Notice
There is currently an issue with the citation download feature. Learn more

The 2nd IEEE Asia-Pacific Service Computing Conference (APSCC 2007)

11-14 Dec. 2007

Filter Results

Displaying Results 1 - 25 of 82
  • The 2nd IEEE Asia-Pacific Service Computing Conference - Cover

    Publication Year: 2007, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (68 KB)
    Freely Available from IEEE
  • The 2nd IEEE Asia-Pacific Service Computing Conference - Title

    Publication Year: 2007, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (82 KB)
    Freely Available from IEEE
  • The 2nd IEEE Asia-Pacific Service Computing Conference - Copyright

    Publication Year: 2007, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (46 KB)
    Freely Available from IEEE
  • The 2nd IEEE Asia-Pacific Service Computing Conference - TOC

    Publication Year: 2007, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (129 KB)
    Freely Available from IEEE
  • Message from the General Chair

    Publication Year: 2007, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (97 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2007, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (81 KB)
    Freely Available from IEEE
  • Program Comittee

    Publication Year: 2007, Page(s):xii - xv
    Request permission for commercial reuse | PDF file iconPDF (79 KB)
    Freely Available from IEEE
  • Automated Resource Management Framework for Adjusting Business Service Capability

    Publication Year: 2007, Page(s):3 - 9
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (319 KB) | HTML iconHTML

    The value of business service is depended on efficient resource management in meeting service level agreements (SLAs) with clients and other business objectives. Agreement based resource management in service environment enable service provider to know customer demand in advance and allocate the required resources for the service. However, traditional resource management scheduling systems for the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coordinating Service Distribution through Cooperative "YuuZuu" Reservations

    Publication Year: 2007, Page(s):10 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (680 KB) | HTML iconHTML

    Services are perishable and are simultaneously produced and consumed. A reservation is a traditional and effective means for coordinating service demand and supply. In recent years, computerized reservation systems have been used widely by many service vendors such as airline companies and hotels to improve their profits. In this paper, we propose and describe a "YuuZuu" reservation that motivates... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scenario-Based Petri Net Approach for Collaborative Business Process Modelling

    Publication Year: 2007, Page(s):18 - 25
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (179 KB) | HTML iconHTML

    Web services composition techniques provide a practical foundation for business process management in loosely coupled distributed environments. Requirements analysis, however, is still the essential step for launching any commercial systems. Nevertheless, what is needed from the business world and what is available from the IT world remain indistinguishable, that obstructs the way to achieve smoot... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Context-Aware Service Matchmaking Method Using Description Logic

    Publication Year: 2007, Page(s):26 - 32
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (245 KB) | HTML iconHTML

    The current trend of Web service research is towards automatic service composition. Undoubtedly, service matchmaking is one of the critical problem to achieve the intention. Previous methods concerns service matchmaking considers the problem in a context free manner , in another word, they are domain independent. Obviously, without the consideration of context information, the degree of recall and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Considering Cultural Issues in E-Business Solutions

    Publication Year: 2007, Page(s):33 - 39
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (602 KB) | HTML iconHTML

    This paper addresses cultural issues in e-business solutions. The study explores the preferences of users based on two different culture groups. The paper commenced with the current e-commerce practice of e-commerce implementation on a global level. A survey was conducted to find Australian and Korean users' experiences on global business-to customer (B2C) e-commerce sites. One of the key findings... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Third Parth Subsidy is Not Effective towards Improving the Trading Efficiency for Most E-Business Markets

    Publication Year: 2007, Page(s):40 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3035 KB) | HTML iconHTML

    Research equipments in China were heavily underutilized. An e-business market was created to allow students to reserve available equipment service time from different universities; however, low trading success rate has been the bottleneck of the market efficiency. A third-party subsidy program is being considered to encourage equipment service providers (sellers) to lower their asking prices; henc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Secure Routing Protocol with Malicious Nodes Detecting and Diagnosing Mechanism for Wireless Sensor Networks

    Publication Year: 2007, Page(s):49 - 55
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (393 KB) | HTML iconHTML

    Routing protocol security is the key element in the research of secure wireless sensor networks. Due to its special characteristic, designing security routing protocol is a challenge in these networks. A secure routing protocol with malicious nodes detecting and diagnosing mechanism is used to reduce the malicious nodes' threat to the WSNs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Joint Sink Mobility and Data Diffusion for Lifetime Optimization in Wireless Sensor Networks

    Publication Year: 2007, Page(s):56 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (195 KB) | HTML iconHTML

    In this paper, we address the problem of lifetime optimization under storage constraint for wireless sensor networks with a mobile sink node. The problem is particularly challenging since we need to consider both mobility scheme and storage constraint. Previous works suggest to use a simple single-hop routing model in which source nodes can only communication with the sink node directly in those m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Location Verification Using Hop-Distance Relationship in Wireless Sensor Networks

    Publication Year: 2007, Page(s):62 - 68
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (258 KB) | HTML iconHTML

    With the growing prevalence of wireless sensor networks comes a new need for location-based access control mechanisms. Thus we need a method to perform location verification to enforce location-based access to information resources. In this work, a statistic location verification algorithm in randomly deployed sensor networks is proposed. The nodes in the networks are classified to three roles. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Energy-Efficient TDMA MAC for Wireless Sensor Networks

    Publication Year: 2007, Page(s):69 - 74
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB) | HTML iconHTML

    This paper proposes an energy-efficient and collision-free medium access control protocol TDMA-WSN for wireless sensor networks. The protocol is based on time division multiple access (TDMA) principle and reduces energy consumption by avoiding overhearing, collision and idle listening. Nodes in TDMA-WSN build schedules based on information about their neighborhood to determine when they can transm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy Efficient Multi-rate Based Time Slot Pre-schedule Scheme in WSNs for Ubiquitous Environment

    Publication Year: 2007, Page(s):75 - 80
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB) | HTML iconHTML

    Nowadays, smart spaces occupy an essential part of ubiquitous computing environment. The spaces integrated with wireless sensors networks, actuators and context-aware services become part of our daily life. Smart spaces are equipped with a large number of wireless sensors that aim to collect large quantities of context information, during the process, there exists a large amount of collisions and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Joint Scheduling and Routing for Lifetime Elongation in Surveillance Sensor Networks

    Publication Year: 2007, Page(s):81 - 88
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (219 KB) | HTML iconHTML

    In this paper, we address the problem of lifetime optimization under coverage and connectivity requirements for sensor networks where different targets need to be monitored by different types of sensors running at possibly different sampling rates as well as different initial energy reserve. The problem is particularly challenging since we need to consider both connectivity requirement and so-call... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Global-Energy-Balancing Real-Time Routing in Wireless Sensor Networks

    Publication Year: 2007, Page(s):89 - 93
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB) | HTML iconHTML

    Many applications in wireless sensor networks like video surveillance have the requirement of timely data delivery. Real-time routing is needed in these applications. Because of the limitation of node energy, energy efficiency is also an important concern in routing protocol design in order to increase the network lifetime. In this paper, we propose a global-energy-balancing routing scheme (GEBR) ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiple-Access Channel Model for P2P Networks

    Publication Year: 2007, Page(s):94 - 101
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (341 KB) | HTML iconHTML

    Peer-to-peer (P2P) technology encounters serious methodological limitations to guarantee the quality of services (QoS) of P2P networks with very few peers. In this paper, we propose multiple-access channel model (MACM) to merge different P2P networks as a whole to share their data-transfer capability. The model abstracts the interlaced data links between peers as logical data channels according to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ID-Based Key Agreement for Dynamic Peer Groups in Mobile Computing Environments

    Publication Year: 2007, Page(s):103 - 110
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB) | HTML iconHTML

    In order to secure communications for dynamic peer groups in mobile computing environments, key agreement protocols are required. In this paper, we propose a new key agreement protocol based on identities of mobile users, composed of a basic protocol and a dynamic protocol, for dynamic peer groups. With the basic protocol, an initial secret group key can be achieved in a peer group. By the dynamic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Game-Theoretic Approach for Information Sharing

    Publication Year: 2007, Page(s):111 - 121
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (374 KB) | HTML iconHTML

    This paper presents an integrated methodology to support decision making in cooperation through interorganizational information sharing. The methodology employs game-theoretic approach to determine whether it is advantageous to share information between two or three firms, each possessing one piece of information. While a firm in a two-firm situation has to decide either sharing nothing or sharing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Game-Theoretic Approach for Partial Sharing of Information

    Publication Year: 2007, Page(s):122 - 129
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (542 KB) | HTML iconHTML

    This paper presents an integrated methodology to support decision making in cooperation through interorganizational information sharing. The methodology employs game-theoretic approach to determine whether it is advantageous to share information in situations of 1) competition-cooperation and 2) co-opetition. The decision allows partial sharing of information which we quantify on a scale from 0 to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Contact Profile Based Routing within Intermittently Connected Mobile Ad-hoc Networks

    Publication Year: 2007, Page(s):130 - 137
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB) | HTML iconHTML

    Routing in intermittently connected networks(ICN) is a challenging problem due to the time varying nature of network connectivity. In this work, we focus on a special class of ICN formed by mobile ad-hoc participates called ICMAN. Asynchronous contacts become the basic way of communication in ICMANs instead of data links in traditional ad-hoc networks. Current approaches are primarily based on est... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.