Skip to main content

Page of 77
and
  1. No Access

    Chapter and Conference Paper

    A Subjective and Objective Integrated Method for MAGDM Problems with Multiple Types of Exact Preference Formats

    Group decision making with preference information on alternatives has become a very active research field over the last decade. Especially, the investigation on the group decision making problems based on diff...

    Zeshui Xu, Jian Chen in Intelligent Data Engineering and Automated Learning - IDEAL 2007 (2007)

  2. No Access

    Chapter and Conference Paper

    Study on Efficiency and Effectiveness of KSORD

    KSORD(Keyword Search Over Relational Databases) is an easy and effective way for casual users or Web users to access relational databases. In recent years, much research on KSORD has been done, and many protot...

    Shan Wang, Jun Zhang, Zhaohui Peng, Jiang Zhan in Advances in Data and Web Management (2007)

  3. No Access

    Chapter and Conference Paper

    Active Rules Termination Analysis Through Conditional Formula Containing Updatable Variable

    While active rules have been applied in many areas including active databases, XML documentation and Semantic Web, current methods remain largely uncertain of how to terminate active behaviors. Some existing m...

    Zhongmin **ong, Wei Wang, Jian Pei in Advances in Data and Web Management (2007)

  4. No Access

    Chapter and Conference Paper

    Exploiting Uncertain Data in Support Vector Classification

    A new approach of input uncertainty classification is proposed in this paper. This approach develops a new technique which extends the support vector classification (SVC) by incorporating input uncertainties. ...

    Jianqiang Yang, Steve Gunn in Knowledge-Based Intelligent Information an… (2007)

  5. No Access

    Chapter and Conference Paper

    SAM: An Efficient Algorithm for F&B-Index Construction

    Using index to process structural queries on XML data is a natural way. F&B-Index has been proven to be the smallest index which covers all branching path queries. One disadvantage which prevents the wide usag...

    **anmin Liu, Jianzhong Li, Hongzhi Wang in Advances in Data and Web Management (2007)

  6. No Access

    Chapter and Conference Paper

    Combining Smooth Graphs with Semi-supervised Learning

    The key points of the semi-supervised learning problem are the label smoothness and cluster assumptions. In graph-based semi-supervised learning, graph representations of the data are so important that differe...

    Liang Liu, Weijun Chen, Jianmin Wang in Advances in Data and Web Management (2007)

  7. Chapter and Conference Paper

    Use of Chinese Short Messages

    Short text message (SMS) as a key communication means in China received a lot of attention in research community. 114 subjects attended the study, sharing totally 10843 SMS they sent and received daily. We div...

    Dafei Ma, Fumiko Ichikawa, Ying Liu in Human Interface and the Management of Info… (2007)

  8. No Access

    Chapter and Conference Paper

    A Fast Reading Spatial Knowledge System by Ultrasonic Sound Beams

    PC users can retrieve lots of common information by Internet search engines. A text-to-speech (TTS) system allows citizens to easily access the public report from the city etc. However it takes a long time for...

    Taizo Miyachi, Jens J. Balvig, Jiang Shen Bo in Knowledge-Based Intelligent Information an… (2007)

  9. No Access

    Chapter and Conference Paper

    An Efficient Dictionary Mechanism Based on Double-Byte

    Dictionary is an efficient management of large sets of distinct strings in memory. It has significant influence on Natural Language Process, Information Retrieval and other areas. In this paper, we propose an ...

    Lei Yang, Jian-Yun Shang, Yan-** Zhao in Asian Digital Libraries. Looking Back 10 Y… (2007)

  10. No Access

    Chapter and Conference Paper

    Distributed Knowledge Management Based on Ontological Engineering and Multi-Agent System Towards Semantic Interoperation

    Currently, the available architectures for knowledge management are mainly centralized and focus on basic string processing in essence. They tend to ignore that knowledge is distributed and full of semantics i...

    Yonggui Wang, Jiangning Wu, Zhongtuo Wang in Knowledge Science, Engineering and Managem… (2007)

  11. No Access

    Chapter and Conference Paper

    A Distributed Genetic Algorithm for Optimizing the Quality of Grid Workflow

    The advancement of Grid and Web service technologies greatly facilitates the aggregation of distributed applications. As the grid workflow generally involves long lasting execution tasks, the quality optimizat...

    Hongxia Tong, Jian Cao, Shensheng Zhang in Advances in Web and Network Technologies, … (2007)

  12. No Access

    Chapter and Conference Paper

    CACS: A Novel Classification Algorithm Based on Concept Similarity

    This paper proposes a novel algorithm of classification based on the similarities among data attributes. This method assumes data attributes of dataset as basic vectors of m dimensions, and each tuple of datas...

    **g Peng, Dong-qing Yang, Chang-jie Tang in Advanced Data Mining and Applications (2007)

  13. No Access

    Chapter and Conference Paper

    Exploring Content and Linkage Structures for Searching Relevant Web Pages

    This work addresses the problem of Web searching for pages relevant to a query URL. Based on an approach that uses a deep linkage analysis among vicinity pages, we investigate the Web page content structures a...

    Darren Davis, Eric Jiang in Advanced Data Mining and Applications (2007)

  14. No Access

    Chapter and Conference Paper

    Finding Unsatisfiable Subformulas with Stochastic Method

    Explaining the causes of infeasibility of Boolean formulas has many practical applications in various fields. A small unsatisfiable subformula provides a succinct explanation of infeasibility and is valuable f...

    Jianmin Zhang, Shengyu Shen, Sikun Li in Intelligent Data Engineering and Automated… (2007)

  15. No Access

    Chapter and Conference Paper

    Efficient Keyword Search over Data-Centric XML Documents

    We in this paper investigate keyword search over data-centric XML documents. We first present a novel method to divide an XML document into self-integrated subtrees, which are connected subtrees and can captur...

    Guoliang Li, Jianhua Feng, Na Ta, Lizhu Zhou in Advances in Data and Web Management (2007)

  16. No Access

    Chapter and Conference Paper

    Independent Factor Reinforcement Learning for Portfolio Management

    In this paper we propose to do portfolio management using reinforcement learning (RL) and independent factor model. Factors in independent factor model are mutually independent and exhibit better predictabilit...

    Jian Li, Kun Zhang, Laiwan Chan in Intelligent Data Engineering and Automated… (2007)

  17. No Access

    Chapter and Conference Paper

    CLEF-2006 CL-SR at Maryland: English and Czech

    The University of Maryland participated in the English and Czech tasks. For English, one monolingual run using fields based on automatic transcription (the required condition) and one (otherwise identical) cro...

    Jianqiang Wang, Douglas W. Oard in Evaluation of Multilingual and Multi-modal… (2007)

  18. No Access

    Chapter and Conference Paper

    Contention-Free Communication Scheduling for Group Communication in Data Parallelism

    Group communication significantly influences the performance of data parallel applications. It is required often in two situations: one is array redistribution from phase to phase; the other is array remap**...

    Jue Wang, Changjun Hu, Jianjiang Li in On the Move to Meaningful Internet Systems… (2007)

  19. No Access

    Chapter and Conference Paper

    A Study on Mobile Agent Based Resource Management in Grid

    The cost models for estimating the response time have been presented, and the architecture of grid resource management based on mobile agent is given in this paper. An integration of mobile agent technology wi...

    Chen Zhao, Jian Yu, Bencheng Chai in Knowledge-Based Intelligent Information an… (2007)

  20. No Access

    Chapter and Conference Paper

    The Automatic Peer-to-Peer Signature for Source Address Validation

    SPM (Spoofing Prevention Method) proposed a peer-to-peer anti-spoofing method which could effectively filter spoofed packets and support incremental deployment. However, mechanism of SPM key updating has some ...

    Yan Shen, Jun Bi, Jian** Wu, Qiang Liu in Knowledge-Based Intelligent Information an… (2007)

Page of 77