Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    A Refined Method for Detecting Interpretable and Real-Time Bursty Topic in Microblog Stream

    The real-time detection of bursty topics on microblog has acquired much research efforts in recent years, due to its wide use in a range of user-focused tasks such as information recommendation, trend analysis...

    Tao Zhang, Bin Zhou, Jiuming Huang, Yan Jia in Web Information Systems Engineering – WISE… (2017)

  2. No Access

    Chapter and Conference Paper

    Taxonomy Tree Based Similarity Measurement of Textual Attributes of Items for Recommender Systems

    Recommender systems have become indispensable tools for numerous industries and individual who utilize e-commerce. Although recommender systems rely on the similarities between the items to be recommended, mos...

    Longquan Tao, Fei Liu, **li Cao in Web Information Systems Engineering – WISE 2016 (2016)

  3. No Access

    Chapter and Conference Paper

    Parallel Materialization of Datalog Programs with Spark for Scalable Reasoning

    As the volume of semantic data increases rapidly, semantic reasoning becomes a very challenging task. Existing scalable reasoners focus on fragments of OWL 2 RL (eg. RDFS, OWL Horst), and cannot support Semant...

    Haijiang Wu, Jie Liu, Tao Wang, Dan Ye in Web Information Systems Engineering – WISE… (2016)

  4. No Access

    Chapter and Conference Paper

    Attribute-Based Influence Maximization in Social Networks

    As traditional advertising model exposes its weakness of ignoring consumer interests, the concept of narrow advertising draws increasingly more attention which considers the feature of each user. Under this sp...

    Jiuxin Cao, Tao Zhou, Dan Dong, Shuai Xu in Web Information Systems Engineering – WISE… (2016)

  5. No Access

    Chapter and Conference Paper

    Moving Video Mapper and City Recorder with Geo-Referenced Videos

    There has been growing interest in correlating co-visualizing a video stream to the dynamic geospatial attributes of the moving camera. Moving videos comes from various GPS-enabled video recording devices and ...

    Guangqiang Zhao, Ming** Zhang, Tao Li in Web Information Systems Engineering – WISE… (2015)

  6. No Access

    Chapter and Conference Paper

    Discovering Functional Dependencies in Vertically Distributed Big Data

    The issue of discovering FDs has received a great deal of attention in the database research community. However, as the problem is exponential in the number of attributes, existing approaches can only be appli...

    Weibang Li, Zhanhuai Li, Qun Chen, Tao Jiang in Web Information Systems Engineering – WISE… (2015)

  7. No Access

    Chapter and Conference Paper

    The Detection of Multiple Dim Small Targets Based on Iterative Density Clustering and SURF Descriptor

    Following the classical TBD (Track before Detection) framework popular used in ATR (Automatic Target Recognition), a fast algorithm is proposed in this paper. Different from the classical data association meth...

    Haiying Zhang, Yang Gao, Tao Li in Web Information Systems Engineering – WISE 2015 (2015)

  8. No Access

    Chapter and Conference Paper

    A Classification-Based Demand Trend Prediction Model in Cloud Computing

    Cloud computing allows dynamic scaling of resources to users as needed. With the increasing demand for cloud service, a challenging problem is how to minimize cloud resource provisioning costs while meeting th...

    Qifeng Zhou, Bin **a, Yexi Jiang, Qianmu Li in Web Information Systems Engineering – WISE… (2015)

  9. No Access

    Chapter and Conference Paper

    File Relation Graph Based Malware Detection Using Label Propagation

    The rapid development of malicious software programs has posed severe threats to Computer and Internet security. Therefore, it motivates anti-malware industry to develop novel methods which are capable of prot...

    Ming Ni, Qianmu Li, Hong Zhang, Tao Li in Web Information Systems Engineering – WISE… (2015)

  10. No Access

    Chapter and Conference Paper

    Analyzing File-to-File Relation Network in Malware Detection

    Due to its major threats to Internet security, malware detection is of great interest to both the anti-malware industry and researchers. Currently, features beyond file content are starting to be leveraged for...

    Lingwei Chen, William Hardy, Yanfang Ye in Web Information Systems Engineering – WISE… (2015)

  11. No Access

    Chapter and Conference Paper

    Aspect and Ratings Inference with Aspect Ratings: Supervised Generative Models for Mining Hotel Reviews

    Today, a large volume of hotel reviews is available on many websites, such as TripAdvisor (http://www.tripadvisor.com) and Orbitz (http://www.orbi...

    Wei Xue, Tao Li, Naphtali Rishe in Web Information Systems Engineering – WISE 2015 (2015)

  12. No Access

    Chapter and Conference Paper

    Geographical Constraint and Temporal Similarity Modeling for Point-of-Interest Recommendation

    People often share their visited Points-of-Interest (PoIs) by “check-ins”. On the one hand, human mobility varies with each individual but still implies regularity. Check-ins of an individual tend to localize ...

    Huimin Wu, Jie Shao, Hongzhi Yin in Web Information Systems Engineering – WISE… (2015)

  13. No Access

    Chapter and Conference Paper

    Dividing Traffic Sub-areas Based on a Parallel K-Means Algorithm

    In order to alleviate the traffic congestion and reduce the complexity of traffic control and management, it is necessary to exploit traffic sub-areas division which should be effective in planing traffic. Som...

    Binfeng Wang, Li Tao, Chao Gao, Dawen **a in Knowledge Science, Engineering and Managem… (2014)

  14. No Access

    Chapter and Conference Paper

    A Semantic-Based EMRs Integration Framework for Diagnosis Decision-Making

    Discovering latent information from Electronic Medical Re- cords (EMRs) for guiding diagnosis decision making is a hot issue in the era of big data. An EMR composes of various data (e.g., patient information, ...

    Huili Jiang, Zili Zhang, Li Tao in Knowledge Science, Engineering and Management (2014)

  15. No Access

    Chapter and Conference Paper

    High-Payload Image-Hiding Scheme Based on Best-Block Matching and Multi-layered Syndrome-Trellis Codes

    Image steganography has been widely used in the domain of privacy protection, such as the storage and transmission of the secret images. This paper presents a novel image-hiding scheme to embed the secret imag...

    Tao Han, **long Fei, Shengli Liu, ** Chen in Web Information Systems Engineering – WISE… (2014)

  16. No Access

    Chapter and Conference Paper

    An Efficient Algorithm of Association Information Mining on Web Pages with Dynamic Scripts

    The hyperlink analysis algorithm is widely used by public search engines. But with the development of the websites with dynamic script, this algorithm is not fit to realize the efficient searching for these re...

    Tao Tan, Leting Tan in Emerging Research in Web Information Systems and Mining (2011)

  17. No Access

    Chapter and Conference Paper

    Research on Electromagnetic Wave Through-The-Earth Wireless Communication for Coal Mine Disaster

    When the coal mine disaster happens, the communications system paralysis causes the fact that the stranded personnel and the rescue groups are unable to relate. This situation is the biggest difficult problem ...

    **yi Tao in Web Information Systems and Mining (2011)

  18. No Access

    Chapter and Conference Paper

    3DES Implementation Based on FPGA

    In order to meet the demand of plenty continuous encrypting-deciphering, and meet the demand of enhancing the security of encrypting-deciphering algorithm, the fundamental technologies such as pipeline technol...

    Fang Ren, Leihua Chen, Tao Zhang in Emerging Research in Web Information Systems and Mining (2011)

  19. Chapter and Conference Paper

    Adding Integrity Constraints to the Semantic Web for Instance Data Evaluation

    This paper presents our work on supporting evaluation of integrity constraint issues in semantic web instance data. We propose an alternative semantics for the ontology language, i.e., OWL, a decision procedur...

    Jiao Tao in The Semantic Web – ISWC 2010 (2010)

  20. No Access

    Chapter and Conference Paper

    The Accuracy Enhancements of Virtual Antenna for Location Based Services

    Measurement report (MR) base methods are a kind of cell identifier (CI) base methods whose parameters could be extracted from MRs and the cell configuration database (CCD). They are utilized for location based...

    Fu Tao, Huang Benxiong, Mo Yijun in Web Information Systems and Mining (2010)

previous disabled Page of 2