{"title":"GIF to HTML5 Video -- Optimizing GIF for Modern Browsers","authors":"Michael Frandsen, Yong Zhang","doi":"10.1109/WISA.2014.22","DOIUrl":"https://doi.org/10.1109/WISA.2014.22","url":null,"abstract":"The paper presents a method of bridging the gap between GIF and HTML5 Video by providing both - allowing much faster content delivery and saved bandwidth. It's been over 25 years since the GIF format was introduced, and we've since then made significant progress in video compression. By converting GIF to video formats, you not only gain the possibility of user interaction, but you also reduce its size significantly without any noticeable loss of quality. The paper will present a way to achieve this using FFmpeg, utilizing commands which has been specifically optimized for the purpose of GIF to HTML5 Video conversion. The average GIF will load 8 times faster after it has been converted to video formats, and users who don't support HTML5 Video will have access to the original GIF. Converting GIF to video formats offer many benefits and little to no drawbacks (as long as the original GIF remains available). It is therefore in the best interest for both businesses and consumers to convert GIF to HTML5 Video, thus optimizing GIF for modern browsers.","PeriodicalId":366169,"journal":{"name":"2014 11th Web Information System and Application Conference","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127503318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Sampling Method of Finding Top-k Frequent Items on Timestamp-Based Stream","authors":"Wenfeng Li, Liwei Wang, Zhiyong Peng, Deyi Li","doi":"10.1109/WISA.2014.47","DOIUrl":"https://doi.org/10.1109/WISA.2014.47","url":null,"abstract":"Data streams with high volume and complicated items become more and more common, and typical algorithms of finding top-k frequent items on streams, such as counter-based algorithms and sketch algorithms, are gradually not keeping up with efficiency requirements. Our paper focuses on finding top-k frequent items on timestamp-based complicated streams, and proposes an approximate solution by sampling. Specifically, we design a multi-treap parallel priority algorithm to maintain uniform sample on timestamp-based sliding windows. The top-k answers are approximated through processing on samples. We also theoretically analyze the relationship between item accuracy and sample size. Through experimental analysis on real data, our method provides flexible sample size to satisfy different accuracy requirements and ensure a good running efficiency.","PeriodicalId":366169,"journal":{"name":"2014 11th Web Information System and Application Conference","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115931888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Unified Security Architecture Research for 5G Wireless System","authors":"Fang Qi, Weijie Zhang, Guojun Wang, Hui Fang","doi":"10.1109/WISA.2014.25","DOIUrl":"https://doi.org/10.1109/WISA.2014.25","url":null,"abstract":"The concept of future 5G (5th generation mobile networks or 5th generation wireless systems) widely spreads in industry, but the related standards are still unclear. This paper focuses on the security standard for 5G network, which is one key component covering whole system. The objective is to provide a general protection scheme for both whole infrastructure and some critical components, without introducing too much overhead. The unified security architecture is presented for 5G in order to meet the increasing security requirement. The architecture is more efficient for new standard to cope with threats from both WLAN (Wireless Local Area Network) and mobile access equipments in a consistent way. Therefore a unified security architecture is proposed which contains differentiated counter-measures for these threats. Specifically, the security architecture integrates six modules: unified authentication, additional authentication, encryption, unified access, additional access, and unified integrated security.","PeriodicalId":366169,"journal":{"name":"2014 11th Web Information System and Application Conference","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127801000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web Data Extraction Based on Visual Information and Partial Tree Alignment","authors":"Siwu Fan, Xinjun Wang, Yongquan Dong","doi":"10.1109/WISA.2014.12","DOIUrl":"https://doi.org/10.1109/WISA.2014.12","url":null,"abstract":"Web databases contain a huge amount of structured data which are easily obtained via their query interfaces only. The query results are presented in dynamically generated web pages, usually in the form of data records, for human use. The automatical web data extraction is critical in web integration. A number of approaches have been proposed. The early work are most based on the source code or the tag tree of the page. Recent approaches use the visual feature to extract data information, which are better than the previous work. However, these approaches still have inherent limitation. In this paper, we propose a novel approach that make use of visual features to extract data information from web page, including the data records and the data items. The results of this experiment tests on a large set of query result pages in different domain show that the proposed approach is highly effective.","PeriodicalId":366169,"journal":{"name":"2014 11th Web Information System and Application Conference","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130190269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Static Type Analysis for Python","authors":"Tiancong Dong, Lin Chen, Zhaogui Xu, Bin Yu","doi":"10.1109/WISA.2014.20","DOIUrl":"https://doi.org/10.1109/WISA.2014.20","url":null,"abstract":"Python is a kind of dynamic-typed language which provides flexibility but leaves the programmer without the benefits of static typing. This paper describes Type, a tool that works for static type annotation and inference for python. It could simulate the built-in modules, transform the Python source code to IR(Intermediate representation) which we design and annotate, infer and reduce the IR into the type system. Type could provide the explicit type information, detect the type errors at compile time and improve the efficiency of development and the accuracy of point-to analysis. By the evaluation of applying Type to a suite of benchmarks, we find that Type can annotate and infer the types with a good precision and coverage in accept time.","PeriodicalId":366169,"journal":{"name":"2014 11th Web Information System and Application Conference","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134490225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jifeng Cui, Yong Zhang, Yubin Yang, C. Li, Chunxiao Xing
{"title":"A Dynamic Pyramid Rtree Index for Massive GeoSpatial Files","authors":"Jifeng Cui, Yong Zhang, Yubin Yang, C. Li, Chunxiao Xing","doi":"10.1109/WISA.2014.40","DOIUrl":"https://doi.org/10.1109/WISA.2014.40","url":null,"abstract":"In the large-scale geography information system application, the distributed file system is the key approach for data storage and retrieving, but the traditional distributed spatial index's efficiency is low. We present a dynamic pyramid Rtree(DPR) index for the massive geospatial files management, the method is based on the pyramid spatial index and Rtree index, which can be adjusted with the data distributed dynamically, we described index building and data accessing, the experimentation result shows that our method's efficiency in distributed file system is higher than Hilbert tree index and Quad tree index in range query.","PeriodicalId":366169,"journal":{"name":"2014 11th Web Information System and Application Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127202636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Multimodal Multimedia Retrieval Model Based on pLSA","authors":"Yu Zhang, Ye Yuan, Guoren Wang","doi":"10.1109/WISA.2014.14","DOIUrl":"https://doi.org/10.1109/WISA.2014.14","url":null,"abstract":"In this paper, we propose a multimodal multimedia retrieval model based on probabilistic Latent Semantic analysis (pLSA) to achieve multimodal retrieval. Firstly, We employ pLSA, to respectively simulate the generative processes of texts and images in the same documents. Then we employ the multivariate linear regression method to analyze the correlation between representations of texts and images and use the ordinary least squares (OLS) method to obtain the estimation of the regression matrix that can be used to transform between textual and visual modal data. Extensive experiments results demonstrate the effectiveness and efficiency of the proposed model.","PeriodicalId":366169,"journal":{"name":"2014 11th Web Information System and Application Conference","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127930341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identification of Microblog Opinion Leader Based on User Feature and Interaction Network","authors":"Luo Jing, Xu Lizhen","doi":"10.1109/WISA.2014.31","DOIUrl":"https://doi.org/10.1109/WISA.2014.31","url":null,"abstract":"Opinion leaders are core users in online communities, who can guide the direction of the public opinion. With the rapid development of microblog, identification of the microblog opinion leaders has become a significant task. In this paper, we propose a hybrid data mining approach based on user feature and interaction network, which includes three parts: a way to analyze users' authority, activity and influence, a way to consider the orientation of sentiment in interaction network and a combined method based on HITS algorithm for identifying micro blog opinion leaders. Comparative results show that this mechanism can provide an effective mining of the user feature and a better rate of recognition.","PeriodicalId":366169,"journal":{"name":"2014 11th Web Information System and Application Conference","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131071685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Topic Trend Prediction Based on Wavelet Transformation","authors":"Mingyue Fang, Yuzhong Chen, Peng Gao, Shuiyuan Zhao, Songpan Zheng","doi":"10.1109/WISA.2014.37","DOIUrl":"https://doi.org/10.1109/WISA.2014.37","url":null,"abstract":"The research of topic trend prediction can be a good reference for maximizing the propagation effects of network advertisements as well as guiding and controlling the network consensus. This paper proposes PTEP (the Prediction of Topic Energy Peak) method to model the life cycle of a topic and predicts the time when a hot topic will outbreak. Firstly, taking the number and the authority of followers and the interest of users to a topic into consideration, we design a topic-related user authority (TRUA) algorithm to measure the authority of users. Secondly, we calculate the energy value considering both the tweets and users authority related to the topic. Thirdly, we measure the fluctuation of the energy value based on wavelet transformation. Finally, we present rules to predict topic trend. Experimental results show that our method can effectively predict the peak of a topic in advance with a low omission rate.","PeriodicalId":366169,"journal":{"name":"2014 11th Web Information System and Application Conference","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128714682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Multi-tenant Level Lightweight Lock Mechanism for Multi-tenant Database","authors":"Tao Kang, Shidong Zhang, Lanju Kong","doi":"10.1109/WISA.2014.9","DOIUrl":"https://doi.org/10.1109/WISA.2014.9","url":null,"abstract":"For SaaS applications, tenants usually share a sparse table, and the lock is used to ensure concurrency control. With the development of the hardware upgrade, lock management is increasingly becoming a performance bottleneck. Traditional lock manager does not practical to multi-tenant database because of high concurrency. This paper discusses the provision of a new method - MLLL which is based on sparse table storage model. The method avoids appearing conflict technique among users and almost all of the overhead associated with traditional association lock manager.","PeriodicalId":366169,"journal":{"name":"2014 11th Web Information System and Application Conference","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115163039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}