LEADER 01548nam 2200397Ia 450 001 996389624603316 005 20210104171824.0 035 $a(CKB)4940000000097769 035 $a(EEBO)2240904600 035 $a(OCoLC)ocn945447205e 035 $a(OCoLC)945447205 035 $a(EXLCZ)994940000000097769 100 $a20160323d1659 uy 0 101 0 $aeng 135 $aurbn||||a|bb| 200 12$aA letter to the Honourable Collonel Okey member of parliament$b[electronic resource] $eand to his honoured and worthy friends Collonel Biscoe, Colonel Salmon, and Lievetenant Collonel Allen : communicating to them another letter written by T.F. to a person of condition, perswading to a toleration of popery 210 $aLondon $c[s.n.]$dprinted 1659 215 $a[2], 10 p 300 $aSigned on p. 2: A.B. 300 $aPlace and date of publication suggested by Wing (2nd ed., 1994). 300 $aReproduction of original in: National Library of Scotland. 330 $aeebo-0097 606 $aFreedom of religion$vEarly works to 1800 606 $aAnti-Catholicism$xPolitical aspects$zEngland$vEarly works to 1800 608 $aLetters.$2rbgenr 615 0$aFreedom of religion 615 0$aAnti-Catholicism$xPolitical aspects 700 $aA. B$0790577 701 $aOkey$b John$f-1662.$01001410 701 $aT. F$0826970 801 0$bUMI 801 1$bUMI 906 $aBOOK 912 $a996389624603316 996 $aA letter to the Honourable Collonel Okey member of parliament$92360712 997 $aUNISA LEADER 10365nam 22008055 450 001 9910144334903321 005 20200701065210.0 010 $a3-540-30483-5 024 7 $a10.1007/b103383 035 $a(CKB)1000000000212637 035 $a(DE-He213)978-3-540-30483-8 035 $a(SSID)ssj0000129816 035 $a(PQKBManifestationID)11937003 035 $a(PQKBTitleCode)TC0000129816 035 $a(PQKBWorkID)10080282 035 $a(PQKB)10471575 035 $a(MiAaPQ)EBC3088069 035 $a(PPN)155213776 035 $a(EXLCZ)991000000000212637 100 $a20121227d2004 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aContent Computing $eAdvanced Workshop on Content Computing, AWCC 2004, Zhen Jiang, Jiang Su, China, November 15-17, 2004, Proceedings /$fedited by Chi-Hung Chi, Kwok-Yan Lam 205 $a1st ed. 2004. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2004. 215 $a1 online resource (XII, 516 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v3309 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-23898-0 320 $aIncludes bibliographical references and index. 327 $aSession 1: Mobile Code and Agent Technology -- Mobility Prediction-Based Wireless Resource Allocation and Reservation -- An Agent-Enabled Content-Explicit Authorization Model for OGSA-Compliant Grid -- A Predictable Mobile Agent Computation Model and Its Fabric Architecture -- A Novel Reverse Rerouting Mechanism in Mobile Wireless Internet -- An Agents Based Grid Infrastructure of Social Intelligence -- Agent Aided Workflow Modeling -- Session 2: Content Sharing and Consistency Management -- An Improved Hybrid Method of Maintaining Content Consistency -- Advanced Architecture for Distributed Systems with a Network Infrastructure Based on CAN and Internet for Content Distribution -- Distributed Document Sharing with Text Classification over Content-Addressable Network -- Content Distribution Stochastic Fluid Models for Multi-regions P2P Networks -- Construct Campus Peer-to-Peer Networks -- Session 3: Networking Infrastructure and Performance -- Fractional Gaussian Noise: A Tool of Characterizing Traffic for Detection Purpose -- Performance Analysis of Virtual Time Optimistic Transaction Processing -- A Measurement-Based TCP Congestion Control Scheme -- BM-VF-SBD: An Efficient Data Channel Scheduling Algorithm to Support QoS for Optical Burst Switching Networks -- A Predictive Controller for AQM Router Supporting TCP with ECN -- Session 4: Content Aware Security (I) -- Enhancing the Content of the Intrusion Alerts Using Logic Correlation -- Real-Time Emulation of Intrusion Victim in HoneyFarm -- On the Formal Characterization of Covert Channel -- Availability Analysis and Comparison of Different Intrusion-Tolerant Systems -- Security Analysis of User Efficient Blind Signatures -- Session 5: Content Aware Security (II) -- A Novel DDoS Attack Detecting Algorithm Based on the Continuous Wavelet Transform -- Enhancing the Scalability of the Community Authorization Service for Virtual Organizations -- Securing Multicast Groups in Ad Hoc Networks -- Improved Privacy-Protecting Proxy Signature Scheme -- Improving Security Architecture Development Based on Multiple Criteria Decision Making -- Session 6: Multimedia Content -- A LSB Substitution Oriented Image Hiding Strategy Using Genetic Algorithms -- A Prediction Scheme for Image Vector Quantization Based on Mining Association Rules -- Fuzzy Logic-Based Image Retrieval -- Deriving Facial Patterns for Specifying Korean Young Men?s 3D Virtual Face from Muscle Based Features -- A Content-Based Fragile Watermarking Scheme for Image Authentication -- Session 7: Content Mining and Knowledge Extraction -- A New FP-Tree Algorithm for Mining Frequent Itemsets -- Evaluation Incompleteness of Knowledge in Data Mining -- The Variable Precision Rough Set Model for Data Mining in Inconsistent Information System -- Rule Discovery with Particle Swarm Optimization -- Data Mining Service Based on MDA -- Session 8: Web Services and Content Applications (I) -- Web Service Composition Based on BPWS-Net -- Testing Web Services Using Progressive Group Testing -- XFCM ? XML Based on Fuzzy Clustering and Merging ? Method for Personalized User Profile Based on Recommendation System of Category and Product -- Analyzing Web Interfaces of Databases for Retrieving Web Information -- A New Universally Verifiable and Receipt-Free Electronic Voting Scheme Using One-Way Untappable Channels -- Session 9: Web Services and Content Applications (II) -- Ontology-Based Conceptual Modeling of Policy-Driven Control Framework: Oriented to Multi-agent System for Web Services Management -- An Approach to Dynamically Reconfiguring Service-Oriented Applications from a Business Perspective -- Dynamically Reconfiguring Sitemaps Using RDF -- A General Model for Heterogeneous Web Services Integration -- Methodology for Semantic Representing of Product Data in XML -- Semantic Based Web Services Discovery -- Session 10: Content Retrieval and Management (I) -- What Are People Looking for in Your Web Page? -- The Impact of OCR Accuracy on Automatic Text Classification -- TSS: A Hybrid Web Searches -- Determining the Number of Probability-Based Clustering: A Hybrid Approach -- Categorizing XML Documents Based on Page Styles -- Session 11: Content Retrieval and Management (II) -- Generating Different Semantic Spaces for Document Classification -- A Component Retrieval Method Based on Facet-Weight Self-learning -- The Algorithm About Division and Reducts of Information System Based on Discernibility Index of Attribute -- An Effective Document Classification System Based on Concept Probability Vector -- Accuracy Improvement of Automatic Text Classification Based on Feature Transformation and Multi-classifier Combination -- Session 12: Ontology and Knowledge Conceptualization -- Risk Minimization Based Ontology Mapping -- Evolutionary Parameter Estimation Algorithm for Combined Kernel Function in Support Vector Machine -- Enriching Domain Ontology from Domain-Specific Documents with HowNet -- A Framework of Extracting Sub-ontology -- Ontology Based Sports Video Annotation and Summary. 330 $aWelcome to the Advanced Workshop on Content Computing 2004. The focus of this workshop was ?Content Computing?. It emphasized research areas that facilitate efficient, appropriate dissemination of content to users with the necessary access rights. We use the word ?content? instead of ?information? or ?data? because we want to cover not only raw data but also presentation quality. The fast growth of the Internet has already made it the key infrastructure for information dissemination,education,business and entertainment. While the client-server model has been the most widely adopted paradigm for the WWW, the desire to provide more value-added services in the delivery layer has led to the concept of an active network, where content-driven, intelligent computation will be performed to provide quality-of-service for content presentation and best-?t client demand. These value-added services typically aim to enhance information security, provide pervasive Internet access, and improve application robustness, system/network performance, knowledge extraction,etc. They are realized by incorporating sophisticated mechanisms at the delivery layer,which is transparent to the content providers and Web surfers. Consequently, the notion of ?Content Computing? has emerged. Content computing is a new paradigm for coordinating distributed systems and intelligent networks, based on a peer-to-peer model and with value-added processing of the application-specific contents at the - livery layer. This paradigm is especially useful to pervasive lightweight client devices such as mobile and portable end-user terminals with a wide variation of hardware/software configurations. This year, the workshop was held in Zhenjiang, Jiangsu, China. We received 194 high-quality papers from 11 regions, namely PR China, Korea, Singapore, Japan, United States, Canada, Australia, Germany, Taiwan, Italy, and Hong Kong. Totally, 62 papers were accepted and presented in the workshop. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v3309 606 $aData structures (Computer science) 606 $aComputers 606 $aApplication software 606 $aComputer networks 606 $aInformation storage and retrieval 606 $aDatabase management 606 $aData Structures and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15009 606 $aTheory of Computation$3https://scigraph.springernature.com/ontologies/product-market-codes/I16005 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aInformation Storage and Retrieval$3https://scigraph.springernature.com/ontologies/product-market-codes/I18032 606 $aDatabase Management$3https://scigraph.springernature.com/ontologies/product-market-codes/I18024 615 0$aData structures (Computer science) 615 0$aComputers. 615 0$aApplication software. 615 0$aComputer networks. 615 0$aInformation storage and retrieval. 615 0$aDatabase management. 615 14$aData Structures and Information Theory. 615 24$aTheory of Computation. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aComputer Communication Networks. 615 24$aInformation Storage and Retrieval. 615 24$aDatabase Management. 676 $a006.13/2 702 $aChi$b Chi-Hung$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLam$b Kwok-Yan$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910144334903321 996 $aContent Computing$92092078 997 $aUNINA