Qiang Ma

Learn More
With the development of positioning technologies and the boosting deployment of inexpensive location-aware sensors, large volumes of trajectory data have emerged. However, efficient and scalable query processing over trajectory data remains a big challenge. We explore a new approach to this target in this paper, presenting a new framework for query(More)
Storage and utilization of web data has become a big challenge to data management community. Though many commercial and academic tools emerge, the structure, content , and user behavior of Chinese Web is not fully studied. We are working on building a Chinese Web Infrastructure (CWI) for support of such research. In this paper, a graph data model used in(More)
The vast amount of information is available on the WWW(World Wide Web). Usually, users use the information filtering technologies or search engines to acquire their favorite information. However, it's still not easy to acquire or exclude local information with the conventional search engines and information filtering technologies. In this paper, we propose(More)
It is a linguistic issue to evaluate the network vulnerabilities quantitatively in network security management. It is often claimed to evaluate the vulnerabilities properly and effectively. However, detailed analysis and evaluation based on fuzzy logic, which can deal with the linguistic problems well, is very rare. In this paper, a novel approach, based on(More)
  • 1