Cost framework for a heterogeneous distributed semi-structured environment | p. 1 |
Cost-based vertical fragmentation for XML | p. 12 |
Efficiently crawling strategy for focused searching engine | p. 25 |
QoS-guaranteed ring replication management with strong consistency | p. 37 |
A mobile database sharing protocol to increase data availability in mobile environments | p. 50 |
Mining recent frequent itemsets over data streams with a time-sensitive sliding window | p. 62 |
Mining Web transaction patterns in an electronic commerce environment | p. 74 |
Mining purpose-based authorization strategies in database system | p. 86 |
RSP-DS : real time sequential pattern analysis over data streams | p. 99 |
Investigative queries in sensor networks | p. 111 |
A taxonomy-based approach for constructing semantics-based super-peer networks | p. 122 |
A comparative study of replica placement strategies in data grids | p. 135 |
A workload balancing based approach to discourage free riding in peer-to-peer network | p. 144 |
QoS-based services selecting and optimizing algorithms on grid | p. 156 |
Bayesian method based trusted overlay for information retrieval over networks | p. 168 |
Managing a geographic database from mobile devices through OGC Web services | p. 174 |
Real-time creation method of personalized mobile Web contents for ubiquitous contents access | p. 180 |
The golden mean operator scheduling strategy in data stream systems | p. 186 |
Continuous skyline tracking on update data streams | p. 192 |
A hybrid algorithm for Web document clustering based on frequent term sets and k-means | p. 198 |
OMSI-tree : power-awareness query processing over sensor networks by removing overlapping regions | p. 204 |
On studying front-peer attack-resistant trust and reputation mechanisms based on enhanced spreading activation model in P2P environments | p. 211 |
A load balancing method using ring network in the grid database | p. 217 |
Design and implementation of a system for environmental monitoring sensor network | p. 223 |
Policy based scheduling for resource allocation on grid | p. 229 |
Characterizing DSS workloads from the processor perspective | p. 235 |
Exploiting connection relation to compress data graph | p. 241 |
Indexing the current positions of moving objects on road networks | p. 247 |
DBMSs with native XML support : towards faster, richer, and smarter data management | p. 253 |
A personalized re-ranking algorithm based on relevance feedback | p. 255 |
An investigation and conceptual models of Podcast marketing | p. 264 |
A user study on the adoption of location based services | p. 276 |
Email community detection using artificial ant colony clustering | p. 287 |
EviRank : an evidence based content trust model for Web spam detection | p. 299 |
A novel factoid ranking model for information retrieval | p. 308 |
Dynamic composition of Web service based on coordination model | p. 317 |
An information retrieval method based on knowledge reasoning | p. 328 |
Research on personalized recommendation algorithm in E-supermarket system | p. 340 |
XML normal forms based on constraint-tree-based functional dependencies | p. 348 |
Untyped XQuery canonization | p. 358 |
Web search tailored ontology evaluation framework | p. 372 |
An overview of the business process maturity model (BPMM) | p. 384 |
Process mining : extending "[alpha]-algorithm" to mine duplicate tasks in process logs | p. 396 |
A distributed genetic algorithm for optimizing the quality of grid workflow | p. 408 |
Safety analysis and performance evaluation of time WF-nets | p. 420 |
Dual workflow nets : mixed control/data-flow representation for workflow modeling and verification | p. 433 |
Bridging organizational structure and information system architecture through process | p. 445 |
Relation-driven business process-oriented service discovery | p. 456 |
Workflow message queue's performance effect measurements on an EJB-based workflow management system | p. 467 |
RFID application model and performance for postal logistics | p. 479 |
An organization and task based access control model for workflow system | p. 485 |
A method of Web services composition based on service alliance | p. 491 |
Toward a lightweight process-aware middleware | p. 497 |
Automatic generation of Web service workflow using a probability based process-semantic repository | p. 504 |
A three-dimensional customer classification model based on knowledge discovery and empirical study | p. 510 |
QoS-driven global optimization of services selection supporting services flow re-planning | p. 516 |
SOA-based collaborative modeling method for cross-organizational business process integration | p. 522 |
Model checking for BPEL4WS with time | p. 528 |
A version management of business process models in BPMS | p. 534 |
Research on architecture and key technology for service-oriented workflow performance analysis | p. 540 |
The study on Internet-based face recognition system using principal component analysis | p. 546 |
Semantic representation of RTBAC : relationship-based access control model | p. 554 |
A code-based multi-match packet classification with TCAM | p. 564 |
Home network device authentication : device authentication framework and device certificate profile | p. 573 |
P-IDC : information security and consideration in building Internet data centers for pervasive environment | p. 583 |
Improvement of an authenticated key agreement protocol | p. 593 |
A mechanism for securing digital evidences in pervasive environments | p. 602 |
A secure chaotic hash-based biometric remote user authentication scheme using mobile devices | p. 612 |
Adapting Web services security standards for mobile and wireless environments | p. 624 |
Coexistence proof using chain of timestamps for multiple RFID tags | p. 634 |
A design of authentication protocol for multi-key RFID tag | p. 644 |
An efficient fragile watermarking for Web pages tamper-proof | p. 654 |
Classification of key management schemes for wireless sensor networks | p. 664 |
An efficient algorithm for proportionally fault-tolerant data mining | p. 674 |
SOGA : fine-grained authorization for self-organizing grid | p. 684 |
Permission-centric hybrid access control | p. 694 |
Table of Contents provided by Blackwell. All Rights Reserved. |