, Huai-Min Wang, Dian-xi Shi. 569-574 [doi]
- A New Database Adaptive Buffer Replacement Algorithm Based on Call Graph OptimizationYa-Dan Deng, Ning Jing, Wei Xiong. 575-582 [doi]
- Controlling Information Leakage of Fine-Grained Access Model in DBMSsHong Zhu, Jie Shi, Yuanzhen Wang, Yucai Feng. 583-590 [doi]
- DTAD: A Dynamic Taint Analysis Detector for Information SecurityZhiwen Bai, Liming Wang, Jinglin Chen, Lin Xu, Jian Liu, Xiyang Liu. 591-597 [doi]
- A Kind of Formal Modelling for Network Security Situational Awareness Based on HMMYing Liang, Huiqiang Wang, Yonggang Pang. 598-605 [doi]
- An Efficient Algorithm of Role Mapping across Security Domains in Data-Sharing EnvironmentsWang Xiaoqing, Gu Tianyang, Guo Yong, Zheng Yanxing, Zong Jianjian. 606-611 [doi]
- An Improved Method of Hybrid Worm SimulationQi Liu, Jiwu Jing, Yuewu Wang. 612-618 [doi]
- A New-Style Domain Integrating Management of Windows and UNIXShengli Liu, Wenbing Wang, Yuefei Zhu. 619-624 [doi]
- A Prediction Model of DoS Attack s Distribution Discrete ProbabilityWentao Zhao, Jianping Yin, Jun Long. 625-628 [doi]
- SOA-Based Service Recovery FrameworkJie-Ying Chen, Yong-Jun Wang, Yi Xiao. 629-635 [doi]
- A Strategy Selection Model for Network Survivability Based on Fuzzy Matrix GameGuo-sheng Zhao, Huiqiang Wang, Jian Wang. 636-639 [doi]
- Measuring Network Vulnerability Based on PathologyYulong Wang, Fangchun Yang, Qibo Sun. 640-646 [doi]
- Data-Flow Based Analysis of Java Bytecode VulnerabilityGang Zhao, Hua Chen, Dongxia Wang. 647-653 [doi]
- ASG Automated Signature Generation for Worm-Like P2P Traffic PatternsFengtao Xiao, Huaping Hu, Xin Chen, Bo Liu. 654-660 [doi]
- Research of a Secure File System for Protection of Intellectual Property RightJun Ma, Jiang-chun Ren, Zhiying Wang, Yaokai Zhu. 661-665 [doi]