Research of Matrix Clustering Algorithm Based on Web User Access Pattern (English)
- New search for: Bao, J.
- New search for: Bao, J.
- New search for: Gong, Zhiguo
In:
Web information systems and mining; PART 2 /
6988
;
154-159
;
2011
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:Research of Matrix Clustering Algorithm Based on Web User Access Pattern
-
Contributors:Bao, J. ( author ) / Gong, Zhiguo
-
Conference:International conference, Web information systems and mining; PART 2 / ; 2011 ; Taiyuan, China
-
Published in:Web information systems and mining; PART 2 / , 6988 ; 154-159LECTURE NOTES IN COMPUTER SCIENCE , 6988 ; 154-159
-
Publisher:
- New search for: Springer
-
Place of publication:Heidelberg
-
Publication date:2011-01-01
-
Size:6 pages
-
Remarks:Includes bibliographical references and author index.
-
ISBN:
-
ISSN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Text Clustering Based on LSA-HGSOMWang, J. / Ma, L. et al. | 2011
- 1
-
Research on Electromagnetic Wave Through-The-Earth Wireless Communication for Coal Mine DisasterTao, J. et al. | 2011
- 11
-
The Investigation of WEB Software System Based on Domain-Driven DesignWang, F. / Yan, L. / Zhou, P. / Sun, W. / Ding, Y. et al. | 2011
- 11
-
Design Pattern Modeling and Implementation Based on MDAPang, X. / Ma, K. / Yang, B. et al. | 2011
- 19
-
MediaCRM: Enabling Customer Relationship Management in the BroadcastDe Sutter, R. / Matton, M. / Laukens, N. / Van Rijsselbergen, D. / Van de Walle, R. et al. | 2011
- 19
-
End-to-End Resources Planning Based on Internet of ServiceLi, B. / Zhang, W. et al. | 2011
- 27
-
A Comprehensive Reputation Computation Model Based on Fuzzy Regression Method of Cross-Domain UsersZhou, J. / Hu, G. / Pang, Q. et al. | 2011
- 27
-
Jordan Triple Multiplicative Maps on the Symmetric MatricesZhang, H. / Li, Y. et al. | 2011
- 35
-
A TV Commercial Detection SystemLi, Y. / Luo, S. et al. | 2011
- 35
-
International Collaborations in Brain-Computer Interface (BCI) ResearchHamadicharef, B. et al. | 2011
- 43
-
A Classification of Cluster Validity Indexes Based on Membership Degree and ApplicationsXie, N. / Hu, L. / Luktarhan, N. / Zhao, K. et al. | 2011
- 44
-
Research and Implementation of Entropy-Based Model to Evaluation of the Investment Efficiency of Grid EnterpriseWu, K. / Tu, X. / Duan, C. et al. | 2011
- 51
-
Several Methods of Calculating the Distribution of Linear Combinations of Two-Dimensional Random VariablesLi, Y. / Zhang, H. et al. | 2011
- 51
-
Passive Data Storage Based Housewares Store Management SystemXiao, Y. / Li, G. / Zhang, J. et al. | 2011
- 57
-
Multiple Solutions for Resonant Difference EquationsWang, S. / Zhang, J. et al. | 2011
- 59
-
Propagation in LHM Slab Loaded Rectangular WaveguideLi, R.-l. et al. | 2011
- 65
-
The Application of the GPRS Network on the Design of Real-Time Monitor System for Water Pollution ResourceSun, S.-h. et al. | 2011
- 66
-
The Study of Images Emotion Based on fMRIQiao, X. / Li, H. / Xiang, J. / Deng, H. et al. | 2011
- 72
-
CuttingPlane: An Efficient Algorithm for Three-Dimensional Spatial Skyline Queries Based on Dynamic Scan TheoryZhao, M. / Yu, J. et al. | 2011
- 73
-
The Communication Protocol Design of Electro-Hydraulic Control System for Hydraulic Supports at Coal MineWen, J. / Lian, Z. et al. | 2011
- 79
-
ROS: Run-Time Optimization of SPARQL QueriesLi, L. / Wang, X. / Meng, X. / Feng, Z. et al. | 2011
- 79
-
Temperature Characteristics and Compensation Method of Capacitive Ice Layer Thickness SensorYinke, D. / Xiaomin, C. et al. | 2011
- 86
-
False Alarm Probability of the Digital Channelized Receiver Based CA-CFAR DetectorHe, M. / Jia, K. / Cheng, T. et al. | 2011
- 87
-
The Research and Implementation of Heterogeneous Data Integration under Ontology Mapping MechanismBian, J. / Zhang, H. / Peng, X. et al. | 2011
- 92
-
Strong Solution of Initial-Boundary Value Problem for a Class of Nonlinear Thermoelastic Couple Beam EquationsWang, C.-x. / Zhang, J.-w. et al. | 2011
- 95
-
Extracting Hyponymy Patterns in Tibetan Language to Enrich Minority Languages Knowledge BaseQiu, L. / Weng, Y. / Zhao, X. / Qiu, X. et al. | 2011
- 98
-
Initial-Boundary Value Problem for Viscoelastic Rectangular Plate EquationWang, D. / Wang, Y. et al. | 2011
- 103
-
Discovering Atypical Property Values for Object Searches on the WebFujisaka, T. / Yumoto, T. / Sumiya, K. et al. | 2011
- 104
-
An Invariant Subspace Theorem for Sequentially Subdecomposable OperatorsLiu, M. et al. | 2011
- 109
-
The Genetic Algorithm in the Test Paper GenerationHu, J.-J. / Sun, Y.-H. / Xu, Q.-Z. et al. | 2011
- 113
-
An Indent Shape Based Approach for Web Lists MiningZhu, Y. / Yin, G. / Wang, H. / Shi, D. / Li, X. / Yuan, L. et al. | 2011
- 114
-
CDMA Mobile Internet User Behavior Analysis Based on RP InterfaceYu, K. / He, D. / Dou, Y. / Lei, Z. et al. | 2011
- 122
-
Web Text Clustering with Dynamic ThemesHung, P.J. / Hsu, P.Y. / Cheng, M.S. / Wen, C.H. et al. | 2011
- 124
-
Personalizing Group Recommendation to Social Network UsersEsmaeili, L. / Nasiri, M. / Minaei-Bidgoli, B. et al. | 2011
- 131
-
Multi-aspect Blog Sentiment Analysis Based on LDA Topic Model and Hownet LexiconFu, X. / Liu, G. / Guo, Y. / Guo, W. et al. | 2011
- 134
-
A Novel Frequent Trajectory Mining Method Based on GSPLi, J. / Wang, J. / Yu, L. / Zhang, J. et al. | 2011
- 139
-
Redundant Feature Elimination by Using Approximate Markov Blanket Based on Discriminative ContributionZeng, X.-Q. / Chen, S.-F. / Zou, H.-X. et al. | 2011
- 141
-
Study of a Fuzzy Clustering Algorithm Based on Interval ValueDu, H. et al. | 2011
- 147
-
Synchronization of Hyperchaotic Rossler System and Hyperchaotic Lorenz System with Different StructureWei, Y.-q. / Jiang, N. et al. | 2011
- 148
-
The Influence of the Fourth-Order Dispersion Coefficient for the Information Transmission in FiberXingfang, J. / Kai, S. et al. | 2011
- 154
-
Research of Matrix Clustering Algorithm Based on Web User Access PatternBao, J. et al. | 2011
- 155
-
A Research of Resource Scheduling Strategy with SLA Restriction for Cloud Computing Based on Pareto Optimality MxN Production ModelLi, H. et al. | 2011
- 160
-
Combining Link-Based and Content-Based Classification MethodTian, K. et al. | 2011
- 166
-
A Distributed Processing Method for Design Patent Retrieval SystemCao, J.-Z. / Zhu, J.-W. / Wang, X.-W. / Dai, Q.-Y. et al. | 2011
- 169
-
Chinese Expert Entity Homepage Recognition Based on Co-EMLiu, L. / Yu, Z. / Li, L. et al. | 2011
- 175
-
An Adaptive Distribution Model for Multi-dimensional Data in Decentralized EnvironmentsHe, W. / Cui, L. et al. | 2011
- 178
-
Semi-supervised K-Means Clustering by Optimizing Initial Cluster CentersWang, X. / Wang, C. / Shen, J. et al. | 2011
- 184
-
Research on SOA Business Process Disaster Tolerance Recovery MethodZhang, X. / Sun, J. / Guo, P. et al. | 2011
- 188
-
Fuzzy ID3 Algorithm Based on Generating Hartley MeasureLi, F. / Jiang, D. et al. | 2011
- 192
-
Admission Control for WebServices in Enterprise Systems Using Expert SystemsSalimi, A.J. / Isazadeh, A. / Karimpour, J. et al. | 2011
- 196
-
A Technique for Improving the Performance of Naive Bayes Text ClassificationJiang, Y. / Lin, H. / Wang, X. / Lu, D. et al. | 2011
- 200
-
An Improved Lookup Algorithm on Over-DHT Paradigm Based P2P NetworkFu, Y. / Hu, R. / Chen, J. / Wang, Z. / Tian, G. et al. | 2011
- 204
-
Mapping Data Classification Based on Modified Fuzzy Statistical AnalysisCheng, Y. / Xie, M. / Guo, J. et al. | 2011
- 208
-
Maximizing the Lifetime of Daley-Tolerant Wireless Sensor Networks Using Fuzzy SystemPorshokooh, V.R. / Haghighat, A.T. / Tashtarian, F. et al. | 2011
- 211
-
Web Clustering Using a Two-Layer ApproachLi, Y. / Xing, J. / Wu, R. / Zheng, F. et al. | 2011
- 216
-
Structural Equation Modeling for Evaluating the Public Value of Service Delivery through e-Government: A Case Study from Sri LankaKarunasena, K. / Deng, H. / Karunasena, A. et al. | 2011
- 219
-
An Improved KNN Algorithm for Vertical Search EnginesJia, Y. / Fan, H. / Xia, G. / Dong, X. et al. | 2011
- 224
-
Concluding Pattern of Web Page Based on String Pattern MatchingCai, Y. / Wang, X. / Lu, C. / Yan, Z. / Peng, Z. et al. | 2011
- 226
-
W-entropy Index: The Impact of the Members on Social NetworksLi, W. / Zheng, J. / Li, D.L. et al. | 2011
- 234
-
A Rapid Method to Extract Multiword Expressions with Statistic Measures and Linguistic RulesWang, L. / Liu, R. et al. | 2011
- 234
-
Improving Security of SET Protocol Based on ECCCao, L.-C. et al. | 2011
- 242
-
The Constrained Computing and Application for Intelligent Generalization of SettlementsWang, L. / Zhang, J. et al. | 2011
- 242
-
Mining Popular Menu Items of a Restaurant from Web ReviewsGu, Y.H. / Yoo, S.J. et al. | 2011
- 251
-
Integrating Landsat TM Imagery and See5 Decision-Tree Software for Identifying Croplands: A Case Study in Shunyi District, BeijingZhao, J. / Zhang, D. / Wang, D. / Huang, W. et al. | 2011
- 251
-
News Information Extraction Based on Adaptive Weighting Using Unsupervised Bayesian AlgorithmHuang, S. / Zheng, X. / Wang, X. / Chen, D. et al. | 2011
- 259
-
An Authenticated Key Exchange to Improve the Security of Shi et al. and Kim et al.'s ProtocolsKim, M. / Kwon, C. / Won, D. et al. | 2011
- 259
-
Infectious Communities Forging: Using Information Diffusion Model in Social Network MiningHu, T. / Feng, X. et al. | 2011
- 271
-
A Fast and Tolerant Voting Mechanism in Wireless Sensor NetworksHuang, J.-h. / Shi, Y.-h. et al. | 2011
- 272
-
Extracting Dimensions for OLAP on Multidimensional Text DatabasesZhang, C. / Wang, X. / Peng, Z. et al. | 2011
- 282
-
A Conceptual Framework for Efficient Web Crawling in Virtual Integration ContextsHernandez, I. / Sleiman, H.A. / Ruiz, D. / Corchuelo, R. et al. | 2011
- 283
-
The Strategy of Proactive-Reactive Intrusion Tolerance Recovery Based on Hierarchical ModelHuang, J.-h. / Wang, F.-f. et al. | 2011
- 292
-
Web Trace Duplication Detection Based on ContextGao, C. / Hong, X. / Peng, Z. / Chen, H. et al. | 2011
- 294
-
A Network-Flow-Based Method for Embedding RectificationLi, W. / Wang, H. / He, Z. et al. | 2011
- 302
-
A Framework for Incremental Deep Web Crawler Based on URL ClassificationZhang, Z. / Dong, G. / Peng, Z. / Yan, Z. et al. | 2011
- 304
-
An Approach of Authentication Base on Modified Digital Identity Metasystem in Service-Oriented ArchitectureLi, P. / Wen, J. / Dong, J. / Tang, F. et al. | 2011
- 311
-
Query Classification Based on Index Association Rule ExpansionFu, X. / Chen, D. / Guo, X. / Wang, C. et al. | 2011
- 312
-
Defense against DNS Man-In-The-Middle SpoofingBai, X. / Hu, L. / Song, Z. / Chen, F. / Zhao, K. et al. | 2011
- 319
-
A Link Analysis Model Based on Online Social NetworksZhan, B. / Xia, Z. et al. | 2011
- 320
-
Defensive Steganography: A Novel Way against SteganalysisLi, W. / Wang, H. / He, Z. et al. | 2011
- 327
-
Research on Information Measurement at Semantic LevelJiang, K. / Li, L. / Xu, B. et al. | 2011
- 328
-
A New Privacy-Preserving Scheme DOSPA for SaaSLi, L. / Li, Q. / Shi, Y. / Zhang, K. et al. | 2011
- 335
-
A New Similarity Measure Based Robust Possibilistic C-Means Clustering AlgorithmJia, K. / He, M. / Cheng, T. et al. | 2011
- 336
-
Performance Evaluation of Digital Audio Watermarking Algorithm under Low Bits RatesYu, G. / Zuo, J. / Cui, D. et al. | 2011
- 343
-
DOM Semantic Expansion-Based Extraction of Topical Information from Web pagesChen, J. / Jia, J. / Duan, L. et al. | 2011
- 344
-
An Anti-collusion Trust Model in P2P NetworksTang, X. / Wang, R. / Huang, H. et al. | 2011
- 351
-
A Domain Specific Language for Interactive Enterprise Application DevelopmentZhou, J. / Zhao, D. / Liu, J. et al. | 2011
- 352
-
An Alerts Correlation Technology for Large-Scale Network Intrusion DetectionYuan, J. / Ding, S. et al. | 2011
- 360
-
Dynamic Authorization of Grid Based on Trust MechanismNiu, R.-p. / Mu, X.-f. / Sun, G.-f. et al. | 2011
- 361
-
Scalable Application Description Language to Support IPTV Client Device Independence Based on MPEG-21Lim, T.-B. / Yoon, K. / Kim, K.W. / Moon, J.W. / Lee, Y.J. / Lee, S.-P. et al. | 2011
- 368
-
Timestamp Based Authentication Protocol for Smart Card Using ECCChatterjee, K. / De, A. / Gupta, D. et al. | 2011
- 369
-
A Study on Using Two-Phase Conditional Random Fields for Query Interface SegmentationDong, Y. / Zhao, X. / Zhang, G. et al. | 2011
- 376
-
Data Privacy Preservation during Schema Evolution for Multi-tenancy Applications in Cloud ComputingZhang, K. / Li, Q. / Shi, Y. et al. | 2011
- 377
-
Key Techniques Research on Water Resources Scientific Data Sharing PlatformYu, Y. / Li, S. / Jiang, J. et al. | 2011
- 384
-
A Simple (v, t, n)-Fairness Secret Sharing Scheme with One Shadow for Each ParticipantLee, Y.-C. et al. | 2011
- 385
-
ExpertRec: A Collaborative Web Search EngineSun, J. / Chen, J. / Yu, X. / Zhong, N. et al. | 2011
- 390
-
An Encrypted Data-Transportation Method for Distributed SystemChen, H. / Chen, Y. / Cao, J. / Sun, Y. et al. | 2011
- 393
-
A QoS Evaluation Method for Personalized Service RequestsYang, R. / Chen, Q. / Qi, L. / Dou, W. et al. | 2011
- 397
-
Study on Grid Access Control Strategy Based on Trust and Security GradeLiu, Y. et al. | 2011
- 402
-
Self-adaptive QoS Control Mechanism in Cognitive Networks Based on Intelligent Service AwarenessGu, C. / Zhang, S. et al. | 2011
- 403
-
Virtual Personalized Learning Environment (VPLE) on the CloudLiang, P.-H. / Yang, J.-M. et al. | 2011
- 411
-
Robustness Promotion of High Speed Network Content Auditing Integrated System Based on Machine Learning MethodYang, J. / Wu, Y. / Dou, Y. / Zhang, K. et al. | 2011
- 412
-
MTrust-S: A Multi-model Based Prototype System of Trust Management for Web ServicesPeng, D. / Yi, S. / Huo, H. / Lu, J. et al. | 2011
- 419
-
Diagnosis Method of Combing Feature Extraction Based on Time-Frequency Analysis and Intelligent ClassifierGao, B. / Chen, J. / Xiong, X. / Xiong, S. et al. | 2011
- 420
-
Web Application Security Based on Trusted Network ConnectionFu, Y. / Peng, X. et al. | 2011
- 426
-
Performance Analysis of Sleep-Mode with Uplink/Downlink Traffics in IEEE 802.16mHuo, Z. / Liu, X. et al. | 2011
- 428
-
Model Checking for Asynchronous Web Service Composition Based on XYZ/ADLZhang, G. / Shi, H. / Rong, M. / Di, H. et al. | 2011
- 434
-
LMI Conditions for Stability of Impulsive Stochastic Neural Networks with Unbounded Time-Varying DelaysYin, L. / Yang, D. et al. | 2011
- 436
-
Specification and Verification of Data and Time in Web Service CompositionZhang, G. / Di, H. / Rong, M. / Shi, H. et al. | 2011
- 441
-
Queuing System M/M/1/T with Priority Dropping Packets Mechanism Based on Living TimeWen, W. / Wang, Y. / Zhang, H. et al. | 2011
- 444
-
Development of LMS/LCMS (Contents Link Module) Real-Time Interactive in Videos for Maximizing the Effect of LearningKim, J. / Hwang, D. / Kim, K. / Jung, C. / Kim, W. et al. | 2011
- 452
-
Converting XML Schema Data to Object-Relational Data with DOMSang, L. / Xiao, J. / Cui, X. et al. | 2011
- 461
-
XML Query Algorithm Based on Matching Pretreatment OptimizationWang, Y. / Ye, H. / Ma, H. / Zhang, W. et al. | 2011