By Topic

2006 IEEE Asia-Pacific Conference on Services Computing (APSCC'06)

12-15 Dec. 2006

Filter Results

Displaying Results 1 - 25 of 116
  • 2006 IEEE Asia-Pacific Conference on Services Computing - Cover

    Publication Year: 2006, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (174 KB)
    Freely Available from IEEE
  • 2006 IEEE Asia-Pacific Conference on Services Computing-Title

    Publication Year: 2006, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (42 KB)
    Freely Available from IEEE
  • 2006 IEEE Asia-Pacific Conference on Services Computing-Copyright

    Publication Year: 2006, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (52 KB)
    Freely Available from IEEE
  • 2006 IEEE Asia-Pacific Conference on Services Computing - TOC

    Publication Year: 2006, Page(s):v - xii
    Request permission for commercial reuse | PDF file iconPDF (54 KB)
    Freely Available from IEEE
  • Message from the Chairs

    Publication Year: 2006, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (23 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2006, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (25 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2006, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (20 KB)
    Freely Available from IEEE
  • Fuzzy Similarity from Conceptual Relations

    Publication Year: 2006, Page(s):3 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (323 KB) | HTML iconHTML

    Semantic similarity between concepts supported by the use of ontology plays a prominent role in the concept of the semantic level to provide semantic information for Web services discovery and composition. In this work we consider ontology as knowledge structure that specifies concepts and their semantic relations. And we propose a fuzzy similarity measure for not only atomic concepts with inclusi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy Petri Net-Based Evaluation to the Process of ERP Implementation

    Publication Year: 2006, Page(s):11 - 17
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB) | HTML iconHTML

    To avoid the risks on the process of enterprise resource planning (ERP) implementation, summarize the process of ERP implementation, and sum up the experiences and lessons, establishing an evaluation system to the process of ERP implementation. The evaluation indexes emphasized on the human-related critical factors which have important effects to implementation. An evaluation model and method base... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improved Secret Sharing with Access Structures in a Hierarchy

    Publication Year: 2006, Page(s):18 - 25
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (171 KB) | HTML iconHTML

    In 2004, Chang et al. presented an approach firstly to solve the problem of secret sharing with access structures in a hierarchy. After that, based on one way hash function, another proposed scheme was suggested by Lin et al. However, there is the same drawback in both schemes. When group secret keys need to be changed, the trust authority has to update related parameters of each branch in both th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Semantic Matchmaking Method of Web Services Based on SHOIN^+ (D)*

    Publication Year: 2006, Page(s):26 - 33
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (246 KB) | HTML iconHTML

    Capability matchmaking is one of the key issue in the field of Web services research community because it is the basis of doing service discovery and composition. Generally, the matchmaking of Web services involves the so called IOPE matchmaking. The method used in matchmaking IO is very different from the one used in matchmaking of PE. And the semantics reflected by IO is also very different from... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Approach to Web Services Discovery and Composition when Large Scale Services are Available

    Publication Year: 2006, Page(s):34 - 41
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (289 KB) | HTML iconHTML

    Web services composition and discovery are two most important research issues in the study of Web services. Based on the study on previous known conferences it is pointed out that the Web service composition tree (WSCT) is the key that affects the performance of Web services compositions when a large number of services are available. Then the mutual search operations among Web service operations, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Effective Technique for Personalization Recommendation Based on Access Sequential Patterns

    Publication Year: 2006, Page(s):42 - 46
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (250 KB) | HTML iconHTML

    Considering that personalization recommendation systems based on association rules suffer from some limitations that a lot of time is spent on matching current user session with all discovered patterns in patterns database, authors propose a new approach to build personalization recommendation system based on access sequential patterns discovered form usage data and highly compressed into a tree s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Algorithm for Predicting Customer Churn via BP Neural Network Based on Rough Set

    Publication Year: 2006, Page(s):47 - 50
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (211 KB) | HTML iconHTML

    To solve the prediction of customer churn, the paper proposed a new algorithm. Based on rough set theory, the algorithm used the consistency of condition attributes and decision attributes in information table, and the conception of super-cube and scan vector to discretize the continuous attributes, reduce the redundant attributes. And furthermore, it took BP neural network as the calculating tool... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fuzzy Multi-attribute Decision Making Algorithm for Web Services Selection Based on QoS

    Publication Year: 2006, Page(s):51 - 57
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB) | HTML iconHTML

    One of the challenging problems that Web service technology faces is the ability to rapidly locate useful on-line services based on their capabilities. With the increasing popularity of Web services, a wide variety of services are offered that can satisfy the functional requirements of a special task, therefore there is need for mediation infrastructures able to support humans or agents in the eve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Three Dimensional Layered Approach for Analyzing Value Chain Re-organization Cross ICT Industries for Converged Mobile Multimedia Services

    Publication Year: 2006, Page(s):58 - 63
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (327 KB) | HTML iconHTML

    ICT innovations, while driving technological advances, also create new services and new value chain structures. The nascent mobile multimedia services exhibit distinct attributes from conventional telecom, broadcast and Internet services. While traditional two-dimensional approach for value chain analysis serves less inadequate for the complex value system structures of converged mobile multimedia... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Algorithm for Web Services Composition with a Chain Data Structure

    Publication Year: 2006, Page(s):64 - 69
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (245 KB) | HTML iconHTML

    Automatic composition of Web services has drawn a great deal of attention recently. Current Web service (WS) composition algorithms are not only logical presented in a rough way, but also existed inefficient or limited applied scope problem. In this paper a data structure called WS chain table, which describes the dependent relations among Web services, is proposed, and an efficient algorithm for ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TreeLogit Model for Customer Churn Prediction

    Publication Year: 2006, Page(s):70 - 75
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB) | HTML iconHTML

    For the purpose of improving the predictive accuracy and interpret ability of churn prediction model, TreeLogit model, which integrates the advantage of AD tree model and logistic regression model, is proposed in this paper to predict customers' churn propensities. Compared with TreeNetreg, a model which won the gold prize in the 2003 mobile customer churn prediction modeling contest (The Duke/NCR... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improved Trust Model in P2P

    Publication Year: 2006, Page(s):76 - 81
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (249 KB) | HTML iconHTML

    Based on the Bayesian network trust model, an improved trust model is proposed in this paper. It includes two parts: one is the improved searching resource peers algorithm, which can reduce the redundancy packages received by peers and enhance the reliability of system; the other is the improved trust computing and updating method, which applies logarithm for evaluation and the number of services ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Model-Driven Aspect Framework for Grid Service Development

    Publication Year: 2006, Page(s): 82
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1096 KB) | HTML iconHTML

    Service-oriented architecture (SOA) plays an important role in the next generation computing models for scientific and commercial applications. But difficulties in the development and maintenance of grid services slow down the spread of service-based applications. A model-driven aspect framework (MDAF) is proposed in this paper to facilitate the development of grid services, which benefits from th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reversible Sketch Based on the XOR-Based Hashing

    Publication Year: 2006, Page(s):93 - 98
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (529 KB) | HTML iconHTML

    We provided a novel reversible sketch data structure which had exactly sub-linear finding time proportional to the sketch length. We first introduced the XOR-based hash functions over the Galois field GF({O,1},square,*), defined the full-ranked boolean matrix over GF({0,1}, square, *) and the maximum dispersion among the hash functions. Then, we chose d non-singular boolean matrices randomly to im... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Process-Based Design Verification for Systems Involving Shared Resources

    Publication Year: 2006, Page(s):99 - 106
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (321 KB) | HTML iconHTML

    In system synthesis, one need to derive from a given set of processes a system design which is correct in the sense that the system is well-behaved (that is, live, bounded and reversible). This is especially important for shared-resource systems, in which erroneous situations such as deadlock and capacity overflow are easily induced because of the sharing of common resources among different asynch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fair E-cash Payment Model on Credit Overdraft

    Publication Year: 2006, Page(s):107 - 111
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    It proposes a fair e-cash payment model on credit outdrawing, which can avoid the odd change and division of e-cash, users, according to the bill of credit issued by the bank, get the e-cash to pay their consumption to sellers after verification by the sellers without the participation of bank at each time. The role of banks is to solve the disputes between the users and sellers to ensure the fair... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fuzzy Neural Network Model with Application to Telecommunications Business

    Publication Year: 2006, Page(s):112 - 117
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (309 KB) | HTML iconHTML

    There are many factors involved in a revenue-forecasting problem of telecommunications business (TB), which are not independent and conflicted with each other. The traditional methods of forecasting TB revenues are based on regression analysis, but the precisions of the results are usually not satisfied in practice. In this study, statistical analysis is first used to evaluate factors and then the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cooperative Design and Development of Logistics Information System Based on Simple Factory Pattern

    Publication Year: 2006, Page(s):118 - 122
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (210 KB) | HTML iconHTML

    The logistics information system usually includes many subsystems with close interaction. The cooperative design is an inevitable in the development issue. This paper adopts the simple factory pattern to solve the programming problem at the beginning of system design that every subsystem is defined with interfaces to its referencing subsystems in order to invoke during programming and reduce the c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.