会议日程


2007914(星期五)全天

时间

活动(地点)

08:00~12:00

参会代表报到
(地点:中国人民大学理工配楼前)

14:0014:30

大会开幕式
主持:孟小峰教授
(地点:第一报告厅)

14:30~15:00

集体合影(地点:逸夫会议中心前)

15:0017:30

特邀报告1

主持:于戈,沈钧毅教授
地点:第一报告厅

特邀报告2

特邀报告3

18:30~20:00

欢迎宴会(地点:中区食堂三层)

20:3022:00

专委年度工作会议(第一会议厅)

2007915(星期六)全天

时间

活动(地点)

07:00~07:50

早餐(地点:龙都宾馆餐厅)

08:3010:00

WISA1A
第三会议室

WISA1B
第四会议室

SWON1
第二会议室

EGTA1
第一会议室

10:00~10:30

中间休息

10:3012:00

WISA2A
第三会议室

WISA2B
第四会议室

SWON2
第二会议室

EGTA2
第一会议室

12:00~13:30

午餐(地点:中区食堂三层)、休息

13:3015:00

WISA3A
第三会议室

WISA3B
第四会议室

SWON3
第二会议室

EGTA3
第一会议室

15:00~15:30

中间休息,前往主会场

15:3017:00

特邀报告4

主持:单志广
地点:报告厅

特邀报告5

17:0017:30

大会闭幕式
主持:徐宝文教授 (地点:报告厅)

18:00~19:30

宴会(地点:餐厅)



WISA2007:

WISA 1A : Web Mining and Data Warehouse
主持人:王国仁 地点:第三会议室

1. Semantic Session Analysis for Web Usage Mining : Zhang Hui, Song Han-tao, Xu Xiao-mei
2. A Novel Incremental Mining Algorithm of Frequent Patterns for Web Usage Mining : Dong Yihong, Zhuang Yueting, Tai Xiaoying
3. Extract the Cores of Implicit Communities : Yang Nan, Lin Songxiang, Gao Qiang
4. A New Query Expansion-based Topic Distillation Algorithm : Zhou Hongfang, Feng Boqin, Lv Lintao
5. Finding Representative Subset from Massive Data : Zhou Hongfang, Feng Boqin, Lv Lintao
6. Multi-dimensional Customer Data Analysis in Online Auctions : Lao Guoling, Xiong Kuan
7. Study and Implementation of a New ETL Approach : Bao Yubin, Song Jie, Leng Fangling, et al

WISA 1B : Deep Web and Web Integration
主持人:李娟子 地点:第四会议室

1. Query Translation On the Fly in Deep Web Integration : Jiang Fangjiao, Jia Linlin, Meng Xiaofeng
2. Query Interface Classification Method for Deep Web Source Integration : Yuan Fang, Zhao Yao, Zhou Xu
3. KDS-CM: A Cache Model Based on Top-K Data Source for Deep Web Query : Kou Yue, Yu Ge, Shen Derong, et al
4. Extracting Result Schema Based on Query Instances in the Deep Web : Nie Tiezheng, Yu Ge, Shen Derong, et al
5. A Hybrid XML Index Composing Structure-Encoded With Cluster : Yang Jincai, Zhang Lin, Li Guohui
6. Functional Dependencies and its Axiom System in XML : ZHAO Xiang-guo, Wang Guo-ren, Huo HUan, et al
7. TwigStack+: Holistic Twig Join Pruning Using Extended Solution Extension : Zhou Junfeng, Xie Min, Meng Xiaofeng

WISA 2A : Web Services
主持人:韩燕波 地点:第三会议室

1. Fuzzy Map-based QoS Model Oriented Toward Service Composition : GUO San-jun, DOU Wan-chun, FAN Shao-kun
2. Performance Predictable ServiceBSP Model for Grid Computing : Miao Weikai, Tong Weiqin
3. Automatic Question Answering from Web Documents : Li Xin, Hu Dawei, Li Huan, et al
4. Services Discovery in the Emergency Decision Support System Using Semantic Web Services : Xie Hongwei, Yu Xueli, Wu Xiaobo, et al
5. A Semantically Enabled SOA Approach to Digital Library with WSMX Framework : You Yuanchwen
6. 基于Web Services的网格文档应用研究 : 崔宾阁, 曾庆田

WISA 2B : Text Processing and Information Retrieval
主持人:袁 方 地点:第四会议室

1. Research on the User Interest Modeling in Personalized Search Engine : Li Zhengwei, Xia Shixiong, Niu Qiang, et al
2. A Novel Personalized Web Search Model : XU Jingqiu, ZHU Zhengyu, TIAN Yunyan, et al
3. Organizing Web Documents Resulting From A Search Engine Based On Concept Lattice : LIU LI-FENG, WU MENG-DA
4. Combining Block and Corner Features for Content-based Trademark Retrieval : Hong Zhiling, Jiang Qingshan
5. A New Feature Selection Method for Text Clustering : Junling Xu, Baowen Xu, Weifeng Zhang, et al
6. A High-Performance Extraction Method for Public Opinion on Internet : Li Yanling, Dai Guanzhong, Zhu Yehang, et al
7. KEYWORD EXTRACTION BASED ON TF/IDF FOR CHINESE NEWS DOCUMENT : FAN I-no, LI Juan-zi, ZHANG Kuo

WISA 3A : Infrastructure and Security Issues
主持人:齐勇 沈钧毅 地点:第三会议室

1. Model Checking-Based Testing of Web Applications : ZENG Hongwei, MIAO Huaikou
2. Grey Prediction based Software Stage-effort Estimation : WANG Yong, SONG Qinbao, SHEN Junyi
3. MBODM: A Microbe Biodiversity Database Based on Object Deputy Model : Liu Junqiang, Peng Zhiyong1, Li Xuhui, et al
4. The Research of Anti-plagiarism Monitoring System Model : Shen Yang, Yuan Zhongshang, Liu Lu
5. Context-aware Fuzzy Privacy Decision for Access Personal Information : Zhang Qingsheng, Qi Yong, Zhao Jizhong, et al
6. Anomaly Detection with Artificial Immune Network : PENG Lingxi, LI Tao, LIU Xiaojie, et al

WISA 3B : Peer-to-Peer Computing and Security
主持人:于戈 地点:第四会议室

1. Efficient Multi-keyword Query Processing on P2P based Web Search : Li Meifang, Shen Derong, Zhu Hongkai, et al
2. Search Resource in Unstructured Peer-to-Peer System based on Multiple-trees Overlay Structure : Yu Jianqiao, Liao JW
3. ISS: Efficient Search Scheme Based on Immune Method in Modern Unstructured Peer-to-Peer Networks : Guan Zhitao, Cao Yuanda, Zhu Liehuang, et al
4. The Resolution for Conflicts of Inter-Operation in Multi-Domain Environment : LU Zhengding, WEN Zhumu, TANG Zhuo, et al
5. 基于身份的一轮可认证会议密钥协商协议 : 蔡永泉, 李秀莹
6. 无信任中心的动态门限群签名方案 : 刘艳飞, 贾慧娟, 王玉芬



SWON2007:

SWON 1Semantic Annotation and Information Search
主持人:徐立臻 地点:第二会议室

1. Research On Retrieving Reuse Component Based On Semantic : WANG Yan, CHEN Ming, ZHAO Jianhui
2. Semantic Role Labeling Based on Conditional Random Fields : YU Jiang-de, FAN Xiao-zhong, PANG Wen-bo, YU Zhengtao
3. A Semantic Search Engine - Smartch : WEN Kunmei, LU Zhengding, LI Ruixuan, SUN Xiaolin
4. A Semantic Overlay Network for Searching Taxonomy-based Data Sources : QIAO Baiyou Qiao, WANG Guoren, XIE Kexin
5. Research on Semantic Web-based Manufacture Knowledge Retrieval System : JING Hao, ZHANG Jing, LI Jun-huai
6. A New Rank Learning Algorithm : LIU Huafu,PAN Yi,WANG Zhong
7. Fuzzy C-Means Text Clustering based on Topic Concept Sub-Space : JI Xianghua, CHEN Chao, SHAO Zhengrong, YU Nenghai
8. User-Oriented Web Search based on PLSA : YU Fang, CHEN Dongling, WANG Daling, YU Ge,BAO Yubin

SWON 2Ontology Mapping and Integration
主持人:彭志勇 地点:第二会议室

1. A More Efficient Ontology Matching Algorithm for Integrating Heterogeneous Web Resources : LIU Chen Liu, HAN Yanbo, CHEN Wanghu, DING Weilong
2. Context-driven reconciliation in ontology integration : LI Ling, TANG Shengqun, XIAO Ruliang, FANG Lina, DENG Xinguo, XU Youwei, XU Yang
3. OPKS:Ontology-based Proactive Knowledge System : XIA Shixiong, ZHANG Lei, ZHOU Yong, NIU Qiang, DING Qiulin
4. Ontology Mapping based on Hidden Markov Model : YIN Kangyin, SONG Zilin, XU Ping
5. An Ontology Based Approach of Semantic Information Integration : YANG Xiandi, PENG Zhiyong, LIU Junqiang
6. KL Distance Based Concepts Mapping between Web Ontologies: WU Suyan, GUO Qiao
7. An Ontology Mapping Approach Using Web Search Engine :LI Keyue, XU Baowen, WANG Peng
8. Research on Knowledge Presentation Model for QnA Web Forums : Shitao Yu, Xiaojie Yuan, Jianxing Shi

SWON 3Semantic Web Services and Reasoning
主持人:李瑞轩 地点:第二会议室

1. OntoRBAC: Specify and Integrate RBAC Policies with Ontologies : SUN Xiaolin, LI Ruixuan, WEN Kunmei, LU Zhengding, WANG Zhigang
2. A Heuristic Web Services Composition Method Based on Domain Ontology : REN Hong-Bo, XING Chun-Xiao
3. ASMA: An Approach to Adaptive Services Matchmaking : CHEN Wanghu, HAN Yanbo, WANG Jing, LIU chen
4. Business Domain Oriented AI Planning for Web Service Composition : DAI Yu, YANG Lei, ZHANG Bin
5. The Research of ACS-based Resource Assignment and Task Scheduling in Grid : QI Chao, ZHANG Jing,LI Jun-huai
6. Research on a Trust Model Based Individual Experience : WANG Shao-Jie, ZHENG Xue-Feng, CHU Li-Jun, YU Zhen
7. A Fuzzy Description Logic Based on Vague Sets : MA Z. M.,WANG Hailong,YAN Li,ZHAO Faxin
8. Adopting WSMX into A Semantic Grid Enabled SOA Approach to Knowledge Management : YOU Yuan-chwen



EGAT2007:

EGTA 1Security and Trustiness
主持人:李庆忠 地点:第一会议室

 

特邀报告6 : 电子政务关键技术研究及应用
邢春晓,清华大学信息技术研究院
1. A new digital signature scheme based on two cryptographic assumptions : ZHENG Minghui, CUI Guohua
2. An Emergency Algorithm for Enhancing Survivability of Key Service : ZHAO Guosheng WANG Huiqiang , WANG Jian , SHEN Linshan
3. ABAM: an Agent Based Automated Trust Negotiation Model : LI Kai, LU Zhengding, LI Ruixuan
4. 电子政务信息安全体系研究 : 吕欣

EGTA 2Modeling and Analysis
主持人:邢春晓 地点:第一会议室

1. Dynamic Hierarchy Description and Constraint Rules of Flexibility Workflow : YANG Fei, YIN Baolin
2. Dynamic Hierarchy Description and Constraint Rules of Flexibility Workflow : YANG Fei, YIN Baolin
3. Dynamic Business Processs Modeling and Verification For Inter-Organizational Collaboration : HU Qingcheng XING Chunxiao YAN Qi, et al
4. Modeling and Performance Evaluation of QoS-aware Job Scheduling of Computational Grids: SHAN Zhiguang, LIN Chuang
5. Business Performance Monitoring using Web Service Proxy : CHEN Zaiben, XING Chunxiao, YANG Jijiang, HU Qingcheng

EGTA 3Information System
主持人:单志广 地点:第一会议室

1. Research on Matching Algorithm for Label-Based Integrable-Ware Query: XIAO Kun, CHEN Shihong, CHEN Xi
2. An improved k-means clustering algorithm : XIA Shixiong ZHOU Yong LI Wenchao ZHANG Lei NIU Qiang
3. A Scalable Single Sign-on System: HUANG He, SHAN Zhiguang, HUANG Dongquan
4. Domain Semantic Mapping Study of Database MetaSearch Engine : MIAO Guangxiang, CHEN Xiangyang , NIU Yuguang
5. A Framework for the Integration of SOA and Web2.0 : ZUO Meiyun,ZHANG Zike,LI Qian
6. A Multi-broker Architecture for large-scale Dynamic Heterogeneous Information Integration : DENG Huafeng, LIU Yunsheng
7. 浙江省交通行业数据资源整合经验探讨 : 韩海航



特邀报告简介

特邀报告1Network Intelligence
Abstract Network is the key to representing the complex world around us. Small changes in the topology, affecting only a few of the nodes, can open up hidden doors, allowing new possibilities to emerge. While network intelligence is considered in my talk, it is always stressed and focused on a kernel idea, i.e. topology first, mainly concerning the self-organization, self-similarity and emergency features. Taking network topology as a novel approach of knowledge representation, we discuss the dynamics of information (or virus, etc) spreading on Web, mining typical topology from real information networks at multi-scale, and emergence computation as well.
Brain science has achieved a great success on molecule-level and cell-level research; however, there is still a long way to go for cognitive function of a brain as a whole. How can we understand the non-linear function of a brain How does the left brain (with the priority of logic thinking) cooperate with the right brain (with the priority of visual thinking) How far away for “von-Neumann-style” computer architecture ? May the future computer architecture consist of dual core, one for logic thinking and the other for visual thinking, which correlate each other all the time May the future operating systems are developed under the mechanism of “growth by preferential attachment” I am interested in all these questions in my talk.
个人简介:Deyi Li, was born in 1944 in Jiangsu, China, He graduated at the Electronic Engineering Dept.,South East Univ. in 1967, received his PhD in Computer Science Dept., Heriot-Watt Univ. Edinburgh UK in 1983. He was elected as the member of Chinese Academy of Engineering in 1999, the member of Eurosian Academy of Science in 2004 respectively. At present, he is a professor in Qinghua Univ., the director at Dept. of Information Science, National Natural Science Foundation of China, the vice president of both Chinese Institute of Electronics and Chinese Association of Artificial Intelligence. He has published over 100 papers on a wide range of topics in artificial intelligence. His other books include A prolog database system, and A fuzzy prolog database system.

特邀报告2网络资源空间模型
摘要:互联网的计算环境与三十多年前发明关系数据模型时的计算环境相比已发生了很大变化。原来集中稳定的计算环境发展为分散而动态的计算环境,处理的对象已不再是单纯的数据而是多样异构的资源,应用范围也由原来单纯的数据管理发展为多样的资源管理和智能服务,用户和数据拥有者也呈现由原来的以机构为中心发展为以个人为中心的趋势。这些变化对数据模型的要求已超出了经典数据模型的适用范围。资源空间模型是一个通过对资源内容进行分类的规范、存贮、管理和定位网络资源的语义数据模型。
个人简介:诸葛海,国家重大基础研究计划973“语义网格的基础理论、模型与方法研究”项目首席科学家,中国科学院计算技术研究所研究员。2001年入选中国科学院百人计划,IEEE Senior Member。是早期倡导知识网格研究的学者之一。在Communications of the ACM, IEEE Computer, IEEE Transactions on Data and Knowledge Engineering, IEEE Transactions on Parallel and Distributed Systems等国际刊物上发表论文60余篇.《The Knowledge Grid》和《The Web Resource Space Model》是其代表著作。担任国际学术刊物Journal of Systems and Software领域主编,Future Generation Computer Systems副主编,Journal of Computer Science and Technology副主编。获中国科学院优秀研究生导师奖2次。

特邀报告3Web时代IBM信息管理的创新
摘要:本题目将介绍Web时代IBM对对信息管理所面临的挑战的理解,以及IBM在基础的数据库技术,信息管理架构和信息管理思想等方面的产品创新和观念创新,尤其重点介绍新一代数据库DB2 9所带来的技术变革及其在中国市场的早期实践.
个人简介:刘先生来自IBM中国软件部,有十余年在信息产业服务的经验。在IBM主导了商业智能、信息整合、企业信息搜索、企业数据模型等领域一系列大型项目的设计和实施,建立了包括泰康人寿、招商银行、华为、华电集团等一系列有全球影响的成功案例。在IBM刘先生拥有深厚软件工程师和架构师的经历, 曾任IBM亚太区信息整合业务的技术领导,与IBM美国及中国研发中心在信息管理领域有广泛的联系和合作.获得2003年度IBM亚太区信息管理年度最佳技术工程师奖,2006年为IBM亚太区信息管理年度最佳技术经理奖获得者。目前刘先生担任IBM软件部中国区信息管理技术经理,负责管理软件部中国信息管理技术团队以及相关的市场技术支持和推广工作。

特邀报告4Grid security via Behavior conformity from Trusted Computing and virtualization
摘要 Ideally a grid is a virtual machine or virtual organization (VO) of unbounded computational and storage capacity built by pooling heterogeneous resources from real organizations (lessors). Currently such grids are only seen in scientific or academic communities. To maximally utilize their resources, commercial enterprises, like resource-abundant financial institutions, should > ‘‘go for grid,’’ and become lessors. Inadequate grid security currently prevents commercial organizations with under-utilized resources from being lessors. A missing security service is behavior conformity: VO code mustn’t damage the lessor, and conversely, the lessor mustn’t compromise the VO’s proprietary information.
Project Daoli strengthens grid security by adding behavior conformity in three levels of virtualization with software components to be tamper-protected by TCG technologies. At the OS level, the protected component is a highly-privileged hypervisor that intercepts interrupts for memory isolation and persistent storage protection. At the application level, the component is a grid application plus protected data. A third level of virtualization, which is realized by grid middleware, enables one piece of code to run across the VO’s heterogeneous environment; policy enforcement is achieved simply by propagating this code with the protective credential being migrated along the TCG-technology enabled platforms. 
个人简介:Dr. Wenbo Mao obtained a BSc in mathematics from Fudan University in Shanghai, China (1982), an MSc in computer science from Beihang University in Beijing, China (1987), and a PhD in computer science from Strathclyde University in Glasgow, Scotland (1992). From 1992-1994, Dr. Mao held a post-doctoral research position in Manchester University in Manchester, UK. In May 2007, Dr. Mao joined EMC Corporation as director of its new research team based in Beijing, which is one of the core research groups in the EMC Innovation Network.
Dr. Mao's research interests include formal methods for software/hardware systems analysis, computer security, cryptography, and grid computing. He is the author of a cryptographic textbook Modern Cryptography, Theory and Practice (Prentice-Hall, 2003) and co-author of a new textbook Cryptographic Protocols (Addison-Wesley, to appear).

特邀报告5:中联部电子政务建设的实践与经验
任锦华,中共中央对外联络部信息化工作办公室 主任


特邀报告6:电子政务关键技术研究及应用
邢春晓,清华大学信息技术研究院教授