2009 International Symposium on Information Engineering and Electronic Commerce

16-17 May 2009

Filter Results

Displaying Results 1 - 25 of 186
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (1123 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (14 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (80 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - xv
    Request permission for commercial reuse | PDF file iconPDF (114 KB)
    Freely Available from IEEE
  • Message from the Symposium Chairs

    Publication Year: 2009, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (63 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2009, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (62 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2009, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (64 KB)
    Freely Available from IEEE
  • Notice of Retraction
    Semi-fragile Image Watermarking Algorithm Based on Double-Step

    Publication Year: 2009, Page(s):3 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (542 KB) | HTML iconHTML

    Notice of RetractionAfter careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.The presenting author of this paper has the option ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Multi-dimensional Cellular Automation Pseudorandom Generator of LFSR Architecture

    Publication Year: 2009, Page(s):11 - 15
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    Cellular automata (CA) or linear feedback shift register (LFSR) architecture is widely used in pseudorandom generator of applied cryptography. The paper proposes a multi-dimensional and multi-rank pseudorandom generator combined the CA algorithm and LFSR architecture. In order to test the feasibility of the design, we research on feasibility and efficient of the algorithm by using three bit tests ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Adaptive Supply Chain Model in B2C Electronic Commerce

    Publication Year: 2009, Page(s):16 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB) | HTML iconHTML

    To supply chain network design problems considering electronic commerce (e-commerce) of scale and further demand fluctuations, a reliability evaluation method is proposed to evaluate the performance of plants under demand fluctuations. In addition, an efficient mathematical model is proposed to adaptively determine the optimal adjustment decisions regarding production reallocation among plants und... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on the Returns Policy Model of a Dual-Channel Supply Chain in E-commerce

    Publication Year: 2009, Page(s):21 - 25
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (249 KB) | HTML iconHTML

    This paper quantitatively analyzes the use of the e-marketplace for selling the returned products after rework in a dual-channel supply chain. In our dual-channel model, we derive the optimal order quantities and optimal retail prices for all the parties in the supply chain and we also propose the optimal buyback price established by the manufacturer. Through comparative analysis of the single-cha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cooperative Black Hole Attack Prevention for Mobile Ad Hoc Networks

    Publication Year: 2009, Page(s):26 - 30
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (287 KB) | HTML iconHTML

    The black hole attack is one of the security attacks that occur in mobile ad hoc networks (MANETs). In this article, the routing security issues and the problem of coordinated attack by multiple black holes acting in group in MANET are addressed in detail. Two authentication mechanisms, based on the hash function, the message authentication code (MAC) and the pseudo random function (PRF), are prop... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Conflict Analysis between Tacit Knowledge Sharing and Its Exclusivity Based on Meta-game Theory

    Publication Year: 2009, Page(s):31 - 35
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (194 KB) | HTML iconHTML

    Tacit knowledge sharing discussed in this study is important in the area of business due to its sharing to impel the organizationspsila competitive advantage. In this study, the conflict between tacit knowledge sharing and its exclusivity is described by conflict analysis based on game theory. Analysis shows that the conflict can be categorized as a non-absolute opposability conflict. Furthermore,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research of an Improved BP Decoding Algorithm

    Publication Year: 2009, Page(s):36 - 39
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (265 KB) | HTML iconHTML

    That the computation load is big is a shortcoming of traditional BP decoding algorithm. According to this shortcoming we give an improved BP decoding algorithm. The decoding algorithm in the iterative decoding process, only need to update the possibility of a wrong bit of information without having to update the information whose reliability is very high, raises the decoding efficiency and reduces... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quorum-Based Optimistic Concurrency Control in Replicated DHTs

    Publication Year: 2009, Page(s):40 - 45
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (347 KB) | HTML iconHTML

    Distributed hash tables (DHTs) provide a scalable solution for data sharing in P2P systems. To achieve fault tolerance and ensure high data availability, DHTs typically rely on data replication. However, nodes churn, lacking of global view and existence of malicious nodes in P2P environment bring new challenges to the concurrency control for replicated data. Agreement-based algorithms require all-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Empirical Assessment and Application of SERVQUAL in Mainland Chinese Express Industry

    Publication Year: 2009, Page(s):46 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (229 KB) | HTML iconHTML

    In the present study, the exploratory and confirmatory factor analyses were conducted to assess the SERVQUAL instrument dimensionality, reliability and validity, and apply the SERVQUAL instrument into Chinese Express Industry. We found that the adapted SERVQUAL instrument is also a valid and valuable tool to measure service quality. ldquoSecurityrdquo is an important additional dimension of servic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Weighted k-Means Algorithm Based Text Clustering

    Publication Year: 2009, Page(s):51 - 55
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (230 KB) | HTML iconHTML

    This paper proposes a weighted k-means clustering algorithm based on k-means (MacQueen, 1967; Anderberg, 1973) algorithm, and it can be used to cluster texts. Firstly, the weighted k-means algorithm changes the descriptive approach of text objects, and converts the categorical attributes to numeric ones to measure the dissimilarity of text objects by Euclidean distance; then, the weighted k-means ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Empirical Research on Consumer Trust in E-commerce

    Publication Year: 2009, Page(s):56 - 61
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (255 KB) | HTML iconHTML

    According to the fact that consumer trust is widely perceived as an essential factor to the success of electronic commerce, we develop a model of consumer trust in e-commerce and use empirical research method to test it. After deep analyzing, we find that perceived size, propensity to trust, perceived privacy information protection, and perceived legal environment security are insignificantly rela... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Effect of Industry Competition on Credit Trade

    Publication Year: 2009, Page(s):62 - 65
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (183 KB) | HTML iconHTML

    In this paper, we analysis from the supply of trade credit and present a study on the use of an important non-formal financial channel - trade credits - for firms based on Chinese companies from 2000 to 2006. In particular, we compare the use of trade credit between competition industries and non-competition industries firms. To test the difference in the use of trade credit between competition in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Dynamic Trust Model Based on Entity Credibility in Heterogeneous Wireless Network

    Publication Year: 2009, Page(s):66 - 70
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB) | HTML iconHTML

    The characteristics of uncertainty and variability in heterogeneous wireless network bring some new security challenges. This paper proposes a dynamic trust model based on entity credibility (DTMBC) to evaluate the trustworthiness of the network. The evaluation incorporates direct trust, recommended trust, credibility of the candidate network, credibility of the evaluating entity and time stamp. D... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Retraction
    Effects of Customer Participation on Customer Perceived Value and Customer Satisfaction in B2B Business Model

    Publication Year: 2009, Page(s):71 - 78
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB) | HTML iconHTML

    Notice of RetractionAfter careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.The presenting author of this paper has the option ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Secure Routing and Aggregation Protocol with Low Energy Cost for Sensor Networks

    Publication Year: 2009, Page(s):79 - 84
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (301 KB) | HTML iconHTML

    Wireless sensor networks are increasingly deployed in security-critical areas, such as battle field. However, general sensor nodes are manufactured with inexpensive components, and they are short of security enhancement. Therefore, an adversary could capture and compromise sensor nodes easily, then launch some malicious attacks (including tampering or discarding useful data collected from source n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Color Image Cryptography Using Multiple One-Dimensional Chaotic Maps and OCML

    Publication Year: 2009, Page(s):85 - 89
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (388 KB) | HTML iconHTML

    In this paper, a stream color image cryptography has been proposed based on spatiotemporal chaos system. One-way coupled map lattices (OCML) are used to generate pseudorandom sequences and then encrypt image pixels one by one. By iterating randomly chosen chaotic maps from a set of chaotic maps for certain times, the generated pseudorandom sequences obtain high initial-value sensitivity and good r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two Scalable Approaches to Analyzing Network Security Using Compact Attack Graphs

    Publication Year: 2009, Page(s):90 - 94
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (218 KB) | HTML iconHTML

    The compact attack graphs can implicitly reveal the potential threat of sophisticated multi-step attacks by enumerating possible sequences of exploits leading to the compromising given critical resources in enterprise networks with thousands of hosts. For security analysts, the challenge is how to analyze the complex attack graphs with possible ten thousands of nodes for defending the security of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.