Skip to main content

Page of 5
and
  1. No Access

    Chapter and Conference Paper

    A Category on the Cache Invalidation for Wireless Mobile Environments

    Wireless computing becomes most popular with the development of mobile computers. Cache technique in wireless computing is crucial because it facilitates the data access at clients for reducing servers’ loadin...

    Jianpei Zhang, Yan Chu in Advanced Web and Network Technologies, and Applications (2006)

  2. No Access

    Chapter and Conference Paper

    Web-Based Three-Dimension E-Mail Traffic Visualization

    E-mail pervades many aspects of our lives and is becoming indispensable communication method in areas such as commerce, government, production and general information dissemination. To maintain the security an...

    **ang-hui Wang, Guo-yin Zhang in Advanced Web and Network Technologies, and Applications (2006)

  3. No Access

    Chapter and Conference Paper

    An Effective XML Filtering Method for High-Performance Publish/Subscribe System

    During the process large-scale XPath queries against fast XML streams on Internet, a bottleneck occurs due to the lack of memory for filtering. This paper presents an effective automaton method to reduce the m...

    Tong Wang, Da-**n Liu, Wei Sun in Advanced Web and Network Technologies, and… (2006)

  4. No Access

    Chapter and Conference Paper

    The Research of a Semantic Architecture in Meteorology Grid Computing

    Meteorology is a complex, interdisciplinary area. Meteorology Grid Computing tries to offer a flexible, secure, coordinated resource sharing and problem-resolving environment by making good use of semantic gri...

    Ren Kaijun, **ao Nong, Song Junqiang in Advanced Web and Network Technologies, and… (2006)

  5. No Access

    Chapter and Conference Paper

    A Dynamic Web Service Composite Platform Based on QoS of Services

    In this paper, a web service composite platform is introduced which aims to compose the services dynamically. And more importantly, in order to get a most qualified composite service, a selection task needs to...

    Lei Yang, Yu Dai, Bin Zhang, Yan Gao in Advanced Web and Network Technologies, and… (2006)

  6. No Access

    Chapter and Conference Paper

    Model and Simulation on Enhanced Grid Security and Privacy System

    The wide acceptance of the grid technology has created pressure to add some features that were not part of its original design, such as security, privacy, and quality-of-service support. In this paper, we have...

    Jiong Yu, **anhe Sun, Yuanda Cao in Advanced Web and Network Technologies, and… (2006)

  7. No Access

    Chapter and Conference Paper

    MIMO Techniques in Cluster-Based Wireless Sensor Networks

    Advances in microsensor and radio technology will enable small but smart sensors to be deployed for a wide range of environment monitoring applications. Most architectures of wireless sensor networks (WSN) are...

    **g Li, Yu Gu, Wei Zhang, Baohua Zhao in Advanced Web and Network Technologies, and… (2006)

  8. No Access

    Chapter and Conference Paper

    Mining Maximum Frequent Access Patterns in Web Logs Based on Unique Labeled Tree

    Discovering user’s Frequent Access Patterns is one of research hotspots in mining web logs. A novel apriori-based algorithm named s-Tree is proposed for mining maximum Frequent Access Patterns. The main contri...

    Ling Zhang, Jian-** Yin, Yu-bin Zhan in Web Information Systems – WISE 2006 Workshops (2006)

  9. No Access

    Chapter and Conference Paper

    Design and Implementation of a Service-Oriented Manufacturing Grid System

    A Service-oriented Manufacturing Grid (MG) System according to OGSA named MGRID is presented and discussed in detail. In MGRID, various manufacturing resources compose the foundation of applications above it. ...

    Shijun Liu, **angxu Meng, Ruyue Ma, Lei Wu in Advanced Web and Network Technologies, and… (2006)

  10. No Access

    Chapter and Conference Paper

    Common Program Analysis of Two-Party Security Protocols Using SMV

    A common framework, which can be used to analyze the two-party security protocols, is proposed in this paper. With the common framework, a common program is developed in order that any two-party security proto...

    Yuqing Zhang, Su** Jia in Advanced Web and Network Technologies, and Applications (2006)

  11. No Access

    Chapter and Conference Paper

    Supporting Complex Query with Structured Overlays in Schema-Based P2P System

    Despite of their advantages in scalability and routing efficiency, structured peer-to-peer(P2P) overlay networks fail to support complex queries in a network of peers with heterogeneous schemas, which limits t...

    Min Yu, Zhanhuai Li, Longbo Zhang in Web Information Systems – WISE 2006 Workshops (2006)

  12. No Access

    Chapter and Conference Paper

    Quasi-Bottleneck Nodes: A Potential Threat to the Lifetime of Wireless Sensor Networks

    Enlightened by the congestion linkage in the traditional Internet, the novel concept of bottleneck node is proposed in this paper, which is crucial to the lifetime of the wireless sensor network deployed rando...

    Le Tian, Dongliang **e, Lei Zhang in Advanced Web and Network Technologies, and… (2006)

  13. No Access

    Chapter and Conference Paper

    Design of Chinese Word Segmentation System Based on Improved Chinese Converse Dictionary and Reverse Maximum Matching Algorithm

    The increasing interest in cross-lingual and multilingual information retrieval has posed a great challenge of designing accurate information retrieval systems for Asian languages such as Chinese, Thai and Jap...

    Liyi Zhang, Yazi Li, Jian Meng in Web Information Systems – WISE 2006 Workshops (2006)

  14. No Access

    Chapter and Conference Paper

    Grid-Based Multi-scale PCA Method for Face Recognition in the Large Face Database

    In this paper, we propose an efficient grid-based multi-scale PCA method in the large face database. This method divides the large face database into some small sub-face databases by maximizing the variance in...

    Haiyang Zhang, Huadong Ma, Anlong Ming in Advanced Web and Network Technologies, and… (2006)

  15. No Access

    Chapter and Conference Paper

    A Grid-Based System for the Multi-reservoir Optimal Scheduling in Huaihe River Basin

    The up- and mid-stream of Huaihe River Basin is a complex system of reservoirs and river-ways. It is difficult for flood control and reservoir scheduling. It is ineffective to perform sequential computations f...

    Bing Liu, Hua** Chen, Guoyi Zhang in Advanced Web and Network Technologies, and… (2006)

  16. No Access

    Chapter and Conference Paper

    An Integrated Web-Based Model for Management, Analysis and Retrieval of EST Biological Information

    In this work, an integrated Web-based model integrating a number of components has been proposed to analyze, manage and retrieve biological information. In particular, we deal with Expressed Sequence Tags (EST...

    You** Deng, Yinghua Dong, Susan J. Brown in Advanced Web and Network Technologies, and… (2006)

  17. No Access

    Chapter and Conference Paper

    Deployment of Web Services for Enterprise Application Integration (EAI) System

    The process to explore application integration for enterprise information system is called Enterprise Application Integration (EAI). Generally, EAI that based on the peer-to-peer has many limitations, such as ...

    Jie Liu, Er-peng Zhang, **-fen **ong in Advanced Web and Network Technologies, and… (2006)

  18. No Access

    Chapter and Conference Paper

    Grid-Based Parallel Elastic Graph Matching Face Recognition Method

    This paper presents a grid-based parallel elastic graph matching face recognition method. We firstly divide the face into several sub-regions by geometric features decomposing algorithm, and match the sub-regi...

    Haiyang Zhang, Huadong Ma in Advanced Web and Network Technologies, and Applications (2006)

  19. No Access

    Chapter and Conference Paper

    Processing Probabilistic Range Query over Imprecise Data Based on Quality of Result

    Sensors are employed in many applications to monitor entities such as environment temperature or illumination. Because of limited resources (e.g., battery power and wireless bandwidth), it is impractical for t...

    Wei Zhang, Jianzhong Li in Advanced Web and Network Technologies, and Applications (2006)

  20. No Access

    Chapter and Conference Paper

    Toolkits for Ontology Building and Semantic Annotation in UDMGrid

    University Digital Museum Grid (UDMGrid) has been developed to provide one-stop information services about kinds of digital specimens in the form of grid services. In order to speed up the way to make the digi...

    **aowu Chen, **xi Luo, Haifeng Ou in Advanced Web and Network Technologies, and… (2006)

Page of 5