2010 Third International Symposium on Electronic Commerce and Security

29-31 July 2010

Filter Results

Displaying Results 1 - 25 of 98
  • [Front cover]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (1824 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (23 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (412 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (104 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):v - x
    Request permission for commercial reuse | PDF file iconPDF (162 KB)
    Freely Available from IEEE
  • Message from the ISECS 2010 Symposium Chairs

    Publication Year: 2010, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (68 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2010, Page(s):xii - xiii
    Request permission for commercial reuse | PDF file iconPDF (89 KB)
    Freely Available from IEEE
  • Program Committee Members

    Publication Year: 2010, Page(s):xiv - xv
    Request permission for commercial reuse | PDF file iconPDF (73 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2010, Page(s):xvi - xviii
    Request permission for commercial reuse | PDF file iconPDF (52 KB)
    Freely Available from IEEE
  • Research on Short Text Classification Algorithm Based on Statistics and Rules

    Publication Year: 2010, Page(s):3 - 7
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (521 KB) | HTML iconHTML

    In this paper, we introduced the overview of short text research and the short text classification firstly. On the foundation of several common used classic text classification algorithms, mainly according to the major feature extraction methods, the short text classification based on statistics and rules is proposed. Experiments show that this algorithm has better performance than other algorithm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Image Method of Measuring Sand Content in Medium and Small River Water

    Publication Year: 2010, Page(s):8 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (634 KB) | HTML iconHTML

    Using the computer graphic processing technology, the detection of river sand content is proved. After using the submarine photograph method ingestion overflow cross section video information source material, carries on processing and the analysis using the wavelet denoising algorithm to the image, it can measure the number of particles of sediment, sediment particle shape and size of each. Then i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Application of Internet of Things in Electronic Commerce

    Publication Year: 2010, Page(s):13 - 16
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (550 KB) | HTML iconHTML

    In this paper, the importance of IOT and its history is introduced, and many countries and enterprises put their focus on IOT. After this, several technologies in IOT are discussed. Then the applications of IOT in Electronic Commerce are analyzed. In the end, the conclusion is drawn that IOT will greatly change the methods and styles of Electronic Commerce, and it will improve the service of EC an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Authentication and Access Control in Satellite Network

    Publication Year: 2010, Page(s):17 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (660 KB) | HTML iconHTML

    It is obvious that satellite networks are of usefulness in the area of information technology, and can be utilized to the extent of extending the application of information technologies further. Because of the high variability and complexity of satellite network, the problems of network security in satellite network must be solved. The unique attributes of satellite network that is different from ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Computer Science Reform of Curriculum Structure

    Publication Year: 2010, Page(s):21 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (513 KB) | HTML iconHTML

    When talking about the professional education of Computer Science, we need not only to keep the contents of teaching up-to-date following the revolutionary steps of new-born technology, but also take the teaching methods together with approach to the next level. This paper suggests a creative thought, which takes the gain of students' interests into full consideration. By improving the arrangement... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Kind of New Type Intellectualized Examination System

    Publication Year: 2010, Page(s):25 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (647 KB) | HTML iconHTML

    This article introduces a new type of remote intellectualized examination system. Besides auto-making test paper and intellectualized evaluating test paper and information source's management, etc, this examination system includes Simulation Realistic Environment Assessment Technology and Subject Base Fingerprint Technology, etc. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Noval Data Quality Controlling and Assessing Model Based on Rules

    Publication Year: 2010, Page(s):29 - 32
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (546 KB) | HTML iconHTML

    As a resource, data is the base for information construction and application. According to the principle of “garbage in and garbage out”, it needs us to ensure data reliability, no errors and accurately reflect the real situation to support the right decisions. However, due to various reasons, it leads to poor quality of dirty data in existing system business, while the dirty data is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Stage Differences of the First-line and Middle Manager IT Competence

    Publication Year: 2010, Page(s):33 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (499 KB) | HTML iconHTML

    IT application has stage characteristics, and in different stages, the key effect factors may vary. Previous research showed that first-line and middle manager IT competencies will affect the IT application. However, little is known about the stage differences of the first-line and middle manager IT competencies. In this study, based on Xiao's five-stage IT application model, using a sample of 590... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computing and Modeling of Urban Railway Traction Transmission System

    Publication Year: 2010, Page(s):37 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (657 KB) | HTML iconHTML

    Four subsystems in urban railway traction transmission system are analyzed respectively. The kinematics and dynamics of a moving railway vehicle and a suspended motor with gaps are outlined. Whereafter the mathematical model of a suspended motor with a gap and a suspended rolling wheelset are set up. The paper makes a concrete analysis of the main factors to cause instability and chaos in four sub... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Data Transmission Strategy of P2P Live Streaming Media System

    Publication Year: 2010, Page(s):41 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (555 KB) | HTML iconHTML

    In this paper, an algorithm optimization is made with improved simulated annealing algorithm aimed at data transmission strategy of streaming media System in P2P networks. According with global layout, we have established a mathematic model for data transmission strategy of streaming media System in P2P networks named VMDTSA-P2P, which completely have considered the affection of both the out-bandw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anomaly Traffic Detection Model Based on Dynamic Aggregation

    Publication Year: 2010, Page(s):46 - 50
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (403 KB) | HTML iconHTML

    Integrated with the ideas of aggregation and network model, this paper presented an anomaly detection model based on DAATDM, i.e. the dynamic and aggregate anomaly detection model. Besides, it established an anomaly traffic detection system based on DAATDM. DAATDM not only analyzed the aggregation of network parameters but also built a weighted statistical model for aggregate parameters which can ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two Improved Algorithms Based on Character Encryption and Decryption

    Publication Year: 2010, Page(s):51 - 54
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (515 KB) | HTML iconHTML

    To improve the weakness that the same plaintext strings have the same ciphertext strings in character encryption and decryption scheme based on a shift register, this paper presents an improved algorithm of character encryption and decryption based on multi-shift registers disturbance mode. This algorithm can compensate the defect, enlarge the ciphertext space, and improve the crack difficulty of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Proactive System for Real-time Safety Management in Civil Airport

    Publication Year: 2010, Page(s):55 - 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (556 KB) | HTML iconHTML

    Objective Researching a safety management system tool, it can manage airports safety in a high efficient level???Methods Based on B/S structure, It is established that an airport safety management system. It has implemented the daily work of airport safety management and risk management integration. Results The system designs a function framwork, including predictive subsystem, proactive subsystem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Use of GPS for the Measurement of Details in Different Areas

    Publication Year: 2010, Page(s):59 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB) | HTML iconHTML

    These GPS techniques can be stated as static, kinematic, semi-kinematic and on the other hand, with respect to the special precision requirements of different applications, they can also be stated as relative, absolute and DGPS techniques. RTK GPS has seen great technological advances over the past few years and is now routinely used in a wide variety of engineering type applications. evaluate RTK... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on the Integrated Management System of Metro Enterprises for Comprehensive Budget

    Publication Year: 2010, Page(s):63 - 67
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (585 KB) | HTML iconHTML

    In this paper, a novel approach based on the integrated management system is presented for comprehensive budget. The proposed approach can integrate the operation, organization and stratagem in strategy level, processing level and information level, respectively. And which takes the essential factors in all around of metro enterprises into account carefully. Thus, the integrated management system ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Comprehensive Security Protection System of Information Management under Network Environment in China

    Publication Year: 2010, Page(s):68 - 73
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (516 KB) | HTML iconHTML

    Factors influencing security of information management under network environment are mainly subjective and objective. According to the factors and demands of security protection for present digital information management, a four-level security protection system is constructed, which includes cognitive level, managerial level, planning level and legal level, so that some references are provided for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.