World Wide Web Journal (2018)
Content
- 2018 Volume 21 Issue 6 21 papers
- 2018 Volume 21 Issue 5 10 papers
- 2018 Volume 21 Issue 4 13 papers
- 2018 Volume 21 Issue 3 13 papers
- 2018 Volume 21 Issue 2 13 papers
- 2018 Volume 21 Issue 1 12 papers
2018 Volume 21 Issue 6
Editorial: Deep Mining Big Social Data
Xiaofeng Zhu
|
Gerard Sanroma
|
Jilian Zhang
|
Brent C. Munsell
Priority scheduling with consolidation based backfilling algorithm in cloud
Dinesh Komarasamy
|
Muthuswamy Vijayalakshmi
Discovery of trading points based on Bayesian modeling of trading rules
Qinghua Huang
|
Zhoufan Kong
|
Yanshan Li
|
Jie Yang
|
Xuelong Li
A new breast tumor ultrasonography CAD system based on decision tree and BI-RADS features
Qinghua Huang
|
Fan Zhang
|
Xuelong Li
A novel relevance feedback method for CBIR
Yunbo Rao
|
Wei Liu
|
Bojiang Fan
|
Jiali Song
|
Yang Yang
SCSMiner: mining social coding sites for software developer recommendation with relevance propagation
Yao Wan
|
Liang Chen
|
Guandong Xu
|
Zhou Zhao
|
Jie Tang
|
Jian Wu
Supervised feature selection algorithm via discriminative ridge regression
Shichao Zhang
|
Debo Cheng
|
Rongyao Hu
|
Zhenyun Deng
Self-tuning clustering for high-dimensional data
Guoqiu Wen
|
Yonghua Zhu
|
Zhiguo Cai
|
Wei Zheng
Durable relationship prediction and description using a large dynamic graph
Ruili Wang
|
Wanting Ji
|
Baoyan Song
SNA based QoS and reliability in fog and cloud framework
Sandeep K. Sood
A potential-based clustering method with hierarchical optimization
Xin Liu
|
Yongjian Liu
|
Qing Xie
|
Lin Li
|
Zhixu Li
Aggregate location recommendation in dynamic transportation networks
Jianmin Li
|
Yan Wang
|
Ying Zhong
|
Danhuai Guo
|
Shunzhi Zhu
Interactive resource recommendation algorithm based on tag information
Qing Xie
|
Feng Xiong
|
Tian Han
|
Yongjian Liu
|
Lin Li
|
Zhifeng Bao
Self-representation and PCA embedding for unsupervised feature selection
Yonghua Zhu
|
Xuejun Zhang
|
Ruili Wang
|
Wei Zheng
|
Yingying Zhu
A graph based method for constructing popular routes with check-ins
Gang Hu
|
Jie Shao
|
Zhiyang Ni
|
Dongxiang Zhang
An enhanced short text categorization model with deep abundant representation
Yanhui Gu
|
Min Gu
|
Yi Long
|
Guandong Xu
|
Zhenglu Yang
|
Junsheng Zhou
|
Weiguang Qu
Cell detection in pathology and microscopy images with multi-scale fully convolutional neural networks
Xipeng Pan
|
Dengxian Yang
|
Lingqiao Li
|
Zhenbing Liu
|
Huihua Yang
|
Zhiwei Cao
|
Yubei He
|
Zhen Ma
|
Yiyi Chen
Joint self-representation and subspace learning for unsupervised feature selection
Ruili Wang
|
Ming Zong
Resisting re-identification mining on social graph data
Jianliang Gao
|
Qing Ping
|
Jianxin Wang
The purpose driven privacy preservation for accelerometer-based activity recognition
Soumia Menasria
|
Jianxin Wang
|
Mingming Lu
Multiple-scale cost sensitive decision tree learning
Shichao Zhang
2018 Volume 21 Issue 5
Recommending topics in dialogue
Yi-Chung Chen
|
Ming-Yeh Tsai
|
Chiang Lee
Spreading of social contagions without key players
Gizem Korkmaz
|
Chris J. Kuhlman
|
S. S. Ravi
|
Fernando Vega-Redondo
No-but-semantic-match: computing semantically matched xml keyword search results
Mehdi Naseriparsa
|
Md. Saiful Islam
|
Chengfei Liu
|
Irene Moser
Exploiting detected visual objects for frame-level video filtering
Xingzhong Du
|
Hongzhi Yin
|
Zi Huang
|
Yi Yang
|
Xiaofang Zhou
Recommending diverse friends in signed social networks based on adaptive soft consensus paradigm using variable length genetic algorithm
Vinti Agarwal
|
Kamal Kant Bharadwaj
CrimeTelescope: crime hotspot prediction based on urban and social media data fusion
Dingqi Yang
|
Terence Heaney
|
Alberto Tonon
|
Leye Wang
|
Philippe Cudré-Mauroux
ACRES: efficient query answering on large compressed sequences
Bin Wang
|
Xiaochun Yang
|
Guoren Wang
A novel parallel community detection scheme based on label propagation
Nai Yue Chen
|
Yun Liu
|
Junjun Cheng
|
Qing Liu
Learning to embed music and metadata for context-aware music recommendation
Dongjing Wang
|
Shuiguang Deng
|
Xin Zhang
|
Guandong Xu
S-LPM: segmentation augmented light-weighting and progressive meshing for the interactive visualization of large man-made Web3D models
Wen Zhou
|
Kai Tang
|
Jinyuan Jia
2018 Volume 21 Issue 4
Dual influence embedded social recommendation
Qinzhe Zhang
|
Jia Wu
|
Qin Zhang
|
Peng Zhang
|
Guodong Long
|
Chengqi Zhang
Personalized semantic trajectory privacy preservation through trajectory reconstruction
Yan Dai
|
Jie Shao
|
Chengbo Wei
|
Dongxiang Zhang
|
Heng Tao Shen
An effective approach for the protection of privacy text data in the CloudDB
Zongda Wu
|
Guandong Xu
|
Chenglang Lu
|
Enhong Chen
|
Fang Jiang
|
Guiling Li
Team formation with influence maximization for influential event organization on social networks
Cheng-Te Li
|
Mei-Yuan Huang
|
Rui Yan
Group recommendation based on a bidirectional tensor factorization model
Jinkun Wang
|
Yuanchun Jiang
|
Jianshan Sun
|
Yezheng Liu
|
Xiao Liu
A novel social network hybrid recommender system based on hypergraph topologic structure
Xiaoyao Zheng
|
Yonglong Luo
|
Liping Sun
|
Xintao Ding
|
Ji Zhang
Learning-based SPARQL query performance modeling and prediction
Wei Emma Zhang
|
Quan Z. Sheng
|
Yongrui Qin
|
Kerry Taylor
|
Lina Yao
Guest Editorial: WWWJ Special Issue of the 17th International Conference on Web Information Systems Engineering (WISE 2016)
Wojciech Cellary
|
Hua Wang
|
Yanchun Zhang
Leveraging semantic resources in diversified query expansion
Adit Krishnan
|
Deepak P
|
Sayan Ranu
|
Sameep Mehta
Event phase oriented news summarization
Chengyu Wang
|
Xiaofeng He
|
Aoying Zhou
Tales of emotion and stock in China: volatility, causality and prediction
Zhenkun Zhou
|
Ke Xu
|
Jichang Zhao
A joint model for analyzing topic and sentiment dynamics from large-scale online news
Joint user knowledge and matrix factorization for recommender systems
Yonghong Yu
|
Yang Gao
|
Hao Wang
|
Ruili Wang
2018 Volume 21 Issue 3
Semantic-aware top-k spatial keyword queries
Zhihu Qian
|
Jiajie Xu
|
Kai Zheng
|
Pengpeng Zhao
|
Xiaofang Zhou
Sharing your privileges securely: a key-insulated attribute based proxy re-encryption scheme for IoT
Hanshu Hong
|
Zhixin Sun
Event summarization for sports games using twitter streams
Yue Huang
|
Chao Shen
|
Tao Li
An adaptive peer-sampling protocol for building networks of browsers
Brice Nédelec
|
Julian Tanke
|
Davide Frey
|
Pascal Molli
|
Achour Mostéfaoui
Modelling majority and expert influences on opinion formation in online social networks
Rajkumar Das
|
Joarder Kamruzzaman
|
Gour C. Karmakar
Continuous monitoring of range spatial keyword query over moving objects
Chaluka Salgado
|
Muhammad Aamir Cheema
|
Mohammed Eunus Ali
Context-aware trust network extraction in large-scale trust-oriented social networks
Guanfeng Liu
|
Yi Liu
|
An Liu
|
Zhixu Li
|
Kai Zheng
|
Yan Wang
|
Xiaofang Zhou
Guest editorial: special issue on mobile crowdsourcing - Preface to the special issue on mobile crowdsourcing
Bin Guo
|
Xing Xie
|
Raghu K. Ganti
|
Daqing Zhang
|
Zhu Wang
Participant selection for t-sweep k-coverage crowd sensing tasks
Zhiyong Yu
|
Jie Zhou
|
Wenzhong Guo
|
Longkun Guo
|
Zhiwen Yu
GP-selector: a generic participant selection framework for mobile crowdsourcing systems
Jiangtao Wang
|
Yasha Wang
|
Leye Wang
|
Yuanduo He
Multi-layer-based opportunistic data collection in mobile crowdsourcing networks
Fan Li
|
Zhuo Li
|
Kashif Sharif
|
Yang Liu
|
Yu Wang
Channel dynamic adjustment in data broadcast
Wenbin Hu
|
Zhenyu Qiu
|
Cong Nie
|
Bo Du
LoTAD: long-term traffic anomaly detection based on crowdsourced bus trajectory data
Xiangjie Kong
|
Ximeng Song
|
Feng Xia
|
Haochen Guo
|
Jinzhong Wang
|
Amr Tolba
2018 Volume 21 Issue 2
A game-theoretic approach to advertisement dissemination in ephemeral networks
Lihua Yin
|
Yunchuan Guo
|
Fenghua Li
|
Yanwei Sun
|
Junyan Qian
|
Athanasios V. Vasilakos
Scalable and fast SVM regression using modern hardware
Zeyi Wen
|
Rui Zhang
|
Kotagiri Ramamohanarao
|
Li Yang
Finding maximal ranges with unique topics in a text database
Zhihui Yang
|
Huixin Ma
|
Zhenying He
|
X. Sean Wang
SNAF: Observation filtering and location inference for event monitoring on twitter
Yihong Zhang
|
Claudia Szabo
|
Quan Z. Sheng
|
Xiu Susie Fang
Recommendations based on a heterogeneous spatio-temporal social network
Pavlos Kefalas
|
Panagiotis Symeonidis
|
Yannis Manolopoulos
Collaborative text categorization via exploiting sparse coefficients
Lina Yao
|
Quan Z. Sheng
|
Xianzhi Wang
|
Shengrui Wang
|
Xue Li
|
Sen Wang
Temporal link prediction in multi-relational network
Niladri Sett
|
Saptarshi Basu
|
Sukumar Nandi
|
Sanasam Ranbir Singh
Leveraging link pattern for entity-centric exploration over Linked Data
Liang Zheng
|
Yuzhong Qu
|
Gong Cheng
SharkDB: an in-memory column-oriented storage for trajectory analysis
Bolong Zheng
|
Haozhou Wang
|
Kai Zheng
|
Han Su
|
Kuien Liu
|
Shuo Shang
A topic model for co-occurring normal documents and short texts
Yang Yang
|
Feifei Wang
|
Junni Zhang
|
Jin Xu
|
Philip S. Yu
User interest mining via tags and bidirectional interactions on Sina Weibo
Lu Deng
|
Yan Jia
|
Bin Zhou
|
Jiuming Huang
|
Yi Han
Top-K representative documents query over geo-textual data stream
Bin Wang
|
Rui Zhu
|
Xiaochun Yang
|
Guoren Wang
Spam query detection using stream clustering
Tahere Shakiba
|
Sajjad Zarifzadeh
|
Vali Derhami
2018 Volume 21 Issue 1
Editorial: Special Issue on Security and Privacy of IoT
Hua Wang
|
Zonghua Zhang
|
Tarek Taleb
Traceability and visual analytics for the Internet-of-Things (IoT) architecture
Richard K. Lomotey
|
Joseph C. Pry
|
Chenshean Chai
An infrastructure framework for privacy protection of community medical internet of things - Transmission protection, storage protection and access control
Fulong Chen
|
Yonglong Luo
|
Ji Zhang
|
Junru Zhu
|
Ziyang Zhang
|
Chuanxin Zhao
|
Taochun Wang
IIoT-SIDefender: Detecting and defense against the sensitive information leakage in industry IoT
Letian Sha
|
Fu Xiao
|
Wei Chen
|
Jing Sun
Personalized app recommendation based on app permissions
Min Peng
|
Guanyin Zeng
|
Zhaoyu Sun
|
Jiajia Huang
|
Hua Wang
|
Gang Tian
Discovering and understanding android sensor usage behaviors with data flow analysis
Xing Liu
|
Jiqiang Liu
|
Wei Wang
|
Yongzhong He
|
Xiangliang Zhang
An automatically vetting mechanism for SSL error-handling vulnerability in android hybrid Web apps
Yang Liu
|
Chaoshun Zuo
|
Zonghua Zhang
|
Shanqing Guo
|
Xin-Shun Xu
DECENT: Secure and fine-grained data access control with policy updating for constrained IoT devices
Qinlong Huang
|
Licheng Wang
|
Yixian Yang
Securely outsourcing the ciphertext-policy attribute-based encryption
Kim Thuat Nguyen
|
Nouha Oualha
|
Maryline Laurent
Trustworthy service composition with secure data transmission in sensor networks
Tao Zhang
|
Lele Zheng
|
Yongzhi Wang
|
Yulong Shen
|
Ning Xi
|
Jianfeng Ma
|
Jianming Yong
Practical chosen-message CPA attack on message blinding exponentiation algorithm and its efficient countermeasure
Hui Wang
|
Wei Guo
|
Jizeng Wei
Spoofing attacks and countermeasures in fm indoor localization system
Zi Li
|
Qingqi Pei
|
Yao Liu