By Topic

2008 10th IEEE Conference on E-Commerce Technology and the Fifth IEEE Conference on Enterprise Computing, E-Commerce and E-Services

Date 21-24 July 2008

Filter Results

Displaying Results 1 - 25 of 78
  • [Cover art]

    Publication Year: 2008, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (633 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (9 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):v - x
    Request permission for commercial reuse | PDF file iconPDF (120 KB)
    Freely Available from IEEE
  • Message from the General and Program Co-chairs

    Publication Year: 2008, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (83 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2008, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (76 KB)
    Freely Available from IEEE
  • CEC Program Committee

    Publication Year: 2008, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (102 KB)
    Freely Available from IEEE
  • EEE Program Committee

    Publication Year: 2008, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (102 KB)
    Freely Available from IEEE
  • [Four keynote abstracts with speakers' biographies]

    Publication Year: 2008, Page(s):xv - xviii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (98 KB)

    Provides an abstract for each of the four keynote presentations and a brief professional biography of each presenter. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advance Reservation of Grid Resources via Real Options

    Publication Year: 2008, Page(s):3 - 10
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (301 KB) | HTML iconHTML

    While grid market schedulers have recently received a lot of attention and have been accepted not only in economic but also in purely computer science areas as well, technical grid schedulers are being modified to support advance reservation of resources, too. This prompts questions on how to model grid markets and how to handle grid resource reservation in a reasonable economic fashion. This pape... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Randomized Pay-as-Bid Mechanism for Grid Resource Allocation

    Publication Year: 2008, Page(s):11 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2005 KB) | HTML iconHTML

    Grid technology denotes a computing paradigm in which computing resources are shared across geographical and administrative boundaries. Market-based mechanisms are deemed promising to provide a better fit to grids' strategic and dynamic nature than classic technical schedulers. In this paper, we present a deterministic heuristic that achieves the distinct trade-off between scalability by approxima... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Planning and Pricing of Service Mashups

    Publication Year: 2008, Page(s):19 - 26
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB) | HTML iconHTML

    Today's development and provision of commercially used Web services has shifted from providing static and predefined functionality to highly configurable services that can be dynamically combined by customers. This new form of composed services called service mashups integrate functionality of multiple sub-services from decentralized providers. Consequently this leads to a high configuration compl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Password Management for EPC Class 1 Generation 2 Transponders

    Publication Year: 2008, Page(s):29 - 35
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (826 KB) | HTML iconHTML

    RFID systems compliant to the widely-used standard EPC class 1 generation 2 lack effective security mechanisms. We show that passwords used to protect critical functionality can be obtained by attackers with only moderate effort. Since more capable systems are not likely to replace the current standard in the medium term, it is crucial to embed the deployment of RFID technology into IT-ecosystems ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Verification of Receipts from M-commerce Transactions on NFC Cellular Phones

    Publication Year: 2008, Page(s):36 - 43
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (347 KB) | HTML iconHTML

    A main challenge in mobile commerce is to make it possible for users to manage their transaction histories from both online e-commerce transactions and in-person transactions. Such histories are typically useful to build credit or to establish trust based on past transactions. In this paper we propose an approach to manage electronic receipts on cellular devices by assuring their secure and privac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Providing One-to-One Marketing with Customers' Privacy in Stationary Retail

    Publication Year: 2008, Page(s):44 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (325 KB) | HTML iconHTML

    Electronic commerce has provided retailers with effective instruments to deploy one-to-one marketing over the internet. While the increasing use of sensors, RFID tags and other technologies enables the deployment of one-to-one marketing also in stationary retail stores, ini-tial experiments in realizing personalization in this setting have shown that customers' acceptance is low, as services requi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Arbitrage Opportunities and Market-Making Traders in Prediction Markets

    Publication Year: 2008, Page(s):53 - 59
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (848 KB) | HTML iconHTML

    Prediction markets are a promising approach for predicting uncertain future events and developments. These markets will work well if they are efficient and in efficient markets, one does not expect arbitrage opportunities to be persistent. This paper therefore studies whether pure arbitrage opportunities existed in a sports prediction market. Moreover, market liquidity can become an issue in predi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Belief Based Distributed Buyer Coalition Formation with Non-transferable Utility

    Publication Year: 2008, Page(s):60 - 67
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (359 KB) | HTML iconHTML

    Online buyer coalition formation problem is an application of e-commerce and distributed agent technology. So far, most works in this topic are social utility based approaches, which assume the agents' utilities to be transferable and publicly known. However, such assumptions are not valid in many software agents applications where agents beliefs are private, and stability is often a more importan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reverse Pricing in Supply Chains: An Assessment of Sourcing Strategies

    Publication Year: 2008, Page(s):68 - 75
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (397 KB) | HTML iconHTML

    Reverse pricing as a special form of dynamic pricing has become a growing interest in e-commerce. It gives buyers an active role: The price of a transaction is not given by the supplier, but is mainly determined by the buyer's bid. This paper extends the coverage of current reverse pricing models to sourcing. The reason is that sourcing strategies, such as global, local, and multiple sourcing, gre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Classification Model for Automating Compliance

    Publication Year: 2008, Page(s):79 - 86
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB) | HTML iconHTML

    Various approaches to automate the observance of compliance requirements have recently been proposed. Since there is no all-round solution available within the foreseeable future, we propose a classification scheme for existing approaches that address different aspects of automating compliance. A layer model is used for linking laws and regulations with a company's IT system. The "policy layer" is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automating Privacy Compliance with ExPDT

    Publication Year: 2008, Page(s):87 - 94
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (479 KB) | HTML iconHTML

    Today, personalized services are lucrative for service providers and their customers. With their increasing pervasiveness and interconnection, however, customers show concerns about their privacy. If customers were to refuse the processing of their personal data in general, the economic potential of personalized services could not be realized. We claim that such scepticism is a direct consequence ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SVNNAT: Measuring Collaboration in Software Development Networks

    Publication Year: 2008, Page(s):97 - 104
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (997 KB) | HTML iconHTML

    We investigate the structures of collaboration in software development groups by analyzing the data derived from the versioning system SVN (subversion) for several open source projects of different types and sizes. The goal of the work presented here is to investigate specific properties of the network topology in the collaboration groups of open source developer communities. For this purpose we d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Auction-Based Traffic Management: Towards Effective Concurrent Utilization of Road Intersections

    Publication Year: 2008, Page(s):105 - 112
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (478 KB) | HTML iconHTML

    Valuation-aware traffic-control mechanisms for road intersections take the valuations of reduced waiting time of the individual drivers into account. They use agents to avoid any disturbance of the driver, and they feature mechanisms specifically designed for negotiating valuations. While such mechanisms do indeed increase overall driver satisfaction, they only allow one vehicle at a time to use t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-attribute Inter-enterprise Exchange of Logistics Services

    Publication Year: 2008, Page(s):113 - 120
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (451 KB) | HTML iconHTML

    The exchange of inter-enterprise and intra-enterprise logistics services in the transport logistics sector has become more important. Nevertheless, only a few approaches are able to take into consideration the synergy effects between the customer orders in the case of the outsourcing process and the preferences of customers. In this article, an approach is introduced which offers a solution based ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal Contracting for E-Mall Services

    Publication Year: 2008, Page(s):123 - 127
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (361 KB) | HTML iconHTML

    We discuss an agency model for an e-market place. When a marketplace goes from brick-and-mortar to virtual, incentive issues according to asymmetric information of e-mall providers become significant because contracting for an e-mall service can be "outcome-based." We discuss the Internet firm's incentives associated with the cost of operating an e-mall and different types of contracting policy. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.