Content Computing Advanced Workshop on Content Computing, AWCC 2004, Zhen Jiang, Jiang Su, China, November 15-17, 2004, Proceedings

Bibliographic Details
Other Authors: Chi, Chi-Hung (Editor), Lam, Kwok-Yan (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2004, 2004
Edition:1st ed. 2004
Series:Lecture Notes in Computer Science
Subjects:
Online Access:
Collection: Springer Book Archives -2004 - Collection details see MPG.ReNa
LEADER 06702nmm a2200481 u 4500
001 EB000652557
003 EBX01000000000000000505639
005 00000000000000.0
007 cr|||||||||||||||||||||
008 140122 ||| eng
020 |a 9783540304838 
100 1 |a Chi, Chi-Hung  |e [editor] 
245 0 0 |a Content Computing  |h Elektronische Ressource  |b Advanced Workshop on Content Computing, AWCC 2004, Zhen Jiang, Jiang Su, China, November 15-17, 2004, Proceedings  |c edited by Chi-Hung Chi, Kwok-Yan Lam 
250 |a 1st ed. 2004 
260 |a Berlin, Heidelberg  |b Springer Berlin Heidelberg  |c 2004, 2004 
300 |a XII, 516 p  |b online resource 
505 0 |a Fractional Gaussian Noise: A Tool of Characterizing Traffic for Detection Purpose -- Performance Analysis of Virtual Time Optimistic Transaction Processing -- A Measurement-Based TCP Congestion Control Scheme -- BM-VF-SBD: An Efficient Data Channel Scheduling Algorithm to Support QoS for Optical Burst Switching Networks -- A Predictive Controller for AQM Router Supporting TCP with ECN -- Session 4: Content Aware Security (I) -- Enhancing the Content of the Intrusion Alerts Using Logic Correlation -- Real-Time Emulation of Intrusion Victim in HoneyFarm -- On the Formal Characterization of Covert Channel -- Availability Analysis and Comparison of Different Intrusion-Tolerant Systems -- Security Analysis of User Efficient Blind Signatures -- Session 5: Content Aware Security (II) -- A Novel DDoS Attack Detecting Algorithm Based on the Continuous Wavelet Transform -- Enhancing the Scalability of the Community Authorization Service for Virtual Organizations --  
505 0 |a Session 1: Mobile Code and Agent Technology -- Mobility Prediction-Based Wireless Resource Allocation and Reservation -- An Agent-Enabled Content-Explicit Authorization Model for OGSA-Compliant Grid -- A Predictable Mobile Agent Computation Model and Its Fabric Architecture -- A Novel Reverse Rerouting Mechanism in Mobile Wireless Internet -- An Agents Based Grid Infrastructure of Social Intelligence -- Agent Aided Workflow Modeling -- Session 2: Content Sharing and Consistency Management -- An Improved Hybrid Method of Maintaining Content Consistency -- Advanced Architecture for Distributed Systems with a Network Infrastructure Based on CAN and Internet for Content Distribution -- Distributed Document Sharing with Text Classification over Content-Addressable Network -- Content Distribution Stochastic Fluid Models for Multi-regions P2P Networks -- Construct Campus Peer-to-Peer Networks -- Session 3: Networking Infrastructure and Performance --  
505 0 |a Evolutionary Parameter Estimation Algorithm for Combined Kernel Function in Support Vector Machine -- Enriching Domain Ontology from Domain-Specific Documents with HowNet -- A Framework of Extracting Sub-ontology -- Ontology Based Sports Video Annotation and Summary 
505 0 |a Securing Multicast Groups in Ad Hoc Networks -- Improved Privacy-Protecting Proxy Signature Scheme -- Improving Security Architecture Development Based on Multiple Criteria Decision Making -- Session 6: Multimedia Content -- A LSB Substitution Oriented Image Hiding Strategy Using Genetic Algorithms -- A Prediction Scheme for Image Vector Quantization Based on Mining Association Rules -- Fuzzy Logic-Based Image Retrieval -- Deriving Facial Patterns for Specifying Korean Young Men’s 3D Virtual Face from Muscle Based Features -- A Content-Based Fragile Watermarking Scheme for Image Authentication -- Session 7: Content Mining and Knowledge Extraction -- A New FP-Tree Algorithm for Mining Frequent Itemsets -- Evaluation Incompleteness of Knowledge in Data Mining -- The Variable Precision Rough Set Model for Data Mining in Inconsistent Information System -- Rule Discovery with Particle Swarm Optimization -- Data Mining Service Based on MDA --  
505 0 |a Session 8: Web Services and Content Applications (I) -- Web Service Composition Based on BPWS-Net -- Testing Web Services Using Progressive Group Testing -- XFCM – XML Based on Fuzzy Clustering and Merging – Method for Personalized User Profile Based on Recommendation System of Category and Product -- Analyzing Web Interfaces of Databases for Retrieving Web Information -- A New Universally Verifiable and Receipt-Free Electronic Voting Scheme Using One-Way Untappable Channels -- Session 9: Web Services and Content Applications (II) -- Ontology-Based Conceptual Modeling of Policy-Driven Control Framework: Oriented to Multi-agent System for Web Services Management -- An Approach to Dynamically Reconfiguring Service-Oriented Applications from a BusinessPerspective -- Dynamically Reconfiguring Sitemaps Using RDF -- A General Model for Heterogeneous Web Services Integration -- Methodology for Semantic Representing of Product Data in XML -- Semantic Based Web Services Discovery --  
505 0 |a Session 10: Content Retrieval and Management (I) -- What Are People Looking for in Your Web Page? -- The Impact of OCR Accuracy on Automatic Text Classification -- TSS: A Hybrid Web Searches -- Determining the Number of Probability-Based Clustering: A Hybrid Approach -- Categorizing XML Documents Based on Page Styles -- Session 11: Content Retrieval and Management (II) -- Generating Different Semantic Spaces for Document Classification -- A Component Retrieval Method Based on Facet-Weight Self-learning -- The Algorithm About Division and Reducts of Information System Based on Discernibility Index of Attribute -- An Effective Document Classification System Based on Concept Probability Vector -- Accuracy Improvement of Automatic Text Classification Based on Feature Transformation and Multi-classifier Combination -- Session 12: Ontology and Knowledge Conceptualization -- Risk Minimization Based Ontology Mapping --  
653 |a Computer Communication Networks 
653 |a Computer science 
653 |a Information Storage and Retrieval 
653 |a Data Structures and Information Theory 
653 |a Database Management 
653 |a Application software 
653 |a Information storage and retrieval systems 
653 |a Computer networks  
653 |a Information theory 
653 |a Data structures (Computer science) 
653 |a Computer and Information Systems Applications 
653 |a Theory of Computation 
653 |a Database management 
700 1 |a Lam, Kwok-Yan  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b SBA  |a Springer Book Archives -2004 
490 0 |a Lecture Notes in Computer Science 
028 5 0 |a 10.1007/b103383 
856 4 0 |u https://doi.org/10.1007/b103383?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 003.54 
082 0 |a 005.73