


default search action
16th APWeb Workshops 2014: Changsha, China
- Weihong Han, Zi Huang, Changjun Hu, Hongli Zhang, Li Guo:

Web Technologies and Applications - APWeb 2014 Workshops, SNA, NIS, and IoTS, Changsha, China, September 5, 2014. Proceedings. Lecture Notes in Computer Science 8710, Springer 2014, ISBN 978-3-319-11118-6
First International Workshop on Social Network Analysis (SNA 2014)
- Xiaolong Deng, Runyu Chen:

Sentiment Analysis Based Online Restaurants Fake Reviews Hype Detection. 1-10 - Chong Feng

, Chun Liao, Zhirun Liu, Heyan Huang:
A Hybrid Method of Sentiment Key Sentence Identification Using Lexical Semantics and Syntactic Dependencies. 11-22 - Shunming Lv, Li Pan:

Influence Maximization in Independent Cascade Model with Limited Propagation Distance. 23-34 - Yang Yang

, Shuyuan Jin, Yang Zuo, Jin Xu:
Online Social Network Model Based on Local Preferential Attachment. 35-46 - Yanyu Yu, Yue Hu, Ge Li:

Temporal Curve Patterns Discovery of Information in BBS. 47-57 - Changjun Hu, Ying Hu, Wenwen Xu, Peng Shi, Shushen Fu:

Understanding Popularity Evolution Patterns of Hot Topics Based on Time Series Features. 58-68 - Chang-Ai Sun, Pan Wang, Xin Zhang, Marco Aiello

:
VxBPEL_ODE: A Variability Enhanced Service Composition Engine. 69-81 - Qiang Liu, Yuanzhuo Wang, Jingyuan Li, Yantao Jia, Yan Ren:

Predicting User Likes in Online Media Based on Conceptualized Social Network Profiles. 82-92 - Xiang Zhu

, Yuanping Nie, Aiping Li:
Demographic Prediction of Online Social Network Based on Epidemic Model. 93-103 - Ziyan Su, Bin Zhou, Aiping Li, Yi Han:

Analysis on Chinese Microblog Sentiment Based on Syntax Parsing and Support Vector Machine. 104-114 - Songchang Jin, Yuchao Zhang, Yuanping Nie, Xiang Zhu

, Hong Yin, Aiping Li, Shuqiang Yang:
A Parallel and Scalable Framework for Non-overlapping Community Detection Algorithms. 115-126 - Shaojie Pei, Lumin Zhang, Aiping Li:

Microblog Sentiment Analysis Model Based on Emoticons. 127-135 - Quanquan Fu, Changjun Hu, Wenwen Xu, Xiao He

, TieShan Zhang:
Detect and Analyze Flu Outlier Events via Social Network. 136-147
First International Workshop on Network and Information Security (NIS 2014)
- Junxing Zhu

, Aiping Li:
An Advanced Spam Detection Technique Based on Self-adaptive Piecewise Hash Algorithm. 148-157 - Fengguang Gong, Wenting Huang, Hao Luo, Hailong Zhu:

DNFStore: A Distributed Netflow Storage System Supports Fast Retrieval. 158-166 - Hongli Zhang, Qiang Zhang:

A Novel Road Topology-aware Routing in VANETs. 167-176 - Ye Xu, Gang Xiong, Yong Zhao, Li Guo:

Toward Identifying and Understanding User-Agent Strings in HTTP Traffic. 177-187 - Ying Qin, ShengYu Shen, Jingzhu Kong, Huadong Dai:

Cloud-Oriented SAT Solver Based on Obfuscating CNF Formula. 188-199 - Dongliang Xu, Hongli Zhang, Miao Hou:

The Improved AC High-Performance Pattern-Matching Algorithm for Intrusion Detection. 200-213 - Lu Deng, Weihong Han, Aiping Li, Yong Quan:

The Research of Partitioning Model Based on Virtual Identity Data. 214-224 - Jiemei Zeng, Xuewei Feng, Dongxia Wang, Lan Fang:

Implemention of Cyber Security Situation Awareness Based on Knowledge Discovery with Trusted Computer. 225-234 - Shuo Mao, Zhigang Wu, Bo Sun, Shoufeng Cao, Xiongjie Du, Kaifeng Wang:

NNSDS: Network Nodes' Social Attributes Discovery System Based on Netflow. 235-245 - Gang Xiong

, Jiayin Tong, Ye Xu, Hongliang Yu, Yong Zhao:
A Survey of Network Attacks Based on Protocol Vulnerabilities. 246-257 - Yong Zhao, Yuan Yuan, Yong Wang, Yao Yao, Gang Xiong:

Evaluation Scheme for Traffic Classification Systems. 258-264 - Yichen Wei, Xu Fei, Xiaojun Chen, Jinqiao Shi, Sihan Qing:

Winnowing Multihashing Structure with Wildcard Query. 265-281
First International Workshop on Internet of Things Search (IOTS 2014)
- Rui Chen, Lan Chen, Ying Li:

Efficient IEEE 802.15.4 AHB Slave of Security Accelerator in Wireless Senor Networks. 282-290 - Liang Fang, Yunchuan Guo:

A Survey of Role Mining Methods in Role-Based Access Control System. 291-300 - Chao Lee, Lihua Yin, Lan Dong:

A Modified-k-Anonymity Towards Spatial-Temporal Historical Data in Location-Based Social Network Service. 301-311 - Licai Liu, Bingxing Fang, Beiting Yi:

A General Framework of Nonleakage-Based Authentication Using CSP for the Internet of Things. 312-324 - Yan Sun, Lihua Yin:

A Security Routing Mechanism against Sybil Attacks in Mobile Social Networks. 325-332 - Kaiwen Sun, Lihua Yin:

Attribute-Role-Based Hybrid Access Control in the Internet of Things. 333-343 - Xin Tong, Jikang Xia, Lan Chen, Ying Li:

A Dynamic Feature-Based Security Detector in Wireless Sensor Network Transceiver. 344-352 - Xia Xiao, Lan Chen, Ying Li:

A Highly Adaptable Reputation System Based on Dirichlet Distribution. 353-364 - Dongyan Zhang, Pingxin Du, Zhiwen Yang, Lan Dong:

Research on Covert Channels Based on Multiple Networks. 365-375 - Rui Zhang, Xiaojun Chen, Jinqiao Shi, Fei Xu, Yiguo Pu:

Detecting Insider Threat Based on Document Access Behavior Analysis. 376-387 - Xiaofei Zhou, Wenhan Jiang, Jianlong Tan:

Enhanced Sample Selection for SVM on Face Recognition. 388-401

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














