Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
IEEE CS Standards
Career Center
About Us
Subscribe to Newsletter
0
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
0
Home
Proceedings
DBTA
DBTA 2009
Generate Citations
2009 First International Workshop on Database Technology and Applications, DBTA
April 25 2009 to April 26 2009
Wuhan, Hubei
Table of Contents
Papers
[Copyright notice]
Freely available from IEEE.
pp. iv
Papers
Table of contents
Freely available from IEEE.
pp. v-xvi
Papers
Program Committee
Freely available from IEEE.
pp. xix
list-reviewer
Freely available from IEEE.
pp. xx-xx
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Papers
Message from the Workshop Chair
Freely available from IEEE.
pp. xvii
Papers
Organizing Committee
Freely available from IEEE.
pp. xviii
Papers
Research of Automatic Control System Based on 6K Controller Welding Robot
Full-text access may be available. Sign in or learn about subscription options.
pp. 3-6
by
Gao Mingliang
,
Huo Limin
,
Xing Yazhou
,
Yi Jinggang
,
Tong Leiguang
Papers
Implementation of Embedded Web Server Based on Mc9s12ne64
Full-text access may be available. Sign in or learn about subscription options.
pp. 7-9
by
Zhang Yong
,
Wang Shouyi
Papers
Effective Communication and the Prevention of Psychological Contract Breach
Full-text access may be available. Sign in or learn about subscription options.
pp. 10-13
by
Shao Jing
,
Cao Yake
A Novel Control Method for Magnetic-Valve Controllable Reactor
Full-text access may be available. Sign in or learn about subscription options.
pp. 72-75
by
Xuxuan Chen
,
Baichao Chen
,
Cuihua Tian
Papers
Knowledge Construction Based on Visualization E-learning in Digital Library
Full-text access may be available. Sign in or learn about subscription options.
pp. 14-17
by
Chen Yongyue
,
Xia Huosong
Papers
Geological Spatial Data Mining Basing on Web Geological Database
Full-text access may be available. Sign in or learn about subscription options.
pp. 18-21
by
X. He
,
J.J. Liu
Papers
A Designed Edge Marking Fill Algorithm for Elongated Polygon
Full-text access may be available. Sign in or learn about subscription options.
pp. 22-24
by
Guodong Ye
,
Gui Lin
,
Changqing Zhu
Papers
An Improving and Application of Attribute Reduction Arithmetic in Agroclimatology
Full-text access may be available. Sign in or learn about subscription options.
pp. 25-29
by
Hongxia Wang
,
Yanhui Cheng
Papers
Effect of Navigation Aids and Landmarks on Acquisition of Spatial Knowledge in Virtual Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 30-32
by
Zuo Wuheng
,
Xu Baihua
,
Yuan He
,
Feng Zhilin
Papers
Syncretizing Context Information into the Collaborative Filtering Recommendation
Full-text access may be available. Sign in or learn about subscription options.
pp. 33-36
by
Ruliang Xiao
,
Faliang Hong
,
Jinbo Xiong
,
Xiaojian Zheng
,
Zhengqiu Zhang
Papers
Oracle GeoRaster Image Data Visualization with OCCI
Full-text access may be available. Sign in or learn about subscription options.
pp. 37-40
by
Wu Baiyan
,
Wang Wei
,
Du Daosheng
,
Li Qing
Papers
Cutter Database Management System Development on NetBeans 5.0 Platform
Full-text access may be available. Sign in or learn about subscription options.
pp. 41-44
by
Yan Cao
,
Zhou Fang
,
Yanli Yang
,
Zhong Li
Papers
Research on Performance Analysis and Comprehensive Evaluation Model of MES for Machining Workshop
Full-text access may be available. Sign in or learn about subscription options.
pp. 45-48
by
Yongdi Zhang
,
Yanfang Yue
,
Guang Yang
,
Dongcai Li
Papers
Expropriation of the Biggest Shareholdings Based on Principal Component Analysis in Neural Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 49-52
by
Haisheng Li
Papers
Empirical Analysis of Beijing Logistics Industry's GDP Contribution to the National Economy
Full-text access may be available. Sign in or learn about subscription options.
pp. 53-56
by
Sun Yong Bo
Papers
Parallel Algorithms for Constructing Fellow Automata of Regular Expressions
Full-text access may be available. Sign in or learn about subscription options.
pp. 57-60
by
Sun Yuqiang
,
Yang Ruimin
,
Gu Yuwan
,
You Jing
Papers
Road Surface Condition Recognition Method Based on Color Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 61-63
by
Li Hong
,
Lin Jun
,
Feng Yanhui
Papers
Space Target Recognition Based on Biomimetic Pattern Recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 64-67
by
Wenming Cao
,
Hao Feng
,
Lili Hu
,
Tiancheng He
Papers
Reliability Demonstration Testing Procedure for Weibull Distribution about Zero Failure-Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 68-71
by
Yang Xingqiong
,
Wan Lin
Papers
A Unified Out-of-Sequence Measurements Fusion Algorithm for WSN
Full-text access may be available. Sign in or learn about subscription options.
pp. 76-79
by
Yuepeng Shi
,
Yuqing Wan
,
Quanbo Ge
Papers
Design and Implementation of Distributed Memory Management System Based on Local Area Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 83-86
by
Yujian Wang
,
Lili Fan
,
Chen Liu
,
Xing Tian
Papers
Research on Heterogeneous Data Integration in the Safety Production and Management of Coal-Mining
Full-text access may be available. Sign in or learn about subscription options.
pp. 87-90
by
Xiao-bing Han
,
Feng Tian
,
Feng-bo Wu
Papers
K-Anonymity Based on Sensitive Tuples
Full-text access may be available. Sign in or learn about subscription options.
pp. 91-94
by
Xinping Hu
,
Zhihui Sun
,
Yingjie Wu
,
Wenyu Hu
,
Jiancheng Dong
Papers
How to Solve Key Escrow Problem in Proxy Re-encryption from CBE to IBE
Full-text access may be available. Sign in or learn about subscription options.
pp. 95-98
by
Ke Niu
,
Xu an Wang
,
Minqing Zhang
Papers
Proxy Re-encryption Scheme from IBE to CBE
Full-text access may be available. Sign in or learn about subscription options.
pp. 99-102
by
Xu an Wang
,
Xiaoyuan Yang
,
Minqing Zhang
Papers
Study and Safety Analysis on UCONonA Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 103-106
by
Zhai Zhigang
,
Wang Jiandong
,
Mao Yuguang
The Improved Algorithm of ART2 in Data Mining
Full-text access may be available. Sign in or learn about subscription options.
pp. 177-180
by
Liangun Li
,
Bin Zhang
,
Yuanyuan Che
Papers
A Cluster-Based Watermarking Technique for Relational Database
Full-text access may be available. Sign in or learn about subscription options.
pp. 107-110
by
Kaiyin Huang
,
Min Yue
,
Pengfei Chen
,
Yanshan He
,
Xiaoyun Chen
Papers
A Survey on Privacy Preserving Data Mining
Full-text access may be available. Sign in or learn about subscription options.
pp. 111-114
by
Jian Wang
,
Yongcheng Luo
,
Yan Zhao
,
Jiajin Le
Papers
The Application of Unascertained Measure Model to the Safety Evaluation of Bofang Coal Seam-Roof Stabiity
Full-text access may be available. Sign in or learn about subscription options.
pp. 115-118
by
Zhanglin Guo
,
Wu Yang
,
Hao Liu
Papers
Distributed Block-Dependent Watermarking Method for JPEG2000 Image Authentication
Full-text access may be available. Sign in or learn about subscription options.
pp. 119-122
by
Shewen Sun
,
Zhaohong Li
Papers
The Strategic Role of Indigenous Innovation for Global Competition
Full-text access may be available. Sign in or learn about subscription options.
pp. 123-127
by
Fengtao Zhu
,
Lei Xiao
,
Shiming Li
Papers
A Survey on Privacy Preserving Approaches in Data Publishing
Full-text access may be available. Sign in or learn about subscription options.
pp. 128-131
by
Yan Zhao
,
Ming Du
,
Jiajin Le
,
Yongcheng Luo
Papers
Research on Bluetooth-Based User Identity Sensing and Facial Orientation Estimation Applied to Ambient Intelligence
Full-text access may be available. Sign in or learn about subscription options.
pp. 132-135
by
Zhang Yong
,
Shang Haitao
,
He Jian
,
Huang Zhangqin
Papers
Study on the Traffic Safety Intelligent Warning Technologies and Methods Based on the Integrated Traffic Safety Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 136-139
by
Yin Zhu
Papers
Application of Unbalanced Data Approach to Network Intrusion Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 140-143
by
Zhao Yueai
,
Chen Junjie
Papers
The Integrative Storage and Management of Land Resources Data Center Based on Oracle Spatial
Full-text access may be available. Sign in or learn about subscription options.
pp. 144-147
by
Mei Zhong
,
Dejun Xu
,
Qingyun Du
,
Zhiwei Ye
Papers
Mobile Agent Technology and Its Application in Distributed Data Mining
Full-text access may be available. Sign in or learn about subscription options.
pp. 151-155
by
Ma Yubao
,
Ding Renyuan
Papers
Image Semantic Search Engine
Full-text access may be available. Sign in or learn about subscription options.
pp. 156-159
by
Chaoqing Lv
,
Takashi Kobayashi
,
Kiyoshi Agusa
,
Kun Wu
,
Qing Zhu
Papers
Algorithm Research on Project Risk Fuzzy Evaluation
Full-text access may be available. Sign in or learn about subscription options.
pp. 160-164
by
Kaidi Liu
,
Jimei Hao
,
Yanjun Pang
Papers
Visualized Geology Spatial Data Classifying Based on Integrated Techniques between GIS and SDM
Full-text access may be available. Sign in or learn about subscription options.
pp. 165-169
by
Zelu Jia
,
Yaolin Liu
Papers
Abnormal BGP Routing Dynamics Detection by Sampling Approach in Decision Tree
Full-text access may be available. Sign in or learn about subscription options.
pp. 170-173
by
Qitao Wu
,
Meiyan Wang
Papers
The Value Model of Customer Relationship Management Based on Rough Set and Fuzzy Theory
Full-text access may be available. Sign in or learn about subscription options.
pp. 174-176
by
Xiguo Xie
,
Yongsheng Jin
Papers
An Attribute Value Reduction Algorithm Based on Set Operations
Full-text access may be available. Sign in or learn about subscription options.
pp. 181-183
by
Mingchen Yao
,
Jie Yang
,
Huisheng Zhang
,
Wei Wu
Papers
Research on Embedded Real-Time Database Model Based on Wireless
Full-text access may be available. Sign in or learn about subscription options.
pp. 184-187
by
Chi Tao
,
Li Tuo
,
Huang Danfeng
Papers
Network Analysis for Core Herbal Combination Knowledge Discovery from Clinical Chinese Medical Formulae
Full-text access may be available. Sign in or learn about subscription options.
pp. 188-191
by
Xuezhong Zhou
,
Runsun Zhang
,
Yinghui Wang
,
Ping Li
,
Baoyan Liu
Papers
A Framework for Semi-supervised Clustering Based on Dimensionality Reduction
Full-text access may be available. Sign in or learn about subscription options.
pp. 192-195
by
Peng Cui
,
Ru-bo Zhang
Papers
Comparison and Analysis of Algorithms for Association Rules
Full-text access may be available. Sign in or learn about subscription options.
pp. 196-198
by
He Lijun
,
Li Linghua
,
Li Xiaoniu
,
Wang Degao
Papers
Data Mining in Traffic Flow Analysis of City Tunnel
Full-text access may be available. Sign in or learn about subscription options.
pp. 199-201
by
Chengqian Ma
,
Jingling Yuan
,
Luo Zhong
,
Xi Yue
Papers
The Application of Improved Decision Tree Algorithm in Data Mining of Employment Rate: Evidence from China
Full-text access may be available. Sign in or learn about subscription options.
pp. 202-205
by
Yuxiang Shao
,
Qing Chen
,
Weiming Yin
Papers
Research on Web Information Filtering Based on DCM Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 206-208
by
Luo Chang-ri
,
Zhang Xin-hua
,
Luo Shi-guang
Papers
The Research and Application on Streaming Data of GIS Data Mining
Full-text access may be available. Sign in or learn about subscription options.
pp. 209-212
by
Jia Liu
,
Lin Liu
,
Wei Chen
Papers
LILA: A Connected Components Labeling Algorithm in Grid-Based Clustering
Full-text access may be available. Sign in or learn about subscription options.
pp. 213-216
by
Tao Jiang
,
Ming Qiu
,
Jie Chen
,
Xue Cao
Papers
Mineralization Information Mining from GIS Map & Attribution Database and Multi-sources Data Intergration
Full-text access may be available. Sign in or learn about subscription options.
pp. 217-220
by
Liu Xing
Papers
A Cost Sensitive Ensemble Method for Medical Prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 221-224
by
Liangyuan Li
,
Mei Chen
,
Hanhu Wang
,
Wei Chen
,
Zhiyong Guo
Papers
Chinese Automatic Text Summarization Based on Keyword Extraction
Full-text access may be available. Sign in or learn about subscription options.
pp. 225-228
by
Xiao-yu Jiang
Papers
The Analysis of Customer Data Mining Based on System Dynamics
Full-text access may be available. Sign in or learn about subscription options.
pp. 229-232
by
Yan Dan
Papers
Using the Bibliometric Analysis to Evaluate Global Scientific Production of Data Mining Papers
Full-text access may be available. Sign in or learn about subscription options.
pp. 233-238
by
Shuang Deng
,
Yangge Tian
,
Hao Zhang
Papers
The Design of Online Learning Process Analysis and Mining System
Full-text access may be available. Sign in or learn about subscription options.
pp. 239-242
by
XiaoMing Cao
,
Kekang He
,
Shiqing Hu
Papers
Data Mining Technology and Its Application in CRM of Commercial Banks
Full-text access may be available. Sign in or learn about subscription options.
pp. 243-246
by
Bin Fang
,
Shoufeng Ma
Papers
Segmentation Study on Enterprise Customers Based on Data Mining Technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 247-250
by
Xin-an Lai
Papers
Data Mining of ACO-Based Rough Sets and Application in Construction Projects Cost Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 251-254
by
Shi Huawang
,
Cao Huishu
Papers
ACARS Data Identification and Application in Aircraft Maintenance
Full-text access may be available. Sign in or learn about subscription options.
pp. 255-258
by
Shuguang Sun
Papers
Extracting Structured Data from Ajax Site
Full-text access may be available. Sign in or learn about subscription options.
pp. 259-262
by
Tian Xia
Papers
Process Analysis of Service Modularization Based on Cluster Arithmetic
Full-text access may be available. Sign in or learn about subscription options.
pp. 263-266
by
Ling Yang
,
Miyuan Shan
Papers
An Improved Algorithm for Image Fractal Dimension
Full-text access may be available. Sign in or learn about subscription options.
pp. 267-270
by
Lihong Hu
,
Zifan Yu
,
Yanfang Liu
Papers
The Research of Web Page De-duplication Based on Web Pages Reshipment Statement
Full-text access may be available. Sign in or learn about subscription options.
pp. 271-274
by
Min-yan Wang
,
Dong-sheng Liu
Papers
Implementation of Clustering Algorithm Using Artificial Immune System
Full-text access may be available. Sign in or learn about subscription options.
pp. 275-278
by
Li lan
,
Rong Qiao-mei
Papers
A Study of the Construction of a Large-Scale Water Quality Spatial Database Based on ArcSDE
Full-text access may be available. Sign in or learn about subscription options.
pp. 279-282
by
Xu Shuna
,
Yang Lingbin
,
Zhang Xia
,
Wu Jin
Papers
The Wavelet Transform in the Acoustic Emission Signal Feature Extraction of the Rubbing Fault
Full-text access may be available. Sign in or learn about subscription options.
pp. 283-286
by
Jin Zhihao
,
Wang Dan
,
Jin Wen
,
Wen Bangchun
Papers
Rubbing Fault Diagnosis of Rotary Machinery Based on Wavelet and Support Vector Machine
Full-text access may be available. Sign in or learn about subscription options.
pp. 287-290
by
Jin Zhihao
,
Ji Shangwei
,
Jin Wen
,
Wen Bangchun
Papers
Semantic-Based Remote Sensing Images Intelligent Service on Grid Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 291-294
by
Mou Naixia
,
Liu Bing
,
Lu Xiushan
,
Zhang Lingxian
,
Liu Wenbao
Papers
Research on Credit Card Fraud Detection Model Based on Similar Coefficient Sum
Full-text access may be available. Sign in or learn about subscription options.
pp. 295-298
by
ChunHua Ju
,
Na Wang
Papers
A Systematic Study of the Work that Web Mining does in the Technology Opportunities Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 299-302
by
Gu Chengjian
,
Huang Lucheng
Papers
The Case Study on CSI of Household Electrical Appliances Based on Customer Delivered Value
Full-text access may be available. Sign in or learn about subscription options.
pp. 303-306
by
Bu Qingjuan
Papers
The Earning Management of the Chemical Industry in the Antidumping Investigation---Empirical Data from China Listed Company
Full-text access may be available. Sign in or learn about subscription options.
pp. 307-311
by
Xu Xuexia
Papers
Analyzes and Solves the Top Enterprise Network Data Security Issues with the Web Data Mining Technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 312-314
by
Wenguang Chai
Papers
Applying Research of Data Mining Technology on the Analysis of Vehicles Report-Stop Fraud
Full-text access may be available. Sign in or learn about subscription options.
pp. 315-318
by
Qian Zhou
,
Yin-sheng Liu
Papers
The Research of Chinese Automatic Word Segmentation In Hierarchical Model Dictionary Binary Tree
Full-text access may be available. Sign in or learn about subscription options.
pp. 321-324
by
Luo XianGang
,
Luo Jin
,
Xie Zhong
Papers
Study on the Forecast of Air Passenger Flow Based on SVM Regression Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 325-328
by
Yan Ke-wu
Papers
Dynamic Detection of Unknown Malicious Executables Base on API Interception
Full-text access may be available. Sign in or learn about subscription options.
pp. 329-332
by
Fei Chen
,
Yan Fu
Papers
The Module Design of Intelligent Allocating Storage Space in Container Freight Station
Full-text access may be available. Sign in or learn about subscription options.
pp. 333-336
by
Zhou Guiliang
,
Mao Lina
Papers
The Model of Dam Displacement Based on Improved Ant Colony Algorithm-Neural Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 337-340
by
Yu-feng Jiang
,
Juan Wang
Papers
A New Architecture Model of Mobile Database Based on Agent
Full-text access may be available. Sign in or learn about subscription options.
pp. 341-344
by
Jing Li
,
Jianhua Wang
Papers
Analysis Hierarchy Set Pair Model on Material Selection
Full-text access may be available. Sign in or learn about subscription options.
pp. 345-347
by
Yang Guang
,
Zhang Yong-di
,
Yue Yan-fang
,
Zhang Rui-gang
Papers
Load Balancing System Applied Research
Full-text access may be available. Sign in or learn about subscription options.
pp. 348-350
by
Zengqingjiang Yaojuan
Papers
Stress Analysis and Intensity Design of Electromotor Used in Hazardous Location Present Powder and Explosives
Full-text access may be available. Sign in or learn about subscription options.
pp. 351-354
by
Zhang Qinghui
,
Jin Guangfeng
Papers
UMC Model for Prediction of Seismic Liquefaction of Sand Soil
Full-text access may be available. Sign in or learn about subscription options.
pp. 355-358
by
Long-jun Dong
,
Jin-chun Xue
Papers
Surface Inspection System of Steel Strip Based on Machine Vision
Full-text access may be available. Sign in or learn about subscription options.
pp. 359-362
by
Bo Tang
,
Jian-yi Kong
,
Xing-dong Wang
,
Li Chen
Papers
Research on Ontology-Based Metadata Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 363-366
by
Qi Jia
,
ShouZhong Guo
,
HaiYong Chen
,
Nan Li
Papers
The Distribution Reliability Assessment Based on the Arithmetic of Simulating Reasoning
Full-text access may be available. Sign in or learn about subscription options.
pp. 367-370
by
Huang Lihua
,
Hu Jie
,
Zhang Lina
,
Xie Yunfang
,
Huo Limin
Papers
Research on Control of the Data Quality in Digital Land Spatial Database Based on GIS
Full-text access may be available. Sign in or learn about subscription options.
pp. 373-376
by
Chen Weigong
Showing 100 out of 179
Load More
Load All