Default Cover Image

2016 12th International Conference on Semantics, Knowledge and Grids (SKG)

Aug. 15 2016 to Aug. 17 2016

Beijing, China

Table of Contents

Title Page iFreely available from IEEE.pp. i-i
Title Page iiiFreely available from IEEE.pp. iii-iii
Copyright PageFreely available from IEEE.pp. iv-iv
Table of ContentsFreely available from IEEE.pp. v-vii
PrefaceFreely available from IEEE.pp. viii-viii
Conference OrganizationFreely available from IEEE.pp. ix-ix
Program CommitteeFreely available from IEEE.pp. x-x
Density Peaks Based Clustering Algorithm for Overlapping Community DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
An Approach to Standalone Provenance Systems for Big Social Provenance DataFull-text access may be available. Sign in or learn about subscription options.pp. 9-16
Using Constraint-Based Reasoning for Multi-objective Optimisation of the ENTICE EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 17-24
Computational Modeling of the Individualized Knowledge Building in a Constructivist WayFull-text access may be available. Sign in or learn about subscription options.pp. 25-31
The Role of Cause-Effect Link within Scientific PaperFull-text access may be available. Sign in or learn about subscription options.pp. 32-39
A Survey of Collaborative Filtering Algorithms for Social Recommender SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 40-46
A Hidden Knowledge Discovering Approach for Past Tense and Plural Problems to Language CognitionFull-text access may be available. Sign in or learn about subscription options.pp. 47-53
Summarization of Related Work through CitationsFull-text access may be available. Sign in or learn about subscription options.pp. 54-61
A Big Data Processing Framework for Self-Healing Internet of Things ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 62-68
An Ontology Mapping Approach Based on Classification with Word and Context SimilarityFull-text access may be available. Sign in or learn about subscription options.pp. 69-75
KGRL: An OWL2 RL Reasoning System for Large Scale Knowledge GraphFull-text access may be available. Sign in or learn about subscription options.pp. 83-89
Automatic Question Answering Based on Single DocumentFull-text access may be available. Sign in or learn about subscription options.pp. 90-96
Combining Statistical Information and Distance Computation for K-Means InitializationFull-text access may be available. Sign in or learn about subscription options.pp. 97-102
Performance Analysis of Multilevel Indices for Service RepositoriesFull-text access may be available. Sign in or learn about subscription options.pp. 103-108
Improving Collaborative Filtering AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 109-114
Behavioral Verification of UML2.0 Software ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 115-120
High Level Event Identification in Social MediaFull-text access may be available. Sign in or learn about subscription options.pp. 121-125
Combining Nonlinear Dimension Reduction and Hashing Method for Efficient Image RetrievalFull-text access may be available. Sign in or learn about subscription options.pp. 126-130
Bayesian Network-Based Approach for Mining Actionable Behavioral RulesFull-text access may be available. Sign in or learn about subscription options.pp. 131-135
Hybrid Artificial Bee Colony Algorithm Based on Cuckoo Search StrategyFull-text access may be available. Sign in or learn about subscription options.pp. 136-140
Concepts Expansion in Materials Domain Based on Ontology Matching ResultsFull-text access may be available. Sign in or learn about subscription options.pp. 141-145
Element-Level Clustering of Feature Vectors Considering Correlations for Analyzing Image DataFull-text access may be available. Sign in or learn about subscription options.pp. 146-149
Community-Based Recommendations: A Solution to the Vulnerability ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 150-153
Ranking Scientific Articles in a Dynamically Evolving Citation NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 154-157
The Fault Prediction Base on Data-Driven Method in the Tracking, Telemetry and Command SystemFull-text access may be available. Sign in or learn about subscription options.pp. 162-165
An Efficient Storage Model of Tree-Like Structure in MongoDBFull-text access may be available. Sign in or learn about subscription options.pp. 166-169
Resource Space Extension ModelFull-text access may be available. Sign in or learn about subscription options.pp. 170-173
Author IndexFreely available from IEEE.pp. 174-175
Publisher's InformationFreely available from IEEE.pp. 176-176
Showing 38 out of 38