Content Computing: Advanced Workshop on Content Computing, AWCC 2004, Zhen Jiang, Jiang Su, China, November 15-17, 2004, Proceedings

Front Cover
Springer Science & Business Media, Nov 18, 2004 - Computers - 510 pages
Welcome to the Advanced Workshop on Content Computing 2004. The focus of this workshop was "Content Computing." It emphasized research areas that facilitate e?cient, appropriate dissemination of content to users with the nec- saryaccessrights. Weusetheword"content"insteadof"information"or"data" because we want to cover not only raw data but also presentation quality. The fast growth of the Internet has already made it the key infrastructure for informationdissemination, education, business andentertainment. While the client-server model has been the most widely adopted paradigm for the WWW, thedesiretoprovidemorevalue-addedservicesinthedeliverylayerhasledtothe concept of an active network, where content-driven, intelligent computation will be performed to provide quality-of-service for content presentation and best-'t client demand. These value-added services typically aim to enhance information security, provide pervasive Internet access, and improve application robustness, system/networkperformance, knowledgeextraction, etc. Theyarerealizedby- corporatingsophisticatedmechanisms atthe deliverylayer, which is transparent to the content providers and Web surfers. Consequently, the notion of "Content Computing" has emerged. Content computing is a new paradigm for coordin- ing distributed systems and intelligent networks, based on a peer-to-peer model and with value-added processing of the application-speci?c contents at the - livery layer. This paradigm is especially useful to pervasive lightweight client devices such as mobile and portable end-user terminals with a wide variation of hardware/software con?gurations. This year, the workshop was held in Zhenjiang, Jiangsu, China. We received 194 high-quality papers from 11 regions, namely PR China, Korea, Singapore, Japan, United States, Canada, Australia, Germany, Taiwan, Italy, and Hong Kong. Totally, 62 papers were accepted and presented in the workshop.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Mobility PredictionBased Wireless Resource Allocation and Reservation
1
An AgentEnabled ContentExplicit Authorization Model for OGSACompliant Grid
12
A Predictable Mobile Agent Computation Model and Its Fabric Architecture
18
A Novel Reverse Rerouting Mechanism in Mobile Wireless Internet
27
An Agents Based Grid Infrastructure of Social Intelligence
33
Agent Aided Workflow Modeling
39
An Improved Hybrid Method of Maintaining Content Consistency
46
Advanced Architecture for Distributed Systems with a Network Infrastructure Based on CAN and Internet for Content Distribution
58
Evaluation Incompleteness of Knowledge in Data Mining
278
The Variable Precision Rough Set Model for Data Mining in Inconsistent Information System
285
Rule Discovery with Particle Swarm Optimization
291
Data Mining Service Based on MDA
297
Web Service Composition Based on BPWSNet
303
Testing Web Services Using Progressive Group Testing
314
XFCM XML Based on Fuzzy Clustering and Merging Method for Personalized User Profile Based on Recommendation System of Category and Pro...
323
Analyzing Web Interfaces of Databases for Retrieving Web Information
331

Distributed Document Sharing with Text Classification over ContentAddressable Network
70
Content Distribution Stochastic Fluid Models for Multiregions P2P Networks
82
Construct Campus PeertoPeer Networks
88
A Tool of Characterizing Traffic for Detection Purpose
94
Performance Analysis of Virtual Time Optimistic Transaction Processing
104
A MeasurementBased TCP Congestion Control Scheme
112
An Efficient Data Channel Scheduling Algorithm to Support QoS for Optical Burst Switching Networks
120
A Predictive Controller for AQM Router Supporting TCP with ECN
131
Enhancing the Content of the Intrusion Alerts Using Logic Correlation
137
RealTime Emulation of Intrusion Victim in HoneyFarm
143
On the Formal Characterization of Covert Channel
155
Availability Analysis and Comparison of Different IntrusionTolerant Systems
161
Security Analysis of User Efficient Blind Signatures
167
A Novel DDoS Attack Detecting Algorithm Based on the Continuous Wavelet Transform
173
Enhancing the Scalability of the Community Authorization Service for Virtual Organizations
182
Securing Multicast Groups in Ad Hoc Networks
194
Improved PrivacyProtecting Proxy Signature Scheme
208
Improving Security Architecture Development Based on Multiple Criteria Decision Making
214
A LSB Substitution Oriented Image Hiding Strategy Using Genetic Algorithms
219
A Prediction Scheme for Image Vector Quantization Based on Mining Association Rules
230
Fuzzy LogicBased Image Retrieval
241
Deriving Facial Patterns for Specifying Korean Young Mens 3D Virtual Face from Muscle Based Features
251
A ContentBased Fragile Watermarking Scheme for Image Authentication
258
A New FPTree Algorithm for Mining Frequent Itemsets
266
A New Universally Verifiable and ReceiptFree Electronic Voting Scheme Using OneWay Untappable Channels
337
Oriented to Multiagent System for Web Services Management
346
An Approach to Dynamically Reconfiguring ServiceOriented Applications from a Business Perspective
357
Dynamically Reconfiguring Sitemaps Using RDF
369
A General Model for Heterogeneous Web Services Integration
374
Methodology for Semantic Representing of Product Data in XML
380
Semantic Based Web Services Discovery
388
What Are People Looking for in Your Web Page?
394
The Impact of OCR Accuracy on Automatic Text Classification
403
A Hybrid Web Searches
410
A Hybrid Approach
416
Categorizing XML Documents Based on Page Styles
422
Generating Different Semantic Spaces for Document Classification
430
A Component Retrieval Method Based on FacetWeight Selflearning
437
The Algorithm About Division and Reducts of Information System Based on Discernibility Index of Attribute
449
An Effective Document Classification System Based on Concept Probability Vector
457
Accuracy Improvement of Automatic Text Classification Based on Feature Transformation and Multiclassifier Combination
463
Risk Minimization Based Ontology Mapping
469
Evolutionary Parameter Estimation Algorithm for Combined Kernel Function in Support Vector Machine
481
Enriching Domain Ontology from DomainSpecific Documents with HowNet
487
A Framework of Extracting Subontology
493
Ontology Based Sports Video Annotation and Summary
499
Author Index
509
Copyright

Other editions - View all

Common terms and phrases