ebook img

Web Information Systems and Mining: International Conference, WISM 2012, Chengdu, China, October 26-28, 2012. Proceedings PDF

732 Pages·2012·13.647 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Web Information Systems and Mining: International Conference, WISM 2012, Chengdu, China, October 26-28, 2012. Proceedings

Lecture Notes in Computer Science 7529 CommencedPublicationin1973 FoundingandFormerSeriesEditors: GerhardGoos,JurisHartmanis,andJanvanLeeuwen EditorialBoard DavidHutchison LancasterUniversity,UK TakeoKanade CarnegieMellonUniversity,Pittsburgh,PA,USA JosefKittler UniversityofSurrey,Guildford,UK JonM.Kleinberg CornellUniversity,Ithaca,NY,USA AlfredKobsa UniversityofCalifornia,Irvine,CA,USA FriedemannMattern ETHZurich,Switzerland JohnC.Mitchell StanfordUniversity,CA,USA MoniNaor WeizmannInstituteofScience,Rehovot,Israel OscarNierstrasz UniversityofBern,Switzerland C.PanduRangan IndianInstituteofTechnology,Madras,India BernhardSteffen TUDortmundUniversity,Germany MadhuSudan MicrosoftResearch,Cambridge,MA,USA DemetriTerzopoulos UniversityofCalifornia,LosAngeles,CA,USA DougTygar UniversityofCalifornia,Berkeley,CA,USA GerhardWeikum MaxPlanckInstituteforInformatics,Saarbruecken,Germany Fu Lee Wang Jingsheng Lei Zhiguo Gong Xiangfeng Luo (Eds.) Web Information Systems and Mining International Conference, WISM 2012 Chengdu, China, October 26-28, 2012 Proceedings 1 3 VolumeEditors FuLeeWang CaritasInstituteofHigherEducation,DepartmentofBusinessAdministration 18ChuiLingRoad,TseungKwanO,HongKong,China E-mail:[email protected] JingshengLei ShanghaiUniversityofElectricPower SchoolofComputerandInformationEngineering Shanghai200090,China E-mail:[email protected] ZhiguoGong UniversityofMacau,DepartmentofComputerandInformationScience Av.PadreTomásPereira,Taipa,Macau,China E-mail:[email protected] XiangfengLuo ShanghaiUniversity,SchoolofComputer Shanghai200444,China E-mail:[email protected] ISSN0302-9743 e-ISSN1611-3349 ISBN978-3-642-33468-9 e-ISBN978-3-642-33469-6 DOI10.1007/978-3-642-33469-6 SpringerHeidelbergDordrechtLondonNewYork LibraryofCongressControlNumber:2012946752 CRSubjectClassification(1998):H.4.1-3,H.3.4-5,H.5.3,H.2.7-8,K.4.4,K.6.4,E.3, I.2.6,C.2.0,D.4.6,C.2.4 LNCSSublibrary:SL3–InformationSystemsandApplication,incl.Internet/Web andHCI ©Springer-VerlagBerlinHeidelberg2012 Thisworkissubjecttocopyright.Allrightsarereserved,whetherthewholeorpartofthematerialis concerned,specificallytherightsoftranslation,reprinting,re-useofillustrations,recitation,broadcasting, reproductiononmicrofilmsorinanyotherway,andstorageindatabanks.Duplicationofthispublication orpartsthereofispermittedonlyundertheprovisionsoftheGermanCopyrightLawofSeptember9,1965, initscurrentversion,andpermissionforusemustalwaysbeobtainedfromSpringer.Violationsareliable toprosecutionundertheGermanCopyrightLaw. Theuseofgeneraldescriptivenames,registerednames,trademarks,etc.inthispublicationdoesnotimply, evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevantprotectivelaws andregulationsandthereforefreeforgeneraluse. Typesetting:Camera-readybyauthor,dataconversionbyScientificPublishingServices,Chennai,India Printedonacid-freepaper SpringerispartofSpringerScience+BusinessMedia(www.springer.com) Preface The 2012 International Conference on Web Information Systems and Mining (WISM 2012) was held during October 26–28, 2012 in Chengdu, China. WISM 2012 received 418 submissions from 10 countries and regions. After rigorous reviews, 87 high-quality papers were selected for publication in the WISM 2012 proceedings. The acceptance rate was 21%. The aim of WISM 2012 was to bring together researchers working in many different areas of web information systems and web mining to exchange new ideas and promote international collaboration. In addition to the large number ofsubmittedpapersandinvitedsessions,therewereseveralinternationallywell- known keynote speakers. On behalf of the Organizing Committee, we thank Xihua University and Leshan Normal University for its sponsorship and logistics support. We also thank the members of the Organizing Committee and the ProgramCommittee fortheirhardwork.We areverygratefultothe keynotespeakers,sessionchairs, reviewers,andstudent helpers. Lastbut notleast, we thank allthe authors and participants for their great contributions that made this conference possible. October 2012 Fu Lee Wang Jingsheng Lei Zhiguo Gong Xiangfeng Luo Organization Organizing Committee General Co-chairs WeiGuo Sun Xihua University, China Qing Li City University of Hong Kong, Hong Kong, China Program Committee Co-chairs Zhiguo Gong University of Macau, Macau, China Xiangfeng Luo Shanghai University, China Steering Committee Chair Jingsheng Lei Shanghai University of Electric Power,China Local Arrangements Co-chairs Yajun Du Xihua University, China MingXing He Xihua University, China Jin Pei LeShan Normal University, China Proceedings Co-chairs Fu Lee Wang Caritas Institute of Higher Education, Hong Kong, China Ting Jin Fudan University, China Sponsorship Chair Zhiyu Zhou Zhejiang Sci-Tech University, China Program Committee Ladjel Bellatreche ENSMA - Poitiers University, France Sourav Bhowmick Nanyang TechnologicalUniversity, Singapore Stephane Bressan National University of Singapore, Singapore Erik Buchmann University of Karlsruhe, Germany Jinli Cao La Trobe University, Australia Jian Cao Shanghai Jiao Tong University, China VIII Organization Badrish Chandramouli Microsoft Research, USA Akmal Chaudhri City University of London, UK Qiming Chen Hewlett-Packard Laboratories,USA Lei Chen Hong Kong University of Science and Technology, China Jinjun Chen Swinburne University of Technology, Australia Hong Cheng The Chinese University of Hong Kong, China Reynold Cheng Hong Kong Polytechnic University, China Bin Cui Peking University, China Alfredo Cuzzocrea University of Calabria, Italy Wanchun Dou Nanjing University, China Xiaoyong Du Renmin University of China, China Ling Feng Tsinghua University, China Cheng Fu Nanyang TechnologicalUniversity, Singapore Gabriel Fung The University of Queensland, Australia Byron Gao University of Wisconsin, USA Yunjun Gao Zhejiang University, China Bin Gao Microsoft Research, China Anandha Gopalan Imperial College, UK Stephane Grumbach INRIA, France Ming Hua Simon Fraser University, Canada Ela Hunt University of Strathclyde, Glasgow Renato Iannella National ICT, Australia Yan Jia National University of Defence Technology, China Yu-Kwong Ricky Colorado State University, USA Yoon Joon Lee KAIST, Korea Carson Leung The University of Manitoba, Canada Lily Li CSIRO, Australia Tao Li Florida International University, USA Wenxin Liang Dalian University of Technology, China Chao Liu Microsoft, USA Qing Liu CSIRO, Australia Jie Liu Chinese Academy of Sciences, China JianXun Liu Hunan University of Science and Technology, China Peng Liu PLA University of Science and Technology, China Jiaheng Lu University of California, Irvine, USA Weiyi Meng Binghamton University, USA Miyuki Nakano University of Tokyo, Japan Wilfred Ng Hong Kong University of Science and Technology, China Junfeng Pan Google, USA Organization IX Zhiyong Peng Wuhan University, China Xuan-Hieu Phan University of New South Wales (UNSW), Australia Tieyun Qian Wuhan University, China Kaijun Ren National University of Defense Technology, China Dou Shen Microsoft, USA Peter Stanchev Kettering University, USA Xiaoping Su Chinese Academy of Sciences, China Jie Tang Tsinghua University, China Zhaohui Tang Microsoft, USA Yicheng Tu University of South Florida, USA Junhu Wang Griffith University, Australia Hua Wang University of Southern Queensland, Australia Guoren Wang Northeastern University, USA Lizhe Wang Research Center Karlsruhe, Germany Jianshu Weng Singapore Management University, Singapore Raymond Wong Hong Kong University of Science and Technology, China Jemma Wu CSIRO, Australia Jitian Xiao Edith Cowan University, Australia Junyi Xie Oracle Corp., USA Wei Xiong National University of Defence Technology, China Hui Xiong Rutgers University, USA Jun Yan University of Wollongon, Australia Xiaochun Yang Northeastern University, China Jian Yang Macquarie University, Australia Jian Yin Sun Yat-Sen University, China Qing Zhang CSIRO, Australia Shichao Zhang University of Technology, Australia Yanchang Zhao University of Technology, Australia Sheng Zhong State University of New York at Buffalo, USA Aoying Zhou East China Normal University, China Xingquan Zhu Florida Atlantic University, USA Table of Contents Applications of Web Information Systems Study onthe DesignofAutomatic CottonBaleInspecting Management System ......................................................... 1 Jie Zhao, Fang Yu, Minfeng Tang, Wenliao Du, and Jin Yuan The Smallest Randi´c Index for Trees ............................... 9 Bingjun Li and Weijun Liu Design of Meridian and Acupoints Compatibility Analysis System...... 15 Jingchang Pan and Guangwen Wang Invariant Subspaces for Operators with Thick Spectra ................ 22 Mingxue Liu Voronoi Feature Selection Model Considering Variable-Scale Map’s Balance and Legibility............................................ 26 Hua Wang, Jiatian Li, Haixia Pu, Rui Li, and Yufeng He A Code Dissemination Protocolof Low Energy Consumption .......... 36 Haiyong Wang, Geng Yang, Jian Xu, Zhengyu Chen, and Zhen Yang Dynamic Spectrum Analysis of High-Speed Train Passenger Compartment Luggage Rack Noise ................................. 44 Chuanhui Wu, Xiangling Gao, and Pinxian Gao Port-Based Composable Modeling and Simulation for Safety Critical System Testbed.................................................. 51 Yujun Zhu, Zhongwei Xu, and Meng Mei Risk Assessment Method of Radio Block Center in Fuzzy Uncertain Environment .................................................... 59 Qiuxiang Tao, Wei Nai, Haiming Gao, and Jiliang Tu Learning Research in Knowledge Transfer ........................... 67 Bing Wu and Pingping Chen A Post-filtering Technique for Enhancing Acoustic Echo Cancelation System ......................................................... 73 Yaxun Wang Packet Dropping Schemes and Quality Evaluation for H.264 Videos at High PacketLoss Rates........................................... 81 Yuxia Wang, Yi Qu, and Rui Lv XII Table of Contents A Blocked Statistics Method Based on Directional Derivative.......... 90 Junli Li, Chengxi Chu, Gang Li, and Yang Lou Study on Cooperative Game Model of Talent Training through School-Enterprise Coalition........................................ 98 Jun Li, Yan Niu, and Jingliang Chen Applications of Web Mining Research on Internet Public Opinion Detection System Based on Domain Ontology ................................................ 105 Chunming Yang A Security Analysis Model Based on Artificial Neural Network......... 111 Rongqi Liu and Shifen Zhong Social Network Analyses on Knowledge Diffusion of China’s Management Science ............................................. 117 Hongjiang Yue A ParallelAssociation-Rule Mining Algorithm....................... 125 Zhi-gang Wang and Chi-she Wang An Algorithm of Parallel Programming Design Based on Problem Domain Model................................................... 130 Xin Zhang, Guangnan Guo, Lu Bai, Yu Zhang, and Hao Wang E-government and E-commerce Metadata-Aware Small Files Storage Architecture on Hadoop.......... 136 Xiaoyong Zhao, Yang Yang, Li-li Sun, and Han Huang Research on the Isomorphism of the Electronic-Government and Electronic-Commerce in Support System............................ 144 Yunbiao Gu and Jian Liu OntheDeploymentofWirelessSensorNetworkswithRegularTopology Patterns ........................................................ 150 Wen-xiang Li and Ya-jie Ma An Empirical Study on the Relationship among Trust and the Risky and Non-Risky Components of E-Commerce......................... 159 Xibao Zhang Process Modeling and Reengineering in the Integration Stage of Electronic Government ........................................... 167 Ning Zhang and Haifeng Li Table of Contents XIII Development of Vertical Industrial B2B in China: Based on Cases Study .......................................................... 175 Jinghuai She and Xiaotong Xing Personalized Recommendation System on Massive Content Processing Using Improved MFNN........................................... 183 Jianyang Li and Xiaoping Liu Information Security A Speaker Recognition Based Approach for Identifying Voice Spammer ....................................................... 191 Fei Wang, KeXing Yan, and Min Feng Security Access Authentication System for IPv4/IPv6 Dual-Stack Campus Network Based on IpoE................................... 199 Jinshan Zhu, Jiankang Guo, and Yueguang Ruan Information Encryption Based on Virtual Optical Imaging System and Chen’s Chaos.................................................... 206 Wei Zhu, Geng Yang, Jian Xu, and Xiao-ling Yang A New Scheme with Secure Cookie against SSLStrip Attack........... 214 Sendong Zhao, Wu Yang, Ding Wang, and Wenzhen Qiu ID-Based Signatures from Lattices in the Random Oracle Model ....... 222 Chunxiang Gu, Li Chen, and Yonghui Zheng Strongly Secure Attribute-Based Authenticated Key Exchange with Traceability ..................................................... 231 Fugeng Zeng, Chunxiang Xu, Xiujie Zhang, and Jian Liu A New Public Key Signature Scheme Based on Multivariate Polynomials..................................................... 239 Feng Yuan, Shangwei Zhao, Haiwen Ou, and Shengwei Xu Comments on an Advanced Dynamic ID-Based Authentication Scheme for Cloud Computing............................................. 246 Ding Wang, Ying Mei, Chun-guang Ma, and Zhen-shan Cui Research on Security Management in Active Network Node Operating Systems ........................................................ 254 Yongchun Cao, Yabin Shao, and Zhengqi Cai An Integrity Verification Scheme for Multiple Replicas in Clouds....... 264 La Zhang, Qingzhong Li, Yuliang Shi, Lin Li, and Wenxiao He Multi-stage Attack Detection Algorithm Based on Hidden Markov Model .......................................................... 275 Nurbol Luktarhan, Xue Jia, Liang Hu, and Nannan Xie

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.