16
Lecture Notes in Computer Science 6184 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Alfred Kobsa University of California, Irvine, CA, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen TU Dortmund University, Germany Madhu Sudan Microsoft Research, Cambridge, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max-Planck Institute of Computer Science, Saarbruecken, Germany

Lecture Notes in Computer Science 6184 - scu.edu.cn

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Lecture Notes in Computer Science 6184 - scu.edu.cn

Lecture Notes in Computer Science 6184Commenced Publication in 1973Founding and Former Series Editors:Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen

Editorial Board

David HutchisonLancaster University, UK

Takeo KanadeCarnegie Mellon University, Pittsburgh, PA, USA

Josef KittlerUniversity of Surrey, Guildford, UK

Jon M. KleinbergCornell University, Ithaca, NY, USA

Alfred KobsaUniversity of California, Irvine, CA, USA

Friedemann MatternETH Zurich, Switzerland

John C. MitchellStanford University, CA, USA

Moni NaorWeizmann Institute of Science, Rehovot, Israel

Oscar NierstraszUniversity of Bern, Switzerland

C. Pandu RanganIndian Institute of Technology, Madras, India

Bernhard SteffenTU Dortmund University, Germany

Madhu SudanMicrosoft Research, Cambridge, MA, USA

Demetri TerzopoulosUniversity of California, Los Angeles, CA, USA

Doug TygarUniversity of California, Berkeley, CA, USA

Gerhard WeikumMax-Planck Institute of Computer Science, Saarbruecken, Germany

Page 2: Lecture Notes in Computer Science 6184 - scu.edu.cn

Lei Chen Changjie Tang Jun YangYunjun Gao (Eds.)

Web-AgeInformation Management11th International Conference, WAIM 2010Jiuzhaigou, China, July 15-17, 2010Proceedings

13

Page 3: Lecture Notes in Computer Science 6184 - scu.edu.cn

Volume Editors

Lei ChenHong Kong University of Science and TechnologyDepartment of Computer ScienceClear Water Bay, Kowloon, Hong Kong, ChinaE-mail: [email protected]

Changjie TangSichuan University, Computer DepartmentChengdu 610064, ChinaE-mail: [email protected]

Jun YangDuke University, Department of Computer ScienceBox 90129, Durham, NC 27708-0129, USAE-mail: [email protected]

Yunjun GaoZhejiang University, College of Computer Science388 Yuhangtang Road, Hangzhou 310058, ChinaE-mail: [email protected]

Library of Congress Control Number: 2010929625

CR Subject Classification (1998): H.3, H.4, I.2, C.2, H.2, H.5

LNCS Sublibrary: SL 3 – Information Systems and Application, incl. Internet/Weband HCI

ISSN 0302-9743ISBN-10 3-642-14245-1 Springer Berlin Heidelberg New YorkISBN-13 978-3-642-14245-1 Springer Berlin Heidelberg New York

This work is subject to copyright. All rights are reserved, whether the whole or part of the material isconcerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting,reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publicationor parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965,in its current version, and permission for use must always be obtained from Springer. Violations are liableto prosecution under the German Copyright Law.

springer.com

© Springer-Verlag Berlin Heidelberg 2010Printed in Germany

Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, IndiaPrinted on acid-free paper 06/3180

Page 4: Lecture Notes in Computer Science 6184 - scu.edu.cn

Preface

WAIM is a leading international conference on research, development, and applica-tions of Web technologies, database systems, and information management. Tradi-tionally, WAIM has drawn the strongest participation from the Asia-Pacific region. The previous WAIM conferences were held in Shanghai (2000), Xi'an (2001), Beijing (2002), Chengdu (2003), Dalian (2004), Hangzhou (2005), Hong Kong (2006), Huangshan (2007), Zhangjiajie (2008), and Suzhou (2009). In 2010, WAIM was held in Jiuzhaigou, Sichuan, China.

This high-quality program would not have been possible without the authors who chose WAIM for disseminating their contributions. Out of 205 submissions from 16 countries and regions, including Australia, Canada, France, Germany, Hong Kong, Japan, Korea, Macau, Malaysia, Mainland China, Saudi Arabia, Singapore, Taiwan, Thailand, UK, and USA, we selected 58 full papers and 11 short papers for publica-tion. The acceptance rate for regular full papers was 28%. The contributed papers addressed a wide range of topics such as Web, XML, and multimedia data, data proc-essing in the cloud or on new hardware, data mining and knowledge discovery, infor-mation integration and extraction, networked data and social networks, graph and stream processing, similarity search, etc. We are also grateful to our distinguished keynote speakers Prof. Jianzhong Li, Dr. Divesh Srivastava, Prof. Katsumi Tanaka, and Prof. Xiaofang Zhou.

A conference like WAIM can only succeed as a team effort. We want to thank the Program Committee members and the reviewers for their invaluable efforts. Special thanks go to the local Organizing Committee headed by Changjie Tang, Aoying Zhou, and Lei Duan. Many thanks also go to our Workshop Co-chairs (Jian Pei and Hengtao Shen), Tutorial Co-chairs (Liu Wenyin and Jian Yang), Publicity Co-chairs (Hua Wang and Shuigeng Zhou), Industrial Chairs (Qiming Chen and Haixun Wang), Reg-istration Chair (Chuan Li), and Finance Co-chairs (Howard Leung and Yu Chen). Last but not least, we wish to express our gratitude for the hard work of our webmaster Jie Zuo, and for our sponsors who generously supported the smooth running of our conference.

Lei Chen

Changjie Tang Jun Yang

Masaru Kitsuregawa Qing Li

Page 5: Lecture Notes in Computer Science 6184 - scu.edu.cn

WAIM 2010 Conference Organization

Honorary Chair

Yi Zhang Sichuan University, China

Conference Co-chairs

Masaru Kitsuregawa University of Tokyo, Japan Qing Li City University of Hong Kong, Hong Kong

Program Committee Co-chairs

Lei Chen Hong Kong University of Science and Technology, Hong Kong

Changjie Tang Sichuan University, China Jun Yang Duke University, USA

Local Organization Co-chairs

Aoying Zhou East China Normal University, China Lei Duan Sichuan University, China

Workshops Co-chairs

Jian Pei Simon Fraser University, Canada Hengtao Shen University of Queensland, Australia

Tutorial/Panel Co-chairs

Wenyin Liu City University of Hong Kong, Hong Kong Jian Yang Macquarie University, Australia

Industrial Co-chairs

Qiming Chen HP Labs, Palo Alto, USA Haixun Wang Microsoft Research Asia, China

Page 6: Lecture Notes in Computer Science 6184 - scu.edu.cn

Organization VIII

Publication Chair

Yunjun Gao Zhejiang University, China

Publicity Co-chairs

Hua Wang University of Southern Queensland, Australia Shuigeng Zhou Fudan University, China

Finance Co-chairs

Howard Leung Hong Kong Web Society, Hong Kong Yu Chen Sichuan University, China

Registration Chair

Chuan Li Sichuan University, China

CCF DB Society Liaison

Xiaofeng Meng Renmin University of China, China

Steering Committee Liaison

Zhiyong Peng Wuhan University, China

Web Master

Jie Zuo Sichuan University, China

Program Committee

James Bailey University of Melbourne, Australia Gang Chen Zhejiang University, China Hong Chen Chinese Univeristy of Hong Kong, Hong Kong Yu Chen Sichuan University, China Reynold Cheng The University of Hong Kong, Hong Kong David Cheung The University of Hong Kong, Hong kong Dickson Chiu Dickson Computer Systems, Hong Kong Byron Choi Hong Kong Baptist University, Hong Kong Bin Cui Peking University, China Alfredo Cuzzocrea University of Calabria, Italy

Page 7: Lecture Notes in Computer Science 6184 - scu.edu.cn

Organization IX

Guozhu Dong Wright State University, USA Xiaoyong Du Renmin University of China, China Lei Duan Sichuan University, China Ling Feng Tsinghua University, China Johann Gamper Free University of Bozen-Bolzano, Italy Bryon Gao Texas State University at San Marcos, USA Yong Gao Univeristy of British Columbia, Canada Jihong Guan Tongji University, China Giovanna Guerrini Università di Genova, Italy Bingsheng He Chinese Univeristy of Hong Kong, Hong Kong Jimmy Huang York Univeristy, Canada Seung-won Hwang Pohang University of Science and Technology,

Korea Wee Hyong Microsoft Yoshiharu Ishikawa Nagoya University, Japan Yan Jia National University of Defence Technology, China Ruoming Jin Kent State University, USA Ning Jing National University of Defence Technology, China Ben Kao The University of Hong Kong, Hong Kong Yong Kim Korea Education & Research Information Service,

Korea Nick Koudas Univeristy of Toronto, Canada Wu Kui Victoria University, Canada Carson Leung University of Manitoba, Canada Chengkai Li University of Texas at Arlington, USA Chuan Li Sichuan University, China Feifei Li Florida State University, USA Tao Li Florida International University, USA Tianrui Li Southwest Jiaotong University, China Zhanhuai Li Northwestern Polytechnical University, China Zhoujun Li Beihang University, China Xiang Lian Hong Kong University of Science and Technology,

Hong Kong Lipeow Lim University of Hawaii at Manoa, USA Xuemin Lin University of New South Wales, Australia Huan Liu Arizona State University, USA Lianfang Liu Computing Center of Guangxi, China Qizhi Liu Nanjing University, China Weiyi Liu Yunnan University, China Wenyin Liu City Univeristy of Hong Kong Eric Lo Hong Kong Polytechnic University, Hong Kong Zongmin Ma Northeastern University, China Weiyi Meng State University of New York at Binghamton, USA Mohamed Mokbel University of Minnesota, USA Yang-Sae Moon Kangwon National University, Korea Akiyo Nadamoto Konan University, Japan Miyuki Nakano University of Tokyo, Japan

Page 8: Lecture Notes in Computer Science 6184 - scu.edu.cn

Organization X

Raymond Ng University of British Columbia, Canada Anne Ngu Texas State University at San Marcos, USA Tadashi Ohmori University of Electro Communications, Japan Olga Papaemmanouil Brandeis University, USA Zhiyong Peng Wuhan University, China Evaggelia Pitoura University of Ioannina, Greece Tieyun Qian Wuhan University, China Shaojie Qiao Southwest Jiaotong University, China Markus Schneider University of Florida, USA Hengtao Shen University of Queensland, Australia Yong Tang Sun Yat-sen University, China David Taniar Monash University, Australia Maguelonne Teisseire University Montpellier 2, France Anthony Tung National University of Singapore, Singapore Shunsuke Uemura Nara Sangyo University, Japan Jianyong Wang Tsinghua University, China Ke Wang Simon Fraser University, Canada Tengjiao Wang Peking University, China Wei Wang University of New South Wales, Australia Raymond Wong University of New South Wales, Australia Raymond Chi-Wing Wong Hong Kong University of Science and Technology,

Hong Kong Xintao Wu University of North Carolina at Charlotte, USA Yuqing Wu Indiana University at Bloomington, USA Junyi Xie Oracle Corp., USA Li Xiong Emory University, USA Jianliang Xu Hong Kong Baptist University, Hong Kong Jian Yang Macquaire University, Australia Xiaochun Yang Northeastern University, China Ke Yi Hong Kong University of Science and Technology,

Hong Kong Hwanjo Yu Pohang University of Science and Technology,

Korea Jeffrey Yu Chinese Univeristy of Hong Kong, Hong Kong Lei Yu State University of New York at Binghamton, USA Philip Yu University of Illinois at Chicago, USA Ting Yu North Carolina State University, USA Xiaohui Yu York University, Canada Demetris Zeinalipour University of Cyprus, Cyprus Donghui Zhang Microsoft Jim Gray Systems Lab, USA Ji Zhang University of Southern Queensland, Australia Baihua Zheng Singapore Management University, Singapore Aoying Zhou East China Normal University, China Shuigeng Zhou Fudan University, China Xiangmin Zhou CSIRO, Australia Qiang Zhu University of Michigan at Dearborn, USA Lei Zou Peking University, China

Page 9: Lecture Notes in Computer Science 6184 - scu.edu.cn

Organization XI

Organized by

Sichuan University

Sponsored by

华东师范大学

EAST CHINA NORMAL UNIVERSITY

Page 10: Lecture Notes in Computer Science 6184 - scu.edu.cn

Table of Contents

Analyzing Data Quality Using Data Auditor (Keynote Abstract) . . . . . . . 1Divesh Srivastava

Rebuilding the World from Views (Keynote Abstract) . . . . . . . . . . . . . . . . 2Xiaofang Zhou and Henning Kohler

Approximate Query Processing in Sensor Networks(Keynote Abstract) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

Jianzhong Li

Web Data I

Duplicate Identification in Deep Web Data Integration . . . . . . . . . . . . . . . . 5Wei Liu, Xiaofeng Meng, Jianwu Yang, and Jianguo Xiao

Learning to Detect Web Spam by Genetic Programming . . . . . . . . . . . . . . 18Xiaofei Niu, Jun Ma, Qiang He, Shuaiqiang Wang, andDongmei Zhang

Semantic Annotation of Web Objects Using Constrained ConditionalRandom Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

Yongquan Dong, Qingzhong Li, Yongqing Zheng, Xiaoyang Xu, andYongxin Zhang

Time Graph Pattern Mining for Web Analysis and InformationRetrieval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40

Taihei Oshino, Yasuhito Asano, and Masatoshi Yoshikawa

Networked Data

FISH: A Novel Peer-to-Peer Overlay Network Based onHyper-deBruijn . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47

Ye Yuan, Guoren Wang, and Yongjiao Sun

Continuous Summarization of Co-evolving Data in Large WaterDistribution Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62

Hongmei Xiao, Xiuli Ma, Shiwei Tang, and Chunhua Tian

Proactive Replication and Search for Rare Objects in UnstructuredPeer-to-Peer Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74

Guoqiang Gao, Ruixuan Li, Kunmei Wen, Xiwu Gu, andZhengding Lu

Page 11: Lecture Notes in Computer Science 6184 - scu.edu.cn

XIV Table of Contents

SWORDS: Improving Sensor Networks Immunity under WormAttacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86

Nike Gui, Ennan Zhai, Jianbin Hu, and Zhong Chen

Efficient Multiple Objects-Oriented Event Detection over RFID DataStreams . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97

Shanglian Peng, Zhanhuai Li, Qiang Li, Qun Chen, Hailong Liu,Yanming Nie, and Wei Pan

Social Networks

CW2I: Community Data Indexing for Complex Query Processing . . . . . . 103Mei Hui, Panagiotis Karras, and Beng Chin Ooi

Clustering Coefficient Queries on Massive Dynamic Social Networks . . . . 115Zhiyu Liu, Chen Wang, Qiong Zou, and Huayong Wang

Predicting Best Answerers for New Questions in Community QuestionAnswering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127

Mingrong Liu, Yicen Liu, and Qing Yang

Semantic Grounding of Hybridization for Tag Recommendation . . . . . . . . 139Yan’an Jin, Ruixuan Li, Yi Cai, Qing Li, Ali Daud, and Yuhua Li

Rich Ontology Extraction and Wikipedia Expansion Using LanguageResources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151

Christian Schonberg, Helmuth Pree, and Burkhard Freitag

Cloud Computing

Fine-Grained Cloud DB Damage Examination Based on BloomFilters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157

Min Zhang, Ke Cai, and Dengguo Feng

XML Structural Similarity Search Using MapReduce . . . . . . . . . . . . . . . . . 169Peisen Yuan, Chaofeng Sha, Xiaoling Wang, Bin Yang,Aoying Zhou, and Su Yang

Comparing Hadoop and Fat-Btree Based Access Method for Small FileI/O Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182

Min Luo and Haruo Yokota

Data Mining I

Mining Contrast Inequalities in Numeric Dataset . . . . . . . . . . . . . . . . . . . . . 194Lei Duan, Jie Zuo, Tianqing Zhang, Jing Peng, and Jie Gong

Page 12: Lecture Notes in Computer Science 6184 - scu.edu.cn

Table of Contents XV

Users’ Book-Loan Behaviors Analysis and Knowledge DependencyMining . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206

Fei Yan, Ming Zhang, Jian Tang, Tao Sun, Zhihong Deng, andLong Xiao

An Extended Predictive Model Markup Language for Data Mining . . . . . 218Xiaodong Zhu and Jianzheng Yang

A Cross-Media Method of Stakeholder Extraction for News ContentsAnalysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232

Ling Xu, Qiang Ma, and Masatoshi Yoshikawa

Stream Processing

An Efficient Approach for Mining Segment-Wise Intervention Rules inTime-Series Streams . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238

Yue Wang, Jie Zuo, Ning Yang, Lei Duan, Hong-Jun Li, andJun Zhu

Automated Recognition of Sequential Patterns in Captured MotionStreams . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250

Liqun Deng, Howard Leung, Naijie Gu, and Yang Yang

Online Pattern Aggregation over RFID Data Streams . . . . . . . . . . . . . . . . 262Hailong Liu, Zhanhuai Li, Qun Chen, and Shanglian Peng

Cleaning Uncertain Streams by Parallelized Probabilistic GraphicalModels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274

Qian Zhang, Shan Wang, and Biao Qin

Graph Processing

Taming Computational Complexity: Efficient and Parallel SimRankOptimizations on Undirected Graphs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280

Weiren Yu, Xuemin Lin, and Jiajin Le

DSI: A Method for Indexing Large Graphs Using Distance Set . . . . . . . . . 297Yubo Kou, Yukun Li, and Xiaofeng Meng

K-Radius Subgraph Comparison for RDF Data Cleansing . . . . . . . . . . . . . 309Hai Jin, Li Huang, and Pingpeng Yuan

Query Processing

A Novel Framework for Processing Continuous Queries on MovingObjects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321

Liang Zhao, Ning Jing, Luo Chen, and Zhinong Zhong

Page 13: Lecture Notes in Computer Science 6184 - scu.edu.cn

XVI Table of Contents

Group Visible Nearest Neighbor Queries in Spatial Databases . . . . . . . . . 333Hu Xu, Zhicheng Li, Yansheng Lu, Ke Deng, and Xiaofang Zhou

iPoc: A Polar Coordinate Based Indexing Method for Nearest NeighborSearch in High Dimensional Space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345

Zhang Liu, Chaokun Wang, Peng Zou, Wei Zheng, andJianmin Wang

Join Directly on Heavy-Weight Compressed Data in Column-OrientedDatabase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357

Gan Liang, Li RunHeng, Jia Yan, and Jin Xin

Potpourri

Exploiting Service Context for Web Service Search Engine . . . . . . . . . . . . 363Rong Zhang, Koji Zettsu, Yutaka Kidawara, and Yasushi Kiyoki

Building Business Intelligence Applications Having Prescriptive andPredictive Capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376

Chen Jiang, David L. Jensen, Heng Cao, and Tarun Kumar

FileSearchCube: A File Grouping Tool Combining Multiple Types ofInterfile-Relationships . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 386

Yousuke Watanabe, Kenichi Otagiri, and Haruo Yokota

Trustworthy Information: Concepts and Mechanisms . . . . . . . . . . . . . . . . . 398Shouhuai Xu, Haifeng Qian, Fengying Wang, Zhenxin Zhan,Elisa Bertino, and Ravi Sandhu

Web Data II

How to Design Kansei Retrieval Systems? . . . . . . . . . . . . . . . . . . . . . . . . . . . 405Yaokai Feng and Seiichi Uchida

Detecting Hot Events from Web Search Logs . . . . . . . . . . . . . . . . . . . . . . . . 417Yingqin Gu, Jianwei Cui, Hongyan Liu, Xuan Jiang, Jun He,Xiaoyong Du, and Zhixu Li

Evaluating Truthfulness of Modifiers Attached to Web Entity Names . . . 429Ryohei Takahashi, Satoshi Oyama, Hiroaki Ohshima, andKatsumi Tanaka

Searching the Web for Alternative Answers to Questions on WebQASites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 441

Natsuki Takata, Hiroaki Ohshima, Satoshi Oyama, andKatsumi Tanaka

Domain-Independent Classification for Deep Web Interfaces . . . . . . . . . . . 453Yingjun Li, Siwei Wang, Derong Shen, Tiezheng Nie, and Ge Yu

Page 14: Lecture Notes in Computer Science 6184 - scu.edu.cn

Table of Contents XVII

Data Mining II

Data Selection for Exact Value Acquisition to Improve UncertainClustering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459

Yu-Chieh Lin, De-Nian Yang, and Ming-Syan Chen

Exploring the Sentiment Strength of User Reviews . . . . . . . . . . . . . . . . . . . 471Yao Lu, Xiangfei Kong, Xiaojun Quan, Wenyin Liu, and Yinlong Xu

Semantic Entity Detection by Integrating CRF and SVM . . . . . . . . . . . . . 483Peng Cai, Hangzai Luo, and Aoying Zhou

An Incremental Method for Causal Network Construction . . . . . . . . . . . . . 495Hiroshi Ishii, Qiang Ma, and Masatoshi Yoshikawa

DCUBE: CUBE on Dirty Databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 507Guohua Jiang, Hongzhi Wang, Shouxu Jiang, Jianzhong Li, andHong Gao

XML and Images

An Algorithm for Incremental Maintenance of Materialized XPathView . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 513

Xueyun Jin and Husheng Liao

Query Processing in INM Database System . . . . . . . . . . . . . . . . . . . . . . . . . 525Jie Hu, Qingchuan Fu, and Mengchi Liu

Fragile Watermarking for Color Image Recovery Based on Color FilterArray Interpolation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 537

Zhenxing Qian, Guorui Feng, and Yanli Ren

A Hybrid-Feature-Based Efficient Retrieval over Chinese CalligraphicManuscript Image Repository . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 544

Yi Zhuang and Chengxiang Yuan

Efficient Filtering of XML Documents with XPath ExpressionsContaining Ancestor Axis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 551

Bo Ning, Chengfei Liu, and Guoren Wang

New Hardware

ACAR: An Adaptive Cost Aware Cache Replacement Approach forFlash Memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 558

Yanfei Lv, Xuexuan Chen, and Bin Cui

GPU-Accelerated Predicate Evaluation on Column Store . . . . . . . . . . . . . . 570Ren Wu, Bin Zhang, Meichun Hsu, and Qiming Chen

Page 15: Lecture Notes in Computer Science 6184 - scu.edu.cn

XVIII Table of Contents

MOSS-DB: A Hardware-Aware OLAP Database . . . . . . . . . . . . . . . . . . . . . 582Yansong Zhang, Wei Hu, and Shan Wang

Similarity Search

Efficient Duplicate Record Detection Based on Similarity Estimation . . . 595Mohan Li, Hongzhi Wang, Jianzhong Li, and Hong Gao

A Novel Composite Kernel for Finding Similar Questions in CQAServices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 608

Jun Wang, Zhoujun Li, Xia Hu, and Biyun Hu

Efficient Similarity Query in RFID Trajectory Databases . . . . . . . . . . . . . . 620Yanqiu Wang, Ge Yu, Yu Gu, Dejun Yue, and Tiancheng Zhang

Information Extraction

Context-Aware Basic Level Concepts Detection in Folksonomies . . . . . . . 632Wen-hao Chen, Yi Cai, Ho-fung Leung, and Qing Li

Extracting 5W1H Event Semantic Elements from Chinese OnlineNews . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 644

Wei Wang, Dongyan Zhao, Lei Zou, Dong Wang, and Weiguo Zheng

Automatic Domain Terminology Extraction Using Graph MutualReinforcement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 656

Jingjing Kang, Xiaoyong Du, Tao Liu, and He Hu

Knowledge Discovery

Semi-supervised Learning from Only Positive and Unlabeled DataUsing Entropy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 668

Xiaoling Wang, Zhen Xu, Chaofeng Sha, Martin Ester, andAoying Zhou

Margin Based Sample Weighting for Stable Feature Selection . . . . . . . . . . 680Yue Han and Lei Yu

Associative Classifier for Uncertain Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . 692Xiangju Qin, Yang Zhang, Xue Li, and Yong Wang

Information Integration

Automatic Multi-schema Integration Based on User Preference . . . . . . . . 704Guohui Ding, Guoren Wang, Junchang Xin, and Huichao Geng

EIF: A Framework of Effective Entity Identification . . . . . . . . . . . . . . . . . . 717Lingli Li, Hongzhi Wang, Hong Gao, and Jianzhong Li

Page 16: Lecture Notes in Computer Science 6184 - scu.edu.cn

Table of Contents XIX

A Multilevel and Domain-Independent Duplicate Detection Model forScientific Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 729

Jie Song, Yubin Bao, and Ge Yu

Extending Databases

Generalized UDF for Analytics Inside Database Engine . . . . . . . . . . . . . . . 742Meichun Hsu, Qiming Chen, Ren Wu, Bin Zhang, and Hans Zeller

Efficient Continuous Top-k Keyword Search in Relational Databases . . . . 755Yanwei Xu, Yoshiharu Ishikawa, and Jihong Guan

V Locking Protocol for Materialized Aggregate Join Views on B-TreeIndices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 768

Gang Luo

Web Information Credibility (Keynote Abstract) . . . . . . . . . . . . . . . . . . . . . 781Katsumi Tanaka

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 783