By Topic

e-Business Engineering (ICEBE), 2012 IEEE Ninth International Conference on

Date 9-11 Sept. 2012

Filter Results

Displaying Results 1 - 25 of 77
  • [Front cover]

    Publication Year: 2012, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (1129 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (39 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (163 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (157 KB)
    Freely Available from IEEE
  • Message from the ICEBE 2012 Chairs

    Publication Year: 2012, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (112 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the ICEBE 2012 Program Chairs

    Publication Year: 2012, Page(s):xi - xii
    Request permission for commercial reuse | PDF file iconPDF (128 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2012, Page(s):xiii - xiv
    Request permission for commercial reuse | PDF file iconPDF (100 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2012, Page(s):xv - xviii
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • Message from the SOAIC 2012 Workshop Co-chairs

    Publication Year: 2012, Page(s): xix
    Request permission for commercial reuse | PDF file iconPDF (101 KB) | HTML iconHTML
    Freely Available from IEEE
  • SOAIC 2012 Workshop Co-chairs and Program Committee

    Publication Year: 2012, Page(s): xx
    Request permission for commercial reuse | PDF file iconPDF (82 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the EM2I 2012 Workshop Co-chairs

    Publication Year: 2012, Page(s): xxi
    Request permission for commercial reuse | PDF file iconPDF (101 KB) | HTML iconHTML
    Freely Available from IEEE
  • EM2I 2012 Workshop Co-chairs and Program Committee

    Publication Year: 2012, Page(s): xxii
    Request permission for commercial reuse | PDF file iconPDF (99 KB)
    Freely Available from IEEE
  • Message from the SOKMBI 2012 Workshop Co-chairs

    Publication Year: 2012, Page(s): xxiii
    Request permission for commercial reuse | PDF file iconPDF (108 KB) | HTML iconHTML
    Freely Available from IEEE
  • SOKMBI 2012 Workshop Co-chairs and Program Committee

    Publication Year: 2012, Page(s): xxiv
    Request permission for commercial reuse | PDF file iconPDF (90 KB)
    Freely Available from IEEE
  • Message from the ASOC 2012 Workshop Chairs

    Publication Year: 2012, Page(s): xxv
    Request permission for commercial reuse | PDF file iconPDF (103 KB) | HTML iconHTML
    Freely Available from IEEE
  • ASOC 2012 Workshop Chairs and Program Committee

    Publication Year: 2012, Page(s): xxvi
    Request permission for commercial reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • Keynotes

    Publication Year: 2012, Page(s):xxvii - xxix
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (131 KB)

    This keynotes discusses the following: The Future of E-commerce; Business Informatics: Research that Matters; and E-Gold? An Overview of Technology used at London 2012. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Probabilistic Top-k Dominating Composite Service Selection

    Publication Year: 2012, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (561 KB) | HTML iconHTML

    A few of works have recently focused on relieving service users of the role played in assigning numeric values to QoS criteria as required in traditional service selection scheme. Towards such goals, skyline services for example have been studied recently by a lot of researchers. However, the size of skyline services sometimes is not easily controlled due to intrinsic attributes of services. Besid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Personalized Recommendation Based on Reviews and Ratings Alleviating the Sparsity Problem of Collaborative Filtering

    Publication Year: 2012, Page(s):9 - 16
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (321 KB) | HTML iconHTML

    With the development of e-commerce, shopping on-line is becoming more and more popular. When we need to decide whether to purchase a product or not on line, the opinions of others become important. The convenience of new web technologies enables us to freely express our opinions and reviews for various products we have purchased which leads to a serious problem, information overloading. How to min... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • k*NNCA: A Location Privacy Preserving Method for Semi-honest Mobile Users

    Publication Year: 2012, Page(s):17 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (485 KB) | HTML iconHTML

    Privacy preservation has recently received considerable attention in location-based services. A large number of location cloaking algorithms have been proposed for protecting the location privacy of mobile users. However, most of existing cloaking approaches assume that mobile users are trusted. And exact locations are required to protect location privacy, which are just the information mobile use... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Trust Evaluation Model for Mobile Commerce Based on Structural Equation Modeling

    Publication Year: 2012, Page(s):25 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB) | HTML iconHTML

    Based on in-depth study of trust concept and trust factors, this paper establishes a theory framework of influence factors of consumers' trust in mobile commerce, involving seven first-level factors and twelve second-level factors. A questionnaire on trust evaluation of mobile commerce is designed, and questionnaire data is collected through both online and offline ways. Using the collected data, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Impact of Online Channel on the Performance of China's Listed Retailers

    Publication Year: 2012, Page(s):33 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (260 KB) | HTML iconHTML

    Although the benefits of the Internet as an additional sales channel to traditional retailers are clear, there are significant variations in the scope and depth of online channel use among retailers. Drawing data from listed retail companies in China, this study examines the impact of online channel use on retailers' performance using event study. The results show that the online channel provides ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Empirical Study of Customer Loyalty to Internet Banking in China

    Publication Year: 2012, Page(s):39 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (263 KB) | HTML iconHTML

    The rapid development of information technology and the severe competition of the bank industry make the internet banking become a new service channel for Chinese banks to acquire new customers and to retain the existing customers. Because the larger part of the profit in internet banking is from the existing customers, Chinese banks have been making their great efforts in order to win the market ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Selective Clustering Ensemble Algorithm

    Publication Year: 2012, Page(s):45 - 49
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (222 KB) | HTML iconHTML

    Selective clustering ensemble is usually based on the reference partition to select members of the ensemble. General method of generating reference partition is to use preliminary ensemble results, yet it cannot eliminate the influence of the inferior clustering partitions and the final clustering result is not satisfactory. In order to solve this problem, the paper proposes a new selective cluste... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.