ISECS 2008:
Guangzhou,
China
Fei Yu, Qi Luo, Yongjun Chen, Zhigang Chen (Eds.):
Proceedings of The International Symposium on Electronic Commerce and Security, ISECS 2008, August 3-5, 2008, Guangzhou, China.
IEEE Computer Society 2008, ISBN 978-0-7695-3258-5 BibTeX
Intelligent Computing
- Yueqin Zhang, Shiying Chen, Jinfeng Liu, Fu Duan:
The Application of Genetic Algorithm in Vehicle Routing Problem.
3-6
Electronic Edition (link) BibTeX
- Shulin Chen, Lei Wang:
The Algorithm of Obtaining Best Rules Based on Rough Set.
7-10
Electronic Edition (link) BibTeX
- Jiang Kaizhong, Lu Zhao, Wu Yuan-qiong, Gu Jun-zhong:
An Algorithm of Topic Distillation Based on Anchor Text.
11-15
Electronic Edition (link) BibTeX
- Chin-Chen Chang, The Duc Kieu, Yung-Chen Chou:
A High Payload Steganographic Scheme Based on (7, 4) Hamming Code for Digital Images.
16-21
Electronic Edition (link) BibTeX
- Liaojun Pang, Huixian Li, Ye Yao, Yumin Wang:
A Verifiable (t, n) Multiple Secret Sharing Scheme and Its Analyses.
22-26
Electronic Edition (link) BibTeX
- Bingru Yang, Zefeng Song, Yinglong Wang, Wei Song:
A New Web Text Clustering Algorithm Based on DFSSM.
27-32
Electronic Edition (link) BibTeX
- Xu Ru-zhi, Nie Pei-yao, Lin Pei-guang, Chu Dong-sheng:
Cloud Model-based Data Attributes Reduction for Clustering.
33-36
Electronic Edition (link) BibTeX
- T. J. Jia:
Construction of Learning Algorithm based on SGA Bayesian Network.
37-40
Electronic Edition (link) BibTeX
- Ting Wu, Min Zhang, Xiaoliang Xu, Rongbo Wang:
Improved Algorithm for Tate Pairing Computation.
41-45
Electronic Edition (link) BibTeX
- Dazhen Wang, Kwang Mong Sim, Benyun Shi:
A Deadline and Cost Constrained Optimization Algorithm for Scheduling Applications in Grids Based on Proportional Share Systems.
46-50
Electronic Edition (link) BibTeX
Web Applications
- Nie Gang:
A Scheme of Workflow Management System Based on Web Services.
53-56
Electronic Edition (link) BibTeX
- Ying Mei, Liangsheng Zhu:
High Efficiency Association Rules Mining Algorithm for Bank Cost Analysis.
57-60
Electronic Edition (link) BibTeX
- Wenli Dong:
Dynamic Reconfiguration Method for Web Service Based on Policy.
61-65
Electronic Edition (link) BibTeX
- Qisong Chen, Yun Wu, Xiaowei Chen:
Research on Customers Demand Forecasting for E-business Web Site Based on LS-SVM.
66-70
Electronic Edition (link) BibTeX
- Sheng Chai, Yang Cheng, Jifan Qiu, Wei Zhou:
An XML based Flexible Security E-Commerce Mode.
71-73
Electronic Edition (link) BibTeX
- Aimin Wang, Jipeng Wang:
The Design and Implementation of the Distribution Resource Planning Management System Based on WEB.
74-77
Electronic Edition (link) BibTeX
- Zhaoyang Qu, Hong Gao, Yi Zhu:
Research on High-accuracy Position Prediction Algorithm in Online Game.
78-81
Electronic Edition (link) BibTeX
- Jianbin Huang, Heli Sun:
A Reliable Web Service Implementation Approach for Large Commercial Applications.
82-85
Electronic Edition (link) BibTeX
- Hui Chen, Zheng Li:
The Factors Influencing Chinese Online Shopper's Satisfaction in Web2.0 Era.
86-90
Electronic Edition (link) BibTeX
- Yi Jiang, Qingling Yue, Zhaogui Qin:
A Novel Constructing Algorithm of E-learning Community.
91-94
Electronic Edition (link) BibTeX
- Wu Deng, Xinhua Yang, Huimin Zhao, Dan Lei, Hua Li:
Study on EAI Based on Web Services and SOA.
95-98
Electronic Edition (link) BibTeX
- Hongqi Li, Zhuang Wu, Xiaogang Ji:
Research on the Techniques for Effectively Searching and Retrieving Information from Internet.
99-102
Electronic Edition (link) BibTeX
Networks
- Zenggang Xiong, Xuemin Zhang, Jianxin Chen:
Research on Grid Resource Discovery Scheme Integrated P2P Mode.
105-109
Electronic Edition (link) BibTeX
- Shuang Xiang, Mingdi Xu, Li Wang, Huanguo Zhang:
Design Secure Contexts Detect Based on Lattice for Grid Computing Environment.
110-113
Electronic Edition (link) BibTeX
- Yejiang Zhang, Zhitang Li, Zhengbing Hu, Hao Tu, Huaiqing Lin:
A P2P E-commerce Related Network Security Issue: P2P Worm.
114-117
Electronic Edition (link) BibTeX
- Shufen Peng, Jingsha He, Yao Meng:
Reputation-based Trust Update in Network Environment.
118-123
Electronic Edition (link) BibTeX
- GaoJun Fan, Feng Liang, Shiyao Jin:
An Efficient Approach for Point Coverage Problem of Sensor Network.
124-128
Electronic Edition (link) BibTeX
- Chunhua Ju, Qibei Lu, Zhongyong Kong:
The Research and Design of Grid-based Business Intelligence Network-BGBIN.
129-132
Electronic Edition (link) BibTeX
- Yang Cheng, Zhishu Li, Wei Zhou, Sheng Cai, Peng Zhou:
Design of Network Interface in Distributed Data Acquisition System for E-Commerce.
133-136
Electronic Edition (link) BibTeX
- Jingbo Hao, Jianping Yin:
A Preliminary Study of Coordinated Worm Networks.
137-140
Electronic Edition (link) BibTeX
Information Processing
- Juan Yang, Yun Bai, Yuhui Qiu:
To Select the Service in Context Aware Systems Using Concept Similarity Mechanism.
143-147
Electronic Edition (link) BibTeX
- Jianhu Cai, Huanhuan Wang, Gengui Zhou:
Study on a Two-Echelon Supply Chain VMI Model under Demand Uncertainty.
148-152
Electronic Edition (link) BibTeX
- Zhao Huawei, Zhang Wenyu:
Definitions and Analysis of Integrity in Strand Spaces Model.
153-158
Electronic Edition (link) BibTeX
- Wei Zhou, Christoph Meinel:
Enforcing Information Flow Constraints in RBAC Environments.
159-164
Electronic Edition (link) BibTeX
- Han-ling Zhang, Shu-yi Wang:
A New Steganalysis Method Using High-pass Filter for JPEG Image.
165-168
Electronic Edition (link) BibTeX
- Yi Ren, Zhiting Xiao, Sipei Guo:
An Extended RBAC Model for Uniform Implementation of Role Hierarchy and Constraint.
169-174
Electronic Edition (link) BibTeX
- Xiaofeng Zhang:
A New Modeling Method for the Data Analysis Solution in Business.
175-178
Electronic Edition (link) BibTeX
- Yali Liu, Xinchun Yin, Liang Qiu:
ID-Based Forward-Secure Signature Scheme from the Bilinear Pairings.
179-183
Electronic Edition (link) BibTeX
- Chin-Chen Chang, Chia-Chen Lin, T. Hoang Ngan Le, Hoai Bac Le:
A Probabilistic Visual Secret Sharing Scheme for Grayscale Images with Voting Strategy.
184-188
Electronic Edition (link) BibTeX
- E. Xu, Shaocheng Tong, Yuan Wang, Shang Xu, Peng Li:
Approach to Missing Data Recovery.
189-192
Electronic Edition (link) BibTeX
Machine Learning
- Shanli Wang:
Research on a New Effective Data Mining Method Based on Neural Networks.
195-198
Electronic Edition (link) BibTeX
- Yang Cheng, Zhishu Li, Peng Zhou, Sheng Chai, Wei Zhou:
Study on Data Enriching Algorithm Based on Rough Set in E-commerce.
199-202
Electronic Edition (link) BibTeX
- Xiao-neng Xie, Fei Wu:
Automatic Video Summarization by Affinity Propagation Clustering and Semantic Content Mining.
203-208
Electronic Edition (link) BibTeX
- Wenzhe Qi, Chenghui Yang, Jianjun Meng:
Circuit Failure Diagnosis Analysis and Research Based On Neural Network.
209-212
Electronic Edition (link) BibTeX
- Quan Zhang, Yahong Li, Jing Huang:
An Entropy-based Approach for Supplier Selection with Interval Information.
213-216
Electronic Edition (link) BibTeX
- Li Jian:
An Agent Bilateral Multi-issue Alternate Bidding Negotiation Protocol Based on Reinforcement Learning and its Application in E-commerce.
217-220
Electronic Edition (link) BibTeX
- Jun Zhai, Lixin Shen, Yiduo Liang, Jiatao Jiang:
Application of Fuzzy Ontology to Information Retrieval for Electronic Commerce.
221-225
Electronic Edition (link) BibTeX
- Wei Han, Lingbo Liu, Huaili Zheng:
Dynamic Pricing by Multiagent Reinforcement Learning.
226-229
Electronic Edition (link) BibTeX
- Jizi Li, Baishun Li, Zhiping Li:
Selecting Supplier of Cluster Supply Chain Based on Fuzzy Measurement.
230-233
Electronic Edition (link) BibTeX
Mobile Commerce
- Tao Zhou:
The Impact of Perceived Value on User Acceptance of Mobile Commerce.
237-240
Electronic Edition (link) BibTeX
- Tao Zhou:
Exploring Mobile User Acceptance Based on UTAUT and Contextual Offering.
241-245
Electronic Edition (link) BibTeX
- Decai Meng, Qingfei Min, Yuping Li:
Study on Trust in Mobile Commerce Adoption - A Conceptual Model.
246-249
Electronic Edition (link) BibTeX
- Shaojing Fan, Zhongkun He, Yongping Zhang, Hongmei Zhang, Rina Su:
An m-Business Model Based on Session Initiation Protocol.
250-253
Electronic Edition (link) BibTeX
- Wang Liang, Guo Yajun, Yan Huifang:
A Fuzzy Anonymity Analysis Model for Mobility in Anonymity System.
254-257
Electronic Edition (link) BibTeX
- Qi Yuan, Zhao Xiaokang, Zhang Qiong:
Key Technology and System Design in Mobile Supply Chain Management.
258-262
Electronic Edition (link) BibTeX
- Zhihong Li, Minxia Li:
Research on Influencing Factors of Consumer Initial Trust Based on Mobile Commerce.
263-267
Electronic Edition (link) BibTeX
- Jin Yan, Li Tong:
Compare and Analysis of Security Strategy in WAP and I-Mode Network.
268-271
Electronic Edition (link) BibTeX
- Guoling Lao, Xinwang Wang:
Application Analysis of M-commerce in Digitized Urban Management.
272-275
Electronic Edition (link) BibTeX
- Xiang Yi-ming, Chen Qi:
A Study on M-Commerce Industry Development and Market Structure in China.
276-280
Electronic Edition (link) BibTeX
Applied Cryptography (I)
- Shan-Qing Guo, Zhong-Hua Zhao:
An Anomaly Intrusion Detection Model Based on Limited Labeled Instances.
283-287
Electronic Edition (link) BibTeX
- Guicheng Shen, Xuefeng Zheng:
Research on Implementation of Elliptic Curve Cryptosystem in E-Commerce.
288-291
Electronic Edition (link) BibTeX
- Chen Zemao, Wu Xiaoping, Tang Weimin:
An Executable Code Authorization Model for Secure Operating System.
292-295
Electronic Edition (link) BibTeX
- Yang Lu, Jiguo Li, Junmo Xiao:
Applying the Fujisaki-Okamoto Conversion to Certificate-based Encryption.
296-300
Electronic Edition (link) BibTeX
- Jianyong Chen, Xiaomin Wang, Liwen He:
An Architecture for Differentiated Security Service.
301-304
Electronic Edition (link) BibTeX
- Tianjie Cao, Peng Shen, Elisa Bertino:
Cryptanalysis of the LCSS RFID Authentication Protocol.
305-309
Electronic Edition (link) BibTeX
- Like Chen, Runtong Zhang:
A Key-dependent Cipher DSDP.
310-313
Electronic Edition (link) BibTeX
- Xiangran Cheng, Xingyuan Chen, Bin Zhang, Yan Yang:
A Novel Trust Collecting Mechanism Based on Publish/Subscribe Scheme in Grid Computing.
314-317
Electronic Edition (link) BibTeX
- Han Jian-min, Yu Hui-qun, Yu Juan, Cen Ting-ting:
A Complete (alpha, k)-Anonymity Model for Sensitive Values Individuation Preservation.
318-323
Electronic Edition (link) BibTeX
Applied Cryptography (II)
- Xiaojun Ye, Lei Jin, Bin Li:
A Multi-Dimensional K-Anonymity Model for Hierarchical Data.
327-332
Electronic Edition (link) BibTeX
- Qing Zhang, Qiaoyan Wen, Gengli Chen:
Efficient Fair Contract Signing Protocol from Bilinear Pairings.
333-337
Electronic Edition (link) BibTeX
- Shimin Wei, Zepeng Zhuo:
Research on PKI Model Based on NTRU.
338-342
Electronic Edition (link) BibTeX
- Xinxia Song, Zhigang Chen:
A Distributed Electronic Authentication Scheme in E-Business System.
343-346
Electronic Edition (link) BibTeX
- Yunpeng Zhang, Fei Zuo, Zhengjun Zhai, Xiaobin Cai:
A New Image Encryption Algorithm Based on Multiple Chaos System.
347-350
Electronic Edition (link) BibTeX
- Bin Jiang, Xijian Ping, Tao Zhang:
Pattern Analysis Applied on Steganalysis for Binary Text Images.
351-354
Electronic Edition (link) BibTeX
- Debasis Giri, P. D. Srivastava:
Cryptanalysis and Improvement of a Remote User Authentication Scheme using Smart Cards.
355-361
Electronic Edition (link) BibTeX
- Shangping Wang, Zhiqiang Chen, Xiaofeng Wang:
A New Certificateless Electronic Cash Scheme with Multiple Banks Based on Group Signatures.
362-366
Electronic Edition (link) BibTeX
- Roy Ng, LinYing Dong:
An Information Assurance Framework on Trusted Autonomic Communications.
367-373
Electronic Edition (link) BibTeX
Information Security (I)
- Hu Ruo, Xu Hong:
Independent Coordination Solutions of Dynamic Information Security.
377-380
Electronic Edition (link) BibTeX
- Liu Yihe, Tang Nianqing, He Wenxiao:
An Information Security Model Based on P2P Network.
381-384
Electronic Edition (link) BibTeX
- Hung-Min Sun, King-Hang Wang:
Defending Secret-Key Based Authentication Protocols against the Stolen-Secret Attack.
385-389
Electronic Edition (link) BibTeX
- Zhiming Qu, Tongbin Ma, Yunlong Zhang:
Application of Parameter Modulation in E-Commerce Security Based on Chaotic Encryption.
390-393
Electronic Edition (link) BibTeX
- Shigen Shen, Guangxue Yue:
Unified Certificate Validation System DNS-OCSP.
394-397
Electronic Edition (link) BibTeX
- Jian Wang, Jian Gu, Fang Mei, Zhe Zhang, Yanheng Liu:
One New BRAS Model Based on Trusted Network.
398-401
Electronic Edition (link) BibTeX
- Zheng Wu, Debao Xiao, Min Xiao, Xi Peng:
Using Multilevel Correlation in a Unified Platform of Network Security Management: Design and Implementation.
402-406
Electronic Edition (link) BibTeX
- Chunming Tang, Dingyi Pei, Zheng-an Yao:
5-Round Computational Zero-Knowledge Proof with Negligible Error Probability for Any NP from Any One-Way Permutation.
407-411
Electronic Edition (link) BibTeX
- Wenhua Xu, Qianhua He, Yanxiong Li, Tao Li:
Cancelable Voiceprint Templates Based on Knowledge Signatures.
412-415
Electronic Edition (link) BibTeX
- Rui Guo, Bosheng Zhou:
Cross Cookie: A Cookie Protocol for Web Mashups.
416-420
Electronic Edition (link) BibTeX
- Qiong Wei, Yansheng Lu:
Preservation of Privacy in Publishing Social Network Data.
421-425
Electronic Edition (link) BibTeX
- Chen Feng, Su Jin-Shu:
A Flexible Approach to Measuring Network Security Using Attack Graphs.
426-431
Electronic Edition (link) BibTeX
- Jiandong Liu, Shuhong Wang, Youming Yu:
TDHA-A One-Way Hash Algorithm Based on Extended Integer Tent Maps with Dynamic Properties.
432-436
Electronic Edition (link) BibTeX
Information Security (II)
- Ding Yong:
Tamper Difficult Technique for Data Residing on Passive Storage.
439-442
Electronic Edition (link) BibTeX
- Ling Zhan, Ji-Guang Wan, Peng Gu:
Metadata Management for Distributed Multimedia Storage System.
443-447
Electronic Edition (link) BibTeX
- Jian He, Mingdi Xu:
Research on Storage Security Based on Trusted Computing Platform.
448-452
Electronic Edition (link) BibTeX
- Wei Sun, Xiangwei Kong, Dequan He, Xingang You:
Information Security Game Analysis with Penalty Parameter.
453-456
Electronic Edition (link) BibTeX
- Liqiang Zhang, Huanguo Zhang:
An Introduction to Data Capturing.
457-461
Electronic Edition (link) BibTeX
- Wang Shaohui:
Modification and Improvement on Group Signature Scheme without Random Oracles.
462-466
Electronic Edition (link) BibTeX
- Jianjun Meng, Chenghui Yang, Wenzhe Qi:
Servicing Work Safety Supervision System for Electric Locomotive Based on Configuration Software.
467-470
Electronic Edition (link) BibTeX
- Ye Jun, Li Zhishu, Ma Yanyan:
JSON Based Decentralized SSO Security Architecture in E-Commerce.
471-475
Electronic Edition (link) BibTeX
- Shi Changqiong, Wang Dawei, Huang Hui, Dafang Zhang:
Network Intrusion Rules Extraction Based on Rough Set and Niche Genetic Algorithm.
476-481
Electronic Edition (link) BibTeX
- Lu Huijuan, Chen Jianguo, Wei Wei:
Two Stratum Bayesian Network Based Anomaly Detection Model for Intrusion Detection System.
482-487
Electronic Edition (link) BibTeX
- Xiaogang Ji:
Research on the Automatic Summarization Model based on Genetic Algorithm and Mathematical Regression.
488-491
Electronic Edition (link) BibTeX
- Siyuan Wu, Zhixing Huang:
A Gossip-based Opinion Diffusion Model via Uninorm Aggregation Operator.
492-496
Electronic Edition (link) BibTeX
- Yaling Zhang, Xiaofeng Wang:
Message Substitute Attack on Concurrent Signatures Protocol and its Improvement.
497-501
Electronic Edition (link) BibTeX
- Liu Wei-Peng, Hu Ju:
A Formal Model of Trust and Security for Task-Oriented Information System.
502-506
Electronic Edition (link) BibTeX
Information Security (III)
- Wuwei Li, Yuhong Wang, Ao Chen:
Grey Relational Evaluation on Vendor Selection Based on E-business.
509-513
Electronic Edition (link) BibTeX
- Shaobo Zhong:
Information Intelligent System based on Web Data Mining.
514-517
Electronic Edition (link) BibTeX
- Leon Pan:
Using Criterion-Based Access Control for Multilevel Database Security.
518-522
Electronic Edition (link) BibTeX
- Wang Juan, Zhou Yajie, Zhang Huanguo:
The Simplified Inductive Approach to Verifying Security Protocols.
523-526
Electronic Edition (link) BibTeX
- Lingyan Bi, Zewei Feng, Min Liu, Weining Wang:
Design and Implementation of the Airline Luggage Inspection System Base on Link Structure of QR Code.
527-530
Electronic Edition (link) BibTeX
- Amontip Jumratjaroenvanit, Yunyong Teng-amnuay:
Probability of Attack Based on System Vulnerability Life Cycle.
531-535
Electronic Edition (link) BibTeX
- Jianqiang Hu, Feng E. Luo, Jun Li, Xin Tong, Guiping Liao:
SOA-based Enterprise Service Bus.
536-539
Electronic Edition (link) BibTeX
- Hong Tang, Liehuang Zhu, Yuanda Cao, Dazhen Wang:
A Novel Tree-based Authenticated Dynamic Group Key Agreement Protocol for Wireless Sensor Network.
540-544
Electronic Edition (link) BibTeX
- Dong Li, Zhitang Li, Jie Ma:
Processing Intrusion Detection Alerts in Large-scale Network.
545-548
Electronic Edition (link) BibTeX
- Zhenhua Wu:
Biometrics Authentication System on Open Network and Security Analysis.
549-553
Electronic Edition (link) BibTeX
- Wei Sun, Xiangwei Kong, Dequan He, Xingang You:
Information Security Problem Research Based on Game Theory.
554-557
Electronic Edition (link) BibTeX
- Jia Yu, Fanyu Kong, Rong Hao, Dexiang Zhang:
Construction of Server-assisted Forward Secure Signature Using Bellare-Miner Scheme.
558-561
Electronic Edition (link) BibTeX
- Wei Cheng, Zhenhua Tan, Xiaoxing Gao, Guiran Chang, Jia Wen:
High Speed Serial Interface & Some Key Technology Research.
562-566
Electronic Edition (link) BibTeX
Risk Analysis
- Chong Wang, Wenkuan Chen, Peiji Shao:
E-business Enterprise Credit Risk Evaluation Based on Markov Chain.
569-572
Electronic Edition (link) BibTeX
- Liu Jindi, Xu Yong:
The Credit Risk Analysis and Prevention of Third Party Payment Platform.
573-576
Electronic Edition (link) BibTeX
- Liu Bin, Cui Wentian, Xin Chunlin:
Cash Management and Its Risk Control under No-Stationary Uncertain Demand.
577-581
Electronic Edition (link) BibTeX
- Fang Fang, Ye Xin, Xia Yun, Xu Haitao:
An Opponent's Negotiation Behavior Model to Facilitate Buyer-seller Negotiations in Supply Chain Management.
582-587
Electronic Edition (link) BibTeX
- Lixia Yang, Xun Liu, Changyong Xu:
Hindrances to the Development of Tourism E-Commerce in China.
588-591
Electronic Edition (link) BibTeX
- Junfeng Tian, Tao Liu, Hongqiang Jiao:
Entropy Weight Coefficient Method for Evaluating Intrusion Detection Systems.
592-598
Electronic Edition (link) BibTeX
- Limao Yang, Xuan Tang:
Research of C2C E-Business Trust Evaluation Model Based on Entropy Method.
599-602
Electronic Edition (link) BibTeX
- Ranzhe Jing, Jianwei Yu, Zuo Jiang:
Exploring Influencing Factors in E-Commerce Transaction Behaviors.
603-607
Electronic Edition (link) BibTeX
- Chen Pang, Xiaofen Ji:
An Empirical Study on Predicting User Purchase Intention on the Creative Product: A Case of Apparel.
608-611
Electronic Edition (link) BibTeX
- Jun Yu, Bin Xu:
A Framework for Seamless Integration of Legacy Business Applications into Enterprise Business Intelligent System.
612-616
Electronic Edition (link) BibTeX
- Jun Yang, Xianze Yang:
Implementing Multi-party Key Exchange by Linear Combination of Elliptic Curve Points.
617-622
Electronic Edition (link) BibTeX
- Zhang Hong, Liu Lei:
An Abstract Interpretation Frame of the Calculus of Boxed Ambients Based on the Ambient Occurrence Counting.
623-626
Electronic Edition (link) BibTeX
Business Process Integration
- Hongju Zhang, Jiajia Liu, Zhijun Yan:
A Research of Outsourcing Decision-making Based on Outsourcing Market Maturity.
629-632
Electronic Edition (link) BibTeX
- Yongming Cai, Wei Chen:
General Service Pricing Strategies Research Based on Dynamic Stochastic Wealth Model.
633-637
Electronic Edition (link) BibTeX
- Lilin Diao, Yanan Ma:
A Versatile SOA-based E-Business Platform.
638-641
Electronic Edition (link) BibTeX
- Guangshu Chang:
The Analysis of Supply Chain Procurement Strategy in E-Commerce.
642-646
Electronic Edition (link) BibTeX
- Yongjian Fan, Yanguang Shen, Jianying Mai:
Study of the Model of E-commerce Personalized Recommendation System Based on Data Mining.
647-651
Electronic Edition (link) BibTeX
- Jui-Chin Jiang, Chun-An Chen, Chih-Chien Wang:
Knowledge and Trust in E-consumers' Online Shopping Behavior.
652-656
Electronic Edition (link) BibTeX
- Li Yu, Ming Dong, Rong Wang:
Taxonomy for Personalized Recommendation Service.
657-660
Electronic Edition (link) BibTeX
- Peide Liu, Hongtao Du:
The Research of Supplier Selection Based on Hybrid Decision-Making Index and VIKOR Method.
661-664
Electronic Edition (link) BibTeX
- Chunhua Ju, Chaohua Zhang:
A Collaboration Model for E-government Based on Semantics and Multi-agent.
665-669
Electronic Edition (link) BibTeX
- Chunhua Ju, Feipeng Guo:
Research and Application of Customer Churn Analysis in Chain Retail Industry.
670-673
Electronic Edition (link) BibTeX
- Yan Cao, Yanli Yang, Huamin Wang:
Integrated Routing Wasp Algorithm and Scheduling Wasp Algorithm for Job Shop Dynamic Scheduling.
674-678
Electronic Edition (link) BibTeX
- Jinsong Gao, Jinhui Xu, Zibo Zhou, Zhuojun Li:
Customer Satisfaction Evaluation for Mobile Commerce Based on Fuzzy Comprehensive Evaluation.
679-682
Electronic Edition (link) BibTeX
Electronic Commerce Applications
Electronic Payment
Innovative E-Business Models
Enterprise Integration Applications
- Qi Yue, Hailin Lan, Luan Jiang:
Ownership Motivation and Corporate Performance in IT Industry under the Wave of E-Commerce: An Empirical Study based on Chinese Public Companies.
829-833
Electronic Edition (link) BibTeX
- Qingying Zhang, Weihong Yue, Chengfang Wang:
Research on the Application of CSCW in Shipbuilding Industry.
834-837
Electronic Edition (link) BibTeX
- Peizhi Wang, Xinying Liu, Wenbo Li:
Analysis on Features and Countermeasures of Foreign-founded Enterprises' Sole Proprietorship in China.
838-842
Electronic Edition (link) BibTeX
- Xing Wan, Lei Huang:
Research on e-Commerce Application Architecture Based on the Integration of Workflow and Agile Service.
843-849
Electronic Edition (link) BibTeX
- Delin Hou, Huosong Xia:
Application of Streaming Media Technology in Electronic Commerce.
850-853
Electronic Edition (link) BibTeX
- Huiwen Tu, Feng Xie:
A Study of Consumer Trust Formation in Electronic-Commerce.
854-857
Electronic Edition (link) BibTeX
- Minghua Han, Chunhua Ju:
Research and Application on OLAP-based Farm Products Examination Model.
858-861
Electronic Edition (link) BibTeX
- Cui Jin-hong, Wang Xu:
Formalization and Verification of Inter-organizational Workflow Modeling for E-Commerce.
862-865
Electronic Edition (link) BibTeX
- Yang Liu:
An Analysis of Knowledge Sharing Incentive Mechanism inside the Enterprise Based on Evolutionary Game.
866-869
Electronic Edition (link) BibTeX
- Mehdi Fasanghari, Navid Gholamy, S. Kamal Chaharsooghi, Shohre Qadami, Mohamad Soltani Delgosha:
The Fuzzy Evaluation of E-Commerce Customer Satisfaction Utilizing Fuzzy TOPSIS.
870-874
Electronic Edition (link) BibTeX
Information Hiding and Watermarking (I)
- Zhihua Xie, Shengqian Wang, Lixin Gan, Lin Zhang, Zhenghua Shu:
Content Based Image Watermarking in the Ridgelet Domain.
877-881
Electronic Edition (link) BibTeX
- Yuping Hu:
A Watermarking Protocol for Piracy Tracing.
882-885
Electronic Edition (link) BibTeX
- Fu Yu, Wu Xiaoping, Chen Zemao, Ye Qing:
A Wavelet Digital Watermarking Algorithm Based on Chaotic Mapping.
886-889
Electronic Edition (link) BibTeX
- Qiaozhuo Du, Fei Peng:
A Zero-Watermark Algorithm with Real-Mean for 2D Engineering Graphic.
890-893
Electronic Edition (link) BibTeX
- Daofang Cheng, Xiaolong Li, Wenfa Qi, Bin Yang:
A Statistics-Based Watermarking Scheme Robust to Print-and-Scan.
894-898
Electronic Edition (link) BibTeX
- Deng Minghui, Yang Fang, Zhen Jingbo:
Robust Image Watermarking Algorithm against Shearing.
899-903
Electronic Edition (link) BibTeX
- Yongzhong Li, Hua Zhu, Ruiqing Yu, Ge Yang, Jing Xu:
An Adaptive Blind Watermarking Algorithm Based on DCT and Modified Watsons Visual Model.
904-907
Electronic Edition (link) BibTeX
- Jiaxin Yu, Xinsheng Wang, Jianfei Li, Xu Nan:
An Effective Fragile Document Watermarking Technique.
908-911
Electronic Edition (link) BibTeX
- Hu Zhihua, Niu Jiping:
A Numeric Watermark Method Based on Valve-Value Surface.
912-915
Electronic Edition (link) BibTeX
- Xia Sun, Ziqiang Wang, Dexian Zhang:
A Watermarking Algorithm Based on MA and DWT.
916-919
Electronic Edition (link) BibTeX
Information Hiding and Watermarking (II)
- Mina Deng, Bart Preneel:
Attacks on Two Buyer-Seller Watermarking Protocols and an Improvement for Revocable Anonymity.
923-929
Electronic Edition (link) BibTeX
- Congxu Zhu, Yuping Hu:
A Multipurpose Watermarking Scheme for Image Authentication and Copyright Protection.
930-933
Electronic Edition (link) BibTeX
- Jianquan Xie, Chunhua Yang, Dazu Huang, Duosi Xie:
A Large Capacity Blind Information Hiding Algorithm.
934-937
Electronic Edition (link) BibTeX
- Ruisong Ye, Huiliang Li:
A Novel Image Scrambling and Watermarking Scheme Based on Cellular Automata.
938-941
Electronic Edition (link) BibTeX
- Na Li, Xiaoshi Zheng, Yanling Zhao, Huimin Wu, Shifeng Li:
Robust Algorithm of Digital Image Watermarking Based on Discrete Wavelet Transform.
942-945
Electronic Edition (link) BibTeX
- Gengming Zhu:
Research on an Advanced Novel Watermarking Technology with Higher Robustness.
946-950
Electronic Edition (link) BibTeX
- Xiaoming Zhang, Xiong Yin, Zhaoyang Yu:
Histogram Specification-based Audio Watermarking Technology against Filtering Attacks in Time Domain.
951-956
Electronic Edition (link) BibTeX
- Huajun Huang, Shaohong Zhong, Xingming Sun:
Steganalysis of Information Hidden in Webpage Based on Higher-order Statistics.
957-960
Electronic Edition (link) BibTeX
Intelligent Systems
- Shouqiang Liu, Deyu Qi, Jun Xiang, Baogang Chen:
Research and Design on Reputation Services (RS) System.
963-966
Electronic Edition (link) BibTeX
- Shijue Zheng, Shaojun Xiong, Yin Huang, Shixiao Wu:
Using Methods of Association Rules Mining Optimizationin in Web-Based Mobile-Learning System.
967-970
Electronic Edition (link) BibTeX
- Yong Feng, Hongyan Xu, Song Yan:
Research on the Construction of Customer-centered Integrative Knowledge Push System.
971-975
Electronic Edition (link) BibTeX
- Guoyin Jiang, Lihong Dong:
Comparative Research of Modeling Methods for Workflow Process.
976-980
Electronic Edition (link) BibTeX
- Tao Liu, Zhifeng Hu, Yan Zhou, Zhijie Wang:
A Modified Resource Limited Artificial Immune System.
981-985
Electronic Edition (link) BibTeX
- Yan Li:
The Research on Multi-agent Framework for Decision Support System and Its Application.
986-989
Electronic Edition (link) BibTeX
- Shuliang Zhao, Haifeng Liu, Zhaohao Sun:
Scalable Trust in Multi-agent E-commerce System.
990-993
Electronic Edition (link) BibTeX
International Finance
Other Topics
- Hong-Jiao Ma, Yu Hua, Wei Guo:
Electronic Time Stamping Safety and Efficiency Optimize Technique Research.
1033-1036
Electronic Edition (link) BibTeX
- Qi Ming, Xie Jingxu:
Research on Witkey Model Based on TRIZ.
1037-1040
Electronic Edition (link) BibTeX
- Yong-Zhong He, Zhen Han, Ye Du:
Context Active RBAC and its Applications.
1041-1044
Electronic Edition (link) BibTeX
- Qiaolian Cheng, Ruijin Zhang, Yezhuang Tian:
Study on Information Technology Capabilities based on Value Net Theory.
1045-1050
Electronic Edition (link) BibTeX
- Guan Xu, Jian Su, Hongda Pan, Donglin Zhang:
A Novel Method for Wheel Rim Recognition.
1051-1054
Electronic Edition (link) BibTeX
- Ming Qi, Beilei Shangguan:
Design of the Knowledge Management Integrated System Based on TRIZ.
1055-1058
Electronic Edition (link) BibTeX
- Zhong-hua Deng, Bin Su:
Development Course for Information Platform Based on MDA.
1059-1062
Electronic Edition (link) BibTeX
- Hui Tan:
The Application of RFID Technology in the Warehouse Management Information System.
1063-1067
Electronic Edition (link) BibTeX
Copyright © Sat May 16 23:25:31 2009
by Michael Ley (ley@uni-trier.de)