Upload
doanthuan
View
215
Download
0
Embed Size (px)
Citation preview
Lecture Notes in Computer Science 6318Commenced Publication in 1973Founding and Former Series Editors:Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen
Editorial Board
David HutchisonLancaster University, UK
Takeo KanadeCarnegie Mellon University, Pittsburgh, PA, USA
Josef KittlerUniversity of Surrey, Guildford, UK
Jon M. KleinbergCornell University, Ithaca, NY, USA
Alfred KobsaUniversity of California, Irvine, CA, USA
Friedemann MatternETH Zurich, Switzerland
John C. MitchellStanford University, CA, USA
Moni NaorWeizmann Institute of Science, Rehovot, Israel
Oscar NierstraszUniversity of Bern, Switzerland
C. Pandu RanganIndian Institute of Technology, Madras, India
Bernhard SteffenTU Dortmund University, Germany
Madhu SudanMicrosoft Research, Cambridge, MA, USA
Demetri TerzopoulosUniversity of California, Los Angeles, CA, USA
Doug TygarUniversity of California, Berkeley, CA, USA
Gerhard WeikumMax Planck Institute for Informatics, Saarbruecken, Germany
Fu Lee Wang Zhiguo Gong Xiangfeng LuoJingsheng Lei (Eds.)
Web Information Systemsand MiningInternational Conference, WISM 2010Sanya, China, October 23-24, 2010Proceedings
13
Volume Editors
Fu Lee WangCaritas Francis Hsu College, Department of Business Administration18 Chui Ling Road, Tseung Kwan O, Hong Kong, ChinaE-mail: [email protected]
Zhiguo GongUniversity of Macau, Department of Computer and Information ScienceAv. Padre Tomás Pereira, Taipa, Macau, SAR, ChinaE-mail: [email protected]
Xiangfeng LuoShanghai University, School of Computer99 Shangda Road, Shanghai 200444, ChinaE-mail: [email protected]
Jingsheng LeiNanjing University of Posts and Telecommunications, School of ComputerNanjing 210003, ChinaE-mail: [email protected]
Library of Congress Control Number: 2010936446
CR Subject Classification (1998): H.4, H.3, H.5, H.2, C.2.4, I.2.6
LNCS Sublibrary: SL 3 – Information Systems and Application, incl. Internet/Weband HCI
ISSN 0302-9743ISBN-10 3-642-16514-1 Springer Berlin Heidelberg New YorkISBN-13 978-3-642-16514-6 Springer Berlin Heidelberg New York
This work is subject to copyright. All rights are reserved, whether the whole or part of the material isconcerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting,reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publicationor parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965,in its current version, and permission for use must always be obtained from Springer. Violations are liableto prosecution under the German Copyright Law.
springer.com
© Springer-Verlag Berlin Heidelberg 2010Printed in Germany
Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, IndiaPrinted on acid-free paper 06/3180
Preface
The 2010 International Conference on Web Information Systems and Mining (WISM 2010) was held October 23–24, 2010 in Sanya, China. WISM 2010 received 603 submissions from 20 countries and regions. After rigorous reviews, 54 high-quality papers were selected for publication in the WISM 2010 proceedings. The acceptance rate was 9%.
The aim of WISM 2010 was to bring together researchers working in many different areas of Web information systems and Web mining to foster the exchange of new ideas and promote international collaboration. In addition to the large number of submitted papers and invited sessions, there were several internationally well-known keynote speakers.
On behalf of the Organizing Committee, we thank Hainan Province Institute of Computer and Qiongzhou University for its sponsorship and logistics support. We also thank the members of the Organizing Committee and the Program Committee for their hard work. We are very grateful to the keynote speakers, invited session organizers, session chairs, reviewers, and student helpers. Last but not least, we thank all the authors and participants for their great contributions that made this conference possible. October 2010 Fu Lee Wang
Gong ZhiguoXiangfeng Luo
Jingsheng Lei
Organization
Organizing Committee
General Co-chairs
Qing Li City University of Hong Kong, China Mingrui Chen Hainan University, China
Program Committee
Co-chairs
Gong Zhiguo University of Macau, Macau Xiangfeng Luo Shanghai University, China
Local Arrangement
Chairs
Zhuang Li Qiongzhou University
Proceedings
Co-chair
Fu Lee Wang Caritas Francis Hsu College, China Jingsheng Lei Nanjing University of Posts and Telecommunications,
China
Publicity
Chair
Lanzhou Wang China Jiliang University, China
VIII Organization
Sponsorship
Chair
Zhiyu Zhou Zhejiang Sci-Tech University, China
Program Committee
Ladjel Bellatreche ENSMA - Poitiers University, France Sourav Bhowmick Nanyang Technological University, Singapore Stephane Bressan National University of Singapore, Singapore Erik Buchmann University Karlsruhe, Germany Jinli Cao La Trobe University, Australia Jian Cao Shanghai Jiao Tong University, China Badrish Chandramouli Microsoft Research, USA Akmal Chaudhri City University of London, UK Qiming Chen Hewlett-Packard Laboratories, USA Lei Chen Hong Kong University of Science and Technology, China Jinjun Chen Swinburne University of Technology, Australia Hong Cheng The Chinese University of Hong Kong, China Reynold Cheng Hong Kong Polytechnic University, China Bin Cui Peking University, China Alfredo Cuzzocrea University of Calabria, Italy Wanchun Dou Nanjing University, China Xiaoyong Du Renmin University of China, China Ling Feng Tsinghua University, China Cheng Fu Nanyang Technological University, Singapore Gabriel Fung The University of Queensland, Australia Byron Gao University of Wisconsin, USA Yunjun Gao Zhejiang University, China Bin Gao Microsoft Research, China Anandha Gopalan Imperial College, UK Stephane Grumbach INRIA, France Ming Hua Simon Fraser University, Canada Ela Hunt University of Strathclyde, Glasgow Renato Iannella National ICT, Australia Yan Jia National University of Defense Technology, China Yu-Kwong Ricky Colorado State University, USA Yoon Joon Lee KAIST, South Korea Carson Leung The University of Manitoba, Canada Lily Li CSIRO, Australia Tao Li Florida International University, USA Wenxin Liang Dalian University of Technology, China Chao Liu Microsoft, USA Qing Liu CSIRO, Australia
Organization IX
Jie Liu Chinese Academy of Sciences, China JianXun Liu Hunan University of Science and Technology, China Peng Liu PLA University of Science and Technology, China Jiaheng Lu University of California, Irvine, USA Weiyi Meng Binghamton University, USA Miyuki Nakano University of Tokyo, Japan Wilfred Ng Hong Kong University of Science and Technology, China Junfeng Pan Google, USA Zhiyong Peng Wuhan University, China Xuan-Hieu Phan University of New South Wales (UNSW), Australia Tieyun Qian Wuhan University, China Kaijun Ren National University of Defense Technology, China Dou Shen Microsoft, USA Peter Stanchev Kettering University, USA Xiaoping Su Chinese Academy of Sciences, China Jie Tang Tsinghua University, China Zhaohui Tang Microsoft, USA Yicheng Tu University of South Florida, USA Junhu Wang Griffith University, Australia Hua Wang University of Southern Queensland, Australia Guoren Wang Northeastern University, USA Lizhe Wang Research Center Karlsruhe, Germany Jianshu Weng Singapore Management University, Singapore Raymond Wong Hong Kong University of Science and Technology, China Jemma Wu CSIRO, Australia Jitian Xiao Edith Cowan University, Australia Junyi Xie Oracle Corp., USA Wei Xiong National University of Defense Technology, China Hui Xiong Rutgers University, USA Jun Yan University of Wollongon, Australia Xiaochun Yang Northeastern University, China Jian Yang Macquarie University, Australia Jian Yin Sun Yat-Sen University, China Qing Zhang CSIRO, Australia Shichao Zhang University of Technology, Australia Yanchang Zhao University of Technology, Australia Sheng Zhong State University of New York at Buffalo, USA Aoying Zhou East China Normal University, China Xingquan Zhu Florida Atlantic University, USA
Table of Contents
Applications of Web Information Systems
An Improving Multi-Objective Particle Swarm Optimization . . . . . . . . . . 1JiShan Fan
Study on RSA Based Identity Authentication Algorithm andApplication in Wireless Controlling System of Aids to Navigation . . . . . . 7
Fu-guo Dong and Hui Fan
Invariant Subspaces for Some Compact Perturbations of NormalOperators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Mingxue Liu
Research of Cooperative Geosteering Drilling Virtual System Based onNetwork . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Xiaorong Gao and Yingzhuo Xu
Optimization of Storage Location Assignment for Fixed RackSystems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Qinghong Wu, Ying Zhang, and Zongmin Ma
Evaluation Query Answer over Inconsistent Database withAnnotations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Aihua Wu
Research and Implementation of Index Weight Calculation Model forPower Grid Investment Returns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Wei Li, Guofeng Chen, and Cheng Duan
Applications of Web Mining
An Improved Algorithm for Session Identification on Web Log . . . . . . . . . 53Yuankang Fang and Zhiqiu Huang
A Chinese Web Page Automatic Classification System . . . . . . . . . . . . . . . . 61Rongyou Huang and Xinjian Zhao
Towards a Quality-Oriented Real-Time Web Crawler . . . . . . . . . . . . . . . . . 67Jianling Sun, Hui Gao, and Xiao Yang
Research on the Value of Business Information Online Based on FuzzyComprehensive Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Xiaohong Wang, Yilei Pei, and Liwei Li
XII Table of Contents
A Clustering Algorithm Based on Matrix over High Dimensional DataStream . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Guibin Hou, Ruixia Yao, Jiadong Ren, and Changzhen Hu
Distributed Systems
A Dynamic Dispatcher-Based Scheduling Algorithm on Load Balancingfor Web Server Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Liyong Bao, Dongfeng Zhao, and Yifan Zhao
Nature of Chinese Thesaurus Automatic Construction and Its Study ofMajor Technologies in Digital Libraries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Wen Zeng and Huilin Wang
Research on the Resource Monitoring Model Under Cloud ComputingEnvironment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Junwei Ge, Bo Zhang, and Yiqiu Fang
E-Government and E-Commerce
A New Photo-Based Approach for Fast Human Body ShapeModeling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Xiao Hu Liu, Yu Wen Wu, and Yan Ting Huang
A Multi-Criteria Analysis Approach for the Evaluation and Selectionof Electronic Market in Electronic Business in Small and Medium SizedEnterprises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
Xiaoxia Duan, Hepu Deng, and Brian Corbitt
Geographic Information Systems
A WebGIS and GRA Based Transportation Risk Management Systemfor Oversea Oil Exploitation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
Tijun Fan and Youyi Jiang
Prediction of Pine Wilt Disease in Jiangsu Province Based on WebDataset and GIS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
Mingyang Li, Milan Liu, Min Liu, and Yunwei Ju
An Approach for Integrating Geospatial Processing Services intoThree-Dimensional GIS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
Yingjie Hu, Jianping Wu, Haidong Zhong, Zhenhua Lv, andBailang Yu
Parallel K-Means Clustering of Remote Sensing Images Based onMapReduce . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
Zhenhua Lv, Yingjie Hu, Haidong Zhong, Jianping Wu, Bo Li, andHui Zhao
Table of Contents XIII
Information Security
Enhancing Distributed Web Security Based on Kerberos AuthenticationService . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
Cao Lai-Cheng
A New Scheme for Protecting Master-Key of Data Centre Web Serverin Online Banking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
Cao Lai-Cheng and Liang Lei
An Automated Worm Containment Scheme . . . . . . . . . . . . . . . . . . . . . . . . . 187Lipeng Song and Zhen Jin
RBAC-Based Access Control Integration Framework for LegacySystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
He Guo, Guoji Lu, Yuxin Wang, Han Li, and Xin Chen
A Pseudo Random Numbers Generator Based on Chaotic Iterations:Application to Watermarking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202
Christophe Guyeux, Qianxue Wang, and Jacques M. Bahi
A Secure Protocol for Point-Segment Position Problem . . . . . . . . . . . . . . . 212Yi Sun, Hongxiang Sun, Hua Zhang, and Qiaoyan Wen
Learning Automata Representation of Network Protocol by GrammarInduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
Ming-Ming Xiao and Shun-Zheng Yu
Gene-Certificate Based Model for User Authentication and AccessControl . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
Feixian Sun
A New Data Integrity Verification Mechanism for SaaS . . . . . . . . . . . . . . . 236Yuliang Shi, Kun Zhang, and Qingzhong Li
An Exquisite Authentication Scheme with Key Agreement PreservingUser Anonymity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244
Mijin Kim, Seungjoo Kim, and Dongho Won
Towards A Dynamic Federation Framework Based on SAML andAutomated Trust Negotiation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254
Yicun Zuo, Xiling Luo, and Feng Zeng
Intelligent Networked Systems
Research and Application of FlexRay High-Speed Bus on TransformerSubstation Automation System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
Hui Li, Hao Zhang, and Daogang Peng
XIV Table of Contents
A Task Scheduling Algorithm Based on Load Balancing in CloudComputing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
Yiqiu Fang, Fei Wang, and Junwei Ge
The Accuracy Enhancements of Virtual Antenna for Location BasedServices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278
Fu Tao, Huang Benxiong, and Mo Yijun
Management Information Systems
Research on the Production Scheduling Management System Based onSOA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286
Baoan Li
A Requirement-Driven Approach to Enterprise ApplicationDevelopment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295
Jinan Duan, Qunxiong Zhu, and Zhong Guan
Mobile Computing
ESA: An Efficient and Stable Approach to Querying Reversek -Nearest-Neighbor of Moving Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303
Dunlu Peng, Wenming Long, Ting Huang, and Huan Huo
The Research of Efficient Dual-Port SRAM Data Exchange withoutWaiting with FIFO-Based Cache . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312
Alfred Ji Qianqian, Zhao Ping, Cheng Sen, Tan Jingjing,Wei Xu, and Wei Yong
Web Content Mining
Extracting Service Aspects from Web Reviews . . . . . . . . . . . . . . . . . . . . . . . 320Jinmei Hao, Suke Li, and Zhong Chen
Clustering the Tagged Resources Using STAC . . . . . . . . . . . . . . . . . . . . . . . 328Feihang Gao, Kening Gao, and Bin Zhang
Advertising Keywords Extraction from Web Pages . . . . . . . . . . . . . . . . . . . 336Jianyi Liu, Cong Wang, Zhengyang Liu, and Wenbin Yao
Automatic Topic Detection with an Incremental ClusteringAlgorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344
Xiaoming Zhang and Zhoujun Li
Web Information Classification
Three New Feature Weighting Methods for Text Categorization . . . . . . . . 352Wei Xue and Xinshun Xu
Table of Contents XV
Algorithms of BBS Opinion Leader Mining Based on SentimentAnalysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360
Xiao Yu, Xu Wei, and Xia Lin
Entity Relationship Extraction Based on Potential RelationshipPattern . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370
Chen Chen, HuiLin Liu, GuoRen Wang, LinLin Ding, and LiLi Yu
Web Information Retrieval
On Arnoldi Method Accelerating PageRank Computations . . . . . . . . . . . . 378Guo-Jian Yin and Jun-Feng Yin
A Framework for Automatic Query Expansion . . . . . . . . . . . . . . . . . . . . . . . 386Hazra Imran and Aditi Sharan
Web Services and E-Learning
WSCache: A Cache Based Content-Aware Approach of Web ServiceDiscovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 394
Dunlu Peng, Xinglong Jiang, Wenjie Xu, and Kai Duan
A Novel Local Optimization Method for QoS-Aware Web ServiceComposition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402
Xiaojie Si, Xuyun Zhang, and Wanchun Dou
Preference-Aware QoS Evaluation for Cloud Web Service CompositionBased on Artificial Neural Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 410
Xuyun Zhang and Wanchun Dou
Software Architecture Driven Configurability of Multi-tenant SaaSApplication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 418
Hua Wang and Zhijun Zheng
XML and Semi-structured Data
Parallel Accessing Massive NetCDF Data Based on MapReduce . . . . . . . . 425Hui Zhao, SiYun Ai, Zhenhua Lv, and Bo Li
On Well-Formedness Rules for UML Use Case Diagram . . . . . . . . . . . . . . . 432Noraini Ibrahim, Rosziati Ibrahim, Mohd Zainuri Saringat,Dzahar Mansor, and Tutut Herawan
Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 441