By Topic

Management of e-Commerce and e-Government (ICMeCG), 2011 Fifth International Conference on

Date 5-6 Nov. 2011

Filter Results

Displaying Results 1 - 25 of 71
  • [Front cover]

    Publication Year: 2011, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (833 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2011, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (48 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2011, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (400 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (108 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (199 KB)
    Freely Available from IEEE
  • Message from the General Co-chairs

    Publication Year: 2011, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (69 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Co-chairs

    Publication Year: 2011, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (68 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Committees

    Publication Year: 2011, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (291 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2011, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (291 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2011, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (294 KB)
    Freely Available from IEEE
  • Method of Association Rule Based on Improved Genetic Algorithm and Application of Network Consuming for the Contemporary Youth

    Publication Year: 2011, Page(s):3 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    Genetic Algorithm and Association Rules both are commonly used methods in data mining. In this paper, a brief overview of Genetic Algorithm and Association Rules has been given, and this paper has presented an improved extract method of association rules of genetic algorithm based on their respective advantages and disadvantages. It also did some research on designing encoding methods, structuring... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Application of Date Mining in Knowledge Management

    Publication Year: 2011, Page(s):7 - 9
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (201 KB) | HTML iconHTML

    Data mining is a step in the knowledge discovery process to extract implicit, unknown but potentially useful information from the incomplete, ambiguous and random data, it is the core of knowledge management. In this paper, we start from the basic relationship between data mining and knowledge management, and then focus on introducing the application of date mining in knowledge management. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Clustering XML Search Results Based on Content and Structure Similarity

    Publication Year: 2011, Page(s):10 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (250 KB) | HTML iconHTML

    Clustering XML search results is an effective way to improve performance. However, the key problem is how to measure similarity between XML documents. In this paper, we propose a semantic similarity measure method combining content with structure, in which a variety of XML document features, including term element frequency, term inverse element frequency, semantic weight of tag label and level in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A RFID Mixed Coding Scheme Based on Huffman Algorithm

    Publication Year: 2011, Page(s):15 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (209 KB) | HTML iconHTML

    In RFID application systems with multiple packaging layers, labeling packaging relationship of objects in different packaging layers by encoding methods is a important technology field. Prefix-based labeling scheme is a method by which the packaging relationship of objects amounts to testing whether one object is an prefix of the other, whereas the region numbering scheme is a method by which an a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two-Phase Clustering-based Collaborative Filtering Algorithm

    Publication Year: 2011, Page(s):19 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (254 KB) | HTML iconHTML

    Internet and E-Commerce are becoming an integral part of everyday life as we accumulate more and more knowledge that demands for some personalized recommendation technology. Collaborative filtering recommendation is the most successful personalized recommendation algorithm among current technologies. The paper suggests the two-phase clustering-based collaborative filtering algorithm. which not onl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Immune-based Distributed Forensics System for e-Commerce

    Publication Year: 2011, Page(s):27 - 31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB) | HTML iconHTML

    The information security is very important to the development of electronic commerce. Inspired by the immune principle, the paper designs an Immune-based Distributed Forensics System for e-Commerce (IDFSEC). The system consists of distributed and independent nodes which monitor hierarchical objects from network to service in the e-Commerce site. The paper presents the forensics mechanism of node a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Feature Extraction in Abnormal Pattern Recognition of Financial Transaction

    Publication Year: 2011, Page(s):32 - 35
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (221 KB) | HTML iconHTML

    Feature extractors are used to get mathematical features that can be machine readable. In this paper we proposed a novel feature extraction and similarity measurement method based on RBF neural network one-step deviation prediction, which is different from traditional time series researches. The method converts time series similarity to feature vectors similarity comparison, while feature vectors ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • China's Financial Industry Software Application Analysis and Development Strategy

    Publication Year: 2011, Page(s):36 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (191 KB) | HTML iconHTML

    With the development of global information process, tremendous improvement has been seen in China's financial informationization, the software in the financial industry has been made significant applications. The development of software applications on the financial sector has significant impacts, both the positive sides, as well as the negative sides. Therefore, it is essential to make appropriat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on Double-Layers Trust System and Model of Trust in P2PEB Mode

    Publication Year: 2011, Page(s):39 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (236 KB) | HTML iconHTML

    The development trend of E-Business is the P2PEB. In this mode, trust is the base to guarantee the normal conduction of the business activity. According to the features of trust between Enterprises, we propose a double layers trust system in P2PEB mode named as DL-Trust System. After explaining the different mechanisms of the direct trust and indirect trust and discussing the interaction of the do... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Effects of Exchange Rate Volatility on Exports: Evidence from China

    Publication Year: 2011, Page(s):43 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (353 KB) | HTML iconHTML

    This paper empirically investigates the impact of the exchange rate volatility on the real export flows of China by using quarterly data from 1995Q1 to 2010Q1. Co-integration and error-correction models are employed to obtain the estimates of the long run equilibrium and the short-run dynamics, respectively. Our results concerning the effects of exchange rate volatility on real exports suggest tha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis on the Mechanism of Environment Improvement Policy Promoting Economic Growth

    Publication Year: 2011, Page(s):46 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (277 KB) | HTML iconHTML

    According to the endogenous economic growth theory, environment improvement policy is the means to promote economic growth. The paper sets the Hamiltonian optimization model with emission tax policy and emission abatement investment policy being endogenous. By mathematical analysis, we find that environment policy can stimulate human capital and technological advances accumulating much faster so a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Development Strategy of Native Clothing Brand in B2C E-commerce

    Publication Year: 2011, Page(s):53 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (207 KB) | HTML iconHTML

    This paper based on the development situation of several native clothing brands in B2C marketing, analysis and discussion the question of development. The result found that the disadvantage of B2C sales platform, industry chain logistics links not perfect, ignore to promote the value, face double challenge are the main limiting factors. And this paper put forward the following strategies to promot... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Test Case Design Algorithm Based on Priority Techniques

    Publication Year: 2011, Page(s):57 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (253 KB) | HTML iconHTML

    Testing is an important step of building e-commerce system. In regression testing, it is the key issue that how to reuse the test suite efficiently. This paper presents a dynamic adjustment prioritization based on the design information of test suite which is a new exploration of regression test prioritization. It improves the shortcoming of the existing technologies which failed to use the design... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on the Design-centered E-Commerce Platform

    Publication Year: 2011, Page(s):63 - 65
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (201 KB) | HTML iconHTML

    With the design becoming more and more critical in the process of production, the consumption of product can be described as the consumption of design to some extent. In order to provide better design services for the customers, the design-centered e-commerce platform is researched in this paper. The operation of the platform is based on the integrative database and the platform has two functions ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Copula Model Applied to the Correlation among A-share, H-share and N-share

    Publication Year: 2011, Page(s):66 - 71
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (229 KB) | HTML iconHTML

    This paper uses bivariate copula model to analyze Dependence relationship between A-share, H-share and N-share Markets from June 1, 2005 to August 31, 2009. First, the parameters of marginal distribution model for yield of A, H and N stock index are estimated by maximum likelihood method. After the most appropriate marginal distribution model selected, the parameters of the Candidate copulas are c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.