A trust-based selection approach for QoS-aware service composition provisions (English)
- New search for: Wang, Ping
- New search for: Wang, Ping
In:
2012 6th International Conference on New Trends in Information Science, Service Science and Data Mining (ISSDM2012)
;
1-6
;
2012
- Conference paper / Electronic Resource
-
Title:A trust-based selection approach for QoS-aware service composition provisions
-
Contributors:Wang, Ping ( author )
-
Published in:
-
Publisher:
- New search for: IEEE
-
Publication date:2012-10-01
-
Size:1420639 byte
-
ISBN:
-
Type of media:Conference paper
-
Type of material:Electronic Resource
-
Language:English
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
A trust-based selection approach for QoS-aware service composition provisionsWang, Ping et al. | 2012
- 1
-
[Title page]| 2012
- 1
-
Table of contents| 2012
- 7
-
Reducing uncertainty in the automotive after sale service parts through inventory managementChen, Amy / Wee, H.M / Chin-Ying Hsieh, / Wee, Paul et al. | 2012
- 13
-
E-Commerce trust management system reliabilityChong, Soon Keow / Abawajy, Jemal et al. | 2012
- 19
-
Research on influence of information productivity on industrial structureWang Mingming, et al. | 2012
- 23
-
Augmented Reality on a dot matrix hologramChung-Hsuan Hsu, / Hsi-Chun Wang, et al. | 2012
- 27
-
A personalized model of real-life space for providing ambient serviceSora Lim, / Jong-Gak Choe, / Kwon, Yong-Jin et al. | 2012
- 34
-
Healthcare monitoring application in ubiquitous sensor network: Design and implementation based on pulse sensor with arduinoKemis, Hermawan / Bruce, Ndibanje / Wang Ping, / Antonio, Tony / Lee Byung Gook, / Hoon Jae Lee, et al. | 2012
- 39
-
Search word suggestion conversation agent of user experience based on improvement of smart phone usabilitySuKyoung Kim, / Yoon-sung Cho, / Yeol-Woo Sung, / Yong-gil Kim, et al. | 2012
- 45
-
Implementation of bayer image interpolation based on FPGAZhang Qigui, / Zhao Lijuan, et al. | 2012
- 50
-
Forensic evidence gathering impact on business continuityRedford, Mike et al. | 2012
- 57
-
The study of ubiquitous computing and business process management convergence: A case of National Palace MuseumI-Ju Tsai, / Chiang, Johannes K. et al. | 2012
- 63
-
Server farm site selection using green computing criteriaHaibo Wang, / Da Huo, et al. | 2012
- 68
-
Analysis of waiting time for examinees at a health examination centerWei-Chang Yeh, / Vera Chung, / Hsiu-Jung Hung, / Peng-Jen Lai, et al. | 2012
- 73
-
Estimation of mind state with body movements observed using video camerasAoki, Kyota / Bounyong, Souksakhone et al. | 2012
- 79
-
Use of gas law and pulmonary compliance to simulate healthy human lung ventilationYongming Cai, / Xuenong Zhang, / Fuhua Chen, / Man Luo, / Yong Tang, et al. | 2012
- 84
-
An impact of the Japan and the U.S. stock return volatility for two stock markets: An empirical study of Taiwan and Korea CountriesWann-Jyi Horng, / Tien-Chung Hu, et al. | 2012
- 89
-
Conversion of Function Points between NESMA and IFPUG methodHong Huang, / Aihua Ren, / Zhiyong Yang, et al. | 2012
- 94
-
Research on the anxiety of PE examinees engaged in the technical subject test of college entrance examination in Hunan provinceXie Yaping, et al. | 2012
- 98
-
Data transmission mechanism for multiple gateway systemXuan He, / Yuanchen Ma, / Mizutani, Mika et al. | 2012
- 102
-
Improved digital signature schemes based on dual-complexitiesKai Chain, / Yang, Jar-Ferr et al. | 2012
- 108
-
Hardware implementation of the improved trellis algorithmHa, JeongMok / Jeong, Hong et al. | 2012
- 112
-
Optimal method for correct measurement of Line-edge roughnessSun, Insun / Jeong, Hong et al. | 2012
- 116
-
Mobile cloud computing model for data processing and analysis on smartphoneOkkyung Choi, / Wooyeol Jung, / Kangseok Kim, / Hongjin Yeh, et al. | 2012
- 120
-
The research of statistical testing fault detection method based on embedded softwareZheng Wei, / Liu Qi, / Zhang Liang, et al. | 2012
- 125
-
A parallel processor for distributed genetic algorithm with redundant binary numberKamimura, Tomohiro / Kanasugi, Akinori et al. | 2012
- 129
-
Intelligent Group Decision Support Systems based on Multi-Agent SystemErhong Wang, / Jinglei Tang, / Yimin He, et al. | 2012
- 133
-
A light weight public auditing scheme for proof-of-storageTao Zou, / Jian Wu, / Changsheng Wan, et al. | 2012
- 137
-
A study on enterprise performance evaluation based on DEA modelJingyuan Huo, / Tao Sun, et al. | 2012
- 142
-
Dynamic coding for time series in load forecastingYingJu Xia, / YuHang Yang, / Mingming Zhang, / Jian Sun, / Hao Yu, et al. | 2012
- 146
-
A selection method of the evaluation indicator system of the self-oriented innovation capability of enterprises based on 2-dimension linguistic informationJunjie Zhong, / Weidong Zhu, et al. | 2012
- 152
-
A framework of software requirements quality analysis system using case-based reasoning and Neural NetworkMat Jani, Hajar / Tariqul Islam, ABM et al. | 2012
- 158
-
The multimedia authoring in collaborative e-learning systemChuleui Hong, / Yeongjoon Kim, et al. | 2012
- 162
-
Efficient and secure Cloud storage for handling big dataKumar, Arjun / HoonJae Lee, / Singh, Rajeev Pratap et al. | 2012
- 167
-
Using NS2 for a new routing method to note the packet drop problem in DTNsShih-Yang Yang, / Jiun-Ting Jiang, / Po-zung Chen, et al. | 2012
- 173
-
Improved sandboxing for java virtual machine using hybrid execution modelNishiyama, Hiroyasu et al. | 2012
- 179
-
Efficient algorithm for liveness/safeness analysis of free-choice nets in a Petri net tool: HiPSIde, Kazuto / Wasaki, Katsumi et al. | 2012
- 185
-
Research on multisource remote sensing image classification algorithms based on image fusion and the EM-HMRFGuiqing He, / Jinye Peng, / Xiaoyi Feng, / Jun Wang, et al. | 2012
- 193
-
Using social networking technologies to implement adaptive business networksMinggang Chen, / Dong, Ching-shen James / Srinivasan, Ananth et al. | 2012
- 201
-
The protocol for Secure Cloud-Service SystemPark, Hyun-A / Park, JaeHyun / JaeSung Kim, / SeungBock Lee, / JaeKyeong Kim, / Dae-gi Kim, et al. | 2012
- 209
-
Optimization for Vietnamese text classification problem by reducing features setHa Nguyen Thi Thu, / Quynh Nguyen Huu, / Khanh Nguyen Thi Hong, / Hung Le Manh, et al. | 2012
- 213
-
Censoring and combining in cooperative communications assisted by a relayLun-Chung Peng, / Kuen-Tsair Lay, / Tsui-Fen Li, et al. | 2012
- 219
-
Performance study of a clustering-based genetic algorithm for data gathering by a mobile robot in wireless sensor networkLiu, Jing-Sin / Chiu, Ko-Ming / Yang, Shih-Rong / Wu, Shao-You et al. | 2012
- 225
-
A Virtual Potential Field Based Coverage-Enhancing Algorithm for 3D Directional Sensor NetworksLi Yupeng, / Ji Peng, / Liu Hongchao, / Jiang Jingqi, et al. | 2012
- 231
-
Development of the EHS management system as SaaS for small and medium manufacturing firmsSeo, Kwang-Kyu / Yoon, S. et al. | 2012
- 235
-
The dynamic relationship of environmental regulation intension and construction industry developmentLili Zhang, / Jinxin Tian, et al. | 2012
- 240
-
Statistical process adjustment with upside-down normal loss functionLiping Liu, / Jianlan Zhong, / Yizhong Ma, et al. | 2012
- 244
-
Evaluating service process satisfaction of a tourism factory - Using Brands' Health Museum as an exampleChia-Hsien Tsai, / Yu Jin Peng, / Hsin-Hung Wu, et al. | 2012
- 248
-
Study of droughts and floods predicting system based on Spatial-temporal Data MiningXiaotian Gu, / Ning Li, et al. | 2012
- 254
-
Spatial and economic impacts analysis of an emergency eventWei Xie, / Ning Li, / Zhonghui Ji, / Jidong Wu, et al. | 2012
- 260
-
A concise representation of generalized frequent itemsets based on profile summaryYu Xing Mao, / Cheng Hong Zhang, / Hong Ling, et al. | 2012
- 266
-
A cloud computing framework for real-time carpooling servicesChih-Hsiang Lin, / Ming-Kai Jiau, / Shih-Chia Huang, et al. | 2012
- 272
-
A spatialization method for production value of economic sector in Changsha, ChinaZhonghui Ji, / Ning Li, / Wei Xie, / Jidong Wu, / Yang Zhou, et al. | 2012
- 278
-
Study design of water and nitrogen optimal management model based on wireless sensor and maize growth modelLi, Shijuan / Zhu, Yeping et al. | 2012
- 283
-
An authorization model of quantitative analysis of the least privilegeHui Wang, / Lianzhong Liu, / Wanli Tian, et al. | 2012
- 289
-
Sobel mask operations using shared memory in CUDA environmentJi Hoon Jo, / Sang Gu Lee, et al. | 2012
- 293
-
Data hiding technique for digital images tracing system on the WebGilsang Yoo, / Dongeun Sun, / Kigon Lyu, / Hyeoncheol Kim, et al. | 2012
- 297
-
Enhancing Discrete Event Simulation in multi-core processors environments using Multi-Dimensional Queue MechanismWong Ming Tat, / Chong Chun Yong, / Ling Teck Chaw, et al. | 2012
- 303
-
Presentation of virtual electromagnetic shielding using coding theory to achieve high security data transferring in bank data centerAbbasian, F. / Faghihi, F. et al. | 2012
- 307
-
The abuse of Internet usage by undergraduates in Bangkok and vicinityThammakoranonta, Nithinant / Chayawan, Chirasil / Mongkonchoo, Khachon et al. | 2012
- 313
-
Dissemination formats and major statistic data sets of the AEC countries: A surveyBunyakiati, Panuchart / Voravittayathorn, Pajika et al. | 2012
- 317
-
Service-oriented ontology evaluation method by QFD-based approachSukyoung Kim, / Hyunseok Seo, / EungHa Kim, / Youngil Choi, et al. | 2012
- 325
-
Study for performance improvement of parallel process according to analysis of HadoopJinWoo Lee, / SyKyoung Kim, et al. | 2012
- 330
-
Surplus optimization in combinatorial double auctionsHsieh, Fu-Shiung / Chi-Shiang Liao, et al. | 2012
- 336
-
Sensor-based Emissions Monitoring SystemIn Chae Jeong, / Guohua Li, / Sang Boem Lim, et al. | 2012
- 340
-
A data management system for AirScopeGuohua Li, / In Chae Jeong, / Sang Boem Lim, et al. | 2012
- 344
-
Exploring associated networks of cold herb and hot herb within the framework of traditional Chinese medicine through text miningFei Liang, / Junping Zhan, / Zheng, Guang / Miao Jiang, / Cheng Lu, / Aiping Lu, et al. | 2012
- 348
-
A modelling notation for contextual-based message filtering serviceSharon, / Yih-Jiun Lee, / Kai-Wen Lien, et al. | 2012
- 352
-
Development of the smart-TV-based family-oriented communication serviceMinHee Park, / PyoungHwa Kang, / HyunJeong Kim, et al. | 2012
- 356
-
Empirical research on the groupon technology acceptance modeLiu Hong Wei, / Zhu Hui, et al. | 2012
- 361
-
Applying Q-matrix based item relational structure theory to multiplications of fractionsLiu, Hsiang-Chuan / Hsien-Chang Tsai, / Shang-Ling Ou, / Wu, Shih-Neng / Yih-Chang Ou, / Tung-Sheng Liu, et al. | 2012
- 367
-
Visualized comparison for CFP datasets by structure identification and ontologyIssertial, Laurent / Tsuji, Hiroshi / Saga, Ryosuke et al. | 2012
- 373
-
Diagnosis for interactive conjoint analysisCastel, Dennis / Vella, Adrien / Fei Wei, / Saga, Ryosuke / Tsuji, Hiroshi et al. | 2012
- 379
-
Mining English translation of different types of Chinese OOVChien-Yuan Wang, / Ping-Che Yang, / Tsun Ku, / Wen-Tai Hsieh, / Hung-Sheng Chiu, / Ren-Dar Yang, et al. | 2012
- 383
-
Economic recovery measurement of 2005 hurricane Katrina in LouisianaWu, Jidong / Li, Ning / Zhonghui Ji, / Wei Xie, / Xiaotian Gu, et al. | 2012
- 389
-
A model for application-oriented database performance tuningGaozheng Zhang, / Mengdong Chen, / Lianzhong Liu, et al. | 2012
- 395
-
N-triad link prediction model based on structural statistics in social networkJiapeng Chen, / Lianzhong Liu, / Wanli Tian, et al. | 2012
- 400
-
Study on the optimum path algorithms of disaster relief chain based on MapXYang, Zhen / Wang, Cheng-jun / Guo, Li et al. | 2012
- 404
-
The system verification of timed automata based on simulation graphGui Yayun, / Xu Qingguo, et al. | 2012
- 410
-
IWSS: Intelligent Web Service selection for service-oriented applicationsBashir, Rabia / Khanum, Aasia / Azam, Farooque et al. | 2012
- 414
-
A practical test method for scalability of the clusterShiyan Wei, / Lizhi Cai, / Donglin Liu, / Zhenyu Liu, / Leilei Chen, / Pan Liu, et al. | 2012
- 419
-
The study of pattern auto-generation system based on silk fabric propertiesYanzhen Wang, / JianPing Wang, et al. | 2012
- 423
-
Application of fast incremental LLE to bearing fault feature dimension reductionLi Chengliang, / Wang Zhongsheng, / Jiang Hongkai, et al. | 2012
- 427
-
An exploratory study of the impact of organizational factors on employee knowledge sharingYong Wu, / Weidong Zhu, / Junjie Zhong, / Kai Wang, et al. | 2012
- 433
-
The measurement model of the PRCA's reconfigurabilityShidong Huang, / Lizhi Cai, / Shida Lu, / Hong Peng, / Luwei Zhang, et al. | 2012
- 439
-
An optimized method for generating cases of metamorphic testingLeilei Chen, / Lizhi Cai, / Jiang Liu, / Zhenyu Liu, / Shiyan Wei, / Pan Liu, et al. | 2012
- 444
-
MR imaging in gastrointestinal tracts: Static and dynamic assessmentFurukawa, Akira / Yen-Wei Chen, / Kanasaki, Shuzo / Wakamiya, Makoto / Murakami, Yoko / Sato, Shigetaka / Yoshimura, Masahiro / Tateyama, Tomoko / Taniguchi, Ayako et al. | 2012
- 449
-
Statistical shape model of the liver and effective mode selection for classification of liver cirrhosisChen, Yen-Wei / Luo, Jie / Tateyama, Tomoko / Han, Xian-Hua / Furukawa, Akira / Kanasaki, Shuzo / Jiang, Huiyan et al. | 2012
- 453
-
Disease discrimination based on disease subspace of organ shape using orthogonal complement of normal subspaceHigashiura, Keisuke / Prasad Mukherjee, Dipti / Okada, Toshiyuki / Yokota, Futoshi / Hori, Masatoshi / Takao, Masaki / Sugano, Nobuhiko / Chen, Yen-Wei / Tomiyama, Noriyuki / Sato, Yoshinobu et al. | 2012
- 458
-
A high-speed method for liver segmentation on abdominal CT imageWenhan Wang, / Gao, Xihe et al. | 2012
- 463
-
Estimation of the information pathway in an insect brain based on the physiological dataNishikawa, Ikuko / Yamagishi, Yoshihiko / Ikeno, Hidetoshi / Kazawa, Tomoki / Namiki, Shigehiro / Kanzaki, Ryohei et al. | 2012
- 466
-
M-sequence family from cultured neural circuitsTamura, Shinichi / Nishitani, Yoshi / Hosokawa, Chie / Mizuno-Matsumoto, Yuko / Kamimura, Takuya / Yen-Wei Chen, / Miyoshi, Tomomitsu / Sawai, Hajime et al. | 2012
- 472
-
DFT based multiple watermarks for medical image robust to common and geometrical attacksJingbing Li, / Xianhua Han, / Chunhua Dong, / Yen-wei Chen, et al. | 2012
- 478
-
A new linear coding algorithm for efficient multi-dimensional data representation without data expansionXu Qiao, / Xuantao Su, / Xianhua Han, / Yen-Wei Chen, et al. | 2012
- 483
-
Two-step subspace learning for texture synthesis of facial imagesSeo, Masataka / Chen, Yen-Wei et al. | 2012
- 487
-
3D facial images reconstruction from single facial imageOsawa, Shunya / Guifang Duan, / Seo, Masataka / Igarashian, Takanori / Yen-Wei Chen, et al. | 2012
- 491
-
Natural skin color transformation based on color subspace learningMuta, Kenji / Seo, Masataka / Guifang Duan, / Yen-Wei Chen, et al. | 2012
- 495
-
Behavior generation of fish school by the potential field method in Virtual Aqua MuseumFujiwara, Chie / Onishi, Naiki / Tateyama, Tomoko / Hiratsuka, Satoshi / Sakakibara, Kazutoshi / Yen-Wei Chen, et al. | 2012
- 499
-
A study on the combination of emotion keywords to improve the negative emotion recognition accuracyWen-Yi Huang, / Tsang-Long Pao, et al. | 2012
- 504
-
The impact of customer-oriented personality traits and selling skills on performance in Taiwan Pharmaceutical Multi-national Sales TeamChen, Hsuan-Kai / Chung-Li Lee, / Yueh-Chuen Huang, / Kin-Hong Gan, et al. | 2012
- 512
-
A study of integration of technology and pre-training courses of short-term study abroad programsLee, Pi-Ying Becky / Kuo Hung Huang, et al. | 2012
- 518
-
Is electronic prescription essential for hospitals? - A game theory modelNan-Nan Du, / Hui-Yang Chen, / Qian-Jin Zong, / Qin-Jian Yuan, et al. | 2012
- 523
-
Particle Swarm Optimization method for rescheduling of job processing against machine breakdowns for nondisruptive cell manufacturing systemWan-Ling Li, / Murata, Tomohiro et al. | 2012
- 529
-
Automated activity monitoring using a visual sensorHaelyeon Kim, / Heegon Kim, / Sungju Lee, / Yongwha Chung, et al. | 2012
- 533
-
Business model of clean energy vehicles industry based on optionZhong, Zhi-yang / You, Jian-xin et al. | 2012
- 539
-
A data mining algorithm based on joint distribution rules in disaster risk valuationNing Li, / Wei Xie, / Bihang Fan, / Zhonghui Ji, / Xueqin Liu, et al. | 2012
- 544
-
Quasi-linear-time substring searching by q-gram distanceHanada, Hiroyuki / Kudo, Mineichi / Nakamura, Atsuyoshi et al. | 2012
- 550
-
Teaching evaluation using data mining on moodle LMS forumPong-inwong, Chakrit / Rungworawut, Wararat et al. | 2012
- 556
-
Manipulator trajectory planning based on ZigBee for remote controlXue-feng Chen, / Huai-yu Wu, / Feng-mei Zhang, / Tao Han, / Bo Liu, et al. | 2012
- 562
-
Cloud test environment deployment based on the needs of individual usersHong Peng, / GenXing Yang, / Lizhi Cai, / Shidong Huang, / Yun Hu, et al. | 2012
- 568
-
The influence of cultural intelligence and relationship quality on Offshore IS Outsourcing project success: From the Vendor's perspectiveYuying Zhang, / Bo Yang, / Mingzhu Liu, et al. | 2012
- 575
-
An approach of information process and management based on multi-regression analysis: An example of its application to solve a business issueChen, Qikai / Guo, Qianghua et al. | 2012
- 580
-
Version Control for Metadata in unified database consoleYuan Wang, / Mengdong Chen, et al. | 2012
- 586
-
A multi-objective dynamic rebalancing scheduling algorithm for mixed-model assembly lineZhu Zhiyuan, / Tan Jie, / Ni Wancheng, / Yang Yiping, et al. | 2012
- 592
-
Copula in temporal data mining: The joint return period of extreme temperature in BeijingBihang Fan, / Li Guo, / Ning Li, et al. | 2012
- 598
-
An improved collaborative filtering algorithm adapting to user interest changesLai, Wen / Deng, Huifang et al. | 2012
- 603
-
K-means initial clustering center optimal algorithm based on estimating density and refining initialHui Ai, / Wei Li, et al. | 2012
- 607
-
TVMCM: A trusted VM clone model in cloud computingWei Ma, / Xiaoyong Li, / Yong Shi, / Yu Guo, et al. | 2012
- 612
-
The study of micro-blog information diffusion model based on community structure detectionXiaoyuan Lu, / Yidong Cui, et al. | 2012
- 617
-
A probabilistic approach to time delay estimationYihan Gao, et al. | 2012
- 621
-
A fault diagnosis algorithm of artificial immune network model based on neighborhood rough set theoryYonghuang Zheng, / Feng Tian, / Renhou Li, / Qingsong Song, / Longzhuang Li, et al. | 2012
- 628
-
An intelligent RFID data predicting method based on BP-adaboostHong Cheng, / Jie Tan, / Yu Liu, / WanCheng Ni, et al. | 2012
- 633
-
Consistency checking and test generation for UML statechart diagram via extended context-free grammarLiping Li, / Tao He, / Shan Tang, et al. | 2012
- 639
-
Constructivism learning theory for programming through an e-learningYacob, Azliza Bt / Bin Mohd Saman, Md Yazid / Bin Yusoff, Mohd Hafiz et al. | 2012
- 644
-
Application of Gaussian Process Regression for bearing degradation assessmentSheng Hong, / Zheng Zhou, et al. | 2012
- 649
-
Mining closed sequential patterns - A novel approachRahaman, Sophia Banu / Shashi, M. et al. | 2012
- 654
-
Impact of I/O and execution scheduling strategies on large scale parallel data miningBenjamas, Nunnapus / Uthayopas, Putchong et al. | 2012
- 661
-
Characteristic evaluation for groups in data envelopment analysis and its applicationKukozumi, Kanta / Mokciana, Delpmne / Inoue, Kazusnige / Tsuji, Hirosni / Shi, Xiaojun et al. | 2012
- 667
-
Semi-blind bilinear matrix system, BYY harmony learning, and gene analysis applicationsXu, Lei / Chang Jiang, et al. | 2012
- 673
-
Data mining with time granulesHong, Tzung-Pei / Lan, Guo-Cheng / Wu, Pei-Shan / Wang, Shyue-Liang et al. | 2012
- 678
-
A load-balancing H.264 stream dispatching scheme utilized in network video monitoring systemJunfeng Lu, et al. | 2012
- 683
-
Study on the penalty function based on redemption mechanism for trust value of WSNYin Guisheng, / Zhang Jianguo, / Yan Tongbao, et al. | 2012
- 689
-
Using feedback control approach to guarantee QoS issues in mapserverLu, Jianbo / Li, Haipeng / Zhang, Dongna et al. | 2012
- 693
-
A method for prompt dynamic memory reclamationSunja Kim, / Ik-Soon Kim, / Ohseok Kwon, et al. | 2012
- 697
-
Leaf classification using structure features and Support Vector MachinesWatcharabutsarakham, Sarin / Sinthupinyo, Wasin / Kiratiratanapruk, Kantip et al. | 2012
- 701
-
Learning by annotating: A system development study of real-time synchronous supports for distributed learning in multiple locationsShen, Yang Ting / Pei Wen Lu, et al. | 2012
- 707
-
A Knowledge Model about Relations and ApplicationDo, Nhon V. / Nguyen, Hien D. et al. | 2012
- 711
-
Hybrid Multi-Objective PSO with Solution Diversity Extraction for job-shop scheduling managementHsiang-Chun Cheng, / Chun-Liang Lu, / Shih-Yuan Chiu, et al. | 2012
- 717
-
A novel approach to determine cell formation, cell layout, and intracellular machine layoutChin-Chih Chang, / Tai-Hsi Wu, et al. | 2012
- 722
-
Speed Up Kernel Projection Vector Machine Using Kronecker DecompositionDeng, WanYu / Kai Zhang, / QingHua Zheng, et al. | 2012
- 726
-
Online system for detection of Chinese near-duplicate documentsYang Yang, / YuQuan Chen, et al. | 2012
- 732
-
Apply data mining to establish the performance evaluation model of Taiwan TrainQuali SystemLin, Wen-Tsann / Chia-Pao Chang, / Ching-Yu Kung, / Yung-Tsan Jou, / Yih-Chuan Wu, et al. | 2012
- 738
-
EMG signals detection technique in voluntary muscle movementAli, Adnan Ahmed / Albarahany, / Liu quan, et al. | 2012
- 743
-
Online risk control mechanisms, perceived risk, trust and consumers' behavioral intention for price errorsYu-Hui Wang, / Yi-Cheng Liu, et al. | 2012
- 749
-
Identifying the cold and hot properties of medicinal herbs based on the associated target proteins by pattern recognition technologyHaibo Gao, / Jianxin Cui, / Yao Gao, / Fei Liang, / Junping Zhan, / Li Li, / Guang Zheng, / Cheng Lu, / Aiping Lu, / Miao Jiang, et al. | 2012
- 755
-
Use of ontology-based ethnographic decision tree model to explore MMORPGsChingwei Chang, / Kwoting Fang, et al. | 2012
- 760
-
Towards personalized health profiling in social networkBatool, Rabia / Khan, Wajahat Ali / Hussain, Maqbool / Maqbool, Jahanzeb / Afzal, Muhammad / Lee, Sungyoung et al. | 2012
- 766
-
Reliability of series system with two identical units and repairman single vacation under common cause failureCheng, Jiang / Tang, Yinghui et al. | 2012
- 769
-
Vehicular separation by thermal features' relative angle for nighttime trafficSangnoree, Apiwat et al. | 2012
- 774
-
IT-caused shifts in labor demandHong Hyo Jin, et al. | 2012
- 779
-
ARSA: An archive social annotation tool for content digitizationHaruechaiyasak, Choochart / Pailai, Jaruwat et al. | 2012
- 785
-
Name entity extraction based on POS tagging for criminal information analysis and relation visualizationYang, Kai-Sheng / Chun-Cheng Chen, / Yuen-Hsien Tseng, / Zih-Ping Ho, et al. | 2012
- 790
-
Enhanced symbolic aggregate approximation method for financial time series data representationBarnaghi, Peiman Mamani / Abu Bakar, Azuraliza / Othman, Zulaiha Ali et al. | 2012
- 796
-
Emotion-based music recommendation using audio features and user playlistDeng, James J. / Leung, Clement et al. | 2012
- 802
-
A personalized recommendation system in E-Learning environment based on semantic analysisLi, Yi / Mei, Lin / Wang, Jian et al. | 2012
- 808
-
Modeling user's temporal dynamic profile in micro-blogging using clustering methodRunsheng Li, / Wei He, / Zhenyu Wu, / Jun Hu, / Yu Liu, et al. | 2012
- 813
-
A novel design to support skyline query in key-value storesChe-Wei Chang, / Cheng-Lung Chu, / Yu-Chang Chao, et al. | 2012
- 819
-
Flower search by image on mobile phoneSunpetchniyom, Treepop / Watanapa, Saowaluk / Siricharoenchai, Rungkarn et al. | 2012
- 824
-
Split clouds: New security architecture for protecting user information from cloud insiders - Designs, implementation, and performance evaluationsFujinoki, Hiroshi / Dehkordi, Siamak Mahmoudian et al. | 2012
- c1
-
[Front and back cover]| 2012