Skip to main content

previous disabled Page of 23
and
  1. No Access

    Chapter

    Integrated Fact and Rule Management Based on Relational Technology

    Database programming languages integrate concepts of databases and programming languages to provide both implementation tools for dataintensive applications and high-level user interfaces to databases. Frequen...

    Joachim W. Schmidt, Lingyuan Ge in Foundations of Knowledge Base Management (1989)

  2. No Access

    Chapter and Conference Paper

    A Virtual Private Network for Virtual Enterprise Information Systems

    The security requirements of a virtual enterprise information system are investigated and a virtual private network (VPN) is designed to ensure the security, taking the advantages of the integrated functionali...

    Lina Wang, Ge Yu, Guoren Wang, **aochun Yang, Dan Wang in Web-Age Information Management (2000)

  3. No Access

    Chapter and Conference Paper

    Adaptive Networking for Tele-Immersion

    Tele-Immersive applications possess an unusually broad range of networking requirements. As high-speed and Quality of Service-enabled networks emerge, it will becoming more difficult for developers of Tele-Imm...

    Jason Leigh, Oliver Yu, Dan Schonfeld in Immersive Projection Technology and Virtua… (2001)

  4. No Access

    Chapter and Conference Paper

    Efficiently Map** Integrity Constraints from Relational Database to XML Document1

    XML is rapidly emerging as the dominant standard for exchanging data on the WWW. Most of application data are stored in relational databases due to its popularity and rich development experiences over it. Ther...

    **aochun Yang, Ge Yu, Guoren Wang in Advances in Databases and Information Systems (2001)

  5. No Access

    Chapter and Conference Paper

    A New Path Expression Computing Approach for XML Data

    Most query languages in XML database systems use Regular Path Expressions (RPE) to query or extract data from databases and some query processing and optimization techniques have been proposed for RPEs. Concep...

    Jianhua Lv, Guoren Wang, Jeffrey Xu Yu in Efficiency and Effectiveness of XML Tools … (2003)

  6. No Access

    Chapter and Conference Paper

    Efficient Evaluation of XML Path Queries with Automata

    Path query is one of the most frequently used components by the various XML query languages. Most of the proposed methods compute path queries in instance space, i.e. directly facing the XML instances, such as...

    Bing Sun, Jianhua Lv, Guoren Wang, Ge Yu in Advances in Web-Age Information Management (2003)

  7. No Access

    Chapter and Conference Paper

    A Protein Secondary Structure Prediction Framework Based on the Support Vector Machine

    Our framework for predicting protein secondary structures differs from existing prediction methods since we consider physio-chemical information and context information of secondary structure segments. We have...

    **aochun Yang, Bin Wang, Yiu-Kai Ng, Ge Yu in Advances in Web-Age Information Management (2003)

  8. No Access

    Chapter and Conference Paper

    A Hybrid Machine Learning/Statistical Model of Grid Security

    Most current Grid security techniques concentrate on traditional security aspects such as authentication, authorization, etc. While they have shown their usefulness, the significance of the information hidden ...

    Guang **ang, Ge Yu, **angli Qu, **aomei Dong in Grid and Cooperative Computing - GCC 2004 (2004)

  9. No Access

    Chapter and Conference Paper

    Modeling QoS for Semantic Equivalent Web Services

    Quality of Service (QoS) is an important factor for selecting a better Web service from numerous semantic equivalent Web services in Web services composition. In this paper, a QoS model (e_QoS) for evaluating ...

    Derong Shen, Ge Yu, Tiezheng Nie, Rui Li in Advances in Web-Age Information Management (2004)

  10. No Access

    Chapter and Conference Paper

    Research and Implementation of Single Sign-On Mechanism for ASP Pattern

    Software Services based Application Service Provider pattern is an important method in constructing enterprise applications, which integrate business systems with different authentication mechanism. So there a...

    Bo Li, Sheng Ge, Tian-yu Wo, Dian-fu Ma in Grid and Cooperative Computing - GCC 2004 (2004)

  11. No Access

    Chapter and Conference Paper

    CD-Trees: An Efficient Index Structure for Outlier Detection

    Outlier detection is to find objects that do not comply with the general behavior of the data. Partition is a kind of method of dividing data space into a set of non-overlap** rectangular cells. There exists...

    Huanliang Sun, Yubin Bao, Faxin Zhao, Ge Yu in Advances in Web-Age Information Management (2004)

  12. No Access

    Chapter and Conference Paper

    EM Medical Image Reconstruction in a Peer-to-Peer Systems

    Medical image reconstruction remains a topic of interest to medical researchers. Although the algorithms have become more mature, one particular challenge has persisted over the decades: finding an economic an...

    Jun Ni, Tao He, **ang Li, Shaowen Wang in Grid and Cooperative Computing - GCC 2004 (2004)

  13. No Access

    Chapter and Conference Paper

    Research on User Programming Environment in Grid

    Principal among the technical obstacles when using the grid environment is usability. Owing to the inherently complex, programs in grid will reflect some of the complexity. To make grid resources useful and ac...

    Ge He, Donghua Liu, Zhiwei Xu, Lin Li, Shengliang Xu in Grid and Cooperative Computing (2004)

  14. No Access

    Chapter and Conference Paper

    Performance Optimization of Fractal Dimension Based Feature Selection Algorithm

    Feature selection is a key issue in the advanced application fields like data mining, multi-dimensional statistical analysis, multimedia index and document classification. It is a novel method to exploit fract...

    Yubin Bao, Ge Yu, Huanliang Sun, Daling Wang in Advances in Web-Age Information Management (2004)

  15. No Access

    Chapter and Conference Paper

    DHT Based Searching Improved by Sliding Window

    Efficient full-text searching is a big challenge in Peer-to-Peer (P2P) system. Recently, Distributed Hash Table (DHT) becomes one of the reliable communication schemes for P2P. Some research efforts perform ke...

    Shen Huang, Gui-Rong Xue, **ng Zhu in Advances in Web-Age Information Management (2004)

  16. No Access

    Chapter and Conference Paper

    Web Users’ Classification Using Fuzzy Neural Network

    With the increasing of data and Web users in the Internet, it is necessary and significant to identify users for offering further possible personalized services. To implement this goal, we used the users’ surf...

    Fang Yuan, Huanrui Wu, Ge Yu in Knowledge-Based Intelligent Information an… (2004)

  17. Chapter and Conference Paper

    Secure Databases: An Analysis of Clark-Wilson Model in a Database Environment

    Information systems are vulnerable to accidental or malicious attacks. Security models for commercial computer systems exist, but information systems security is often ignored or added at or after implementati...

    **aocheng Ge, Fiona Polack, Régine Laleau in Advanced Information Systems Engineering (2004)

  18. Chapter and Conference Paper

    On Dynamic Subset Difference Revocation Scheme

    Subset Difference Revocation (SDR) [8] has been proposed to perform group rekeying in a stateless manner. However, statelessness comes at a cost in terms of storage and message overhead when the number of curr...

    Weifeng Chen, Zihui Ge, Chun Zhang, Jim Kurose, Don Towsley in Networking 2004 (2004)

  19. No Access

    Chapter and Conference Paper

    BM + -Tree: A Hyperplane-Based Index Method for High-Dimensional Metric Spaces

    In this paper, we propose a novel high-dimensional index method, the BM + -tree, to support efficient processing of similarity search queries in high-dimensional spaces. The main idea of the proposed index is to ...

    **angmin Zhou, Guoren Wang, **aofang Zhou in Database Systems for Advanced Applications (2005)

  20. No Access

    Chapter and Conference Paper

    Tick Scheduling: A Deadline Based Optimal Task Scheduling Approach for Real-Time Data Stream Systems

    Most of the current research work on timely streaming data processing focuses on minimizing average tuple latency instead of strict individual tuple latency upper-bound, that is, deadline. In this paper, we pr...

    Zhengyu Ou, Ge Yu, Yaxin Yu, Shanshan Wu in Advances in Web-Age Information Management (2005)

previous disabled Page of 23