Model Interactive Search between User and Associated Link Networks (English)
- New search for: Baiquan Zhu,
- New search for: Xiangfeng Luo,
- New search for: Yang Liu,
- New search for: Xiang He,
- New search for: Lingyu Xu,
- New search for: Baiquan Zhu,
- New search for: Xiangfeng Luo,
- New search for: Yang Liu,
- New search for: Xiang He,
- New search for: Lingyu Xu,
In:
2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing
;
729-736
;
2011
- Conference paper / Electronic Resource
-
Title:Model Interactive Search between User and Associated Link Networks
-
Contributors:Baiquan Zhu, ( author ) / Xiangfeng Luo, ( author ) / Yang Liu, ( author ) / Xiang He, ( author ) / Lingyu Xu, ( author )
-
Published in:
-
Publisher:
- New search for: IEEE
-
Publication date:2011-12-01
-
Size:750450 byte
-
ISBN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Electronic Resource
-
Language:English
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Service Injection: A Threat to Self-Managed Complex SystemsMeland, P. H. et al. | 2011
- 7
-
S2XS2: A Server Side Approach to Automatically Detect XSS AttacksShahriar, H. / Zulkernine, M. et al. | 2011
- 15
-
Establishing Hypothesis for Recurrent System Failures from Cluster Log FilesChuah, E. / Lee, G. / Tjhi, W-C / Shyh-Hao Kuo, / Hung, T. / Hammond, J. / Minyard, T. / Browne, J. C. et al. | 2011
- 23
-
Long-Term CPU Load PredictionJianhuang Liang, / Jian Cao, / Jungang Wang, / Yuxia Xu, et al. | 2011
- 27
-
Application of Neural Networks to the Correction of a Stiffness Matrix by a Static TestZhong Yang, / Haifei Si, et al. | 2011
- 31
-
New Latch-Up Model for Deep Sub-micron Integrated CircuitsPan Dong, / Long Fan, / Suge Yue, / Hongchao Zheng, / Shougang Du, et al. | 2011
- 37
-
Self-Adaptive Authorization Framework for Policy Based RBAC/ABAC ModelsBailey, C. / Chadwick, D. W. / de Lemos, R. et al. | 2011
- 45
-
Exact and Heuristic Algorithm for Multi-constrained Optimal Path ProblemQingan Fang, / Jun Han, / Liyong Mao, / Zhaoguo Li, et al. | 2011
- 52
-
A Wide-Range Edge-Combining DLL with a Charge Pump for Low SpurBin He, / Lu, T. J. / Wang, Z. M. / Zhang, T. L. et al. | 2011
- 56
-
Analysis of the New Latchup Model for Deep Sub-micron Integrated CircuitsPan Dong, / Long Fan, / Suge Yue, / Hongchao Zheng, / Shougang Du, et al. | 2011
- 63
-
A Trustful Infrastructure for the Internet of Things Based on EPOSMoteFrohlich, A. A. / Steiner, R. V. / Rufino, L. M. et al. | 2011
- 69
-
A 46MHz Biquad Gm-C High Q Bandpass Filter Design for Wireless ApplicationChong Duan, / Weimin Li, et al. | 2011
- 73
-
Ontology Based Modeling for Information Security ManagementSaha, P. / Parameswaran, N. / Ray, P. / Mahanti, A. et al. | 2011
- 81
-
Towards Self-Awareness in Cloud Markets: A Monitoring MethodologyBreskovic, I. / Haas, C. / Caton, S. / Brandic, I. et al. | 2011
- 89
-
Intelligent Test Oracle Construction for Reactive Systems without Explicit SpecificationsFarn Wang, / Li-Wei Yao, / Jung-Hsuan Wu, et al. | 2011
- 97
-
Workload Balancing for Highly Available Services: The Case of the N+M Redundancy ModelKanso, A. / Khendek, F. / Toeroe, M. et al. | 2011
- 105
-
Reliability Implications of Register Utilization: An Empirical StudyRomer, P. / Troger, P. et al. | 2011
- 113
-
A Natural Classification Scheme for Software Security PatternsAlvi, A. K. / Zulkernine, M. et al. | 2011
- 121
-
Automatic Annotation of Software Configuration Models with Service Recovery InformationKanso, A. / Khendek, F. / Toeroe, M. et al. | 2011
- 129
-
A Connection-Based Signature Approach for Control Flow Error DetectionMohamed, A. / Zulkernine, M. et al. | 2011
- 137
-
A Fuzzy Logic-Based Buffer Overflow Vulnerability AuditorShahriar, H. / Zulkernine, M. et al. | 2011
- 145
-
A Bio-inspired Host-Based Multi-engine Detection System with Sequential Pattern RecognitionJiang, F. / Frater, M. / Jiankun Hu, et al. | 2011
- 151
-
Polymorphic Malware Detection Using Hierarchical Hidden Markov ModelMuhaya, F. B. / Khan, M. K. / Yang Xiang, et al. | 2011
- 156
-
Personalized Searching for Web Service Using User InterestsRong Hu, / Wanchun Dou, / Liu, X. F. / Jianxun Liu, et al. | 2011
- 164
-
Using Particle Swarm Optimization to Improve the Precision and Recall of Taxonomy ExtractionSyafrullah, M. / Salim, N. B. et al. | 2011
- 170
-
A Formal Model for Advanced Physical AnnotationsAlzahrani, A. A. / Loke, S. W. / Hongen Lu, et al. | 2011
- 178
-
Pervasive Intelligent Routing in Content Centric Delay Tolerant NetworksAnh Dung Nguyen, / Senac, P. / Ramiro, V. / Diaz, M. et al. | 2011
- 186
-
Protecting from Inside Attacks in Wireless Sensor NetworksXu Huang, / Ahmed, M. / Sharma, D. et al. | 2011
- 192
-
First Prototype of Aquatic Tool Kit: Towards Low-Cost Intelligent Larval Fish Counting in HatcheriesLoh, B. C. S. / Raman, V. / Then, P. H. H. et al. | 2011
- 196
-
A Carrier Aggregation Based Resource Allocation Scheme for Pervasive Wireless NetworksFan Wu, / Yuming Mao, / Supeng Leng, / Xiaoyan Huang, et al. | 2011
- 202
-
The User-Group Based Recommendation for the Diverse Multimedia Contents in the Social Network EnvironmentsSaim Shin, / Se-Jin Jang, / Seok-Pil Lee, et al. | 2011
- 207
-
From Sensory Data to Situation Awareness: Enhanced Context Spaces Theory ApproachBoytsov, A. / Zaslavsky, A. et al. | 2011
- 215
-
Mapping for Activity Recognition in the Context-Aware Systems Using Software SensorsPathan, K. T. / Reiff-Marganiec, S. / Yi Hong, et al. | 2011
- 222
-
Design and Implementation of P2P Reasoning System Based on Description LogicHai Wan, / Yang Yu, / Jian-Tian Zheng, et al. | 2011
- 230
-
Recognizing Concurrent and Interleaved Activities in Social InteractionsSaguna, / Zaslavsky, A. / Chakraborty, D. et al. | 2011
- 238
-
Intelligent Sensor Network Simulation for Battlefield Resources ManagementYu, H. Y. / Lu, Y. L. et al. | 2011
- 242
-
Crowdsourcing in Mobile: A Three Stage Context Based ProcessAfridi, A. H. et al. | 2011
- 246
-
Gesture-Based Easy-Computer Interaction Using a Linear Array of Low Cost Distance SensorsGuan Huang, / Loke, S. W. et al. | 2011
- 252
-
Load-Aware Dynamic Partial Reconfiguration Implementation of Crossbar SchedulerShaobin Zhang, / Tongsen Hu, / Minghui Wu, / Tianzhou Chen, / Zening Qu, et al. | 2011
- 259
-
Efficient Pattern Detection for Embedded Optical Bio-sensing SystemYingjie Cao, / Yongxin Zhu, / Guoguang Rong, / Gang Cheng, / Meikang Qiu, et al. | 2011
- 267
-
Deriving High-Performance Real-Time Multicore Systems Based on Simulink ApplicationsMinji Cha, / Kyong Hoon Kim, / Chung Jae Lee, / Dojun Ha, / Byoung Soo Kim, et al. | 2011
- 275
-
Analysis and Comparison of Two Different Implementations of MCS-51 Compatible MicrocontrollersJincheng Fei, / Haiyang Quan, / Dawei Yuan, et al. | 2011
- 279
-
Global Priority Table for Last-Level CachesBaozhong Yu, / Jianliang Ma, / Tianzhou Chen, / Minghui Wu, et al. | 2011
- 286
-
Design and Implementation of a Peripheral Bus Based on a New Kind of Reconfigurable SystemYimao Cai, / Yuanfu Zhao, / Lidong Lan, et al. | 2011
- 292
-
GALS-JOP: A Java Embedded Processor for GALS Reactive ProgramsNadeem, M. / Biglari-Abhari, M. / Salcic, Z. et al. | 2011
- 300
-
A Study on QoS Routing Schem for Tactical Ad Hoc NetworkTaehun Kang, / Kim, H. / Jaiyong Lee, et al. | 2011
- 305
-
Scheduling Instructions for Soft Errors in Register FilesJianjun Xu, / Qingping Tan, / Huiping Zhou, et al. | 2011
- 313
-
System Level Performance Simulation of Distributed GENESYS Applications on Multi-core PlatformsKhan, S. A. / Saastamoinen, J. / Tiensyrja, K. / Nurmi, J. et al. | 2011
- 321
-
Benchmarking Embedded Devices for Broadband Performance TestingTangadpalliwar, S. / Sandrasegaran, K. / Raymond, M. / Moitra, A. / Madani, F. et al. | 2011
- 328
-
An Efficient Test Design for Verification of Cache Coherence in CMPsDalui, M. / Sikdar, B. K. et al. | 2011
- 335
-
Impact of Inaccurate Design of Branch Predictors on Processors' Power ConsumptionDas, B. / Bhattacharya, G. / Maity, I. / Sikdar, B. K. et al. | 2011
- 343
-
A Balanced Clustering Algorithm for Non-uniformly Deployed Sensor NetworksHeewook Shin, / Sangman Moh, / Ilyong Chung, et al. | 2011
- 351
-
Coprocessing Architecture in System-on-Programmable-Chip for Walk on the Boundary Method to Calculate CapacitanceOng, S. J. J. / Halim, Z. A. et al. | 2011
- 356
-
An Elastic OLAP Cloud PlatformBrezany, P. / Yan Zhang, / Janciak, I. / Peng Chen, / Sicen Ye, et al. | 2011
- 364
-
Analysis of Power-Saving Techniques over a Large Multi-use ClusterMcGough, A. S. / Gerrard, C. / Noble, J. / Robinson, P. / Wheater, S. et al. | 2011
- 372
-
An Authenticated Key Exchange Scheme for Efficient Security-Aware Scheduling of Scientific Applications in Cloud ComputingChang Liu, / Xuyun Zhang, / Jinjun Chen, / Chi Yang, et al. | 2011
- 380
-
Energy Efficient Task Allocation over Mobile NetworksComito, C. / Falcone, D. / Talia, D. / Trunfio, P. et al. | 2011
- 388
-
Application Behavior Mapping across Heterogeneous Hardware PlatformsHaifeng Chen, / Hui Kang, / Guofei Jiang, / Yoshihira, K. et al. | 2011
- 396
-
Performance Evaluation of Image Conversion Module Based on MapReduce for Transcoding and Transmoding in SMCCSEMyoungjin Kim, / Hanku Lee, / Yun Cui, et al. | 2011
- 404
-
ALARM: Autonomic Load-Aware Resource Management for P2P Key-Value Stores in CloudCan Zhang, / Haopeng Chen, / Shuotao Gao, et al. | 2011
- 411
-
BoostPred: An Automatic Demand Predictor for the CloudWaiho Wong, / Davis, J. et al. | 2011
- 419
-
Accurate Mutlicore Processor Power Models for Power-Aware Resource ManagementTakouna, I. / Dawoud, W. / Meinel, C. et al. | 2011
- 427
-
CBF: A Packet Filtering Method for DDoS Attack Defense in Cloud EnvironmentQi Chen, / Wenmin Lin, / Wanchun Dou, / Shui Yu, et al. | 2011
- 435
-
A Measurement Study of Server Utilization in Public CloudsHuan Liu, et al. | 2011
- 443
-
Energy Prediction for MapReduce WorkloadsWenjun Li, / Hailong Yang, / Zhongzhi Luan, / Depei Qian, et al. | 2011
- 449
-
Towards a Service Lifecycle Based Methodology for Risk Assessment in Cloud ComputingKiran, M. / Ming Jiang, / Armstrong, D. J. / Djemame, K. et al. | 2011
- 457
-
Migrating Complex Business Process to Cloud Based on Mspoa and CBPMHai Wan, / Yang Yu, et al. | 2011
- 465
-
On Reference Node Deployment for Precise Clock Synchronization in Smart Power GridChiu-Ping Chang, / Chung-Ta King, / Chen-Min Chan, et al. | 2011
- 473
-
An Intelligent Real-Time Odor Monitoring System Using a Pattern Extraction AlgorithmEungyeong Kim, / Seok Lee, / Taikjin Lee, / Beom Ju Shin, / Jungho Lee, / Young Tae Byun, / Hyung Seok Kim, et al. | 2011
- 480
-
Cost and Energy Reduction Evaluation for ARM Based Web ServersSvanfeldt-Winter, O. / Lafond, S. / Lilius, J. et al. | 2011
- 488
-
A Distributed Application Component Placement Approach for Cloud Computing EnvironmentZhicheng Jin, / Jian Cao, / Minglu Li, et al. | 2011
- 496
-
A Novel Cost-Effective Dynamic Data Replication Strategy for Reliability in Cloud Data CentresWenhao Li, / Yun Yang, / Dong Yuan, et al. | 2011
- 503
-
Priority-Based Scheduling for Large-Scale Distribute Systems with Energy AwarenessHussin, M. / Young Choon Lee, / Zomaya, A. Y. et al. | 2011
- 510
-
A Multi-objective GRASP Algorithm for Joint Optimization of Energy Consumption and Schedule Length of Precedence-Constrained ApplicationsPecero, J. E. / Bouvry, P. / Huacuja, H. J. F. / Khan, S. U. et al. | 2011
- 518
-
An Upper-Bound Control Approach for Cost-Effective Privacy Protection of Intermediate Dataset Storage in CloudXuyun Zhang, / Chang Liu, / Jinjun Chen, / Wanchun Dou, et al. | 2011
- 526
-
Disrupt the Disruptor: A Theoretical Approach of Cloud Computing on IT Outsourcing Industry DisruptionZhenyu Yang, et al. | 2011
- 532
-
Data Allocation Based on XML Query Patterns to Reduce Power ConsumptionXuehua Jiang, / Watanabe, Y. / Yokota, H. et al. | 2011
- 540
-
Cloud Control and Management Planes for Service ProvisioningSilvana, G. P. / Costanzo, A. et al. | 2011
- 547
-
A Weighted K-Means Clustering Based Co-scheduling Strategy towards Efficient Execution of Scientific Workflows in Collaborative Cloud EnvironmentsKefeng Deng, / Lingmei Kong, / Junqiang Song, / Kaijun Ren, / Dong Yuan, et al. | 2011
- 555
-
The Sustainability and Survivabiltiy Network Design for Next Generation Cloud NetworkingBing Luo, / Liu, W. et al. | 2011
- 561
-
Identifying Contextual Properties of Software Architecture in Cloud ComputingKhan, K. M. / Malluhi, Q. et al. | 2011
- 569
-
The Differences and Commonalities between Green and Conventional Business Process ManagementNowak, A. / Leymann, F. / Schumm, D. et al. | 2011
- 577
-
A Taxonomy for Cloud Data Hosting SolutionsStrauch, S. / Kopp, O. / Leymann, F. / Unger, T. et al. | 2011
- 585
-
WSRank: A Method for Web Service Ranking in Cloud EnvironmentRong Hu, / Wanchun Dou, / Liu, X. F. / Jianxun Liu, et al. | 2011
- 593
-
Improving Energy Efficiency of LTE Networks by Applying Genetic Algorithm (GA)Kongluan Lin, et al. | 2011
- 598
-
A Bio-inspired Approach to Provisioning of Virtual Resources in Federated CloudsAgostinho, L. / Feliciano, G. / Olivi, L. / Cardozo, E. / Guimaraes, E. et al. | 2011
- 605
-
Energy Consumption Side-Channel Attack at Virtual Machines in a CloudHlavacs, H. / Treutner, T. / Gelas, J. / Lefevre, L. / Orgerie, A. et al. | 2011
- 613
-
A Power-Aware Scheduling of MapReduce Applications in the CloudYing Li, / Hongli Zhang, / Kyong Hoon Kim, et al. | 2011
- 621
-
An Innovative Self-Adaptive Configuration Optimization System in Cloud ComputingJing Jiang, / Jie Lu, / Guangquan Zhang, et al. | 2011
- 628
-
A Consumer-Provider Cloud Cost Model Considering Variable CostMach, W. / Schikuta, E. et al. | 2011
- 636
-
SecDM: Securing Data Migration between Cloud Storage SystemsQingni Shen, / Lizhe Zhang, / Xin Yang, / Yahui Yang, / Zhonghai Wu, / Ying Zhang, et al. | 2011
- 642
-
A Workflow Scheduling Algorithm for Optimizing Energy-Efficient Grid Resources UsageCoutinho, F. / de Carvalho, L. A. V. / Santana, R. et al. | 2011
- 650
-
A Restful Approach to Service Level Agreements for Cloud EnvironmentsBlumel, F. / Metsch, T. / Papaspyrou, A. et al. | 2011
- 658
-
A Performance and Energy Consumption Analytical Model for GPUCheng Luo, / Suda, R. et al. | 2011
- 666
-
Energy-Aware Communities Using Mobile ClientsSaffre, F. / Nicolas, S. / Hildmann, H. et al. | 2011
- 674
-
A Group-Choose Model for Partner Selection in Virtual OrganizationMiaomiao Li, / Yang Yu, / Zhenguang Huang, et al. | 2011
- 682
-
Assessing Measurements of QoS for Global Cloud Computing ServicesPedersen, J. M. / Riaz, M. T. / Celestino, Joaquim / Dubalski, B. / Ledzinski, D. / Patel, A. et al. | 2011
- 690
-
Cloud-Enabled Adaptive Activity-Aware Energy-Saving System in a Dynamic EnvironmentHui-Wen Yeh, / Ching-Hu Lu, / Yu-Chiao Huang, / Tsung-Han Yang, / Li-Chen Fu, et al. | 2011
- 697
-
An Empirical Analysis of Cloud, Mobile, Social and Green Computing: Financial Services IT Strategy and Enterprise ArchitectureGill, A. Q. / Bunker, D. / Seltsikas, P. et al. | 2011
- 705
-
From Cloud to Green: E-Collaboration for Environmental ConservationAoun, C. / Vatanasakdakul, S. / Bunker, D. et al. | 2011
- 713
-
A Generic QoS Framework for Cloud Workflow SystemsXiao Liu, / Yun Yang, / Dong Yuan, / Gaofeng Zhang, / Wenhao Li, / Dahai Cao, et al. | 2011
- 721
-
A PID-Controlled Power Manager for Energy Efficient Web ClustersHolmbacka, S. / Lafond, S. / Lilius, J. et al. | 2011
- 729
-
Model Interactive Search between User and Associated Link NetworksBaiquan Zhu, / Xiangfeng Luo, / Yang Liu, / Xiang He, / Lingyu Xu, et al. | 2011
- 737
-
An Elastic Multi-tenant Database Schema for Software as a ServiceYaish, H. / Goyal, M. / Feuerlicht, G. et al. | 2011
- 744
-
Intrusion Detection Techniques for Infrastructure as a Service CloudTupakula, U. / Varadharajan, V. / Akku, N. et al. | 2011
- 752
-
An Evaluation of Power-Proportional Data Placement for Hadoop Distributed File SystemsHieu Hanh Le, / Hikida, S. / Yokota, H. et al. | 2011
- 760
-
Conceptualization of a Context Aware Cloud Adaptation (CACA) FrameworkGill, A. Q. / Bunker, D. et al. | 2011
- 768
-
Profiling Energy Consumption of VMs for Green Cloud ComputingQingwen Chen, / Grosso, P. / van der Veldt, Karel / de Laat, Cees / Hofman, R. / Bal, H. et al. | 2011
- 776
-
Multi-level Subsidy and Penalty Strategy for a Green Industry SectorHsiao-Fan Wang, et al. | 2011
- 784
-
MCDB: Using Multi-clouds to Ensure Security in Cloud ComputingAlZain, M. A. / Soh, B. / Pardede, E. et al. | 2011
- 792
-
A Science Cloud Resource Provisioning Model Using Statistical Analysis of Job HistorySeoyoung Kim, / Jung-In Koh, / Yoonhee Kim, / Chongam Kim, et al. | 2011
- 794
-
Monitoring Energy Consumption in Clouds: The CompatibleOne ExperienceLefevre, L. / Mornard, O. / Gelas, J-P / Morel, M. et al. | 2011
- 796
-
HERO Web Portal: On-Demand Portal for Co-allocating Computing and Network Resources on Top of TIGRIS Middleware PlatformJae-Hyuck Kwak, / Junweon Yoon, / Yonghwan Jung, / Jaegyoon Hahm, / Dongin Park, et al. | 2011
- 798
-
The Green Computing Observatory: A Data Curation Approach for Green ITGermain-Renaud, C. / Furst, F. / Jouvin, M. / Kassel, G. / Nauroy, J. / Philippon, G. et al. | 2011
- 800
-
Combining Technical Analysis with Sentiment Analysis for Stock Price PredictionShangkun Deng, / Mitsubuchi, T. / Shioda, K. / Shimada, T. / Sakurai, A. et al. | 2011
- 808
-
Partial Social Network Disclosure and CrawlersEffendy, S. / Halim, F. / Yap, R. H. C. et al. | 2011
- 816
-
Applications of Social Network Construction and Analysis in the Medical Referral ProcessAlmansoori, W. / Zarour, O. / Jarada, T. N. / Karampales, P. / Rokne, J. / Alhajj, R. et al. | 2011
- 824
-
Finding Strong Groups of Friends among Friends in Social NetworksCameron, J. J. / Leung, C. K-S / Tanbeer, S. K. et al. | 2011
- 832
-
Evaluating Roving Patrol Effectiveness by GPS TrajectoryHuanhuan Li, / Jianxun Liu, / Yizhi Liu, / Long Jin, et al. | 2011
- 838
-
SkyBoundary: An Improved Approach to Member Promotion in Social NetworksZhuo Peng, / Chaokun Wang, / Fangbo Tao, / Lu Han, et al. | 2011
- 846
-
Organized Crime Structures in Co-offending NetworksTayebi, M. A. / Glasser, U. et al. | 2011
- 854
-
TIE: Temporal Interaction Explorer for Co-presence CommunitiesBoston, D. J. / Borcea, C. et al. | 2011
- 864
-
On the Socialness of SoftwareMaalej, W. / Pagano, D. et al. | 2011
- 872
-
Social-Aware Document Similarity Computation for Recommender SystemsTran Vu Pham, / Le Nguyen Thach, et al. | 2011
- 879
-
Expert-Citizen Engineering: "Crowdsourcing" Skilled CitizensZhi Zhai, / Sempolinski, P. / Thain, D. / Madey, G. / Wei, D. / Kareem, A. et al. | 2011
- 887
-
Credibility Assessment Using Wikipedia for Messages on Social Network ServicesSuzuki, Y. / Nadamoto, A. et al. | 2011
- 895
-
Monitoring Trends on FacebookCvijikj, I. P. / Michahelles, F. et al. | 2011
- 903
-
An Exploration of Social Media in Public Opinion Convergence: Elaboration Likelihood and Semantic Networks on Political EventsYi Wu, / Wong, J. / Yimeng Deng, / Chang, K. et al. | 2011
- 911
-
Multistage Filtering for Collusion Detection in P2P NetworkBao Yu, / Cao Tianjie, / Zeng Guosun, et al. | 2011
- 917
-
Identifying Consensus Tags in Social Tagging SystemsKening Gao, / Yin Zhang, / Bin Zhang, / Xin Jin, / Pengwei Guo, et al. | 2011
- 924
-
Organizational Social Media around the GLOBESchlagwein, D. / Prasarnphanich, P. et al. | 2011
- 932
-
A Model for Social Network-Enhanced Health CommunicationSteele, R. et al. | 2011
- 939
-
A Mobile Community Service Platform Promoting Ubiquitous CollaborationKyungran Kang, / Jungtae Lee, / Kyoungwon Beak, / Sungeun Park, / Jaehwan Kim, et al. | 2011
- 947
-
Simulation on the Dynamics of Interpersonal Communication NetworkYing Liu, / Yuxiao Li, et al. | 2011
- 951
-
An Organization Model in MAS Based on HolonLiu Jie, / Zhang Wei-Ming, / Xiu Bao-Xin, / Liu Zhong, et al. | 2011
- 958
-
A Uniform Semantic Web Framework for Co-authorship NetworksAhmedi, L. / Abazi-Bexheti, L. / Kadriu, A. et al. | 2011
- 966
-
Participation and Engagement in Inter-organizational Groups: Synthesizing Social Network Analysis with Ethnography to Evaluate Social CapitalButcher, T. / Chan, C. / Scriven, P. / O'Reilly, S. / Pereira, S. et al. | 2011
- 974
-
Trust and Trustworthiness in Online Credit MarketsKuwabara, K. / Horne, C. / Anthony, D. et al. | 2011
- 980
-
The Interrelation between Communities, Trust and Their Online Social PatternsSousa, S. C. / Lamas, D. / Dias, P. et al. | 2011
- 987
-
Building Hierarchical Keyword Level Association Link Networks for Web Events Semantic AnalysisJunyu Xuan, / Xiangfeng Luo, / Shunxiang Zhang, / Zheng Xu, / Huimin Liu, / Feiyue Ye, et al. | 2011
- 995
-
Tweeting Government: A Case of Australian Government Use of TwitterAlam, L. / Lucas, R. et al. | 2011
- 1002
-
Using Social Media in Government: The Australian Taxation Office e-Tax Facebook PageAlam, S. L. / Campbell, J. / Lucas, R. et al. | 2011
- 1010
-
Making the Most of Virtual Expertise in Telemedicine and Telehealth EnvironmentsStanding, C. / Volpe, I. / Standing, S. / Gururajan, R. et al. | 2011
- 1017
-
Modeling Learners and Contents in Academic-Oriented Recommendation FrameworkJia Zhou, / Tiejian Luo, / Fuxing Cheng, et al. | 2011
- 1025
-
Extracting Opinions from Topic-Based Events in the BlogosphereChen Ming Wu, / Tsun Ku, et al. | 2011
- 1031
-
Complex Human-System Systems Design for C2Xu-Hui Luo, / Jiang Wang, / Meng Qian, / Zhong Liu, / Wei-Ming Zhang, / Cheng Zhu, et al. | 2011
- 1039
-
State of the Art of Community-Driven Software Engineering Ontology EvolutionWongthongtham, P. / Dillon, T. / Chang, E. et al. | 2011
- 1046
-
Study of Multistage Anomaly Detection for Secured Cloud Computing Resources in Future InternetByungrae Cha, / Jongwon Kim, et al. | 2011
- 1051
-
Service Level Agreement for Distributed Services: A ReviewAlhamad, M. / Dillon, T. / Chang, E. et al. | 2011
- 1055
-
NetML: Networking NetworksAddie, R. G. / Yu Peng, / Zukerman, M. et al. | 2011
- 1061
-
Mobile Cloud Web-Service for U-CityJong Won Park, / Chang Ho Yun, / Seong Woo Rho, / Yong Woo Lee, / Hae Sun Jung, et al. | 2011
- 1066
-
Evaluating Sustainability, Environmental Assessment and Toxic Emissions during Manufacturing Process of RFID Based SystemsKanth, R. K. / Liljeberg, P. / Tenhunen, H. / Qiansu Wan, / Amin, Y. / Botao Shao, / Qiang Chen, / Lirong Zheng, / Kumar, H. et al. | 2011
- 1072
-
Command and Control Network Modeling and Efficiency Measure Based on Capability Weighted-NodeDu Wei, / Liu Zhong, / Xiu Bao-Xin, / Zhang Wei-Ming, / Cheng Qing, et al. | 2011
- 1078
-
Some Ethical Considerations for Gov 2.0 Using Web 2.0Alam, L. / Lucas, R. et al. | 2011
- 1084
-
Project or Process? How to Measure the Real Type of Employees' Activity?Romanov, D. / Sidorov, P. et al. | 2011
- 1089
-
Theme-Based Mobile Social Network SystemJiamei Tang, / Sangwook Kim, et al. | 2011
- 1096
-
Web Based Cross Language Semantic Plagiarism DetectionKent, Chow Kok / Salim, N. et al. | 2011
- 1103
-
A Model of Close-Relationship among Mobile Users on Mobile Social NetworkKim, P. / Sangwook Kim, et al. | 2011
- 1110
-
A Cloud Computing Environment for Supporting Networked Robotics ApplicationsAgostinho, L. / Olivi, L. / Feliciano, G. / Paolieri, F. / Rodrigues, D. / Cardozo, E. / Guimaraes, E. et al. | 2011
- 1117
-
BSNet: A Three-Layer Business Service Correlation Network ModelKeman Huang, / Yushun Fan, / Wei Tan, et al. | 2011
- 1125
-
Multi-business Services Selection Model and Calculation MethodYushun Fan, / Sufen Li, et al. | 2011
- 1131
-
A Conceptual Platform of SLA in Cloud ComputingMinChao Wang, / Xing Wu, / Wu Zhang, / FuQiang Ding, / Jun Zhou, / GuoCai Pei, et al. | 2011
- 1136
-
A Dynamical Optimization Approach for Service Process LibraryLei Wang, / Jian Cao, / Haiyan Zhao, et al. | 2011
- 1144
-
A New Process Mining Algorithm Based on Event TypeDongyi Wang, / Jidong Ge, / Hao Hu, / Bin Luo, et al. | 2011
- 1152
-
Activity Instance Oriented Handling in WorkflowsYiping Wen, / Zhigang Chen, / Jianxun Liu, et al. | 2011
- 1159
-
Requirements Management Using KANO Model and AHP for Service Systems DesignJaeung Lee, / Sugumaran, V. / Sooyong Park, et al. | 2011
- 1167
-
Control Strategy of Group Behavior for Internet of ThingsQingkui Chen, / He Jia, et al. | 2011
- 1172
-
Private Cloud System Based on BOINC with Support for Parallel and Distributed SimulationYihua Wu, / Jian Cao, / Minglu Li, et al. | 2011
- 1179
-
On English Writing Feedback Provided by Writing Roadmap™ 2.0 Automated Evaluation System in EFL ClassroomShuwen Wang, et al. | 2011
- 1184
-
Fuzzy Genetic Semantic Based Text SummarizationSuanmali, L. / Salim, N. / Binwahlan, M. S. et al. | 2011
- 1192
-
A Multiplicity Approach to Organization of Knowledge and Development of Web SoftwareChow, K. O. / Wong, T. L. et al. | 2011
- 1199
-
Towards Data Quality into the Data Warehouse DevelopmentMunawar, M. / Salim, N. / Ibrahim, R. et al. | 2011
- 1207
-
An Automated Approach to Web Service Classification Based on SemanticZhaoteng Song, / Xinhuai Tang, et al. | 2011
- 1211
-
Characterizing Twitter with Respondent-Driven SamplingSalehi, M. / Rabiee, H. R. / Nabavi, N. / Pooya, S. et al. | 2011
- 1218
-
On Analyzing User Ratings and Directional Trusts in Epinions.comShaoyu Li, / Won-Seok Hwang, / Sang-Wook Kim, et al. | 2011
- 1222
-
Incorporating Sentiment Analysis for Improved Tag-Based RecommendationZhou Qingbiao, / Fang Jie, / Gaundong Xu, et al. | 2011
- 1228
-
Photo Cube: An Automatic Management and Search for Photos Using Mobile SmartphonesJinho Kim, / Suan Lee, / Ji-Seop Won, / Yang-Sae Moon, et al. | 2011
- 1235
-
Parallel Range Query Processing on R-Tree with Graphics Processing UnitBoseon Yu, / Hyunduk Kim, / Wonik Choi, / Dongseop Kwon, et al. | 2011
- 1243
-
Maximum Reliable Tree for Social Network SearchWookey Lee, / Lee, James Jung-Hun / Song, Justin Jong-Su / Eom, Chris Soo-Hyun et al. | 2011
- 1250
-
Semantic Pattern Tree Kernels for Short-Text ClassificationKwanho Kim, / Beom-Suk Chung, / Ye Rim Choi, / Jonghun Park, et al. | 2011
- 1253
-
Author index| 2011
- 1260
-
[Publishers information]| 2011
- C1
-
[Front cover]| 2011
- i
-
[Title page i]| 2011
- iii
-
[Title page iii]| 2011
- iv
-
[Copyright notice]| 2011
- l
-
CTUW 2011 Organizing Committee| 2011
- li
-
Message from CSN 2011 Workshop Co-chairs| 2011
- lii
-
CSN 2011 Organizing Committee| 2011
- v
-
Table of contents| 2011
- xix
-
Message from DASC 2011 Chairs| 2011
- xl
-
SCA 2011 Organizing Committee| 2011
- xliii
-
Message from ACGS 2011 Program Co-chairs| 2011
- xliv
-
Message from ASS 2011 Program Co-chairs| 2011
- xlv
-
Message from WMSC 2011 Program Co-chairs| 2011
- xlvi
-
WMSC 2011 Organizing Committee| 2011
- xlvii
-
Message from CMS 2011 Workshop Co-chairs| 2011
- xlviii
-
CMS 2011 Organizing Committee| 2011
- xlvix
-
Message from CTUW 2011 Program Co-chairs| 2011
- xxi
-
DASC 2011 Organizing Committee| 2011
- xxii
-
DASC 2011 Program Committee| 2011
- xxiv
-
Message from PICom 2011 Chairs| 2011
- xxix
-
EmbeddedCom 2011 Organizing Committee| 2011
- xxv
-
PICom 2011 Organizing Committee| 2011
- xxvii
-
Message from EmbeddedCom 2011 Chairs| 2011
- xxxi
-
Message from CGC 2011 Chairs| 2011
- xxxiii
-
CGC 2011 Organizing Committee| 2011
- xxxviii
-
Message from SCA 2011 Chairs| 2011