2001 International Conferences on Info-Tech and Info-Net. Proceedings (Cat. No.01EX479)

Oct. 29 2001-Nov. 1 2001

Go

Filter Results

Displaying Results 1 - 25 of 34
  • 2001 International Conferences on Info-tech and Info-net Proceedings [front matter]

    Publication Year: 2001, Page(s):0_1 - 3
    Request permission for commercial reuse | |PDF file iconPDF (205 KB)
    Freely Available from IEEE
  • Info-tech & info-net: crisis and solutions - Why is ICII 2001 needed

    Publication Year: 2001, Page(s):4 - 9
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (306 KB) | HTML iconHTML

    As is well known, Communication Networks, whose current forms are telecommunication network, Internet, CATV and etc., have made great contributions to the world development. The terms like IT and Network Economy have thus been widely spread. However, there is also an argument on the subject that whether IT and Network Economy are opportunity or threat to the mankind. Recently, the worldwide crisis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2001, Page(s): 179
    Request permission for commercial reuse | |PDF file iconPDF (40 KB)
    Freely Available from IEEE
  • Engineering logistics information system in the second wave of e-business era: a perspective from business network strategy

    Publication Year: 2001, Page(s):17 - 22 vol.6
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (383 KB) | HTML iconHTML

    This paper presents a conceptual framework for the analysis of implementing logistics information system during the second wave of e-business era from a perspective of business network strategy. To tackle the competition and pursue more potential markets, many firms have implemented information systems in supply chain management in order to gain competitive advantages. Nevertheless, most of them l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Opportunity and enlightenment brought to China by rapid development of network economy

    Publication Year: 2001, Page(s):175 - 178 vol.6
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (208 KB) | HTML iconHTML

    Under the background of economy globalization, network economy is a kind of brand-new form of economy development, which is based on modem electronic information technology, carried by Internet, led by e-commerce, ensured by intermediary business, to realize the flow of information, capital and materials, and to accelerate sustained growth of economy. The rising and developing of network economy i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of mobile agents in collecting the residual value from electronic accounts

    Publication Year: 2001, Page(s):13 - 16 vol.6
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (180 KB) | HTML iconHTML

    With the prevalence of the electronic commerce, the residual balance of electronic currency emerges in our lives. For example, we usually use electronic currency cards. Every card has only small balance such as $50. Sometimes, the residual value in the cards is so little that we cannot process the transactions we want with it. If collecting the balance in these cards, we can use the sum to do some... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The load monitoring of Web server using mobile agent

    Publication Year: 2001, Page(s):130 - 135 vol.6
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (189 KB) | HTML iconHTML

    The importance of the server is growing with the growth of the Internet and the load on the server has rapidly grown with the increase in the number of Web server users. Load monitoring has become an important technical aspect in the performance of the server for these reasons. It has proven to be more efficient to use a Java mobile agent that operates by moving between the systems for load monito... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploration in developing modern distant education base in digital video broadcast cable network

    Publication Year: 2001, Page(s):72 - 77 vol.6
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (290 KB) | HTML iconHTML

    To search for a method of modern distance education that is suitable for the Chinese nation, and to construct the country's lifelong education system more efficiently, a letterpress, linked to the teaching practice and application of distance education based on the DVB-C (Digital Video Broadcast Cable) platform network, analyses the manner of constitution, the purpose, the superiority and the fore... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The present situation and way to develop E-commerce of the enterprise in China

    Publication Year: 2001, Page(s):171 - 174 vol.6
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (186 KB) | HTML iconHTML

    As the important part of the knowledge economy, network economy is growing up rapidly, and becomes the new driving force of the world economy increment. E-commerce is the nucleus of Internet economy, the traditional enterprise entering E-commerce can make the enterprise reduce the cost, enlarges effective output, promote the efficiency, raise society goods and materials wealth and welfare standard... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of portable mobile devices based e-payment system and e-ticketing system with digital signature

    Publication Year: 2001, Page(s):7 - 12 vol.6
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (229 KB) | HTML iconHTML

    In this paper, we study the application of digital signature in e-payment and e-ticketing systems where distributed verification is required. The systems proposed in this paper are aimed at being implemented in the Bluetooth-embedded mobile devices like handphones or palmtops etc. In these systems, people can make payment and ticketing activities with their handheld devices in a secure manner. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Character-based consistency maintenance in Web-based real-time cooperative edit system

    Publication Year: 2001, Page(s):112 - 118 vol.6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (328 KB) | HTML iconHTML

    A char-based consistency maintenance algorithm is introduced which is implemented in the brainstorm edit mode on the Web-based real-time cooperative edit system. Here we put forward a star-like system architecture, which is based on events' intercepting-transmitting-recurring, and uses an improved transformation algorithm that is based on the GOTO algorithm to realize the consistency maintenance. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling of SET protocol based on UML and colored Petri net

    Publication Year: 2001, Page(s):124 - 129 vol.6
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (266 KB) | HTML iconHTML

    In this paper, the formal specification of the SET protocol is given. The use cases and activity diagram of the buying procedure in the SET protocol are explained in detail. With the help of the computer tool Design/CPN, the CPN model of the SET protocol is proposed. Supported by the corresponding tools, it can be used to verify the correctness and the security properties of SET protocol. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual Institute for the Modelling of Industrial Manufacturing Systems (VIMIMS) - implementation of an international platform for teaching and research

    Publication Year: 2001, Page(s):66 - 71 vol.6
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (352 KB) | HTML iconHTML

    The aim of an ongoing research project carried out by six European research and educational institutions is to establish a Virtual Institute for the Modelling of Industrial Manufacturing Systems (VIMIMS). The virtual institute is designed to become an international platform for teaching and research for this particular scientific field. VIMIMS is an Internet-based portal that offers students and r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Internet-based remote ISP for distant education

    Publication Year: 2001, Page(s):54 - 59 vol.6
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (266 KB) | HTML iconHTML

    With the purpose of developing network-based engineering education, we combine the Internet together with in-system programming (ISP) in order to design a remote ISP tool which is capable of remotely monitoring, controlling, debugging or upgrading electronic systems, facilities and products made of PLDs (programmable logic devices). This tool can be used by schools or universities where courses on... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Legal guarantee of the security of electronic commerce

    Publication Year: 2001, Page(s):167 - 170 vol.6
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (165 KB) | HTML iconHTML

    The safe development of e-commerce needs a legal environment that adapts to it, besides necessary technical support and a good economic atmosphere. E-commerce involves many legal issues, in which the building of the laws and regulations on the security of e-commerce is extremely crucial and urgent. This paper lays a strong emphasis on the analysis of the security requirement of e-commerce and the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The innovation of e-marketing combination tactics

    Publication Year: 2001, Page(s):1 - 6 vol.6
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (222 KB) | HTML iconHTML

    Marketing, which is a method and function to link up enterprise with external circumstance, develops with and responses dynamically to the changing of the environment. Under the Internet environment, e-marketing changes the basis of traditional marketing tactics and expands the concept of marketing. The paper discusses the innovation of E-marketing combination tactics from four aspects: product ta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • E-commerce between a European and a Chinese company

    Publication Year: 2001, Page(s):42 - 47 vol.6
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (271 KB) | HTML iconHTML

    With the rapid development of the Chinese economy in general, and the Internet in China in particular, the scope for international business cooperation is increasing. This paper presents an e-commerce case study between a listed Chinese Internet service provider (ISP) company and a small Dutch IT company. The analysis employs a "fit" model that addresses the following five fits: strategic, resourc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Informatization of petrochemical industry and key technology of CIPS accomplishment

    Publication Year: 2001, Page(s):155 - 160 vol.6
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (289 KB) | HTML iconHTML

    With the developing application of information technology and advanced production techniques in the petrochemical industry, the informatization of the Chinese petrochemical industry becomes indispensable to participate in world competition and accelerate its development, of which the accomplishment of CIPS (Computer Integrated Processing System) is the basis and key. Under the informatization circ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer-based simulation analysis of railway carrying capacity utilization

    Publication Year: 2001, Page(s):106 - 111 vol.6
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (227 KB) | HTML iconHTML

    How to advance the utilization efficiency of railway capacity is the key to the research of railway transportation organization. The article introduces the computer-based simulation analysis method of railway carrying capacity utilization and gives an example to study the influencing factors of railway carrying capacity utilization and the relationship among them. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An XML digital signature for Internet e-business applications

    Publication Year: 2001, Page(s):23 - 29 vol.6
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (262 KB) | HTML iconHTML

    At present, many companies doing business-to-business (B2B) e-business on the Internet have suffered difficulties in extending their e-market and in participating in other markets, since it is impossible for their own e-business systems to interoperate with other e-business systems in other e-markets. To resolve the non-interoperability of the e-business applications, e-commerce common framework s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Open Bookmark service based on self-adaptive information agents

    Publication Year: 2001, Page(s):136 - 143 vol.6
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (354 KB) | HTML iconHTML

    As the Web grows, the massive increase in information is placing severe burdens on information retrieval. Automated search engines and information directories with small editorial staff are unable to keep up with the increasing submissions of Web sites. To address the problem, this article introduces the Open Bookmark service based on self-adaptive information agents. One can record favorite URLs ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Infrastructure of Web-based VR-form virtual laboratory

    Publication Year: 2001, Page(s):78 - 83 vol.6
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (400 KB) | HTML iconHTML

    With recent technological advances, electronic learning (e-learning) has been enabled to operate via the World Wide Web (WWW). Being an important education method, online virtual experiment systems have also been developed greatly over the last few years. These have been used to aid education in certain areas, e.g. control engineering and the understanding of physical phenomena. For the sake of ai... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling versions in Web-based real-time cooperative edit system

    Publication Year: 2001, Page(s):119 - 123 vol.6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (297 KB) | HTML iconHTML

    The Web-based real-time cooperative edit system is an efficient working paradigm of CSCW, and it offers a function of editing a document at the same time by multiusers through a Web browser. Modeling versions is one of the most important technologies of the system. According to the characteristics of cooperative work, we define the version, world, context, entity, current version and relationship ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The "Net" in education: some operative examples

    Publication Year: 2001, Page(s):60 - 65 vol.6
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (341 KB) | HTML iconHTML

    The Internet has become an invaluable resource in teaching and learning activities, within both academic and non-academic organisations. It can be used to conduct research, seek out information for course preparation, deliver courses and facilitate communication between students and teaching staff. This paper presents two different experiments which involved the Internet in educational paths in a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and realization of the system for automatic Web-course building

    Publication Year: 2001, Page(s):48 - 53 vol.6
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (307 KB) | HTML iconHTML

    Building Web-based courses has become an important trend for the innovation of teaching methods. At present, however, only a few teachers who are highly zealous and have mastered the knowledge of Internet technology and Web page design skills are able to build and maintain such Web courses in an asynchronous or synchronous learning environment. For most of them, building a Web course by themselves... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.