Advances in Web and Network Technologies, and Information Management: APWeb/WAIM 2007 International Workshops: DBMAN 2007, WebETrends 2007, PAIS 2007 and ASWAN 2007, Huang Shan, China, June 16-18, 2007. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed combined proceedings of four international workshops held in conjunction with the joint 9th Asia-Pacific Web Conference, APWeb 2007, and the 8th International Conference on Web-Age Information Management, WAIM 2007, held in Huang Shan, China in June 2007.

The 50 revised full papers and 25 revised short papers presented together with the abstract of one keynote talk were carefully reviewed and selected from a total of 266 submissions. The papers of the four workshops are very specific and contribute to enlarging the spectrum of the more general topics treated in the APWeb 2007 and WAIM 2007 main conferences. Topics addressed by the workshops are: Database Management and Application over Networks (DBMAN 2007), Emerging Trends of Web Technologies and Applications (WebETrends 2007), Process Aware Information Systems (PAIS 2007), and Application and Security Service in Web and Pervasive Environments (ASWAN 2007).

Author(s): Tianxiao Liu, Tuyêt Trâm Dang Ngoc, Dominique Laurent (auth.), Kevin Chen-Chuan Chang, Wei Wang, Lei Chen, Clarence A. Ellis, Ching-Hsien Hsu, Ah Chung Tsoi, Haixun Wang (eds.)
Series: Lecture Notes in Computer Science 4537 : Information Systems and Applications, incl. Internet/Web, and HCI
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2007

Language: English
Pages: 707
Tags: Data Mining and Knowledge Discovery; Information Systems Applications (incl.Internet); Information Storage and Retrieval; User Interfaces and Human Computer Interaction; Computer Communication Networks; Artificial Intelligence (incl. Rob

Front Matter....Pages -
Cost Framework for a Heterogeneous Distributed Semi-structured Environment....Pages 1-11
Cost-Based Vertical Fragmentation for XML....Pages 12-24
Efficiently Crawling Strategy for Focused Searching Engine....Pages 25-36
QoS-Guaranteed Ring Replication Management with Strong Consistency....Pages 37-49
A Mobile Database Sharing Protocol to Increase Data Availability in Mobile Environments....Pages 50-61
Mining Recent Frequent Itemsets over Data Streams with a Time-Sensitive Sliding Window....Pages 62-73
Mining Web Transaction Patterns in an Electronic Commerce Environment....Pages 74-85
Mining Purpose-Based Authorization Strategies in Database System....Pages 86-98
RSP-DS: Real Time Sequential Pattern Analysis over Data Streams....Pages 99-110
Investigative Queries in Sensor Networks....Pages 111-121
A Taxonomy-Based Approach for Constructing Semantics-Based Super-Peer Networks....Pages 122-134
A Comparative Study of Replica Placement Strategies in Data Grids....Pages 135-143
A Workload Balancing Based Approach to Discourage Free Riding in Peer-to-Peer Network....Pages 144-155
QoS-Based Services Selecting and Optimizing Algorithms on Grid....Pages 156-167
Bayesian Method Based Trusted Overlay for Information Retrieval over Networks....Pages 168-173
Managing a Geographic Database from Mobile Devices Through OGC Web Services....Pages 174-179
Real-Time Creation Method of Personalized Mobile Web Contents for Ubiquitous Contents Access....Pages 180-185
The Golden Mean Operator Scheduling Strategy in Data Stream Systems....Pages 186-191
Continuous Skyline Tracking on Update Data Streams....Pages 192-197
A Hybrid Algorithm for Web Document Clustering Based on Frequent Term Sets and k-Means....Pages 198-203
OMSI-Tree: Power-Awareness Query Processing over Sensor Networks by Removing Overlapping Regions....Pages 204-210
On Studying Front-Peer Attack-Resistant Trust and Reputation Mechanisms Based on Enhanced Spreading Activation Model in P2P Environments....Pages 211-216
A Load Balancing Method Using Ring Network in the Grid Database....Pages 217-222
Design and Implementation of a System for Environmental Monitoring Sensor Network....Pages 223-228
Policy Based Scheduling for Resource Allocation on Grid....Pages 229-234
Characterizing DSS Workloads from the Processor Perspective....Pages 235-240
Exploiting Connection Relation to Compress Data Graph....Pages 241-246
Indexing the Current Positions of Moving Objects on Road Networks....Pages 247-252
DBMSs with Native XML Support: Towards Faster, Richer, and Smarter Data Management....Pages 253-254
A Personalized Re-ranking Algorithm Based on Relevance Feedback....Pages 255-263
An Investigation and Conceptual Models of Podcast Marketing....Pages 264-275
A User Study on the Adoption of Location Based Services....Pages 276-286
Email Community Detection Using Artificial Ant Colony Clustering....Pages 287-298
EviRank: An Evidence Based Content Trust Model for Web Spam Detection....Pages 299-307
A Novel Factoid Ranking Model for Information Retrieval....Pages 308-316
Dynamic Composition of Web Service Based on Coordination Model....Pages 317-327
An Information Retrieval Method Based on Knowledge Reasoning....Pages 328-339
Research on Personalized Recommendation Algorithm in E-Supermarket System....Pages 340-347
XML Normal Forms Based on Constraint-Tree-Based Functional Dependencies....Pages 348-357
Untyped XQuery Canonization....Pages 358-371
Web Search Tailored Ontology Evaluation Framework....Pages 372-383
An Overview of the Business Process Maturity Model (BPMM)....Pages 384-395
Process Mining: Extending α -Algorithm to Mine Duplicate Tasks in Process Logs....Pages 396-407
A Distributed Genetic Algorithm for Optimizing the Quality of Grid Workflow....Pages 408-419
Safety Analysis and Performance Evaluation of Time WF-nets....Pages 420-432
Dual Workflow Nets: Mixed Control/Data-Flow Representation for Workflow Modeling and Verification....Pages 433-444
Bridging Organizational Structure and Information System Architecture Through Process....Pages 445-455
Relation-Driven Business Process-Oriented Service Discovery....Pages 456-466
Workflow Message Queue’s Performance Effect Measurements on an EJB-Based Workflow Management System....Pages 467-478
RFID Application Model and Performance for Postal Logistics....Pages 479-484
An Organization and Task Based Access Control Model for Workflow System....Pages 485-490
A Method of Web Services Composition Based on Service Alliance....Pages 491-496
Toward a Lightweight Process-Aware Middleware....Pages 497-503
Automatic Generation of Web Service Workflow Using a Probability Based Process-Semantic Repository....Pages 504-509
A Three-Dimensional Customer Classification Model Based on Knowledge Discovery and Empirical Study....Pages 510-515
QoS-Driven Global Optimization of Services Selection Supporting Services Flow Re-planning....Pages 516-521
SOA-Based Collaborative Modeling Method for Cross-Organizational Business Process Integration....Pages 522-527
Model Checking for BPEL4WS with Time....Pages 528-533
A Version Management of Business Process Models in BPMS....Pages 534-539
Research on Architecture and Key Technology for Service-Oriented Workflow Performance Analysis....Pages 540-545
The Study on Internet-Based Face Recognition System Using Principal Component Analysis....Pages 546-553
Semantic Representation of RTBAC: Relationship-Based Access Control Model....Pages 554-563
A Code-Based Multi-match Packet Classification with TCAM....Pages 564-572
Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile....Pages 573-582
P-IDC: Information Security and Consideration in Building Internet Data Centers for Pervasive Environment....Pages 583-592
Improvement of an Authenticated Key Agreement Protocol....Pages 593-601
A Mechanism for Securing Digital Evidences in Pervasive Environments....Pages 602-611
A Secure Chaotic Hash-Based Biometric Remote User Authentication Scheme Using Mobile Devices....Pages 612-623
Adapting Web Services Security Standards for Mobile and Wireless Environments....Pages 624-633
Coexistence Proof Using Chain of Timestamps for Multiple RFID Tags....Pages 634-643
A Design of Authentication Protocol for Multi-key RFID Tag....Pages 644-653
An Efficient Fragile Watermarking for Web Pages Tamper-Proof....Pages 654-663
Classification of Key Management Schemes for Wireless Sensor Networks....Pages 664-673
An Efficient Algorithm for Proportionally Fault-Tolerant Data Mining....Pages 674-683
SOGA: Fine-Grained Authorization for Self-Organizing Grid....Pages 684-693
Permission-Centric Hybrid Access Control....Pages 694-703
Back Matter....Pages -