By Topic

2009 IEEE Conference on Commerce and Enterprise Computing

Date 20-23 July 2009

Filter Results

Displaying Results 1 - 25 of 96
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (401 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (23 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (115 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (146 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - xi
    Request permission for commercial reuse | PDF file iconPDF (175 KB)
    Freely Available from IEEE
  • Message from the CEC 2009 General and Program Co-Chairs

    Publication Year: 2009, Page(s):xii - xiii
    Request permission for commercial reuse | PDF file iconPDF (90 KB) | HTML iconHTML
    Freely Available from IEEE
  • CEC 2009 Organizing Committee

    Publication Year: 2009, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (89 KB)
    Freely Available from IEEE
  • CEC 2009 Program Committee

    Publication Year: 2009, Page(s):xv - xvi
    Request permission for commercial reuse | PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • Message from the Business Process Modeling Notation (BPMN 2009) Workshop Chairs

    Publication Year: 2009, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (69 KB) | HTML iconHTML
    Freely Available from IEEE
  • BPMN 2009 Workshop Organizing Committee

    Publication Year: 2009, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (91 KB)
    Freely Available from IEEE
  • Message from the DEECS 2009 Chairs

    Publication Year: 2009, Page(s): xix
    Request permission for commercial reuse | PDF file iconPDF (82 KB) | HTML iconHTML
    Freely Available from IEEE
  • DEECS 2009 Organizing Committee

    Publication Year: 2009, Page(s): xx
    Request permission for commercial reuse | PDF file iconPDF (86 KB)
    Freely Available from IEEE
  • Message from the Real-Time SOA Chairs

    Publication Year: 2009, Page(s): xxi
    Request permission for commercial reuse | PDF file iconPDF (85 KB) | HTML iconHTML
    Freely Available from IEEE
  • Real-Time SOA Organizing Committee

    Publication Year: 2009, Page(s): xxii
    Request permission for commercial reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • Message from the 1st International Workshop on E-mails in E-commerce and Enterprise Context (E3C) Chairs

    Publication Year: 2009, Page(s):xxiii - xxiv
    Request permission for commercial reuse | PDF file iconPDF (117 KB) | HTML iconHTML
    Freely Available from IEEE
  • E3C Workshop Organizing Committee

    Publication Year: 2009, Page(s): xxv
    Request permission for commercial reuse | PDF file iconPDF (87 KB)
    Freely Available from IEEE
  • Bidding Languages and Supplier Selection for Procurement Markets with Economies of Scale and Scope

    Publication Year: 2009, Page(s):1 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (246 KB) | HTML iconHTML

    Economies of scale and scope describe key characteristics of production cost functions that influence allocations and prices on procurement markets. Combinatorial auctions have been analyzed intensively, and enable the bidders to express economies of scope, but they typically are designed for single units of each item only and cannot easily be extended to the multi-unit case. Auction designs for m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of Prioritization in Performance Models of DTP Systems

    Publication Year: 2009, Page(s):8 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (776 KB) | HTML iconHTML

    Modern IT systems serve many different business processes on a shared infrastructure in parallel. The automatic request execution on the numerous interconnected components, hosted on heterogeneous hardware resources, is coordinated in distributed transaction processing (DTP) systems. While pre-defined quality-of-service metrics must be met, IT providers have to deal with a highly dynamic environme... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolution of Cooperativeness in a Business Game Relying on Acquaintance Based Trustworthiness Assessment

    Publication Year: 2009, Page(s):16 - 23
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (390 KB) | HTML iconHTML

    Reputation systems have been popular in several online market places involving anonymous players as it can provide crucial information on the trustworthiness of an object or individual player to combat selfish and deceptive behaviors from peers. Individual feedbacks on the quality of past association are the fundamental building blocks of reputation systems. Careful consideration in aggregating fe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SARI-SQL: Event Query Language for Event Analysis

    Publication Year: 2009, Page(s):24 - 32
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (941 KB) | HTML iconHTML

    Complex event processing (CEP) systems are capable of processing large amounts of events, utilizing them to monitor, steer and optimize business in real time. The lack of tracking events and maintaining the causal relationships and traceability between those events, as well as aggregating them to higher-level events, is a problem that is currently investigated by many research groups. In this pape... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CHAOS: A Data Stream Analysis Architecture for Enterprise Applications

    Publication Year: 2009, Page(s):33 - 40
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (591 KB) | HTML iconHTML

    In this paper, we describe the design of our architecture for continuous, heterogeneous analysis over streams, aka CHAOS that combines stream processing, approximation techniques, mining, complex event processing and visualization. CHAOS, with the novel concept of computational stream analysis Cube, provides an effective, scalable platform for near real time processing of business and enterprise s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modelling Flexible Processes with Business Objects

    Publication Year: 2009, Page(s):41 - 48
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (994 KB) | HTML iconHTML

    Mainstream business process modelling techniques promote a design paradigm wherein the activities that may be performed within a case, together with their usual execution order, form the backbone on top of which other aspects are anchored. This Fordist paradigm, while effective in standardised and production-oriented domains, breaks when confronted with processes in which case-by-case variations a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Collaborative Feature-Combination Recommender Exploiting Explicit and Implicit User Feedback

    Publication Year: 2009, Page(s):49 - 56
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (198 KB) | HTML iconHTML

    Collaborative filtering (CF) is currently the most popular technique used in commercial recommender systems. Algorithms of this type derive personalized product propositions for customers by exploiting statistics derived from vast amounts of transaction data.Traditionally, basic CF algorithms have exploited a single category of ratings despite the fact that on many platforms a variety of different... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Asymmetric Dominance- and Compromise Effects in the Financial Services Domain

    Publication Year: 2009, Page(s):57 - 64
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1189 KB) | HTML iconHTML

    Recommender systems help customers to identify products which fulfill certain requirements. Many different approaches have been developed and work well for different domains. What has been ignored so far is the fact that psychological phenomena can result in sub optimal decision taking on recommender result pages. This paper presents a user study investigating the Asymmetric Dominance Effect and t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exception Handling in Electronic Contracting

    Publication Year: 2009, Page(s):65 - 73
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (309 KB) | HTML iconHTML

    In a contract, exceptional clauses specify sanctions that come in force when the primary obligations are not fulfilled. An important aspect of exception handling is their resolution: determining which particular exception clause should be enforced when a violation is detected. This paper presents a specification and resolution technique for electronic contracts that can be used by a third party ex... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.