Accepted Papers


  • Multi-verifier: A Novel Method for Fact Statement Verification
    Teng Wang (Renmin University of China, China)
    Qing Zhu (Renmin University of China, China)
    Shan Wang (Renmin University of China, China)
  • What Can We Get from Learning Resource Comments on Engineering Pathway
    Yunlu Zhang (Wuhan University, China)
    Wei Yu (Wuhan University, China)
    Yuchen Fu (Soochow University, China)
    Naizhou Zhang (Henan University of Economics and Law, China)
    Shijun Li (Wuhan University, China)
  • Aggregation-based Probing for Large-scale Duplicate Image Detection
    Ziming Feng (Shanghai Jiao Tong University, China)
    Jia Chen (Shanghai Jiao Tong University, China)
    Xian Wu (Shanghai Jiao Tong University, China)
    Yong Yu (Shanghai Jiao Tong University, China)
  • Design and Evaluation of Access Control Model based on Classification of Users’ Network Behaviors
    Peipeng Liu (CAS, IIE, China)
    Jinqiao Shi (CAS, IIE, China)
    Fei Xu (CAS, IIE, China)
    Lihong Wang (CAS, IIE, China)
    Li Guo (CAS, IIE, China)
  • Improving Keyphrase Extraction from Web News by Exploiting Comments Information
    Zhunchen Luo (National University of Defense Technology, China)
    Jintao Tang (National University of Defense Technology, China)
    Ting Wang (National University of Defense Technology, China)
  • Two Phase Extraction Method for Extracting Real Life Tweets using LDA
    Shuhei Yamamoto (University of Tsukuba, Japan)
    Tetsuji Satoh (University of Tsukuba, Japan)
  • Accelerating Topic Model Training on a Single Machine
    Mian Lu (A*STAR Institute of High Performance Computing, Singapore)
    Ge Bai (Hong Kong University of Science and Technology)
    Qiong Luo (Hong Kong University of Science and Technology)
    Jie Tang (Tsinghua University, China)
    Jiuxin Zhao (Hong Kong University of Science and Technology)
  • GPU-Accelerated Bidirected De Bruijn Graph Construction for Genome Assembly
    Mian Lu (A*STAR Institute of High Performance Computing, Singapore)
    Qiong Luo (Hong Kong University of Science and Technology)
    Bingqiang Wang (BGI-Shenzhen, China)
    Junkai Wu (Hong Kong University of Science and Technology)
    Jiuxin Zhao (Hong Kong University of Science and Technology)
  • A Probabilistic Model for Diversifying Recommendation Lists
    Yutaka Kabutoya (NTT Corporation, Japan)
    Tomoharu Iwata (NTT Corporation, Japan)
    Hiroyuki Toda (NTT Corporation, Japan)
    Hiroyuki Kitagawa (University of Tsukuba, Japan)
  • The Consistency and Absolute Consistency Problems of XML Schema Mappings between Restricted DTDs
    Hayato Kuwada (Osaka University, Japan)
    Kenji Hashimoto (Nara Institute of Science and Technology, Japan)
    Yasunori Ishihara (Osaka University, Japan)
    Toru Fujiwara (Osaka University, Japan)
  • Visually Extracting Data Records from Query Result Pages
    Neil Anderson (Queen’s University Belfast, UK)
    Jun Hong (Queen’s University Belfast, UK)
  • Correlation Mining in Graph Databases with a New Measure
    Md. Samiullah (University of Dhaka, Bangladesh)
    Chowdhury Farhan Ahmed (University of Dhaka, Bangladesh)
    Manziba Akanda Nishi (University of Dhaka, Bangladesh)
    Anna Fariha (University of Dhaka, Bangladesh)
    S M Abdullah (United International University, Bangladesh)
    Md. Rafiqul Islam (Charles Sturt University, Australia)
  • Finding Diverse Friends in Social Networks
    Syed Khairuzzaman Tanbeer (University of Manitoba, Canada)
    Carson Kai-Sang Leung (University of Manitoba, Canada)
  • Efficient Location-dependent Skyline Retrieval with Peer-to-Peer Sharing
    Yingyuan Xiao (Tianjin University of Technology, China)
    Yan Shen (Tianjin University of Technology, China)
    Hongya Wang (Donghua University, China)
    Xiaoye Wang (Tianjin University of Technology, China)
  • Linked Data Informativeness
    Rouzbeh Meymandpour (The University of Sydney, Australia)
    Joseph G. Davis (The University of Sydney, Australia)
  • Collusion Detection in Online Rating Systems
    Mohammad Allahbakhsh (The University of New South Wales, Australia)
    Aleksandar Ignjatovic (The University of New South Wales, Australia)
    Boualem Benatallah (The University of New South Wales, Australia)
    Seyed-Mehdi-Reza Beheshti (The University of New South Wales, Australia)
    Elisa Bertino (Purdue University, USA)
    Norman Foo (The University of New South Wales, Australia)
  • Harnessing the Wisdom of Crowds for Corpus Annotation through CAPTCHA
    Yini Cao (Renmin University of China, China)
    Xuan Zhou (Renmin University of China, China)
  • Identification of Sybil Communities Generating Context-Aware Spam on Online Social Networks
    Faraz Ahmed (King Saud University, Saudi Arabia)
    Muhammad Abulaish (King Saud University, Saudi Arabia)
  • Multi-QoS Effective Prediction in Web Service Selection
    Zhongjun Liang (State Key Laboratory of Networking and Switching Technology)
    Hua Zou (State Key Laboratory of Networking and Switching Technology)
    Jing Guo (Beijing University of Posts and Telecommunications, China)
    Fangchun Yang (State Key Laboratory of Networking and Switching Technology)
    Rongheng Lin (State Key Laboratory of Networking and Switching Technology)
  • Leveraging Visual Features and Hierarchical Dependencies for Conference Information Extraction
    Yue You (Shanghai Jiao Tong University, China, Victoria University, Australia)
    Guandong Xu (University of Technology Sydney, Australia)
    Jian Cao (Shanghai Jiao Tong University, China)
    Yanchun Zhang (Victoria University, Australia, University of Chinese Academy of Sciences, China)
    Guangyan Huang (Victoria University, Australia)
  • Measuring Strength of Ties in Social Network
    Dakui Sheng (Peking University, China)
    Tao Sun (Peking University, China)
    Sheng Wang (Peking University, China)
    Ziqi Wang (Peking University, China)
    Ming Zhang (Peking University, China)
  • Preservation of Proximity Privacy in Publishing Categorical Sensitive Data
    Yujia Li (Fudan University, China)
    Xianmang He (NingBo University, China)
    Wei Wang (Fudan University, China)
    Huahui Chen (NingBo University, China)
    Zhihui Wang (Fudan University, China)
  • MisDis: an Efficent Misbehavior Discovering Method Based on Accountability and State Machine in VANET
    Tao Yang (Peking University, China)
    Wei Xin (Peking University, China)
    Liangwen Yu (Peking University, China)
    Yong Yang (Beijing Jiaotong University,
 China)
    Jianbin Hu (Peking University, China)
    Zhong Chen (Peking University, China)
  • A Probabilistic Data Replacement Strategy for Flash-based Hybrid Storage System
    Yanfei Lv (Peking University, China)
    Xuexuan Chen (Peking University, China)
    Guangyu Sun (Peking University, China)
    Bin Cui (Peking University, China)
  • Detecting Event Rumors on Sina Weibo Automatically
    Shengyun Sun (Renmin University of China, China)
    Hongyan Liu (Tsinghua University, China)
    Jun He (Renmin University of China, China)
    Xiaoyong Du (Renmin University of China, China)
  • K Hops Frequent Subgraphs Mining for Large Attribute Graph
    Haiwei Zhang (Nankai University, China)
    Simeng Jin (Nankai University, China)
    Xiangyu Hu (Nankai University, China)
    Ying Zhang (Nankai University, China)
    Yanlong Wen (Nankai University, China)
    Xiaojie Yuan (Nankai University, China)
  • Privacy Preserving Graph Publication in A Distributed Environment
    Mingxuan Yuan (Huawei Noah Ark Lab, The Hong Kong University of Science & Technology)
    Lei Chen (The Hong Kong University of Science & Technology)
    Philip S. Yu (University of Illinois at Chicago)
    Hong Mei (Peking University, China)
  • Credibility-based Twitter Social Network Analysis
    Jebrin Al-Sharawneh (University of Technology Sydney, Australia)
    Suku Sinnappan (Swinburne University, Australia)
    Mary-Anne Williams (University of Technology Sydney, Australia)
  • Tuned X-HYBRIDJOIN for Near-Real-Time Data Warehousing
    M. Asif Naeem (Auckland University of Technology, New Zealand)
  • A Scalable Approach for LRT Computation in GPGPU Environments
    Linsey Xiaolin Pang (University of Sydney, NICTA, Australia)
    Sanjay Chawla (University of Sydney, Australia )
    Bernhard Scholz (University of Sydney, Australia )
    Georgina Wilcox (University of Sydney, Australia )
  • User Interest Based Complex Web Information Visualization
    Shibli Saleheen (Swinburne University of Technology, Australia)
    Wei Lai (Swinburne University of Technology, Australia)
  • Location-based Emerging Event Detection in Social Networks
    Sayan Unankard (The University of Queensland, Australia)
    Xue Li (The University of Queensland, Australia)
    Mohamed A. Sharaf (The University of Queensland, Australia)
  • An Approach to Retrieving Similar Source Codes by Control Structure and Method Identifiers
    Yoshihisa Udagawa (Tokyo Polytechnic University, Japan)
  • FIMO: A Novel WiFi Localization Method
    Yao Zhou (East China Normal University, China)
    Leilei Jin (East China Normal University, China)
    Cheqing Jin (East China Normal University, China)
    Aoying Zhou (East China Normal University, China)
  • A Framework for OLAP in Column-store Database: One-pass Join and Pushing the Materialization to the End
    Yuean Zhu (Renmin University of China, China)
    Yansong Zhang (Renmin University of China, China)
    Xuan Zhou (Renmin University of China, China)
    Shan Wang (Renmin University of China, China)
  • An Influence Strength Measurement Via Time-Aware Probabilistic Generative Model for Microblogs
    Zhaoyun Ding (National University of Defense Technology, China)
    Yan Jia (National University of Defense Technology, China)
    Bin Zhou (National University of Defense Technology, China)
    Jianfeng Zhang (National University of Defense Technology, China)
    Yi Han (National University of Defense Technology, China)
    Chunfeng Yu (National University of Defense Technology, China)
  • An Algorithm for Outlier Detection on Uncertain Data Stream
    Keyan Cao (Northeastern University, China)
    Donghong Han (Northeastern University, China)
    Guoren Wang (Northeastern University, China)
    Yachao Hu (Northeastern University, China)
    Ye Yuan (Northeastern University, China)
  • A Two-Layer Multi-Dimensional Trustworthiness Metric for Web Service Composition
    Han Jiao (University of South Australia, Australia)
    Jixue Liu (University of South Australia, Australia)
    Jiuyong Li (University of South Australia, Australia)
    Chengfei Liu (University of Technology, Australia)
  • An Active Service Reselection Triggering Mechanism
    Ying Yin (Northeastern University, China)
    Tiancheng Zhang (Northeastern University, China)
    Bin Zhang (Northeastern University, China)
    Gang Sheng (Northeastern University, China)
    Yuhai Zhao (Northeastern University, China)
    Ming Li (Northeastern University, China)
  • Uncertain Subgraph Query Processing over Uncertain Graphs
    Wenjing Ruan (Tsinghua University, China)
    Chaokun Wang (Chinese Academy of Sciences, Tsinghua University, China)
    Lu Han (Tsinghua University, China)
    Zhuo Peng (Tsinghua University, China)
    Yiyuan Bai (Tsinghua University, China)
  • A New Similarity Measure Based on Preference Sequences for Collaborative Filtering
    Tianfeng Shang (Chinese Academy of Sciences, China)
    Qing He (Chinese Academy of Sciences, China)
    Fuzhen Zhuang (Chinese Academy of Sciences, China)
    Zhongzhi Shi (Chinese Academy of Sciences, China)
  • A Novel Approach to Large-scale Services Composition
    Hongbing Wang (Southeast University, China)
    Xiaojun Wang (Southeast University, China)
  • Identifying Semantic-related Search Tasks in Query Log
    Shuai Gong (Chinese Academy of Sciences, China)
    Jinhua Xiong (Chinese Academy of Sciences, China)
    Cheng Zhang (Chinese Academy of Sciences, China)
    Zhiyong Liu (State Key Laboratory of Computer Architecture, CAS, China)
  • Linking Entities in Unstructured Texts with RDF Knowledge Bases
    Fang Du (Renmin University of China, Ningxia University, China)
    Yueguo Chen (Renmin University of China, China)
    Xiaoyong Du (Renmin University of China, China)
  • An Efficient Privacy-preserving RFID Ownership Transfer Protocol
    Wei Xin (Peking University, China)
    Zhi Guan (Peking University, China)
    Tao Yang (Peking University, China)
    Huiping Sun (Peking University, China)
    Zhong Chen (Peking University, China)
  • Fractal Based Anomaly Detection over Data Streams
    Xueqing Gong (East China Normal University, China)
    Weining Qian (East China Normal University, China)
    Shouke Qin (Baidu Inc., China)
    Aoying Zhou (East China Normal University, China)
  • An Integrated Approach for Large-scale Relation Extraction from the Web
    Naimdjon Takhirov (Norwegian University of Science and Technology, Norway)
    Fabien Duchateau (Université Lyon 1, France)
    Trond Aalberg (Norwegian University of Science and Technology, Norway)
    Ingeborg Sølvberg (Norwegian University of Science and Technology, Norway)
  • Social Network User Influence Dynamics Prediction
    Jingxuan Li (Florida International University, USA)
    Wei Peng (Xerox Corporation)
    Tao Li (Florida International University, USA)
    Tong Sun (Xerox Corporation)
  • Improved Parallel Processing of Massive De Bruijn Graph for Genome Assembly
    Li Zeng (Chinese Academy of Sciences, China)
    Jiefeng Cheng (Chinese Academy of Sciences, China)
    Jintao Meng (Chinese Academy of Sciences, China)
    Bingqiang Wang (Beijing Genomics Institute, China)
    Shengzhong Feng (Chinese Academy of Sciences, China)
  • B3Clustering: identifying protein complexes from protein-protein interaction network
    Eunjung Chin (University of Queensland, Australia)
    Jia Zhu (University of Queensland, Australia)
  • Complementary Information for Wikipedia by Comparing Multilingual Articles
    Yuya Fujiwara (Konan University, Japan)
    Yu Suzuki (Nagoya University, Japan)
    Yukio Konishi (Konan University, Japan)
    Akiyo Nadamoto (Konan University, Japan)
  • Improved Spatial Keyword Search Based on IDF Approximation
    Xiaoling Zhou (University of New South Wales, Australia)
    Yifei Lu (University of New South Wales, Australia)
    Yifang Sun (University of New South Wales, Australia)
    Muhammad Cheema (University of New South Wales, Australia)
  • Exploiting Interaction Features in User Intent Understanding
    Vincenzo Deufemia (Università di Salerno, Italy)
    Massimiliano Giordano (Università di Salerno, Italy)
    Giuseppe Polese (Università di Salerno, Italy)
    Luigi Marco Simonetti (Università di Salerno, Italy)
  • A Recommender System Model Combining Trust with Topic Maps
    Zukun Yu (Zhejiang University, China)
    William Wei Song (Dalarna University, Sweden)
    Xiaolin Zheng (Zhejiang University, China)
    Deren Chen (Zhejiang University, China)
  • ASAWA: An Automatic Partition Key Selection Strategy
    Xiaoyan Wang (Renmin University of China, Ludong University, MOE, China)
    Jinchuan Chen (MOE, China)
    Xiaoyong Du (Renmin University of China, MOE, China)
  • A Simple XSLT Processor for Distributed XML
    Hiroki Mizumoto (University of Tsukuba, Japan)
    Nobutaka Suzuki (University of Tsukuba, Japan)
  • Ontology Usage Network Analysis Framework
    Jamshaid Ashraf (Curtin University, Australia)
    Omar Khadeer Hussain (Curtin University, Australia)
  • Energy Efficiency in W-Grid Data-Centric Sensor Networks via Workload Balancing
    Alfredo Cuzzocrea (ICAR-CNR and University of Calabria, Italy)
    Gianluca Moro (University of Bologna, Italy)
    Claudio Sartori (University of Bologna, Italy)
  • Update Semantics for Interoperability among XML, RDF and RDB
    Muhammad Intizar Ali (DERI, National University of Ireland, Ireland)
    Nuno Lopes (DERI, National University of Ireland, Ireland)
    Owen Friel (CISCO Systems, Ireland)
    Alessandra Mileo (DERI, National University of Ireland, Ireland)
  • S2MART: Smart Sql to Map-Reduce Translators
    Narayan Gowraj (Anna University, India)
    Prasanna Venkatesh Ravi (Anna University, India)
    Mouniga V (Anna University, India)
    M. R.Sumalatha (Anna University, India)
  • A Self-healing Framework for QoS-aware Web Service Composition via Case-based Reasoning
    Guoqiang Li (Beijing Institute of Technology & Linyi University, China)
    Lejian Liao (Beijing Institute of Technology, China)
    Dandan Song (Beijing Institute of Technology, China)
    Jingang Wang (Beijing Institute of Technology, China)
    Fuzhen Sun (Beijing Institute of Technology, China)
    Guangcheng Liang (Beijing Institute of Technology, China)