Skip to main content

previous disabled Page of 3
and
  1. No Access

    Chapter and Conference Paper

    e_SWDL : An XML Based Workflow Definition Language for Complicated Applications in Web Environments

    e_SWDL is the workflow definition language of a prototype WfMS-e_ScopeWork, which is designed to support complex cross-enterprises workflow applications among heterogeneous sites by using XML approach. On this...

    Wei Ge, Baoyan Song, Derong Shen, Ge Yu in Web Technologies and Applications (2003)

  2. No Access

    Chapter and Conference Paper

    An Ant Algorithm Based Dynamic Routing Strategy for Mobile Agents

    Routing strategy is one of the most important aspects in a mobile agent system, which is a complex combinatorial problem. Most of current mobile agent systems adopt static routing strategies, which don’t consi...

    Dan Wang, Ge Yu, Mingsong Lv, Baoyan Song, Derong Shen in Web Technologies and Applications (2003)

  3. No Access

    Chapter and Conference Paper

    An Efficient User Task Handling Mechanism Based on Dynamic Load-Balance for Workflow Systems

    User task is one of the major task types of complicated workflow applications. The way how to handle user tasks impacts the performance of a workflow system significantly, which involves many issues such as de...

    Baoyan Song, Ge Yu, Dan Wang, Derong Shen, Guoren Wang in Web Technologies and Applications (2003)

  4. No Access

    Chapter and Conference Paper

    Answering XML Twig Queries with Automata

    XML is emerging as a de facto standard for information representation and data exchange over the web. Evaluation of twig queries, which allows users to find all occurrence of a multiple branch pattern in an XML d...

    Bing Sun, Bo Zhou, Nan Tang, Guoren Wang in Advanced Web Technologies and Applications (2004)

  5. Chapter and Conference Paper

    Secure Databases: An Analysis of Clark-Wilson Model in a Database Environment

    Information systems are vulnerable to accidental or malicious attacks. Security models for commercial computer systems exist, but information systems security is often ignored or added at or after implementati...

    **aocheng Ge, Fiona Polack, Régine Laleau in Advanced Information Systems Engineering (2004)

  6. No Access

    Chapter and Conference Paper

    BM + -Tree: A Hyperplane-Based Index Method for High-Dimensional Metric Spaces

    In this paper, we propose a novel high-dimensional index method, the BM + -tree, to support efficient processing of similarity search queries in high-dimensional spaces. The main idea of the proposed index is to ...

    **angmin Zhou, Guoren Wang, **aofang Zhou in Database Systems for Advanced Applications (2005)

  7. No Access

    Chapter and Conference Paper

    A Query Rewriting System for Enhancing the Queriability of Form-Based Interface

    Form-based Web queries are commonly used by Web users for extracting information from the Web. However, some hidden information cannot be retrieved from the Web interface, which results in the limited query an...

    **aochun Yang, Bin Wang, Guoren Wang, Ge Yu in Digital Libraries: International Collabora… (2005)

  8. No Access

    Chapter and Conference Paper

    A Common Application-Centric QoS Model for Selecting Optimal Grid Services

    Application-centric QoS (AQoS) model is needed for evaluating semantic equivalent Grid Services in an application-oriented service Grid. Previous related researches on QoS mainly are for resource allocation in...

    Shen Derong, Yu Ge, Nie Tiezheng in Web Technologies Research and Development … (2005)

  9. No Access

    Chapter and Conference Paper

    MMPClust: A Skew Prevention Algorithm for Model-Based Document Clustering

    To support very high dimensionality, model-based clustering is an intuitive choice for document clustering. However, the current model-based algorithms are prone to generating the skewed clusters, which influe...

    **aoguang Li, Ge Yu, Daling Wang in Database Systems for Advanced Applications (2005)

  10. No Access

    Chapter and Conference Paper

    Efficient Cooperative Caching Schemes for Data Access in Mobile Ad Hoc Networks

    We study cooperative caching technique for supporting data access in ad hoc networks. Two protocols that are based on the notion of zone are proposed. The IXP protocol is push-based in the sense that a mobile ...

    Cheng-Ru Young, Ge-Ming Chiu, Fu-Lan Wu in Embedded and Ubiquitous Computing – EUC 2005 (2005)

  11. No Access

    Chapter and Conference Paper

    An Effective Service Discovery Model for Highly Reliable Web Services Composition in a Specific Domain

    How to discover suitable Web services becomes more and more important in supporting highly reliable Web services composition. Nowadays, related work mainly focuses on syntax agreement and compatible matching t...

    Derong Shen, Ge Yu, Tiezheng Nie, Yue Kou in Frontiers of WWW Research and Development … (2006)

  12. No Access

    Chapter and Conference Paper

    Courseware Recommendation in E-Learning System

    E-learning systems , as an education pattern, are becoming more and more popular. In e-learning systems, courseware management is an indispensable part. As the number of various courseware increases, how to fi...

    Ge Liang, Kong Weining, Luo Junzhou in Advances in Web Based Learning – ICWL 2006 (2006)

  13. No Access

    Chapter and Conference Paper

    An Effective Web Page Layout Adaptation for Various Resolutions

    Because of the increasing variety of user terminals, there is a great demand for the Web pages adapt to various resolution terminals with good readability. This paper describes an effective approach to display...

    Jie Song, Tiezheng Nie, Daling Wang, Ge Yu in Frontiers of WWW Research and Development … (2006)

  14. No Access

    Chapter and Conference Paper

    Associated Load Shedding Strategies for Computing Multi-joins in Sensor Networks

    In sensor networks, multi-join queries are processed by joining sensor data generated at different sensor nodes. Due to the energy constraint, however, sometimes only partial sensor data can be transmitted to ...

    **aochun Yang, Lin Li, Yiu-Kai Ng, Bin Wang in Database Systems for Advanced Applications (2006)

  15. No Access

    Chapter and Conference Paper

    Process Control Model in Web-Based e-Learning

    Nowadays most web-based learning systems have already utilized advanced technologies like web services and etc., even grid computing to minimize the gap between traditional learning and e-Learning. Meanwhile, ...

    Weining Kong, Liang Ge, Junzhou Luo in Advances in Web Based Learning – ICWL 2006 (2006)

  16. No Access

    Chapter and Conference Paper

    Mining Purpose-Based Authorization Strategies in Database System

    With the development of computer and communication technology, access control of the resources in databases has become an issue focused by both consumers and enterprises. Moreover, the new concept of purpose-b...

    Jie Song, Daling Wang, Yubin Bao, Ge Yu in Advances in Web and Network Technologies, … (2007)

  17. No Access

    Chapter and Conference Paper

    A QoS-Guaranteeing Scheduling Algorithm for Continuous Queries over Streams

    The increasing demand on streaming data processing has motivated the study of providing Quality of Service (QoS) for data stream processing. Especially for mission-critical applications, deterministic QoS requ...

    Shanshan Wu, Yanfei Lv, Ge Yu, Yu Gu, **ao**g Li in Advances in Data and Web Management (2007)

  18. No Access

    Chapter and Conference Paper

    Efficient Difference NN Queries for Moving Objects

    Group Nearest Neighbor query is a relatively prevalent application in spatial databases and overlay network. Unlike the traditional KNN queries, GNN queries maintain several query points and allow aggregate op...

    Bin Wang, **aochun Yang, Guoren Wang, Ge Yu in Advances in Data and Web Management (2007)

  19. No Access

    Chapter and Conference Paper

    A PLSA-Based Approach for Building User Profile and Implementing Personalized Recommendation

    This paper proposes a method based on Probability Latent Semantic Analysis (PLSA) to analyze web pages that are of interest to the user and the user query co-occurrence relationship, and utilize the latent fac...

    Dongling Chen, Daling Wang, Ge Yu, Fang Yu in Advances in Data and Web Management (2007)

  20. No Access

    Chapter and Conference Paper

    Continuous Approximate Window Queries in Wireless Sensor Networks

    Wireless sensor networks are demonstrating the valuable potential in a variety of settings, e.g. data analysis and statistics. How to minimize energy consumption and prolong network lifetime become one of the ...

    Bin Wang, **aochun Yang, Guoren Wang, Ge Yu in Advances in Data and Web Management (2007)

previous disabled Page of 3