default search action
World Wide Web: Internet and Web Information Systems, Volume 21
Volume 21, Number 1, January 2018
- Hua Wang, Zonghua Zhang, Tarek Taleb:
Editorial: Special Issue on Security and Privacy of IoT. 1-6 - Richard K. Lomotey, Joseph C. Pry, Chenshean Chai:
Traceability and visual analytics for the Internet-of-Things (IoT) architecture. 7-32 - Fulong Chen, Yonglong Luo, Ji Zhang, Junru Zhu, Ziyang Zhang, Chuanxin Zhao, Taochun Wang:
An infrastructure framework for privacy protection of community medical internet of things - Transmission protection, storage protection and access control. 33-57 - Letian Sha, Fu Xiao, Wei Chen, Jing Sun:
IIoT-SIDefender: Detecting and defense against the sensitive information leakage in industry IoT. 59-88 - Min Peng, Guanyin Zeng, Zhaoyu Sun, Jiajia Huang, Hua Wang, Gang Tian:
Personalized app recommendation based on app permissions. 89-104 - Xing Liu, Jiqiang Liu, Wei Wang, Yongzhong He, Xiangliang Zhang:
Discovering and understanding android sensor usage behaviors with data flow analysis. 105-126 - Yang Liu, Chaoshun Zuo, Zonghua Zhang, Shanqing Guo, Xin-Shun Xu:
An automatically vetting mechanism for SSL error-handling vulnerability in android hybrid Web apps. 127-150 - Qinlong Huang, Licheng Wang, Yixian Yang:
DECENT: Secure and fine-grained data access control with policy updating for constrained IoT devices. 151-167 - Kim Thuat Nguyen, Nouha Oualha, Maryline Laurent:
Securely outsourcing the ciphertext-policy attribute-based encryption. 169-183 - Tao Zhang, Lele Zheng, Yongzhi Wang, Yulong Shen, Ning Xi, Jianfeng Ma, Jianming Yong:
Trustworthy service composition with secure data transmission in sensor networks. 185-200 - Hui Wang, Wei Guo, Jizeng Wei:
Practical chosen-message CPA attack on message blinding exponentiation algorithm and its efficient countermeasure. 201-217 - Zi Li, Qingqi Pei, Yao Liu:
Spoofing attacks and countermeasures in fm indoor localization system. 219-240
Volume 21, Number 2, March 2018
- Lihua Yin, Yunchuan Guo, Fenghua Li, Yanwei Sun, Junyan Qian, Athanasios V. Vasilakos:
A game-theoretic approach to advertisement dissemination in ephemeral networks. 241-260 - Zeyi Wen, Rui Zhang, Kotagiri Ramamohanarao, Li Yang:
Scalable and fast SVM regression using modern hardware. 261-287 - Zhihui Yang, Huixin Ma, Zhenying He, X. Sean Wang:
Finding maximal ranges with unique topics in a text database. 289-310 - Yihong Zhang, Claudia Szabo, Quan Z. Sheng, Xiu Susie Fang:
SNAF: Observation filtering and location inference for event monitoring on twitter. 311-343 - Pavlos Kefalas, Panagiotis Symeonidis, Yannis Manolopoulos:
Recommendations based on a heterogeneous spatio-temporal social network. 345-371 - Lina Yao, Quan Z. Sheng, Xianzhi Wang, Shengrui Wang, Xue Li, Sen Wang:
Collaborative text categorization via exploiting sparse coefficients. 373-394 - Niladri Sett, Saptarshi Basu, Sukumar Nandi, Sanasam Ranbir Singh:
Temporal link prediction in multi-relational network. 395-419 - Liang Zheng, Yuzhong Qu, Gong Cheng:
Leveraging link pattern for entity-centric exploration over Linked Data. 421-453 - Bolong Zheng, Haozhou Wang, Kai Zheng, Han Su, Kuien Liu, Shuo Shang:
SharkDB: an in-memory column-oriented storage for trajectory analysis. 455-485 - Yang Yang, Feifei Wang, Junni Zhang, Jin Xu, Philip S. Yu:
A topic model for co-occurring normal documents and short texts. 487-513 - Lu Deng, Yan Jia, Bin Zhou, Jiuming Huang, Yi Han:
User interest mining via tags and bidirectional interactions on Sina Weibo. 515-536 - Bin Wang, Rui Zhu, Xiaochun Yang, Guoren Wang:
Top-K representative documents query over geo-textual data stream. 537-555 - Tahere Shakiba, Sajjad Zarifzadeh, Vali Derhami:
Spam query detection using stream clustering. 557-572
Volume 21, Number 3, May 2018
- Zhihu Qian, Jiajie Xu, Kai Zheng, Pengpeng Zhao, Xiaofang Zhou:
Semantic-aware top-k spatial keyword queries. 573-594 - Hanshu Hong, Zhixin Sun:
Sharing your privileges securely: a key-insulated attribute based proxy re-encryption scheme for IoT. 595-607 - Yue Huang, Chao Shen, Tao Li:
Event summarization for sports games using twitter streams. 609-627 - Brice Nédelec, Julian Tanke, Davide Frey, Pascal Molli, Achour Mostéfaoui:
An adaptive peer-sampling protocol for building networks of browsers. 629-661 - Rajkumar Das, Joarder Kamruzzaman, Gour C. Karmakar:
Modelling majority and expert influences on opinion formation in online social networks. 663-685 - Chaluka Salgado, Muhammad Aamir Cheema, Mohammed Eunus Ali:
Continuous monitoring of range spatial keyword query over moving objects. 687-712 - Guanfeng Liu, Yi Liu, An Liu, Zhixu Li, Kai Zheng, Yan Wang, Xiaofang Zhou:
Context-aware trust network extraction in large-scale trust-oriented social networks. 713-738 - Bin Guo, Xing Xie, Raghu K. Ganti, Daqing Zhang, Zhu Wang:
Guest editorial: special issue on mobile crowdsourcing - Preface to the special issue on mobile crowdsourcing. 739-740 - Zhiyong Yu, Jie Zhou, Wenzhong Guo, Longkun Guo, Zhiwen Yu:
Participant selection for t-sweep k-coverage crowd sensing tasks. 741-758 - Jiangtao Wang, Yasha Wang, Leye Wang, Yuanduo He:
GP-selector: a generic participant selection framework for mobile crowdsourcing systems. 759-782 - Fan Li, Zhuo Li, Kashif Sharif, Yang Liu, Yu Wang:
Multi-layer-based opportunistic data collection in mobile crowdsourcing networks. 783-802 - Wenbin Hu, Zhenyu Qiu, Cong Nie, Bo Du:
Channel dynamic adjustment in data broadcast. 803-823 - Xiangjie Kong, Ximeng Song, Feng Xia, Haochen Guo, Jinzhong Wang, Amr Tolba:
LoTAD: long-term traffic anomaly detection based on crowdsourced bus trajectory data. 825-847
Volume 21, Number 4, July 2018
- Qinzhe Zhang, Jia Wu, Qin Zhang, Peng Zhang, Guodong Long, Chengqi Zhang:
Dual influence embedded social recommendation. 849-874 - Yan Dai, Jie Shao, Chengbo Wei, Dongxiang Zhang, Heng Tao Shen:
Personalized semantic trajectory privacy preservation through trajectory reconstruction. 875-914 - Zongda Wu, Guandong Xu, Chenglang Lu, Enhong Chen, Fang Jiang, Guiling Li:
An effective approach for the protection of privacy text data in the CloudDB. 915-938 - Cheng-Te Li, Mei-Yuan Huang, Rui Yan:
Team formation with influence maximization for influential event organization on social networks. 939-959 - Jinkun Wang, Yuanchun Jiang, Jianshan Sun, Yezheng Liu, Xiao Liu:
Group recommendation based on a bidirectional tensor factorization model. 961-984 - Xiaoyao Zheng, Yonglong Luo, Liping Sun, Xintao Ding, Ji Zhang:
A novel social network hybrid recommender system based on hypergraph topologic structure. 985-1013 - Wei Emma Zhang, Quan Z. Sheng, Yongrui Qin, Kerry Taylor, Lina Yao:
Learning-based SPARQL query performance modeling and prediction. 1015-1035 - Wojciech Cellary, Hua Wang, Yanchun Zhang:
Guest Editorial: WWWJ Special Issue of the 17th International Conference on Web Information Systems Engineering (WISE 2016). 1037-1039 - Adit Krishnan, Deepak P, Sayan Ranu, Sameep Mehta:
Leveraging semantic resources in diversified query expansion. 1041-1067 - Chengyu Wang, Xiaofeng He, Aoying Zhou:
Event phase oriented news summarization. 1069-1092 - Zhenkun Zhou, Ke Xu, Jichang Zhao:
Tales of emotion and stock in China: volatility, causality and prediction. 1093-1116 - (Withdrawn) A joint model for analyzing topic and sentiment dynamics from large-scale online news. 1117-1139
- Yonghong Yu, Yang Gao, Hao Wang, Ruili Wang:
Joint user knowledge and matrix factorization for recommender systems. 1141-1163
Volume 21, Number 5, September 2018
- Yi-Chung Chen, Ming-Yeh Tsai, Chiang Lee:
Recommending topics in dialogue. 1165-1185 - Gizem Korkmaz, Chris J. Kuhlman, S. S. Ravi, Fernando Vega-Redondo:
Spreading of social contagions without key players. 1187-1221 - Mehdi Naseriparsa, Md. Saiful Islam, Chengfei Liu, Irene Moser:
No-but-semantic-match: computing semantically matched xml keyword search results. 1223-1257 - Xingzhong Du, Hongzhi Yin, Zi Huang, Yi Yang, Xiaofang Zhou:
Exploiting detected visual objects for frame-level video filtering. 1259-1284 - Vinti Agarwal, Kamal Kant Bharadwaj:
Recommending diverse friends in signed social networks based on adaptive soft consensus paradigm using variable length genetic algorithm. 1285-1321 - Dingqi Yang, Terence Heaney, Alberto Tonon, Leye Wang, Philippe Cudré-Mauroux:
CrimeTelescope: crime hotspot prediction based on urban and social media data fusion. 1323-1347 - Bin Wang, Xiaochun Yang, Guoren Wang:
ACRES: efficient query answering on large compressed sequences. 1349-1376 - Nai Yue Chen, Yun Liu, Junjun Cheng, Qing Liu:
A novel parallel community detection scheme based on label propagation. 1377-1398 - Dongjing Wang, Shuiguang Deng, Xin Zhang, Guandong Xu:
Learning to embed music and metadata for context-aware music recommendation. 1399-1423 - Wen Zhou, Kai Tang, Jinyuan Jia:
S-LPM: segmentation augmented light-weighting and progressive meshing for the interactive visualization of large man-made Web3D models. 1425-1448
Volume 21, Number 6, November 2018
- Xiaofeng Zhu, Gerard Sanroma, Jilian Zhang, Brent C. Munsell:
Editorial: Deep Mining Big Social Data. 1449-1452 - Dinesh Komarasamy, Muthuswamy Vijayalakshmi:
Priority scheduling with consolidation based backfilling algorithm in cloud. 1453-1471 - Qinghua Huang, Zhoufan Kong, Yanshan Li, Jie Yang, Xuelong Li:
Discovery of trading points based on Bayesian modeling of trading rules. 1473-1490 - Qinghua Huang, Fan Zhang, Xuelong Li:
A new breast tumor ultrasonography CAD system based on decision tree and BI-RADS features. 1491-1504 - Yunbo Rao, Wei Liu, Bojiang Fan, Jiali Song, Yang Yang:
A novel relevance feedback method for CBIR. 1505-1522 - Yao Wan, Liang Chen, Guandong Xu, Zhou Zhao, Jie Tang, Jian Wu:
SCSMiner: mining social coding sites for software developer recommendation with relevance propagation. 1523-1543 - Shichao Zhang, Debo Cheng, Rongyao Hu, Zhenyun Deng:
Supervised feature selection algorithm via discriminative ridge regression. 1545-1562 - Guoqiu Wen, Yonghua Zhu, Zhiguo Cai, Wei Zheng:
Self-tuning clustering for high-dimensional data. 1563-1573 - Ruili Wang, Wanting Ji, Baoyan Song:
Durable relationship prediction and description using a large dynamic graph. 1575-1600 - Sandeep K. Sood:
SNA based QoS and reliability in fog and cloud framework. 1601-1616 - Xin Liu, Yongjian Liu, Qing Xie, Lin Li, Zhixu Li:
A potential-based clustering method with hierarchical optimization. 1617-1635 - Jianmin Li, Yan Wang, Ying Zhong, Danhuai Guo, Shunzhi Zhu:
Aggregate location recommendation in dynamic transportation networks. 1637-1653 - Qing Xie, Feng Xiong, Tian Han, Yongjian Liu, Lin Li, Zhifeng Bao:
Interactive resource recommendation algorithm based on tag information. 1655-1673 - Yonghua Zhu, Xuejun Zhang, Ruili Wang, Wei Zheng, Yingying Zhu:
Self-representation and PCA embedding for unsupervised feature selection. 1675-1688 - Gang Hu, Jie Shao, Zhiyang Ni, Dongxiang Zhang:
A graph based method for constructing popular routes with check-ins. 1689-1703 - Yanhui Gu, Min Gu, Yi Long, Guandong Xu, Zhenglu Yang, Junsheng Zhou, Weiguang Qu:
An enhanced short text categorization model with deep abundant representation. 1705-1719 - Xipeng Pan, Dengxian Yang, Lingqiao Li, Zhenbing Liu, Huihua Yang, Zhiwei Cao, Yubei He, Zhen Ma, Yiyi Chen:
Cell detection in pathology and microscopy images with multi-scale fully convolutional neural networks. 1721-1743 - Ruili Wang, Ming Zong:
Joint self-representation and subspace learning for unsupervised feature selection. 1745-1758 - Jianliang Gao, Qing Ping, Jianxin Wang:
Resisting re-identification mining on social graph data. 1759-1771 - Soumia Menasria, Jianxin Wang, Mingming Lu:
The purpose driven privacy preservation for accelerometer-based activity recognition. 1773-1785 - Shichao Zhang:
Multiple-scale cost sensitive decision tree learning. 1787-1800
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.