default search action
EEE 2004: Taipei, Taiwan
- 2004 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 04), 29-31 March 2004, Taipei, Taiwan. IEEE Computer Society 2004, ISBN 0-7695-2073-1
Web Services
- Chen-Liang Fang, De-Ron Liang, Chyouhwa Chen, PuSan Lin:
A Redundant Nested Invocation Suppression Mechanism for Active Replication Fault-Tolerant Web Service. 9-16 - Tao Yu, Kwei-Jay Lin:
The Design of QoS Broker Algorithms for QoS-Capable Web Services. 17-24 - Weiping He:
Recovery in Web Service Applications. 25-28 - Zakaria Maamar, Soraya Kouadri Mostéfaoui, Emad Bataineh:
A Conceptual Analysis of the Role of Conversations in Web Services Composition. 29-32 - Te-Kai Liu, Santhosh Kumaran, Jen-Yao Chung:
Performance Engineering of a Java-Based eCommerce System. 33-37 - Fethi A. Rabhi, Feras T. Dabous, Hairong Yu, Boualem Benatallah, Yun Ki Lee:
A Case Study in Developing Web Services for Capital Markets. 38-41 - Roy Grønmo, David Skogan, Ida Solheim, Jon Oldevik:
Model-Driven Web Services Development. 42-45
eCommerce Applications
- Mahesha Kapurubandara, Shiromi Arunatileka, Athula Ginige:
Application of eBusiness Strategies for SMEs in Developing Countries. 49-59 - Michael C. Jaeger, Moussa Lo, Robert J. Pefferly:
Simulation Models and Their Metainfo-Management Using RDF-Based Paradigms. 60-67 - Sakuna Vanichvisuttikul, Chamnong Jungthirapanich:
The Assessment of E-Commerce Awareness on Highly Valuable Traditional Products in Thailand. 68-75 - Hsiu-Mei Huang, Shu-Sheng Liaw:
Web Surveys for Electronic Commerce: A Review of the Literature. 76-79
Security & Trust (1)
- Cai-Nicolas Ziegler, Georg Lausen:
Spreading Activation Models for Trust Propagation. 83-97 - Tzone I. Wang, Kun Hua Tsai, Ming-Che Lee:
A Two-Layer Cryptographic Scheme for an e-Service Framework Based on Mobile Agents. 98-105 - Tzer-Shyong Chen, Kuo-Hsuan Huang, Yu-Fang Chung:
A Division-of-Labor-Signature (t, n) Threshold-Authenticated Encryption Scheme with Message Linkage Based on the Elliptic Curve Cryptosystem. 106-112 - Wei-Chi Ku, Chun-Ming Ho:
An e-Voting Scheme against Bribe and Coercion. 113-116 - Jengchung V. Chen, Yangil Park:
Trust and Privacy in Electronic Commerce. 117-120
EC Technologies (1)
- Melody Y. Kiang, Jenny Gilsdorf, Robert T. H. Chi:
Understand User Preference of Online Shoppers. 123-130 - Jen-Hsiang Chen, Kuo-Ming Chao, Nick Godwin, Von-Wun Soo:
A Multiple-Stage Cooperative Negotiation. 131-138 - Zongkai Yang, Weimin Lang, Yunmeng Tan:
A New Fair Micropayment System Based on Hash Chain. 139-145
Intelligence
- Opher Etzion, Amit Fisher, Segev Wasserkrug:
e-CLV: A Modeling Approach for Customer Lifetime Evaluation in e-Commerce Domains, with an Application and Case Study for Online Auctions. 149-156 - Trung T. Pham:
Quantitative Approach to Using E-Commerce Data to Monitor and Control the Performance of a Supply Chain. 157-162 - Zonghua Zhang, Hong Shen:
Suppressing False Alarms of Intrusion Detection Using Improved Text Categorization Method. 163-166
Business Services
- Chengzhi Peng:
e-Service as a New Paradigm for Developing Interactive Multidimensional City Modeling. 169-172 - Tung Wan Cheng, Wan Ling Wang, Shung Kwan Chan:
Three-Tier Multi-Agent Architecture for Asset Management Consultant . 173-176 - Chuang-Cheng Chiu, Chieh-Yuan Tsai:
A Web Services-Based Collaborative Scheme for Credit Card Fraud Detection. 177-181 - Jeng-Jong Lin:
Development of a Remote Quick Design System for Woven Fabrics. 182-189
Intelligence & Agents
- Deepak Subramoniam, Jyothi John:
Algorithms for Community Subject Identification: Experiments and Test Results. 195-201 - Chiu-Che Tseng:
Portfolio Management Using Hybrid Recommendation System. 202-206 - Show-Jane Yen, Yue-Shi Lee, Chung-Wen Cho:
An Efficient Approach for the Maintenance of Path Traversal Patterns. 207-214 - Hua-Fu Li, Suh-Yin Lee:
Single-Pass Algorithms for Mining Frequency Change Patterns with Limited Space in Evolving Append-Only and Dynamic Transaction Data Streams. 215-222 - Timothy C. H. Kwong, Matthew K. O. Lee:
Understanding the Behavioral Intention to Digital Piracy in Virtual Communities - A Propose Model. 223-226 - Yue-Shi Lee, Show-Jane Yen, Ghi-Hua Tu, Min-Chi Hsieh:
Mining Traveling and Purchasing Behaviors of Customers in Electronic Commerce Environment. 227-231
Mobile Services
- Kun-Lung Wu, Shyh-Kwei Chen, Philip S. Yu:
Indexing Continual Range Queries for Location-Aware Mobile Services. 233-240 - Ramon Martí, Jaime Delgado, Xavier Perramon:
Security Specification and Implementation for Mobile e-Health Services. 241-248 - Shu-Chin Wang, Kuo-Qin Yan, C. H. Wei:
Mobile Target Advertising by Combining Self-Organization Map and Decision Tree. 249-252 - Robert Steele, Yuri Ventsov, Tharam S. Dillon:
XML Schema-Based Discovery and Invocation of Mobile Services. 253-258 - Hung-Wen Tung, Von-Wun Soo:
A Personalized Restaurant Recommender Agent for Mobile E-Service. 259-262 - Wei-Po Lee, Ming-Hsiang Su:
Personalizing Information Services on Wired and Wireless Networks. 263-266 - Chun-Te Chen, Te-Chung Lu:
A Mobile Ticket Validation by VSS Tech with Time-Stamp. 267-270 - Agustinus Borgy Waluyo, Raymond Hsieh, David Taniar, J. Wenny Rahayu, Bala Srinivasan:
Utilising Push and Pull Mechanism in Wireless E-Health Environment. 271-274
Internet Technologies (1)
- Tsutomu Morigaki, Kanta Matsuura, Osamu Sudo:
An Analysis of Detailed Electronic Time-Stamping Using Digital TV. 277-284 - Juan D. Velásquez, Richard Weber, Hiroshi Yasuda, Terumasa Aoki:
A Methodology to Find Web Site Keywords. 285-292 - Tzong-Song Wang, Larry K. Bright:
The Challenge of Exclusions in Pervasive Cyberspace. 293-298 - Po-Hsiang Wang, Jung-Ying Wang, Hahn-Ming Lee:
QueryFind: Search Ranking Based on Users? Feedback and Expert?s Agreement. 299-304 - Chih-Ming Chen, Ling-Jiun Duh, Chao-Yu Liu:
A Personalized Courseware Recommendation System Based on Fuzzy. 305-308 - Faye F. Liu, Jidong Wang, Tharam S. Dillon:
An Object-Oriented Approach on Web Information Representation and Derivation. 309-314
EC Technologies (2)
- Libo Chen, Marcello L'Abbate, Ulrich Thiel, Erich J. Neuhold:
Increasing the Customer?s Choice: Query Expansion Based on the Layer-Seeds Method and Its Application in E-Commerce. 317-324 - Bao-Tung Wang, Henning Schulzrinne:
Multifunctional ICMP Messages for e-Commerce. 325-332 - Deok-Gyu Lee, Hyung-Geun Oh, Im-Yeong Lee:
A Study on Contents Distribution Using Electronic Cash System. 333-340 - Byung kwan Lee, Tai-Chi Lee, Seung Hae Yang:
An ASEP (Advanced Secure Electronic Payment) Protocol Design Using 3BC and ECC (F^2) Algorithm. 341-346
Business Process
- Pascal van Eck, Jaap Gordijn, Roel J. Wieringa:
Value-Based Design of Collaboration Processes for e-Commerce. 349-358 - Andreas Wombacher, Peter Fankhauser, Bendick Mahleko, Erich J. Neuhold:
Matchmaking for Business Processes Based on Choreographies. 359-368 - Bo-chiuan Su, Alok Gupta, Zhiping D. Walter:
Economic Analysis of Consumer Purchase Intentions in Electronic and Traditional Retail Channels: Competitive and Strategic Implications. 369-372 - Kanta Matsuura:
Robustness of Entrusted Data-Analysis in e-Science Research Collaboration. 373-378
EC Technologies (3)
- Matthias Enzmann, Markus Schneider:
A Privacy-Friendly Loyalty System for Electronic Marketplaces. 385-393 - Vishwas Patil, R. K. Shyamasundar:
An Efficient, Secure and Delegable Micro-Payment System. 394-404 - Nenad Stojanovic:
On Using Query Neighbourhood for Better Navigation through a Product Catalog: SMART Approach. 405-412 - Sung-Shun Weng, Mei-Ju Liu:
Personalized Product Recommendation in e-Commerce. 413-420 - Zhuang Yan, Simon Fong, Meilin Shi:
Knowledge Oriented Negotiation for Agent-Based B2B Electronic Commerce. 421-424 - Fengjie Wu, Jie Lu, Guangquan Zhang:
A Decision Support System for Multiple Objective Linear Programming with Fuzzy Parameters. 425-429
P2P/Grid
- Marc Fetscherin, Sabrina Zaugg:
Music Piracy on Peer-to-Peer Networks. 431-440 - Shu-Tzu Tsai, Chao-Tung Yang:
Decision Tree Construction for Data Mining on Grid Computing. 441-447 - Chao-Tung Yang, Yu-Lun Kuo, Chuan-Lin Lai:
Design and Implementation of a Computational Grid for Bioinformatics. 448-451 - Hsin-Chuan Ho, Chao-Tung Yang, Chi-Chung Chang:
Building an E-Learning Platform by Access Grid and Data Grid Technologies. 452-455
Mobile Technologies
- Liquan Chen:
A Scheme for MAC Isolation to Realize Effective Management in Public Wireless LAN. 459-464 - Eric Jui-Lin Lu, Chin-Wei Chen:
An Enhanced EDCG Replica Allocation Method in Ad Hoc Networks. 465-472 - Tian-han Gao, Nan Guo, Hong Zhao:
A Self-Adapting Mobile Ipv6 Model Based on MAP. 473-476
Internet Technologies (2)
- Keqiu Li, Hong Shen:
Optimal Placement of Web Proxies for Tree Networks. 479-486 - Nan Guo, Tianhan Gao, Hong Zhao:
Distributed Plug-and-Play Network Management Model Based on Mobile Agents. 487-491 - Woei-Kae Chen, Kuo-Hua Chung:
A Table Presentation System for Database and Web Applications. 492-498 - Hui Song, Suraj Giri, Fanyuan Ma:
Data Extraction and Annotation for Dynamic Web Pages. 499-502 - Jun Lai, Ben Soh:
Using Element and Document Profile for Information Clustering. 503-506
Internet Technologies (3)
- William Kwok-Wai Cheung:
e-Transformation Technologies: Case Studies and the Road Ahead - A Value Chain Perspective. 510-517 - Pei-Jeng Kuo, Terumasa Aoki, Hiroshi Yasuda:
MPEG-7 Based Dozen Dimensional Digital Content Architecture for Semantic Image Retrieval Services. 518-525 - Wan-Song Zhang, Daxin Liu, Jian Li:
An Encoding Scheme for Indexing XML Data. 526-529 - Benjamin P.-C. Yen:
Structure-Based Analysis of Web Sites. 530-533 - Chi-Chien Pan, Kai-Hsiang Yang, Tzao-Lin Lee:
Secure Online Examination Architecture Based on Distributed Firewall. 534-537 - Sheng-Tun Li, Chu-Hung Lin, Yuan-Chun Chang, Jin-Tan David Yang:
On the Distributed Management of SCORM-Compliant Course Contents. 538-539
Security & Trust (2)
- Yuan-Liang Tang, Ching-Ting Chen:
Image Authentication Using Relation Measures of Wavelet Coefficients. 543-547 - António Leong, Simon Fong, Shirley W. I. Siu:
Smart Card-Based Irregular Access Patterns Detection System. 548-555 - Jong-Phil Yang, Chul Sur, Hwa-Sik Jang, Kyung Hyune Rhee:
Practical Modification of an Efficient Public-Key Framework. 556-559 - Yongbin Zhou, Zhenfeng Zhang, Sihan Qing, Juan Liu:
A New CEMBS Based on RSA Signatures and Its Application in Constructing Fair Exchange Protocol. 560-564 - Hung-Min Sun, Bin-Tsan Hsieh, Shin-Mu Tseng:
Cryptanalysis of Aydos et al.'s ECC-Based Wireless Authentication Protocol. 565-568 - Tzer-Shyong Chen, Kuo-Hsuan Huang, Yu-Fang Chung:
Modified Cryptographic Key Assignment Scheme for Overcoming the Incorrectness of the CHW Scheme. 569-572
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.