2009 Second Pacific-Asia Conference on Web Mining and Web-based Application最新文献

筛选
英文 中文
Intelligent Business Prediction in Context-awareness Services Based on Hidden Markov Model (HMM) 基于隐马尔可夫模型(HMM)的上下文感知服务智能业务预测
2009 Second Pacific-Asia Conference on Web Mining and Web-based Application Pub Date : 2009-06-06 DOI: 10.1109/WMWA.2009.50
Chen Xia, Lu Tingjie
{"title":"Intelligent Business Prediction in Context-awareness Services Based on Hidden Markov Model (HMM)","authors":"Chen Xia, Lu Tingjie","doi":"10.1109/WMWA.2009.50","DOIUrl":"https://doi.org/10.1109/WMWA.2009.50","url":null,"abstract":"Context-awareness services are important applications of mobile commerce, and how to predict demands of mobile customers so as to provide business information they need is a key point. This paper proposed a predicting model based on the hidden Markov model (HMM), which mines the latent information requirement concepts that the customer visiting path contains and to make business information predicting decisions. Simulation experimental results show that the scheme is effective.","PeriodicalId":375180,"journal":{"name":"2009 Second Pacific-Asia Conference on Web Mining and Web-based Application","volume":"324 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122711743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Research on IPTV Service in FTTx FTTx中IPTV业务的研究
2009 Second Pacific-Asia Conference on Web Mining and Web-based Application Pub Date : 2009-06-06 DOI: 10.1109/WMWA.2009.73
Zeng Xi-yang, Cheng Chuanqing
{"title":"Research on IPTV Service in FTTx","authors":"Zeng Xi-yang, Cheng Chuanqing","doi":"10.1109/WMWA.2009.73","DOIUrl":"https://doi.org/10.1109/WMWA.2009.73","url":null,"abstract":"Fttx can supply high bandwidth to each user. It can support multicast function as well as data servicel. EPON system is the most important access way to vide multicast service. Carrying IPTV service in EPON, multiple users in the same group can share a stream and can improve the efficiency of downstream band. The paper introduces an method to carrying IPTV in Fttx network base on EPON..","PeriodicalId":375180,"journal":{"name":"2009 Second Pacific-Asia Conference on Web Mining and Web-based Application","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125802065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Building of Campus Network Transition Scheme Based on IPv6 Automatic Tunnel Technology 基于IPv6自动隧道技术的校园网过渡方案的构建
Tingzhao Guan, Yandong Xia
{"title":"The Building of Campus Network Transition Scheme Based on IPv6 Automatic Tunnel Technology","authors":"Tingzhao Guan, Yandong Xia","doi":"10.1109/WMWA.2009.9","DOIUrl":"https://doi.org/10.1109/WMWA.2009.9","url":null,"abstract":"IPv6 is the key technology of the next generation Internet, this paper analyses the strategies for managing the transition from IPO4 to IPO6, designs the campus network transition scheme based on IPv6automatic tunnel technology, and verifies the feasibility that IPv4 network can access IPv6 network through IPv6 automatic tunnel technology by the experiment.","PeriodicalId":375180,"journal":{"name":"2009 Second Pacific-Asia Conference on Web Mining and Web-based Application","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129063925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel Intrusion Detection Scheme Using Support Vector Machine Fuzzy Network for Mobile Ad Hoc Networks 一种基于支持向量机模糊网络的移动自组网入侵检测方案
2009 Second Pacific-Asia Conference on Web Mining and Web-based Application Pub Date : 2009-06-06 DOI: 10.1109/WMWA.2009.75
Huike Li, Daquan Gu
{"title":"A Novel Intrusion Detection Scheme Using Support Vector Machine Fuzzy Network for Mobile Ad Hoc Networks","authors":"Huike Li, Daquan Gu","doi":"10.1109/WMWA.2009.75","DOIUrl":"https://doi.org/10.1109/WMWA.2009.75","url":null,"abstract":"With the rapid development of the networking technology, the ad hoc technology has kept advancing apace. But wireless ad hoc networks present more security problems than the conventional wired and wireless networks. Therefore, the ever-increasing researchers are focusing on intrusion detection, as a complementary mechanism to the regular intrusion prevention approaches, which is needed to secure the wireless ad hoc networks. However, how to improve the accuracy of the intrusion detection efficiently in wireless ad hoc networks is still a challenging problem. In this paper, we propose a new approach for intrusion detection, which uses a novel Support Vector Machine Fuzzy Network (SVMFN) to make the detection more suitable and accurate in various wireless ad hoc network environments. The experimental results show that the generalization performance and the accuracy of identification are improved significantly compared to that of the traditional methods, and adapt to engineering applications.","PeriodicalId":375180,"journal":{"name":"2009 Second Pacific-Asia Conference on Web Mining and Web-based Application","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121564840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
WLAN Authentication System Based on the Improved EAP-TLS Protocol 基于改进EAP-TLS协议的WLAN认证系统
2009 Second Pacific-Asia Conference on Web Mining and Web-based Application Pub Date : 2009-06-06 DOI: 10.1109/WMWA.2009.63
Weili Huang, Renle Li
{"title":"WLAN Authentication System Based on the Improved EAP-TLS Protocol","authors":"Weili Huang, Renle Li","doi":"10.1109/WMWA.2009.63","DOIUrl":"https://doi.org/10.1109/WMWA.2009.63","url":null,"abstract":"This paper introduces the working principle of IEEE 802.1x protocol and Extensible Authentication Protocol EAP-TLS in the wireless local area network. There are some safety defects by analysis of the EAP-TLS protocol. On this basis, make an improvement to the EAP-TLS protocol, and give concrete realization of the process, to set up a WLAN authentication system with higher safety.","PeriodicalId":375180,"journal":{"name":"2009 Second Pacific-Asia Conference on Web Mining and Web-based Application","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134010409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Research on Application of Grey Prediction Theory for Scientists and Technicians Forecasting: Evidence from Henan Province in China 灰色预测理论在科技人员预测中的应用研究——以河南省为例
2009 Second Pacific-Asia Conference on Web Mining and Web-based Application Pub Date : 2009-06-06 DOI: 10.1109/WMWA.2009.65
Wuwei Li
{"title":"Research on Application of Grey Prediction Theory for Scientists and Technicians Forecasting: Evidence from Henan Province in China","authors":"Wuwei Li","doi":"10.1109/WMWA.2009.65","DOIUrl":"https://doi.org/10.1109/WMWA.2009.65","url":null,"abstract":"Based on the statistical data during the period from 2001 to 2004 released by Henan Statistical Bureau in China, this paper aims to predict the amount of scientists and technicians of Henan province in China by the usage of GM (1, 1) model with the four items. The result of this empirical study is that the grey prediction theory can fit the scientists and technicians amount development precisely in Henan province. The accuracy of the prediction result is above 90% and corresponds with a distinction, which the grey theory can meet expectations with small samples or data. Research results show that this model established in this paper could provide valuable information for policy makers in their efforts to make appropriate technological policies.","PeriodicalId":375180,"journal":{"name":"2009 Second Pacific-Asia Conference on Web Mining and Web-based Application","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116952185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study of the Effect of Self-access Center on Non-English Major Students' Listening Ability 自学中心对非英语专业学生听力能力的影响研究
2009 Second Pacific-Asia Conference on Web Mining and Web-based Application Pub Date : 2009-06-06 DOI: 10.1109/WMWA.2009.36
Zhihua Xu, Guangying Cui
{"title":"A Study of the Effect of Self-access Center on Non-English Major Students' Listening Ability","authors":"Zhihua Xu, Guangying Cui","doi":"10.1109/WMWA.2009.36","DOIUrl":"https://doi.org/10.1109/WMWA.2009.36","url":null,"abstract":"This paper tries to probe into the effect of the Self-access Center of Huazhong University of Science and Technology on improving non-English major college students’ listening ability employing many concepts of self-assess language learning, a way of autonomous learning. Both qualitative and quantitative research methods are used to analyze the results. While the students’ listening ability has been improved greatly through learning in the center under the guidance of their teacher, some limitations are also found and suggestions given based on the research results.","PeriodicalId":375180,"journal":{"name":"2009 Second Pacific-Asia Conference on Web Mining and Web-based Application","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131088521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improvement of a Three-party Key Exchange Protocol 三方密钥交换协议的改进
2009 Second Pacific-Asia Conference on Web Mining and Web-based Application Pub Date : 2009-06-06 DOI: 10.1109/WMWA.2009.54
Sida Lin, Qianna Xie
{"title":"Improvement of a Three-party Key Exchange Protocol","authors":"Sida Lin, Qianna Xie","doi":"10.1109/WMWA.2009.54","DOIUrl":"https://doi.org/10.1109/WMWA.2009.54","url":null,"abstract":"Recently¿Lu and Cao proposed a novel three-party key exchange protocol. Guo et al pointed out that their protocol cannot resist man-in-the-middle attack and undetectable on-line dictionary attack, and then an improved protocol was proposed in 2008.However, we show that Guo et al’s protocol is still vulnerable to undetectable on-line dictionary attack. To overcome the security flaw, an improved scheme is proposed.","PeriodicalId":375180,"journal":{"name":"2009 Second Pacific-Asia Conference on Web Mining and Web-based Application","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122432485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of a Distributed Spiders System Based on Web Service 基于Web Service的分布式蜘蛛系统设计
2009 Second Pacific-Asia Conference on Web Mining and Web-based Application Pub Date : 2009-06-06 DOI: 10.1109/WMWA.2009.15
Liu Guangli, Z. Hongbin
{"title":"Design of a Distributed Spiders System Based on Web Service","authors":"Liu Guangli, Z. Hongbin","doi":"10.1109/WMWA.2009.15","DOIUrl":"https://doi.org/10.1109/WMWA.2009.15","url":null,"abstract":"A distributed spiders antitype was designed by Web Service based on Service-Oriented Architecture(SOA).This antitype is made up of a server and several clients. The clients are controlled to download a new web page by the server according to the crawled pages. Moreover, they must manage the To Crawl , Crawled URL queues and Noise URL queue after analyzing it by multi-threads. Furthermore, they keep connection with the server to pass the unknown URL and domain names. The server is made up of the front platform and the background. The front platform controls the clients including the design of load balance policy and real-time monitoring of clients by Microsoft Message Queue(MSMQ). Web service is deployed on the server background which contains the structure of persistent data connection. With the help of this structure, the front platform and the clients can access data by the normative interface. Finally, a lot of experiments were done which show that the distributed spiders system has good robust performance.","PeriodicalId":375180,"journal":{"name":"2009 Second Pacific-Asia Conference on Web Mining and Web-based Application","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115506379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Construction of Autonomous-resource Systems in “Zero-approach” Teaching Mode Based on Web 基于Web的“零接近”教学模式中自主资源系统的构建
2009 Second Pacific-Asia Conference on Web Mining and Web-based Application Pub Date : 2009-06-06 DOI: 10.1109/WMWA.2009.42
X. Tian
{"title":"The Construction of Autonomous-resource Systems in “Zero-approach” Teaching Mode Based on Web","authors":"X. Tian","doi":"10.1109/WMWA.2009.42","DOIUrl":"https://doi.org/10.1109/WMWA.2009.42","url":null,"abstract":"With the teaching reform, \"zero-approach\"teaching mode has been much more popular than before. The core spirit of the reform is to develop autonomy of students in universities. During the course of development, autonomous-material system is necessary to be built based on web. The author has investigated the mode and put forward some useful measures to comply with present teaching reform in universities.In the investigation,the author paid much attention to the usages of methods of natural field observation and analytic statistical ones to get some effective conclusions.","PeriodicalId":375180,"journal":{"name":"2009 Second Pacific-Asia Conference on Web Mining and Web-based Application","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124325376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信