Table of Contents

 

WISA 2009

WISA 2009

Nanchang, China††††††† May 22 - 24, 2009

Nanchang, China††††††† May 22 - 24, 2009

Second International Symposium on

Web Information Systems and Applications

Second International Symposium on

Web Information Systems and Applications

AP Catalog Number

AP-PROC-CS-09CN001

ISBN

978-952-5726-00-8 (Print)

978-952-5726-01-5 (CD-ROM)

Proceedings published by

Front Matter

i - xii

PDF

E-Business Model Design and Implementation in Supply-Chain Integration

†††††††††† Ming-Chang lee, Mei-Wen Han

1

Abstract† |† PDF

Research on the Enterprise Crisis Management System Basic on Knowledge Demand

†††††††††† Zhihong Li, Haiyan Wang

5

Abstract† |† PDF

Tutor Support Evaluation of Online Co-Learning System via Learning Action Analysis

†††††††††† Bin Xu

10

Abstract† |† PDF

A Secure Chameleon Hash Function without Key Exposure from Pairings

†††††††††† Jianhong Zhang, Hua Chen, and Qin Geng

15

Abstract† |† PDF

Research on the Construction Method of Emergency Plan Ontology Based-on OWL

†††††††††† XU Ru-zhi, DAI Xiao-liang, YANG Feng, LIN Pei-guang

19

Abstract† |† PDF

The Impacts of Online Word-of-mouth on Consumerís Buying Intention on Apparel: An Empirical Study

†††††††††† Ji Xiaofen, Zhang Yiling

24

Abstract† |† PDF

Improved Memory-based Collaborative Filtering Using Entropy-based Similarity Measures

†††††††††† Hyeong-Joon Kwon, Tae-Hoon Lee, Kwang-Seok Hong

29

Abstract† |† PDF

Competitive Advantage Evaluation of Real Estate Industry Based on Principal Component Analysis: An Illustrative Example from China

†††††††††† Shufang Li

35

Abstract† |† PDF

Research on Implementation Path and Strategies of Enterprise's Mobile Informatization

†††††††††† Chengyi Le, Ruiqing Zhang

41

Abstract† |† PDF

On-line Payment and Security of E-commerce

†††††††††† Jing Yang

46

Abstract† |† PDF

The PKI authentication system with the integration of Biometric identification and non-symmetric key technology

†††††††††† LIU Shan

51

Abstract† |† PDF

Choosing Credit Risk Index for Listed Companies Based on Grey Clustering Method

†††††††††† Lei Hua, Zhigang Song, Ying Li

56

Abstract† |† PDF

Application Study of E-commerce on Chinese SMEs

†††††††††† Longyi Li, Lihua Tao

60

Abstract† |† PDF

Using Niche Genetic Algorithm to Find Fuzzy Rules

†††††††††† Yan Li

64

Abstract† |† PDF

Highly Accurate Distributed Classification of Web Documents

†††††††††† JingKuan Song, Hui Gao, LianLi Gao, Yan Fu

68

Abstract† |† PDF

A Novel Distributed Intrusion Detection Model Based on Immune Mobile Agent

†††††††††† Yongzhong Li, Rushan Wang, JIng Xu

72

Abstract† |† PDF

Urban Planning Management Information System based on GIS

†††††††††† Hualong Zhao

76

Abstract† |† PDF

An Effective Approach for Remote Attestation in Trusted Computing

†††††††††† Xin Huang, Yuxing Peng

80

Abstract† |† PDF

A CP Intrusion Detection Strategy on Cloud Computing

†††††††††† Yizhang Guan, Jianghong Bao

84

Abstract† |† PDF

A Variable bit Rate Lattice Vector Quantization Method for Audio Coding

†††††††††† Bo Hang, Lei Yuan, Zhao Wu

88

Abstract† |† PDF

Oblivious Infinite Derivable Function Evaluation and Its Application

†††††††††† Pang Shuting, Tang Chunming, Hao Zhifeng

92

Abstract† |† PDF

Research and Design of Web Data Ming in Personalized E-Business

†††††††††† Yun Xue, Jianbin Chen

96

Abstract† |† PDF

The Research on Hybrid Shunt Active Power Filter

†††††††††† Zhong Tingjian, Fan Youping, Xie Youhui

100

Abstract† |† PDF

A Digital Watermarking Algorithm Based On DCT and DWT

†††††††††† Mei Jiansheng, Li Sukang, Tan Xiaomei

104

Abstract† |† PDF

Real Estate Decision Support System Of Market Comparison Approach Based On GIS

†††††††††† Xiaosheng Liu, Hengkai Li, Yanpeng Li

108

Abstract† |† PDF

Research and Implementation of E-commerce Platform Based on .NET Framework

†††††††††† Huang Longjun, Zhou Caiying, Dai Liping, Huang Minghe

112

Abstract† |† PDF

A Contingency Plans Generation System for Urban Storm Surge Disaster Based on Optimization

†††††††††† Hongchun Yuan, Guohua Li, Ying Chen, Dongmei Huang, and Cheng Su

116

Abstract† |† PDF

Study on the application layer security in E-Commerce websites

†††††††††† Zhenlong Li, Wenping Guo, Xiaoming Zhao

120

Abstract† |† PDF

A WebGIS Framework for Vector Geospatial Data Sharing Based on Open Source Projects

†††††††††† Fang Yin, Min Feng

124

Abstract† |† PDF

An Algorithm of Constructing Certificates Chain Based on the FriendshipPoint Group for P2P Network

†††††††††† Wang Guoyin, Wang Yuhua

128

Abstract† |† PDF

Research on Method of Concept Similarity Based on Ontology

†††††††††† Xiquan Yang, Ye Zhang, Na Sun, Deran Kong

132

Abstract† |† PDF

A Novel Risk Recognition Method in Web Services

†††††††††† E Xu, Shao Liangshan, Sun Fuming, Cao Guanghui, Wu Hao

136

Abstract† |† PDF

A Hash-based Hierarchical Algorithm for Massive Text Clustering

†††††††††† Yin Luo, Yan Fu

140

Abstract† |† PDF

MDESB:Model-driven Enterprise Service Bus

†††††††††† ZHANG Ming-bao

144

Abstract† |† PDF

The Application and Research of IDS model Based on Multi-technique Fusion

†††††††††† Wang DongLiang, Wang Hongxin

148

Abstract† |† PDF

Study on supply chain workflow based on grid

†††††††††† Yansheng Zhang, Longyi Li

152

Abstract† |† PDF

Study on curve of pre-heat temperature control in selective laser sintering

†††††††††† Xiao-fei LI, Junhui DONG

156

Abstract† |† PDF

Study on The Considered Harmful Based on Internet QoS

†††††††††† Qi Jun-qiao, Qi Yan-ming

159

Abstract† |† PDF

Application of Decoupling 802.11 Mesh Networks from Cache Coherence in Lambda Calculus

†††††††††† Qi Jun-qiao, Qi Yan-ming

163

Abstract† |† PDF

Application Research on the Simulation of Context-Free

†††††††††† Wang Chang-long, Li Jun, Yu Shuo

167

Abstract† |† PDF

Application of NulChoir on the Emulating Replication and Superpages

†††††††††† Wang Chang-long, Li Dong-ping, Yu Shuo

171

Abstract† |† PDF

The Research on the exploration of Flip-Flop Gates

†††††††††† Qi Yan-ming, Wang Chang-long

174

Abstract† |† PDF

Design of Decoupling Control System with High Angle of Attack Based on PV Criterion

†††††††††† Luo Xutao, Liang Xiaogeng, Jia Xiaohong, Jia Jie, Zhang Xiangyang, Zhao †††††††††† Ke

178

Abstract† |† PDF

Study on Niches of Enterprises and Strategy in E-business Ecosystem

†††††††††† Xianghui Zhu, Jing Zhang

182

Abstract† |† PDF

Research on Fast Implementation of RSA with Java

†††††††††† Guicheng Shen, Bingwu Liu, Xuefeng Zheng

186

Abstract† |† PDF

Data Security Analysis of WebGIS Based on Tile-Map Technique

†††††††††† Li Haiting, Peng Qingshan, Li Yanhong

190

Abstract† |† PDF

Research and Application of a Web Data Validation Model Based on Asynchronous Communication

†††††††††† Fangxiao Wang, Xiaoyi Zhang, Hao Yan

194

Abstract† |† PDF

GPU-based Morphing Terrain Real-time Shadow Algorithm

†††††††††† Wang Xiaojun, Zhai Haitao, Xia Jie, Cui Zhiming

198

Abstract† |† PDF

Analysis on the Successful Strategies of Taobao's E-Commerce

†††††††††† Yang Lixia, Liu Xun

202

Abstract† |† PDF

Study on Balanced Scorecard of Commercial Bank in Performance Management System

†††††††††† Yansheng Zhang, Longyi Li

206

Abstract† |† PDF

Copyright @ 2009 ACADEMY PUBLISHER ó All rights reserved

View : 1-50† |† 51-100† |† 101-137† |† Back to top

View : 1-50† |† 51-100† |† 101-137