By Topic

E-Commerce, 2003. CEC 2003. IEEE International Conference on

Date 24-27 June 2003

Filter Results

Displaying Results 1 - 25 of 55
  • Proceedings IEEE International Conference on E-Commerce. CEC 2003

    Publication Year: 2003
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB)

    The following topics are discussed: e-commerce applications; techniques for e-commerce; negotiation; e-commerce practices; e-marketplace; business process management and protocol design; e-commerce infrastructure; security and trust; auction and dynamic pricing; and Web services for electronic commerce. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Violation of IEEE Publication Principles
    Monitorable electronic contract

    Publication Year: 2003, Page(s):92 - 99
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (9 KB) | HTML iconHTML

    Notice of Violation of IEEE Publication Principles

    "Monitorable Electronic Contract"
    by Lai Xu
    in the Proceedings of the IEEE International Conference on E-Commerce (CEC'03), June 2003

    After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Prin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2003, Page(s):413 - 414
    Request permission for commercial reuse | PDF file iconPDF (155 KB)
    Freely Available from IEEE
  • A tractable mechanism for time dependent markets

    Publication Year: 2003, Page(s):31 - 34
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (275 KB) | HTML iconHTML

    Markets with time dependent goods are special cases of multi commodity markets. An application area of high interest is day-ahead power markets. If these are to be opened for consumer side bidders and local production bidders, the number of actors on the market grows dramatically, and new market mechanisms and algorithms are needed. Another interesting application area with many similarities is ba... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mediating a bilateral multi-issue negotiation

    Publication Year: 2003, Page(s):76 - 83
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB) | HTML iconHTML

    In human decision making behaviors, people rely on random selection processes, such as flipping a coin, to handle a situation that involves so much uncertainty that it subsequently becomes difficult for them to rationally judge a decision. For bilateral multi-issue negotiations, given even bargaining power and two-sided uncertainty, negotiators are often faced with difficult decisions that cannot ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of an efficient tentative hold protocol for automated coordination of multi-business transactions

    Publication Year: 2003, Page(s):215 - 222
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (434 KB) | HTML iconHTML

    The emerging Web services provide an effective means to carry out automated transactions between multiple business parties. While there are several specific protocols currently being discussed to address the coordination of Web services-enabled business transactions, we consider the tentative hold protocol (THP) that allows the placement of tentative holds on business resources prior to actual tra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building and managing adaptive e-business solution infrastructure

    Publication Year: 2003, Page(s): 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (178 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The security problems of Rivest and Shamir's PayWord scheme

    Publication Year: 2003, Page(s):20 - 23
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB) | HTML iconHTML

    The PayWord scheme was proposed by Rivest and Shamir for micropayments. This paper points out that it has the following problem: a malicious customer can damage the bank by purchasing in excess of the customer's credit which the bank has guaranteed by issuing the certificate. In general, there are two positions of the bank with regard to the certificate. Position 1: the bank takes full responsibil... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Group oriented digital certificate architecture

    Publication Year: 2003, Page(s):233 - 237
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (251 KB) | HTML iconHTML

    We introduce a highly efficient string-ring certificate architecture. Compared with the conventional X.509 certificate architecture, this new architecture has the advantage of simple management and convenient verification. There is only one route transverse to the root. To realize the new certificate architecture a modified group signature scheme is presented. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Page Digest for large-scale Web services

    Publication Year: 2003, Page(s):381 - 390
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB) | HTML iconHTML

    We introduce Page Digest, a mechanism for efficient storage and processing of Web documents. The Page Digest design encourages a clean separation of the structural elements of Web documents from their content. Its encoding transformation produces many of the advantages of traditional string digest schemes yet remains invertible without introducing significant additional cost or complexity. Using t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework for dynamic eBusiness negotiation processes

    Publication Year: 2003, Page(s):84 - 91
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (355 KB) | HTML iconHTML

    The importance of personalized products and services is increasing in the dynamic customer-oriented business marketplace. Open environment of dynamic interoperable eBusiness processes is a key requirement for the emerging business models. Negotiation processes are at the core of dynamic eBusiness. While research on negotiation is not new, the vast majority of the studies to date have focused on au... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two distributed algorithms for e-ticket validation protocols for mobile clients

    Publication Year: 2003, Page(s):223 - 230
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (370 KB) | HTML iconHTML

    The e-ticket (electronic ticket) validation problem has relevance in mobile computing environment because of the multiple submission of a ticket that is possible due to intermittent disconnections and mobility of hosts. Here, we propose protocols that are not only sensitive to disconnection but also to location. One of the proposed protocols is the variant of the distributed protocol proposed by P... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Usage-based versus flat pricing for e-business services with differentiated QoS

    Publication Year: 2003, Page(s):355 - 362
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (426 KB) | HTML iconHTML

    Design of competitive e-commerce services, in such a quickly responding market, requires the analyses of prices and price structures. We present a general model of an e-commerce market that allows us to analyze optimal price structures, both flat and usage-based. Based on the price structure of a major Web hosting provider, we consider both single-tier and two-tier (burst-rate) pricing, and our re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Autonomic economics

    Publication Year: 2003, Page(s):120 - 127
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (283 KB) | HTML iconHTML

    Autonomic systems take decisions independent of human administrators and hide much system complexity when they do signal for intervention. Furthermore, they are expected to interact with their environment in an autonomous way, even beyond the boundaries of an individual organization. Autonomic systems will offer their capabilities as services partially based on service elements they acquire from t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A non-repudiation message transfer protocol for e-commerce

    Publication Year: 2003, Page(s):320 - 327
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (278 KB) | HTML iconHTML

    In the business world, exchange of signatures or receipts is a common practice in case of future dispute. Likewise, it is critical in e-commerce applications to have the security service that generates, distributes, validates, and maintains the evidence of an electronic transaction. Quite of number of non-repudiation protocols have been proposed in distributed systems and evaluated based on some e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An effective communication model for collaborative commerce of Web-based surveillance services

    Publication Year: 2003, Page(s):40 - 44
    Cited by:  Papers (3)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (383 KB) | HTML iconHTML

    We design and implement a Web-based information system for providing remote surveillance services. The surveillance data can be treated as a kind of digitized product in e-market. By collaborating different value-added services with the same surveillance data, diverse surveillance applications can be introduced. For example, by collaborating with companies (i.e. virtual enterprises) that supply We... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Property propagation rules for prioritizing and synchronizing trading activities

    Publication Year: 2003, Page(s):246 - 255
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (329 KB) | HTML iconHTML

    With the growing number of marketplaces and trading partners in the e-commerce (electronic commerce) environment, software tools designed to act on behalf of human traders are increasingly used to automate trading activities. We describe a model for constructing trading engines, which are capable of concurrently participating in multiple interrelated negotiations with heterogeneous protocols. Thes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A policy framework for Business Activity Management

    Publication Year: 2003, Page(s):238 - 245
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB) | HTML iconHTML

    Business Activity Management (BAM) is becoming one of the most critical areas to transform a business into an adaptive enterprise. However, to manage business activities and the related resources is a very complex task because of the potentially large number of business rules and unpredictable changes of business situations. Policy-based approach is essential to make such challenging tasks practic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive profiling framework and system for service provisioning

    Publication Year: 2003, Page(s):264 - 271
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (513 KB) | HTML iconHTML

    Effectively profiling customer, merchant and service information is critical to today's e-commerce (electronic commerce) environment. The challenge is to build a flexible profiling system to dynamically collect relevant information about consumers according to diverse profiling requirements of different services, so that the services can get provisioned. We present a service hub based two-phase pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling of Web services flow

    Publication Year: 2003, Page(s):391 - 398
    Cited by:  Papers (15)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (282 KB) | HTML iconHTML

    Services such as automatic purchasing, automatic updating of prices, or getting latest information etc, can be provided on the Internet using Web services technology. A client can access these services using the Internet. Web services infrastructure includes some standards, such as simple object access protocol (SOAP), Web services description language (WSDL) and universal description, discovery a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Matchmaking for business processes

    Publication Year: 2003, Page(s):7 - 11
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (282 KB) | HTML iconHTML

    Web services have a potential to enhance B2B e-commerce over the Internet by allowing companies and organizations to publish their business processes on service directories where potential trading partners can find them. This can give rise to new business paradigms based on ad-hoc trading relations as companies, particularly small to medium scale, can cheaply and flexibly enter into fruitful contr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PCFinder: an intelligent product recommendation agent for e-commerce

    Publication Year: 2003, Page(s):181 - 188
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3414 KB)

    There are many e-commerce applications on the Web. A common shortcoming is the lack of customer service and marketing analysis tools in most e-commerce web sites. In order to overcome this problem, we have constructed an intelligent agent based on Case-Based Reasoning (CBR) and collaborative filtering, which we have included in our product recommendation system, called PCFinder. This system was fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managerial considerations to adopting electronic data interchange

    Publication Year: 2003, Page(s):136 - 146
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (269 KB) | HTML iconHTML

    This paper outlines the process of adopting electronic data interchange into a business cycle and the issues encountered in the process. These issues are categorized into technical, financial, scheduling, and ethical areas. Real-life case studies are presented to illustrate the difficulties of adopting electronic data interchange. Common-sense experiences from these case studies are summarized as ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A prototype of information requirement elicitation in m-commerce

    Publication Year: 2003, Page(s):53 - 56
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (404 KB) | HTML iconHTML

    Information requirement elicitation (IRE) is a context-aware and personalized wireless Web service to elicit user information requirements through interactive choice prompts. The authors developed a prototype of IRE and demonstrated its operations in an imagined m-commerce scenario. This article also gives the result of a preliminary usability study. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Contract representation for run-time monitoring and enforcement

    Publication Year: 2003, Page(s):103 - 110
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (603 KB) | HTML iconHTML

    Converting a conventional contract into an electronic equivalent that can be executed and enforced by computers is a challenging task. The difficulties are caused by the ambiguities that the original human-oriented text is likely to contain. The conversion process involves the conversion of the original text into mathematical notation. We discuss how standard conventional contracts can be describe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.