Keynote Papers | |
Socio-Sense: A System for Analysing the Societal Behavior from Long Term Web Archive | |
Building Web-Scale Data Mining Infrastructure for Search | |
Aggregate Computation over Data Streams | |
A Family of Optimization Based Data Mining Methods | |
Tutorials | |
Web Evolution Management: Detection, Monitoring, and Mining | |
Research and Practice in Data Quality | |
Data Mining and Knowledge Discoverty | |
Detecting Overlapping Community Structures in Networks with Global Partition and Local Expansion | |
High Confidence Fragment-Based Classification Rule Mining for Imbalanced HIV Data | |
Source Credibility Model for Neighbor Selection in Collaborative Web Content Recommendation | |
The Layered World of Scientific Conferences | |
Mining Maximal Frequent Subtrees with Lists-Based Pattern-Growth Method | |
Mining the Web for Hyponymy Relations Based on Property Inheritance | |
Detecting Outliers in Categorical Record Databases Based on Attribute Associations | |
Wireless, Sensor Networks and Grid | |
An Energy-Efficient Multi-agent Based Architecture in Wireless Sensor Network | |
Task Migration Enabling Grid Workflow Application Rescheduling | |
A Dependent Tasks Scheduling Model in Grid | |
A Hierarchical Replica Location Approach Based on Cache Mechanism and Load Balancing in Data Grid | |
Wireless Video-Based Sensor Networks for Surveillance of Residential Districts | |
Trust Maintenance Toward Virtual Computing Environment in the Grid Service | |
An Association Model of Sensor Properties for Event Diffusion Spotting Sensor Networks | |
CROWNBench: A Grid Performance Testing System Using Customizable Synthetic Workload | |
XML and Query Processing and Optimization A Decision Procedure for XPath Satisfiability in the Presence of DTD Containing Choice | |
Performance Analysis and Improvement for Transformation Operators in XML Data Integration | |
Similarity Computation for XML Documents by XML Element Sequence Patterns | |
Evolving Weighting Functions for Query Expansion Based on Relevance Feedback | |
Ontology-Based Mobile Information Service Platform | |
On Safety, Computability and Local Property of Web Queries (Extended Abstract) | |
Privacy, and Security | |
Privacy Inference Attacking and Prevention on Multiple Relative K-Anonymized Microdata Sets | |
Exposing Homograph Obfuscation Intentions by Coloring Unicode Strings | |
On the Complexity of Restricted k-anonymity Problem | |
An Efficient Electronic Marketplace Bidding Auction Protocol with Bid Privacy | |
A Provable Secure Authentication Protocol Given Forward Secure Session Key | |
A Secure Multi-dimensional Partition Based Index in DAS | |
Multilateral Approaches to the Mobile RFID Security Problem Using Web Service | |
Classifying Security Patterns | |
Enhanced Mutual Authentication and Key Exchange Protocol for Wireless Communications | |
Verification of the Security Against Inference Attacks on XML Databases | |
Information Extraction, Presentation and Retrieval | |
Mining, Ranking, and Using Acronym Patterns | |
A Method for Web Information Extraction | |
Information Presentation on Mobile Devices: Techniques and Practices | |
Pattern-Based Extraction of Addresses from Web Page Content | |
An Effective Method Supporting Data Extraction and Schema Recognition on Deep Web | |
The Experiments with the Linear Combination Data Fusion Method in Information Retrieval | |
Squeezing Long Sequence Data for Efficient Similarity Search | |
P2P, Agent Systems | |
An Architecture for Distributed Controllable Networks and Manageable Node Based on Network Processor | |
Building a Scalable P2P Network with Small Routing Delay | |
ERASP: An Efficient and Robust Adaptive Superpeer Overlay Network | |
Traceable P2P Record Exchange Based on Database Technologies | |
Ontology, Semantic Web and Web Applications | |
ACORN: Towards Automating Domain Specific Ontology Construction Process | |
Ontological Knowledge Management Through Hybrid Unsupervised Clustering Techniques | |
Semantic-Enabled Organization of Web Services | |
Rule Mining for Automatic Ontology Based Data Cleaning | |
Towards Automatic Verification of Web-Based SOA Applications | |
A Novel and Effective Method for Web System Tuning Based on Feature Selection | |
Effective Data Distribution and Reallocation Strategies for Fast Query Response in Distributed Query-Intensive Data Environments | |
Data Streams, Time Series Analysis and Data Mining | |
A Novel Chi2 Algorithm for Discretization of Continuous Attributes | |
Mining Multiple Time Series Co-movements | |
Effective Spatia-temporal Analysis of Remote Sensing Data | |
Supporting Top-K Aggregate Queries over Unequal Synopsis on Internet Traffic Streams | |
Web Mining and Web Search | |
ONOMATOPEDIA: Onomatopoeia Online Example Dictionary System Extracted from Data on the Web | |
Connectivity of the Thai Web Graph | |
On the Trustworthiness and Transparency of a Web Search Site Examined Using "Gender-equal" as a Search Keyword | |
SemSearch: A Scalable Semantic Searching Algorithm for Unstructured P2P Network | |
Web Image Annotation Based on Automatically Obtained Noisy Training Set | |
An Effective Query Relaxation Solution for the Deep Web | |
Workflow and Middleware | |
A Framework for Query Capabilities and Interface Design of Mediators on the Gulf of Mexico Data Sources | |
Process Mediation Based on Triple Space Computing | |
An Efficient Approach for Supporting Dynamic Evolutionary Change of Adaptive Workflow | |
Author Index | |
Table of Contents provided by Blackwell. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.