Skip to main content

previous disabled Page of 12
and
  1. No Access

    Chapter and Conference Paper

    Modeling Enterprise Objects in a Virtual Enterprise Integrating System: ViaScope

    The construction of information integrating systems for virtual enterprises raises a set of issues concerned with coupling the systems of independent enterprises in a controlled, flexible and easily-understood...

    **aochun Yang, Guoren Wang, Ge Yu, Dik Lun Lee in Internet Applications (1999)

  2. No Access

    Chapter and Conference Paper

    Efficiently Map** Integrity Constraints from Relational Database to XML Document1

    XML is rapidly emerging as the dominant standard for exchanging data on the WWW. Most of application data are stored in relational databases due to its popularity and rich development experiences over it. Ther...

    **aochun Yang, Ge Yu, Guoren Wang in Advances in Databases and Information Systems (2001)

  3. No Access

    Chapter and Conference Paper

    Classify Web Document by Key Phrase Understanding

    In order to evaluate the security rank of document owner (sender or Web station), the documents discrimination is widely adopted to classify Web documents. The old strategy based on keywords matching often lea...

    Changjie Tang, Tong Li, Changyu Liu, Yin Ge in Advances in Web-Age Information Management (2001)

  4. No Access

    Chapter and Conference Paper

    e_SWDL : An XML Based Workflow Definition Language for Complicated Applications in Web Environments

    e_SWDL is the workflow definition language of a prototype WfMS-e_ScopeWork, which is designed to support complex cross-enterprises workflow applications among heterogeneous sites by using XML approach. On this...

    Wei Ge, Baoyan Song, Derong Shen, Ge Yu in Web Technologies and Applications (2003)

  5. No Access

    Chapter and Conference Paper

    An Ant Algorithm Based Dynamic Routing Strategy for Mobile Agents

    Routing strategy is one of the most important aspects in a mobile agent system, which is a complex combinatorial problem. Most of current mobile agent systems adopt static routing strategies, which don’t consi...

    Dan Wang, Ge Yu, Mingsong Lv, Baoyan Song, Derong Shen in Web Technologies and Applications (2003)

  6. No Access

    Chapter and Conference Paper

    Proactive QoS Routing in Ad Hoc Networks

    In this paper, we analyze the advantages and disadvantages of the proactive QoS routing in ad-hoc networks. We discuss how to support bandwidth QoS routing in OLSR (Optimized Link State Protocol), a best-effor...

    Ying Ge, Thomas Kunz, Louise Lamont in Ad-Hoc, Mobile, and Wireless Networks (2003)

  7. No Access

    Chapter and Conference Paper

    Efficient Evaluation of XML Path Queries with Automata

    Path query is one of the most frequently used components by the various XML query languages. Most of the proposed methods compute path queries in instance space, i.e. directly facing the XML instances, such as...

    Bing Sun, Jianhua Lv, Guoren Wang, Ge Yu in Advances in Web-Age Information Management (2003)

  8. No Access

    Chapter and Conference Paper

    An Efficient User Task Handling Mechanism Based on Dynamic Load-Balance for Workflow Systems

    User task is one of the major task types of complicated workflow applications. The way how to handle user tasks impacts the performance of a workflow system significantly, which involves many issues such as de...

    Baoyan Song, Ge Yu, Dan Wang, Derong Shen, Guoren Wang in Web Technologies and Applications (2003)

  9. No Access

    Chapter and Conference Paper

    A Protein Secondary Structure Prediction Framework Based on the Support Vector Machine

    Our framework for predicting protein secondary structures differs from existing prediction methods since we consider physio-chemical information and context information of secondary structure segments. We have...

    **aochun Yang, Bin Wang, Yiu-Kai Ng, Ge Yu in Advances in Web-Age Information Management (2003)

  10. No Access

    Chapter and Conference Paper

    A Hybrid Machine Learning/Statistical Model of Grid Security

    Most current Grid security techniques concentrate on traditional security aspects such as authentication, authorization, etc. While they have shown their usefulness, the significance of the information hidden ...

    Guang **ang, Ge Yu, **angli Qu, **aomei Dong in Grid and Cooperative Computing - GCC 2004 (2004)

  11. No Access

    Chapter and Conference Paper

    Research and Implementation of Single Sign-On Mechanism for ASP Pattern

    Software Services based Application Service Provider pattern is an important method in constructing enterprise applications, which integrate business systems with different authentication mechanism. So there a...

    Bo Li, Sheng Ge, Tian-yu Wo, Dian-fu Ma in Grid and Cooperative Computing - GCC 2004 (2004)

  12. No Access

    Chapter and Conference Paper

    EM Medical Image Reconstruction in a Peer-to-Peer Systems

    Medical image reconstruction remains a topic of interest to medical researchers. Although the algorithms have become more mature, one particular challenge has persisted over the decades: finding an economic an...

    Jun Ni, Tao He, **ang Li, Shaowen Wang in Grid and Cooperative Computing - GCC 2004 (2004)

  13. No Access

    Chapter and Conference Paper

    Research on User Programming Environment in Grid

    Principal among the technical obstacles when using the grid environment is usability. Owing to the inherently complex, programs in grid will reflect some of the complexity. To make grid resources useful and ac...

    Ge He, Donghua Liu, Zhiwei Xu, Lin Li, Shengliang Xu in Grid and Cooperative Computing (2004)

  14. No Access

    Chapter and Conference Paper

    Answering XML Twig Queries with Automata

    XML is emerging as a de facto standard for information representation and data exchange over the web. Evaluation of twig queries, which allows users to find all occurrence of a multiple branch pattern in an XML d...

    Bing Sun, Bo Zhou, Nan Tang, Guoren Wang in Advanced Web Technologies and Applications (2004)

  15. Chapter and Conference Paper

    On Dynamic Subset Difference Revocation Scheme

    Subset Difference Revocation (SDR) [8] has been proposed to perform group rekeying in a stateless manner. However, statelessness comes at a cost in terms of storage and message overhead when the number of curr...

    Weifeng Chen, Zihui Ge, Chun Zhang, Jim Kurose, Don Towsley in Networking 2004 (2004)

  16. No Access

    Chapter and Conference Paper

    Design and Implementation of a 3A Accessing Paradigm Supported Grid Application and Programming Environment

    The mobile grid users accessing to grid services has become a normally paradigm for getting grid resources. To improve their working productivity in dynamic and open grid environment it should provide the mobi...

    He Ge, Liu Donghua, Sun Yuzhong, Xu Zhiwei in Parallel and Distributed Processing and Ap… (2005)

  17. No Access

    Chapter and Conference Paper

    Grid Supporting Platform for AMS Data Processing

    The purpose of AMS experiment is to look for the source of the dark matter, source of the cosmic ray and the universe made of antimatter. The characteristics of AMS experiment are massive data and complicated ...

    Junzhou Luo, Aibo Song, Ye Zhu in Parallel and Distributed Processing and Ap… (2005)

  18. No Access

    Chapter and Conference Paper

    Comb-Pattern Optimal Pilot in MIMO-OFDM System

    Channel estimation is very important for MIMO (Multiple Input Multiple Output) OFDM (Orthogonal Frequency Division Multiplexing) systems, while computation required is relatively large. Block-pattern optimal p...

    Qihong Ge, Huazhong Yang in Networking and Mobile Computing (2005)

  19. No Access

    Chapter and Conference Paper

    A K-Anonymizing Approach for Preventing Link Attacks in Data Publishing

    K-anonymization is an important approach to protect data privacy in data publishing. It is desired to publish k-anomymized data with less information loss. However, the existing algorithm...

    **aochun Yang, **angyu Liu, Bin Wang, Ge Yu in Parallel and Distributed Processing and Ap… (2005)

  20. No Access

    Chapter and Conference Paper

    A Query Processing Approach Based on Window Semantics in Data Stream System

    Since data streams are continuous, unbounded and real-time, continuous queries over data streams are generally based on windows. Windows placed on data streams are maintained by operators themselves for a quer...

    Baoyan Song, Shanshan Wu, Feng Yuan, Ge Yu in Advances in Computer Science – ASIAN 2005.… (2005)

previous disabled Page of 12