Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Deriving High Confidence Rules from Spatial Data Using Peano Count Trees

    The traditional task of association rule mining is to find all rules with high support and high confidence. In some applications, such as mining spatial datasets for natural resource location, the task is to f...

    William Perrizo, Qin Ding, Qiang Ding in Advances in Web-Age Information Management (2001)

  2. No Access

    Chapter and Conference Paper

    Modeling of Facial Expressions Using NURBS Curves

    This paper describes a new NURBS-based method for facial modeling and animation. NURBS curves are constructed to correspond with the facial anatomy, and the vertices on the facial model are geometrically assoc...

    Ding Huang, Wei Lin, Hong Yan in Active Media Technology (2001)

  3. No Access

    Chapter and Conference Paper

    An Improved Usage-Based Ranking

    A good ranking is critical to gain a positive searching experience. With usage data collected from past searching activities, it could be improved from current approaches which are largely based on text or lin...

    Chen Ding, Chi-Hung Chi, Tiejian Luo in Advances in Web-Age Information Management (2002)

  4. Chapter and Conference Paper

    A Q-Based Architecture for Semantic Information Interoperability on Semantic Web

    Semantic Web supports a fire-new infrastructure for solving the problem of semantic information interoperability, and it promises to support an intelligent and automatic information-processing platform for mul...

    Zhen-jie Wang, Huan-ye Sheng, Peng Ding in The Semantic Web - ISWC 2003 (2003)

  5. No Access

    Chapter and Conference Paper

    Data Integrity Framework and Language Support for Active Web Intermediaries

    With the maturity of content adaptation technologies (such as I-CAP and OPES) in web intermediaries and of content personalization in the network, data integrity has already become a key concern when such tech...

    Chi-Hung Chi, **ao-Yan Yu, Wenjie Zhang, Chen Ding in Web Content Caching and Distribution (2004)

  6. No Access

    Chapter and Conference Paper

    Automatic Keyword Extraction by Server Log Analysis

    Traditionally, keywords are extracted from full texts of a document. While in the web environment, there are more sources we can use to provide a more complete view of a web page’s contents. In this paper, we ...

    Chen Ding, ** Zhou, Chi-Hung Chi in Web Information Systems Engineering – WISE 2005 (2005)

  7. No Access

    Chapter and Conference Paper

    A Task-Type Aware Transaction Scheduling Algorithm in J2EE

    A large number of J2EE applications use entity beans as their application persistence mechanism, while current J2EE scheduling to entity beans is still a simple First-Come First-Served (FCFS) policy. Due to th...

    **aoning Ding, **n Zhang, Beihong ** in On the Move to Meaningful Internet Systems… (2005)

  8. No Access

    Chapter and Conference Paper

    The Bahncard Problem with Interest Rate and Risk

    This paper investigated a new framework for the competitive analysis of the Bahncard problem. In contrast to the earlier approach we introduce the interest rate i and the risk tolerance t into the model, in which...

    Lili Ding, Yinfeng Xu, Shuhua Hu in Internet and Network Economics (2005)

  9. No Access

    Chapter and Conference Paper

    Outsourcing Internet Security: Economic Analysis of Incentives for Managed Security Service Providers

    Firms hesitate to outsource their network security to outside security providers (called Managed Security Service Providers or MSSPs) because an MSSP may shirk secretly to increase profits. In economics this s...

    Wen Ding, William Yurcik, **aoxin Yin in Internet and Network Economics (2005)

  10. No Access

    Chapter and Conference Paper

    An Enhanced Super-Peer Model for Digital Library Construction

    Peer-to-Peer (P2P) overlay network has emerged as a major infrastructure for constructing future digital libraries. Among various P2P infrastructures, super-peer based P2P network receives extensive attention ...

    Hao Ding, Ingeborg Sølvberg, Yun Lin in Web Information Systems – WISE 2006 (2006)

  11. No Access

    Chapter and Conference Paper

    xDFT: An Extensible Dynamic Fault Tolerance Model for Cooperative System

    According to the requirement of high-availability, real-time and high performance in cooperative system, an Extensible Dynamic Fault Tolerance model (xDFT) is proposed in the paper. xDFT model dynamically sets lo...

    Ding Wang, Hai **, **peng Yuan, Li Qi in Advanced Web and Network Technologies, and… (2006)

  12. No Access

    Chapter and Conference Paper

    A Recommender System with Interest-Drifting

    Collaborative filtering and content-based recommendation methods are two major approaches used in recommender systems. These two methods have some drawbacks in dealing with situations such as sparse data and c...

    Shanle Ma, Xue Li, Yi Ding in Web Information Systems Engineering – WISE… (2007)

  13. No Access

    Chapter and Conference Paper

    A Fair-Exchange and Customer-Anonymity Electronic Commerce Protocol for Digital Content Transactions

    This paper devises a new e-commerce protocol that can ensure fair exchange and customer’s anonymity for digital content transactions. The proposed protocol considers the complete transaction process: negotiati...

    Shi-Jen Lin, Ding-Chyu Liu in Distributed Computing and Internet Technology (2007)