The 9th IEEE International Conference on E-Commerce Technology and The 4th IEEE International Conference on Enterprise Computing, E-Commerce and E-Services (CEC-EEE 2007)

23-26 July 2007

Filter Results

Displaying Results 1 - 25 of 113
  • The 9th IEEE International Conference on E-Commerce Technology and The 4th IEEE International Conference on Enterprise Computing, E-Commerce and E-Services - Cover

    Publication Year: 2007, Page(s): c1
    Request permission for commercial reuse | |PDF file iconPDF (213 KB)
    Freely Available from IEEE
  • The 9th IEEE International Conference on E-Commerce Technology and The 4th IEEE International Conference on Enterprise Computing, E-Commerce and E-Services - Title

    Publication Year: 2007, Page(s):i - iii
    Request permission for commercial reuse | |PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • The 9th IEEE International Conference on E-Commerce Technology and The 4th IEEE International Conference on Enterprise Computing, E-Commerce and E-Services - Copyright

    Publication Year: 2007, Page(s): iv
    Request permission for commercial reuse | |PDF file iconPDF (134 KB)
    Freely Available from IEEE
  • The 9th IEEE International Conference on E-Commerce Technology and The 4th IEEE International Conference on Enterprise Computing, E-Commerce and E-Services - Table of contents

    Publication Year: 2007, Page(s):v - xv
    Request permission for commercial reuse | |PDF file iconPDF (71 KB)
    Freely Available from IEEE
  • Message from the CEC and EEE Chairs

    Publication Year: 2007, Page(s): xvi
    Request permission for commercial reuse | |PDF file iconPDF (97 KB) | HTML iconHTML
    Freely Available from IEEE
  • CEC and EEE Organizing Committees

    Publication Year: 2007, Page(s): xviii
    Request permission for commercial reuse | |PDF file iconPDF (93 KB)
    Freely Available from IEEE
  • CEC and EEE Program Committee

    Publication Year: 2007, Page(s): xx
    Request permission for commercial reuse | |PDF file iconPDF (103 KB)
    Freely Available from IEEE
  • CEC and EEE External Reviewers

    Publication Year: 2007, Page(s): xxiii
    Request permission for commercial reuse | |PDF file iconPDF (76 KB)
    Freely Available from IEEE
  • Message from the GBSDP Chairs

    Publication Year: 2007, Page(s): xxiv
    Request permission for commercial reuse | |PDF file iconPDF (92 KB) | HTML iconHTML
    Freely Available from IEEE
  • GBSDP Organizing Committees

    Publication Year: 2007, Page(s): xxv
    Request permission for commercial reuse | |PDF file iconPDF (63 KB)
    Freely Available from IEEE
  • Message from the NGN-EC2 Chair

    Publication Year: 2007, Page(s): xxvi
    Request permission for commercial reuse | |PDF file iconPDF (90 KB) | HTML iconHTML
    Freely Available from IEEE
  • NGN-EC2 Organizing Committees

    Publication Year: 2007, Page(s): xxvii
    Request permission for commercial reuse | |PDF file iconPDF (62 KB)
    Freely Available from IEEE
  • Message from the WMEE Chairs

    Publication Year: 2007, Page(s): xxviii
    Request permission for commercial reuse | |PDF file iconPDF (91 KB) | HTML iconHTML
    Freely Available from IEEE
  • WMEE Organizing Committees

    Publication Year: 2007, Page(s): xxix
    Request permission for commercial reuse | |PDF file iconPDF (62 KB)
    Freely Available from IEEE
  • Standardization of Technology for IC Card Ticket System

    Publication Year: 2007, Page(s): 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (125 KB) | HTML iconHTML

    Summary form only given. "Suica," an IC card ticket system in East Japan Railway Company (JR East), has grown to over 20 million issues in five and a half years since its debut in November 18, 2001. Numerous tickets must be processed at the gates immediately to secure the smooth flow of passengers in Tokyo metropolitan area, where high frequent and mass transport is provided. The passengers, on th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enforceable Privacy Promises

    Publication Year: 2007, Page(s): 6
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (120 KB) | HTML iconHTML

    An increasing number of enterprises need access to private data of their customers. To gain these data they usually make privacy promises to customers in many different ways. The point card is one of the most well-known examples of such a privacy promise. Even if customers agree to the collection they do know if the collected data are misused. Only a few of these privacy promises can be automatica... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Calculus for Service Innovation

    Publication Year: 2007, Page(s): 7
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (131 KB) | HTML iconHTML

    Innovation in the services area - especially in the electronic services (e-services) domain - can be characterized by six decision-oriented attributes: decision-driven, information-based, real-time, continuously-adaptive, customer- centric and computationally-intensive. These attributes constitute the decision informatics paradigm. In turn, decision informatics is supported by information and deci... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discovering Equilibrium Strategies for a Combinatorial First Price Auction

    Publication Year: 2007, Page(s):13 - 20
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (470 KB) | HTML iconHTML

    In this paper, the unresolved and fundamental strategy problem of the first price single round sealed bid combinatorial auction is addressed. As a step toward discovering equilibrium strategies, a new heuristic based on simple and intuitive methods is presented. The heuristic is evaluated using two different independently and uniformly distributed valuation models, one very general model where bid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal Auctions for Multi-Unit Procurement with Volume Discount Bids

    Publication Year: 2007, Page(s):21 - 28
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (208 KB) | HTML iconHTML

    Our attention is focused on designing an optimal procurement mechanism which a buyer can use for procuring multiple units of a homogeneous item based on bids submitted by autonomous, rational, and intelligent suppliers. We design elegant optimal procurement mechanisms for two different situations. In the first situation, each supplier specifies the maximum quantity that can be supplied together wi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Agents for Sequential English Auctions with a Fixed Deadline

    Publication Year: 2007, Page(s):29 - 38
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (168 KB) | HTML iconHTML

    In this paper, we consider sequential English auctions with a fixed deadline. The protocol allows the specification of a deadline since in real world trading, it is often essential to conclude a transaction among agents under a fixed deadline. Although there are a lot of differences between continuous double auctions (CDAs) and the sequential English auction, it is possible to modify the agents de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing Web Services Conversation with Exception Contexts for Handling Exceptions of Composite Services

    Publication Year: 2007, Page(s):39 - 46
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (304 KB) | HTML iconHTML

    The successful execution of a composite service relies on not only its internal design and states, but also the execution of its autonomous, heterogeneous, and distributed participants. Exception handling for a composite service is facing great challenge. This paper presents a mechanism to capture external exception contexts from partners' applications through contexts enhanced Web services conver... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web 2.0 versus SOA: Converging Concepts Enabling Seamless Cross-Organizational Collaboration

    Publication Year: 2007, Page(s):47 - 54
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (317 KB) | HTML iconHTML

    A new type of Web-based applications such as interactive encyclopedias, Blogs and Mash-ups has been gaining momentum during the last years and is frequently referred to as Web 2.0. A topic that has experienced a lot of interest recently is the relationship between Web 2.0 and Service-Oriented Architectures (SOAs). The notion of complexity-hiding and reuse, but also the concept of loosely coupling ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Monitoring Method of Cross-Sites' Processes Executed by Multiple WS-BPEL Processors

    Publication Year: 2007, Page(s):55 - 64
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (215 KB) | HTML iconHTML

    This paper presents a method for monitoring cross-sites' processes executed by multiple WS-BPEL (Web Service Business Process Execution Language) processors. Due to the nature of distributed workflow in WS-BPEL, when we make cross-sites' processes visible and traceable at the instance level, we need to consider the particular things like the identification of the SOAP messages, and status manageme... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A General Model of a Production Management System: Proposal of CHARM

    Publication Year: 2007, Page(s):65 - 72
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (258 KB) | HTML iconHTML

    This paper proposes a new general model of the production management domain, the CHARM (cross hierarchical account resource model). This model is based on the Account pattern. Inherent in the pattern are the best practices of the accounting field as applied to the manufacturing management area, enabling us to treat the inventory of the future and production seat booking reasonably. Therefore we ca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dependency of Constrained Clustering of Transaction Data on Known Data Distribution

    Publication Year: 2007, Page(s):73 - 79
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (226 KB) | HTML iconHTML

    Most well-known partitioning clustering algorithms adopt an iterative procedure to converge to the stable status. One problem is that the quality of clustering and execution time is especially sensitive to initial conditions (e.g. initial cluster centers and cluster number). In addition, the method used to measure similarity between two transaction data is also an important factor. In general, the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.