


default search action
World Wide Web: Internet and Web Information Systems, Volume 21
Volume 21, Number 1, January 2018
- Hua Wang

, Zonghua Zhang, Tarek Taleb:
Editorial: Special Issue on Security and Privacy of IoT. 1-6 - Richard K. Lomotey, Joseph C. Pry, Chenshean Chai:

Traceability and visual analytics for the Internet-of-Things (IoT) architecture. 7-32 - Fulong Chen, Yonglong Luo, Ji Zhang, Junru Zhu, Ziyang Zhang, Chuanxin Zhao, Taochun Wang:

An infrastructure framework for privacy protection of community medical internet of things - Transmission protection, storage protection and access control. 33-57 - Letian Sha, Fu Xiao, Wei Chen, Jing Sun:

IIoT-SIDefender: Detecting and defense against the sensitive information leakage in industry IoT. 59-88 - Min Peng, Guanyin Zeng, Zhaoyu Sun, Jiajia Huang, Hua Wang

, Gang Tian:
Personalized app recommendation based on app permissions. 89-104 - Xing Liu, Jiqiang Liu, Wei Wang, Yongzhong He, Xiangliang Zhang

:
Discovering and understanding android sensor usage behaviors with data flow analysis. 105-126 - Yang Liu, Chaoshun Zuo, Zonghua Zhang, Shanqing Guo, Xin-Shun Xu:

An automatically vetting mechanism for SSL error-handling vulnerability in android hybrid Web apps. 127-150 - Qinlong Huang, Licheng Wang, Yixian Yang:

DECENT: Secure and fine-grained data access control with policy updating for constrained IoT devices. 151-167 - Kim Thuat Nguyen, Nouha Oualha

, Maryline Laurent
:
Securely outsourcing the ciphertext-policy attribute-based encryption. 169-183 - Tao Zhang, Lele Zheng, Yongzhi Wang, Yulong Shen, Ning Xi, Jianfeng Ma, Jianming Yong

:
Trustworthy service composition with secure data transmission in sensor networks. 185-200 - Hui Wang, Wei Guo, Jizeng Wei:

Practical chosen-message CPA attack on message blinding exponentiation algorithm and its efficient countermeasure. 201-217 - Zi Li

, Qingqi Pei, Yao Liu:
Spoofing attacks and countermeasures in fm indoor localization system. 219-240
Volume 21, Number 2, March 2018
- Lihua Yin, Yunchuan Guo, Fenghua Li, Yanwei Sun, Junyan Qian, Athanasios V. Vasilakos

:
A game-theoretic approach to advertisement dissemination in ephemeral networks. 241-260 - Zeyi Wen

, Rui Zhang, Kotagiri Ramamohanarao, Li Yang:
Scalable and fast SVM regression using modern hardware. 261-287 - Zhihui Yang

, Huixin Ma, Zhenying He, X. Sean Wang:
Finding maximal ranges with unique topics in a text database. 289-310 - Yihong Zhang

, Claudia Szabo
, Quan Z. Sheng
, Xiu Susie Fang:
SNAF: Observation filtering and location inference for event monitoring on twitter. 311-343 - Pavlos Kefalas

, Panagiotis Symeonidis, Yannis Manolopoulos:
Recommendations based on a heterogeneous spatio-temporal social network. 345-371 - Lina Yao, Quan Z. Sheng

, Xianzhi Wang
, Shengrui Wang, Xue Li
, Sen Wang
:
Collaborative text categorization via exploiting sparse coefficients. 373-394 - Niladri Sett

, Saptarshi Basu, Sukumar Nandi
, Sanasam Ranbir Singh:
Temporal link prediction in multi-relational network. 395-419 - Liang Zheng

, Yuzhong Qu
, Gong Cheng:
Leveraging link pattern for entity-centric exploration over Linked Data. 421-453 - Bolong Zheng, Haozhou Wang, Kai Zheng, Han Su, Kuien Liu, Shuo Shang:

SharkDB: an in-memory column-oriented storage for trajectory analysis. 455-485 - Yang Yang

, Feifei Wang
, Junni Zhang, Jin Xu, Philip S. Yu:
A topic model for co-occurring normal documents and short texts. 487-513 - Lu Deng

, Yan Jia, Bin Zhou, Jiuming Huang, Yi Han:
User interest mining via tags and bidirectional interactions on Sina Weibo. 515-536 - Bin Wang, Rui Zhu, Xiaochun Yang, Guoren Wang:

Top-K representative documents query over geo-textual data stream. 537-555 - Tahere Shakiba, Sajjad Zarifzadeh, Vali Derhami:

Spam query detection using stream clustering. 557-572
Volume 21, Number 3, May 2018
- Zhihu Qian, Jiajie Xu, Kai Zheng, Pengpeng Zhao, Xiaofang Zhou

:
Semantic-aware top-k spatial keyword queries. 573-594 - Hanshu Hong, Zhixin Sun:

Sharing your privileges securely: a key-insulated attribute based proxy re-encryption scheme for IoT. 595-607 - Yue Huang, Chao Shen, Tao Li:

Event summarization for sports games using twitter streams. 609-627 - Brice Nédelec

, Julian Tanke
, Davide Frey
, Pascal Molli, Achour Mostéfaoui:
An adaptive peer-sampling protocol for building networks of browsers. 629-661 - Rajkumar Das

, Joarder Kamruzzaman
, Gour C. Karmakar:
Modelling majority and expert influences on opinion formation in online social networks. 663-685 - Chaluka Salgado

, Muhammad Aamir Cheema, Mohammed Eunus Ali
:
Continuous monitoring of range spatial keyword query over moving objects. 687-712 - Guanfeng Liu

, Yi Liu, An Liu, Zhixu Li, Kai Zheng, Yan Wang
, Xiaofang Zhou
:
Context-aware trust network extraction in large-scale trust-oriented social networks. 713-738 - Bin Guo

, Xing Xie
, Raghu K. Ganti, Daqing Zhang, Zhu Wang
:
Guest editorial: special issue on mobile crowdsourcing - Preface to the special issue on mobile crowdsourcing. 739-740 - Zhiyong Yu

, Jie Zhou, Wenzhong Guo, Longkun Guo, Zhiwen Yu
:
Participant selection for t-sweep k-coverage crowd sensing tasks. 741-758 - Jiangtao Wang

, Yasha Wang
, Leye Wang, Yuanduo He:
GP-selector: a generic participant selection framework for mobile crowdsourcing systems. 759-782 - Fan Li

, Zhuo Li, Kashif Sharif
, Yang Liu, Yu Wang:
Multi-layer-based opportunistic data collection in mobile crowdsourcing networks. 783-802 - Wenbin Hu, Zhenyu Qiu, Cong Nie, Bo Du:

Channel dynamic adjustment in data broadcast. 803-823 - Xiangjie Kong

, Ximeng Song, Feng Xia
, Haochen Guo, Jinzhong Wang, Amr Tolba
:
LoTAD: long-term traffic anomaly detection based on crowdsourced bus trajectory data. 825-847
Volume 21, Number 4, July 2018
- Qinzhe Zhang, Jia Wu

, Qin Zhang, Peng Zhang
, Guodong Long, Chengqi Zhang
:
Dual influence embedded social recommendation. 849-874 - Yan Dai, Jie Shao

, Chengbo Wei, Dongxiang Zhang, Heng Tao Shen:
Personalized semantic trajectory privacy preservation through trajectory reconstruction. 875-914 - Zongda Wu, Guandong Xu, Chenglang Lu, Enhong Chen, Fang Jiang, Guiling Li:

An effective approach for the protection of privacy text data in the CloudDB. 915-938 - Cheng-Te Li, Mei-Yuan Huang, Rui Yan:

Team formation with influence maximization for influential event organization on social networks. 939-959 - Jinkun Wang, Yuanchun Jiang, Jianshan Sun, Yezheng Liu, Xiao Liu

:
Group recommendation based on a bidirectional tensor factorization model. 961-984 - Xiaoyao Zheng

, Yonglong Luo, Liping Sun, Xintao Ding
, Ji Zhang:
A novel social network hybrid recommender system based on hypergraph topologic structure. 985-1013 - Wei Emma Zhang

, Quan Z. Sheng
, Yongrui Qin, Kerry Taylor, Lina Yao:
Learning-based SPARQL query performance modeling and prediction. 1015-1035 - Wojciech Cellary

, Hua Wang
, Yanchun Zhang:
Guest Editorial: WWWJ Special Issue of the 17th International Conference on Web Information Systems Engineering (WISE 2016). 1037-1039 - Adit Krishnan, Deepak P

, Sayan Ranu, Sameep Mehta:
Leveraging semantic resources in diversified query expansion. 1041-1067 - Chengyu Wang, Xiaofeng He, Aoying Zhou:

Event phase oriented news summarization. 1069-1092 - Zhenkun Zhou

, Ke Xu, Jichang Zhao
:
Tales of emotion and stock in China: volatility, causality and prediction. 1093-1116 - (Withdrawn) A joint model for analyzing topic and sentiment dynamics from large-scale online news. 1117-1139

- Yonghong Yu, Yang Gao, Hao Wang, Ruili Wang:

Joint user knowledge and matrix factorization for recommender systems. 1141-1163
Volume 21, Number 5, September 2018
- Yi-Chung Chen

, Ming-Yeh Tsai, Chiang Lee:
Recommending topics in dialogue. 1165-1185 - Gizem Korkmaz, Chris J. Kuhlman, S. S. Ravi, Fernando Vega-Redondo:

Spreading of social contagions without key players. 1187-1221 - Mehdi Naseriparsa

, Md. Saiful Islam
, Chengfei Liu
, Irene Moser:
No-but-semantic-match: computing semantically matched xml keyword search results. 1223-1257 - Xingzhong Du, Hongzhi Yin

, Zi Huang
, Yi Yang, Xiaofang Zhou
:
Exploiting detected visual objects for frame-level video filtering. 1259-1284 - Vinti Agarwal, Kamal Kant Bharadwaj:

Recommending diverse friends in signed social networks based on adaptive soft consensus paradigm using variable length genetic algorithm. 1285-1321 - Dingqi Yang

, Terence Heaney, Alberto Tonon, Leye Wang, Philippe Cudré-Mauroux
:
CrimeTelescope: crime hotspot prediction based on urban and social media data fusion. 1323-1347 - Bin Wang, Xiaochun Yang, Guoren Wang:

ACRES: efficient query answering on large compressed sequences. 1349-1376 - Nai Yue Chen, Yun Liu, Junjun Cheng, Qing Liu:

A novel parallel community detection scheme based on label propagation. 1377-1398 - Dongjing Wang

, Shuiguang Deng
, Xin Zhang
, Guandong Xu:
Learning to embed music and metadata for context-aware music recommendation. 1399-1423 - Wen Zhou

, Kai Tang, Jinyuan Jia:
S-LPM: segmentation augmented light-weighting and progressive meshing for the interactive visualization of large man-made Web3D models. 1425-1448
Volume 21, Number 6, November 2018
- Xiaofeng Zhu

, Gerard Sanroma, Jilian Zhang, Brent C. Munsell:
Editorial: Deep Mining Big Social Data. 1449-1452 - Dinesh Komarasamy

, Muthuswamy Vijayalakshmi
:
Priority scheduling with consolidation based backfilling algorithm in cloud. 1453-1471 - Qinghua Huang, Zhoufan Kong, Yanshan Li, Jie Yang, Xuelong Li

:
Discovery of trading points based on Bayesian modeling of trading rules. 1473-1490 - Qinghua Huang, Fan Zhang

, Xuelong Li
:
A new breast tumor ultrasonography CAD system based on decision tree and BI-RADS features. 1491-1504 - Yunbo Rao, Wei Liu

, Bojiang Fan, Jiali Song, Yang Yang:
A novel relevance feedback method for CBIR. 1505-1522 - Yao Wan, Liang Chen, Guandong Xu, Zhou Zhao, Jie Tang, Jian Wu:

SCSMiner: mining social coding sites for software developer recommendation with relevance propagation. 1523-1543 - Shichao Zhang, Debo Cheng

, Rongyao Hu, Zhenyun Deng:
Supervised feature selection algorithm via discriminative ridge regression. 1545-1562 - Guoqiu Wen, Yonghua Zhu, Zhiguo Cai, Wei Zheng:

Self-tuning clustering for high-dimensional data. 1563-1573 - Ruili Wang, Wanting Ji, Baoyan Song:

Durable relationship prediction and description using a large dynamic graph. 1575-1600 - Sandeep K. Sood

:
SNA based QoS and reliability in fog and cloud framework. 1601-1616 - Xin Liu, Yongjian Liu, Qing Xie

, Lin Li, Zhixu Li:
A potential-based clustering method with hierarchical optimization. 1617-1635 - Jianmin Li, Yan Wang, Ying Zhong, Danhuai Guo, Shunzhi Zhu:

Aggregate location recommendation in dynamic transportation networks. 1637-1653 - Qing Xie

, Feng Xiong, Tian Han, Yongjian Liu, Lin Li, Zhifeng Bao
:
Interactive resource recommendation algorithm based on tag information. 1655-1673 - Yonghua Zhu, Xuejun Zhang, Ruili Wang, Wei Zheng, Yingying Zhu:

Self-representation and PCA embedding for unsupervised feature selection. 1675-1688 - Gang Hu, Jie Shao, Zhiyang Ni, Dongxiang Zhang:

A graph based method for constructing popular routes with check-ins. 1689-1703 - Yanhui Gu

, Min Gu, Yi Long, Guandong Xu, Zhenglu Yang
, Junsheng Zhou, Weiguang Qu:
An enhanced short text categorization model with deep abundant representation. 1705-1719 - Xipeng Pan, Dengxian Yang, Lingqiao Li

, Zhenbing Liu, Huihua Yang, Zhiwei Cao, Yubei He, Zhen Ma, Yiyi Chen:
Cell detection in pathology and microscopy images with multi-scale fully convolutional neural networks. 1721-1743 - Ruili Wang, Ming Zong:

Joint self-representation and subspace learning for unsupervised feature selection. 1745-1758 - Jianliang Gao, Qing Ping, Jianxin Wang:

Resisting re-identification mining on social graph data. 1759-1771 - Soumia Menasria, Jianxin Wang, Mingming Lu

:
The purpose driven privacy preservation for accelerometer-based activity recognition. 1773-1785 - Shichao Zhang:

Multiple-scale cost sensitive decision tree learning. 1787-1800

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














