Emerging Technologies in Knowledge Discovery and Data Mining: PAKDD 2007 International Workshops, Nanjing, China, May 22-25, 2007, Revised Selected PapersTakashi Washio, Zhi-Hua Zhou, Joshua Zhexue Huang, Xiaohua (Tony) Hu, Jinyan Li, Chao Xie, Jieyue He, Deqing Zou, Kuan-Ching Li, Mario M. Freire Springer Science & Business Media, 2007 M12 14 - 678 pages This book constitutes the thoroughly refereed post-proceedings of three workshops and an industrial track held in conjunction with the 11th Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2007, held in Nanjing, China in May 2007. The 62 revised full papers presented together with an overview article to each workshop were carefully reviewed and selected from 355 submissions. |
From inside the book
Results 1-5 of 50
Page xiii
... Matrix-Based Key Distribution Scheme for Sensor Networks ....................................... 608 Mi Wen, Yanfei Zheng, Hui Li, and Kefei Chen Security Framework for Home Network: Authentication, Authorization, and Security Policy ...
... Matrix-Based Key Distribution Scheme for Sensor Networks ....................................... 608 Mi Wen, Yanfei Zheng, Hui Li, and Kefei Chen Security Framework for Home Network: Authentication, Authorization, and Security Policy ...
Page 5
Sorry, this page's content is restricted.
Sorry, this page's content is restricted.
Page 30
Sorry, this page's content is restricted.
Sorry, this page's content is restricted.
Page 31
Sorry, this page's content is restricted.
Sorry, this page's content is restricted.
Page 32
Sorry, this page's content is restricted.
Sorry, this page's content is restricted.
Contents
PAKDD 2007 Industrial Track Workshop | 1 |
A Survey of Open Source Data Mining Systems | 3 |
Is Time Against Us? | 15 |
FrequencyWeighted Fuzzy TimeSeries Based on Fibonacci Sequence for TAIEX Forecasting | 27 |
Probabilistic Techniques for Corporate Blog Mining | 35 |
Mining Chat Conversations for Sex Identification | 45 |
Mining High Impact Exceptional Behavior Patterns | 56 |
Practical Issues on PrivacyPreserving Health Data Mining | 64 |
Spatial Clustering with Obstacles Constraints Using Ant Colony and Particle Swarm Optimization | 344 |
A High Performance Hierarchical Cubing Algorithm and Efficient OLAP in HighDimensional Data Warehouse | 357 |
GridBased Clustering Algorithm Based on Intersecting Partition and Density Estimation | 368 |
Depth First Generation of Frequent Patterns Without Candidate Generation | 378 |
Efficient Time Series Data Classification and Compression in Distributed Monitoring | 389 |
BestMatch Method Used in Cotraining Algorithm | 401 |
A General Method of Mining Chinese Web Documents Based on GASA and PositionFactors | 410 |
Data Management Services in ChinaGrid for Data Mining Applications | 421 |
Data Mining for Intelligent Structure Form Selection Based on Association Rules from a High Rise Case Base | 76 |
CommonKADS Methodology for Developing Power Grid Switching Orders Systems | 87 |
Discovering Prediction Model for Environmental Distribution Maps | 99 |
Workshop BioDM07An Overview | 110 |
Extracting Features from Gene Ontology for the Identification of Protein Subcellular Location by Semantic Similarity Measurement | 112 |
Detecting Community Structure in Complex Networks by Optimal Rearrangement Clustering | 119 |
The HIV Data Mining Tool for Government DecisionMaking Support | 131 |
Negative Localized Relationship Among p70S6 with Smad1 2 3 and p38 in Three Treated Human Cancer Cell Lines | 142 |
Cancer Identification Based on DNA Microarray Data | 153 |
Incorporating Dictionary Features into Conditional Random Fields for GeneProtein Named Entity Recognition | 162 |
Application to Protein Unfolding Pathways | 174 |
GeneticAnnealing Algorithm for 3D Offlattice Protein Folding Model | 186 |
Biclustering of Microarray Data Based on Singular Value Decomposition | 194 |
On the Number of Partial Least Squares Components in Dimension Reduction for Tumor Classification | 206 |
Coronary Artery Disease Diagnosis Using Linear and Nonlinear Features of HRV | 218 |
High Performance Data Mining and Applications Overview | 229 |
Approximately Mining Recently Representative Patterns on Data Streams | 231 |
Finding Frequent Items in Data Streams Using ESBF | 244 |
A New Decision Tree Classification Method for Mining HighSpeed Data Streams Based on Threaded Binary Search Trees | 256 |
Progressive Subspace Skyline Clusters Mining on High Dimensional Data | 268 |
Efficient Privacy Preserving Distributed Clustering Based on Secret Sharing | 280 |
An Algorithm That Mining Sequential Processes from Hybrid Log | 292 |
Evaluate Structure Similarity in XML Documents with MergeEditDistance | 301 |
Ensemble Learning Based Distributed Clustering | 312 |
Deploying Mobile Agents in Distributed Data Mining | 322 |
Outlier Detection Using Distance Distribution Clustering | 332 |
TwoPhase Algorithms for a Novel UtilityFrequent Mining Model | 433 |
TopDown and BottomUp Strategies for Incremental Maintenance of Frequent Patterns | 445 |
A Fast Online Algorithm for Mining Frequent Closed Itemsets | 457 |
Integration of Distributed Biological Data Using Modified KMeans Algorithm | 469 |
A Parallel Algorithm for Enumerating All the Maximal kPlexes | 476 |
A Multidependency Language Modeling Approach to Information Retrieval | 484 |
Factoid Mining Based Content Trust Model for Information Retrieval | 492 |
Service Security and Its Data Management for Ubiquitous Computing Overview | 500 |
Study on Trust Inference and Emergence of Economical SmallWorld Phenomena in P2P Environment | 502 |
A Secure Time Synchronization Protocol for Sensor Network | 515 |
Toward a Better Connectivity in Wireless Sensor Network | 527 |
A Distributed and Cooperative Black Hole Node Detection and Elimination Mechanism for Ad Hoc Networks | 538 |
A Novel Adaptive and Safe Framework for Ubicomp | 550 |
Reducing Interpiconet Delay for LargeScale Bluetooth Scatternets | 562 |
Security Analysis and Enhancement of OneWay Hash Based LowCost Authentication Protocol OHLCAP | 574 |
An Effective Design of an Active RFID Reader Using a Cache of Tag Memory Data | 584 |
Privacy Protection Scheme of RFID Using Random Number | 596 |
A Hierarchical Composition of LU MatrixBased Key Distribution Scheme for Sensor Networks | 608 |
Authentication Authorization and Security Policy | 621 |
Bogus Data Filtering in Sensor Networks | 629 |
Streaming Media Securely over Multipath Multihop Wireless Network | 636 |
Flexible Selection of Wavelet Coefficients Based on the Estimation Error of Predefined Queries | 644 |
Secured Web Services Based on Extended Usage Control | 656 |
A Digital Rights Management Architecture for Multimedia in P2P | 664 |
673 | |
Other editions - View all
Common terms and phrases
algorithm analysis AODV applications approach association rules attack authentication Berlin Heidelberg 2007 biclusters Bioinformatics blog Bluetooth cache cell China classifier closed itemsets clustering CommonKADS communication components computation cube data holders data mining data set data stream database defined denoted detection dimension distributed documents efficiency evaluate example exceptional behavior frequent itemsets frequent patterns function fuzzy gene expression global grid hash Heidelberg home network identify IEEE ISO/IEC K-Medoids k-plex LNAI matrix memory method microarray open source optimal packet PAKDD 2007 Workshops paper parameters patterns mining peer performance piconet prediction privacy-preserving problem proposed protein protocol query random reader retrieval RFID scatternet scheme selected sensor networks sensor nodes sequence server skyline Springer-Verlag Berlin Heidelberg storage structure support vector machine synchronization Table techniques Technology trajectories transaction tree trust ubiquitous computing vector Washio wavelet wireless sensor networks