Default Cover Image

2009 First International Workshop on Database Technology and Applications, DBTA

April 25 2009 to April 26 2009

Wuhan, Hubei

Table of Contents

Papers
[Copyright notice]Freely available from IEEE.pp. iv
Papers
Table of contentsFreely available from IEEE.pp. v-xvi
Papers
Program CommitteeFreely available from IEEE.pp. xix
list-reviewerFreely available from IEEE.pp. xx-xx
Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
Message from the Workshop ChairFreely available from IEEE.pp. xvii
Papers
Organizing CommitteeFreely available from IEEE.pp. xviii
Papers
Research of Automatic Control System Based on 6K Controller Welding RobotFull-text access may be available. Sign in or learn about subscription options.pp. 3-6
Papers
Implementation of Embedded Web Server Based on Mc9s12ne64Full-text access may be available. Sign in or learn about subscription options.pp. 7-9
Papers
Effective Communication and the Prevention of Psychological Contract BreachFull-text access may be available. Sign in or learn about subscription options.pp. 10-13
A Novel Control Method for Magnetic-Valve Controllable ReactorFull-text access may be available. Sign in or learn about subscription options.pp. 72-75
Papers
Knowledge Construction Based on Visualization E-learning in Digital LibraryFull-text access may be available. Sign in or learn about subscription options.pp. 14-17
Papers
Geological Spatial Data Mining Basing on Web Geological DatabaseFull-text access may be available. Sign in or learn about subscription options.pp. 18-21
Papers
A Designed Edge Marking Fill Algorithm for Elongated PolygonFull-text access may be available. Sign in or learn about subscription options.pp. 22-24
Papers
An Improving and Application of Attribute Reduction Arithmetic in AgroclimatologyFull-text access may be available. Sign in or learn about subscription options.pp. 25-29
Papers
Effect of Navigation Aids and Landmarks on Acquisition of Spatial Knowledge in Virtual EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 30-32
Papers
Syncretizing Context Information into the Collaborative Filtering RecommendationFull-text access may be available. Sign in or learn about subscription options.pp. 33-36
Papers
Oracle GeoRaster Image Data Visualization with OCCIFull-text access may be available. Sign in or learn about subscription options.pp. 37-40
Papers
Cutter Database Management System Development on NetBeans 5.0 PlatformFull-text access may be available. Sign in or learn about subscription options.pp. 41-44
Papers
Research on Performance Analysis and Comprehensive Evaluation Model of MES for Machining WorkshopFull-text access may be available. Sign in or learn about subscription options.pp. 45-48
Papers
Expropriation of the Biggest Shareholdings Based on Principal Component Analysis in Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 49-52
Papers
Empirical Analysis of Beijing Logistics Industry's GDP Contribution to the National EconomyFull-text access may be available. Sign in or learn about subscription options.pp. 53-56
Papers
Parallel Algorithms for Constructing Fellow Automata of Regular ExpressionsFull-text access may be available. Sign in or learn about subscription options.pp. 57-60
Papers
Road Surface Condition Recognition Method Based on Color ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 61-63
Papers
Space Target Recognition Based on Biomimetic Pattern RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 64-67
Papers
Reliability Demonstration Testing Procedure for Weibull Distribution about Zero Failure-DataFull-text access may be available. Sign in or learn about subscription options.pp. 68-71
Papers
A Unified Out-of-Sequence Measurements Fusion Algorithm for WSNFull-text access may be available. Sign in or learn about subscription options.pp. 76-79
Papers
Design and Implementation of Distributed Memory Management System Based on Local Area NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 83-86
Papers
Research on Heterogeneous Data Integration in the Safety Production and Management of Coal-MiningFull-text access may be available. Sign in or learn about subscription options.pp. 87-90
Papers
K-Anonymity Based on Sensitive TuplesFull-text access may be available. Sign in or learn about subscription options.pp. 91-94
Papers
How to Solve Key Escrow Problem in Proxy Re-encryption from CBE to IBEFull-text access may be available. Sign in or learn about subscription options.pp. 95-98
Papers
Proxy Re-encryption Scheme from IBE to CBEFull-text access may be available. Sign in or learn about subscription options.pp. 99-102
Papers
Study and Safety Analysis on UCONonA ModelFull-text access may be available. Sign in or learn about subscription options.pp. 103-106
The Improved Algorithm of ART2 in Data MiningFull-text access may be available. Sign in or learn about subscription options.pp. 177-180
Papers
A Cluster-Based Watermarking Technique for Relational DatabaseFull-text access may be available. Sign in or learn about subscription options.pp. 107-110
Papers
A Survey on Privacy Preserving Data MiningFull-text access may be available. Sign in or learn about subscription options.pp. 111-114
Papers
The Application of Unascertained Measure Model to the Safety Evaluation of Bofang Coal Seam-Roof StabiityFull-text access may be available. Sign in or learn about subscription options.pp. 115-118
Papers
Distributed Block-Dependent Watermarking Method for JPEG2000 Image AuthenticationFull-text access may be available. Sign in or learn about subscription options.pp. 119-122
Papers
The Strategic Role of Indigenous Innovation for Global Competition Full-text access may be available. Sign in or learn about subscription options.pp. 123-127
Papers
A Survey on Privacy Preserving Approaches in Data PublishingFull-text access may be available. Sign in or learn about subscription options.pp. 128-131
Papers
Research on Bluetooth-Based User Identity Sensing and Facial Orientation Estimation Applied to Ambient IntelligenceFull-text access may be available. Sign in or learn about subscription options.pp. 132-135
Papers
Study on the Traffic Safety Intelligent Warning Technologies and Methods Based on the Integrated Traffic Safety DataFull-text access may be available. Sign in or learn about subscription options.pp. 136-139
Papers
Application of Unbalanced Data Approach to Network Intrusion DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 140-143
Papers
The Integrative Storage and Management of Land Resources Data Center Based on Oracle SpatialFull-text access may be available. Sign in or learn about subscription options.pp. 144-147
Papers
Mobile Agent Technology and Its Application in Distributed Data MiningFull-text access may be available. Sign in or learn about subscription options.pp. 151-155
Papers
Image Semantic Search EngineFull-text access may be available. Sign in or learn about subscription options.pp. 156-159
Papers
Algorithm Research on Project Risk Fuzzy EvaluationFull-text access may be available. Sign in or learn about subscription options.pp. 160-164
Papers
Visualized Geology Spatial Data Classifying Based on Integrated Techniques between GIS and SDMFull-text access may be available. Sign in or learn about subscription options.pp. 165-169
Papers
Abnormal BGP Routing Dynamics Detection by Sampling Approach in Decision TreeFull-text access may be available. Sign in or learn about subscription options.pp. 170-173
Papers
The Value Model of Customer Relationship Management Based on Rough Set and Fuzzy TheoryFull-text access may be available. Sign in or learn about subscription options.pp. 174-176
Papers
An Attribute Value Reduction Algorithm Based on Set OperationsFull-text access may be available. Sign in or learn about subscription options.pp. 181-183
Papers
Research on Embedded Real-Time Database Model Based on WirelessFull-text access may be available. Sign in or learn about subscription options.pp. 184-187
Papers
Network Analysis for Core Herbal Combination Knowledge Discovery from Clinical Chinese Medical FormulaeFull-text access may be available. Sign in or learn about subscription options.pp. 188-191
Papers
A Framework for Semi-supervised Clustering Based on Dimensionality ReductionFull-text access may be available. Sign in or learn about subscription options.pp. 192-195
Papers
Comparison and Analysis of Algorithms for Association RulesFull-text access may be available. Sign in or learn about subscription options.pp. 196-198
Papers
Data Mining in Traffic Flow Analysis of City TunnelFull-text access may be available. Sign in or learn about subscription options.pp. 199-201
Papers
The Application of Improved Decision Tree Algorithm in Data Mining of Employment Rate: Evidence from ChinaFull-text access may be available. Sign in or learn about subscription options.pp. 202-205
Papers
Research on Web Information Filtering Based on DCM AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 206-208
Papers
The Research and Application on Streaming Data of GIS Data MiningFull-text access may be available. Sign in or learn about subscription options.pp. 209-212
Papers
LILA: A Connected Components Labeling Algorithm in Grid-Based ClusteringFull-text access may be available. Sign in or learn about subscription options.pp. 213-216
Papers
Mineralization Information Mining from GIS Map & Attribution Database and Multi-sources Data IntergrationFull-text access may be available. Sign in or learn about subscription options.pp. 217-220
Papers
A Cost Sensitive Ensemble Method for Medical PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 221-224
Papers
Chinese Automatic Text Summarization Based on Keyword ExtractionFull-text access may be available. Sign in or learn about subscription options.pp. 225-228
Papers
The Analysis of Customer Data Mining Based on System DynamicsFull-text access may be available. Sign in or learn about subscription options.pp. 229-232
Papers
Using the Bibliometric Analysis to Evaluate Global Scientific Production of Data Mining PapersFull-text access may be available. Sign in or learn about subscription options.pp. 233-238
Papers
The Design of Online Learning Process Analysis and Mining SystemFull-text access may be available. Sign in or learn about subscription options.pp. 239-242
Papers
Data Mining Technology and Its Application in CRM of Commercial BanksFull-text access may be available. Sign in or learn about subscription options.pp. 243-246
Papers
Segmentation Study on Enterprise Customers Based on Data Mining TechnologyFull-text access may be available. Sign in or learn about subscription options.pp. 247-250
Papers
Data Mining of ACO-Based Rough Sets and Application in Construction Projects Cost AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 251-254
Papers
ACARS Data Identification and Application in Aircraft MaintenanceFull-text access may be available. Sign in or learn about subscription options.pp. 255-258
Papers
Extracting Structured Data from Ajax SiteFull-text access may be available. Sign in or learn about subscription options.pp. 259-262
Papers
Process Analysis of Service Modularization Based on Cluster ArithmeticFull-text access may be available. Sign in or learn about subscription options.pp. 263-266
Papers
An Improved Algorithm for Image Fractal DimensionFull-text access may be available. Sign in or learn about subscription options.pp. 267-270
Papers
The Research of Web Page De-duplication Based on Web Pages Reshipment StatementFull-text access may be available. Sign in or learn about subscription options.pp. 271-274
Papers
Implementation of Clustering Algorithm Using Artificial Immune SystemFull-text access may be available. Sign in or learn about subscription options.pp. 275-278
Papers
A Study of the Construction of a Large-Scale Water Quality Spatial Database Based on ArcSDEFull-text access may be available. Sign in or learn about subscription options.pp. 279-282
Papers
The Wavelet Transform in the Acoustic Emission Signal Feature Extraction of the Rubbing FaultFull-text access may be available. Sign in or learn about subscription options.pp. 283-286
Papers
Rubbing Fault Diagnosis of Rotary Machinery Based on Wavelet and Support Vector MachineFull-text access may be available. Sign in or learn about subscription options.pp. 287-290
Papers
Semantic-Based Remote Sensing Images Intelligent Service on Grid EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 291-294
Papers
Research on Credit Card Fraud Detection Model Based on Similar Coefficient SumFull-text access may be available. Sign in or learn about subscription options.pp. 295-298
Papers
A Systematic Study of the Work that Web Mining does in the Technology Opportunities AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 299-302
Papers
The Case Study on CSI of Household Electrical Appliances Based on Customer Delivered ValueFull-text access may be available. Sign in or learn about subscription options.pp. 303-306
Papers
The Earning Management of the Chemical Industry in the Antidumping Investigation---Empirical Data from China Listed CompanyFull-text access may be available. Sign in or learn about subscription options.pp. 307-311
Papers
Analyzes and Solves the Top Enterprise Network Data Security Issues with the Web Data Mining TechnologyFull-text access may be available. Sign in or learn about subscription options.pp. 312-314
Papers
Applying Research of Data Mining Technology on the Analysis of Vehicles Report-Stop FraudFull-text access may be available. Sign in or learn about subscription options.pp. 315-318
Papers
The Research of Chinese Automatic Word Segmentation In Hierarchical Model Dictionary Binary TreeFull-text access may be available. Sign in or learn about subscription options.pp. 321-324
Papers
Study on the Forecast of Air Passenger Flow Based on SVM Regression AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 325-328
Papers
Dynamic Detection of Unknown Malicious Executables Base on API InterceptionFull-text access may be available. Sign in or learn about subscription options.pp. 329-332
Papers
The Module Design of Intelligent Allocating Storage Space in Container Freight StationFull-text access may be available. Sign in or learn about subscription options.pp. 333-336
Papers
The Model of Dam Displacement Based on Improved Ant Colony Algorithm-Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 337-340
Papers
A New Architecture Model of Mobile Database Based on AgentFull-text access may be available. Sign in or learn about subscription options.pp. 341-344
Papers
Analysis Hierarchy Set Pair Model on Material SelectionFull-text access may be available. Sign in or learn about subscription options.pp. 345-347
Papers
Load Balancing System Applied ResearchFull-text access may be available. Sign in or learn about subscription options.pp. 348-350
Papers
Stress Analysis and Intensity Design of Electromotor Used in Hazardous Location Present Powder and ExplosivesFull-text access may be available. Sign in or learn about subscription options.pp. 351-354
Papers
UMC Model for Prediction of Seismic Liquefaction of Sand SoilFull-text access may be available. Sign in or learn about subscription options.pp. 355-358
Papers
Surface Inspection System of Steel Strip Based on Machine VisionFull-text access may be available. Sign in or learn about subscription options.pp. 359-362
Papers
Research on Ontology-Based Metadata ModelFull-text access may be available. Sign in or learn about subscription options.pp. 363-366
Papers
The Distribution Reliability Assessment Based on the Arithmetic of Simulating ReasoningFull-text access may be available. Sign in or learn about subscription options.pp. 367-370
Papers
Research on Control of the Data Quality in Digital Land Spatial Database Based on GISFull-text access may be available. Sign in or learn about subscription options.pp. 373-376
Showing 100 out of 179