By Topic

e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004 IEEE International Conference on

Date 28-31 March 2004

Filter Results

Displaying Results 1 - 25 of 94
  • Music piracy on peer-to-peer networks

    Publication Year: 2004, Page(s):431 - 440
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (525 KB)

    Content providers from the music industry argue that peer-to-peer (P2P) networks such as KaZaA, Morpheus, iMesh, or Audiogalaxy are an enormous threat to their business. They furthermore blame these networks for their recent decline in sales figures. For this reason, an empirical investigation was conducted during a period of 6 weeks on one of the most popular files-sharing systems, in order to de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A multiple-stage cooperative negotiation

    Publication Year: 2004, Page(s):131 - 138
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (273 KB)

    Automated negotiation is a key issue to facilitate e-business. It is an on-going research area and attracts attention from both research communities and industry. We propose a multiple-stage cooperative automated negotiation architecture, including a sophisticated negotiation strategy and protocol, to resolve the agents' conflicts. This proposed architecture attempts to address the discovery of jo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Web services-based collaborative scheme for credit card fraud detection

    Publication Year: 2004, Page(s):177 - 181
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (229 KB)

    A Web services-based collaborative scheme for credit card fraud detection is proposed. With the proposed scheme, participant banks can share the knowledge about fraud patterns in a heterogeneous and distributed environment and further enhance their fraud detection capability and reduce financial loss. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Decision tree construction for data mining on grid computing

    Publication Year: 2004, Page(s):441 - 447
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB)

    Decision tree is one of the frequently used methods in data mining for searching prediction information. Due to its characteristics which are suitable for parallelism, it has been widely adopted in high performance field and developed into various parallel decision tree algorithms to deal with huge data and complex computation. Following the development of other technology fields, grid computing i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new fair micropayment system based on hash chain

    Publication Year: 2004, Page(s):139 - 145
    Cited by:  Papers (11)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (221 KB)

    Micropayment systems in existence usually do not provide fairness, which means that either the customer or the merchant, or both, can cheat each other and gain a financial advantage by misbehaving in the protocols. We propose a new fair micropayment system based on hash chain, which is an offline, prepaid system and supports divisibility of digital coins in a simpler way. Moreover, in our system, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A scheme for MAC isolation to realize effective management in public wireless LAN

    Publication Year: 2004, Page(s):459 - 464
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3142 KB)

    Recently, IEEE 802.11 wireless LAN (WLAN) technology was rapidly developed and the high-speed wireless access was stepping into our lives. In public areas, the architecture of public wireless LAN (public WLAN) is proposed to solve the emerging management problems such as authentication, accounting and authorization, etc. [J.A. Laurila et al., (2001)]. But there is no previous good solution mention... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Indexing continual range queries for location-aware mobile services

    Publication Year: 2004, Page(s):233 - 240
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB)

    We study a new main memory-based approach to indexing continual range queries to support location-aware mobile services. The query index is used to efficiently answer the following question repeatedly: "Which moving objects are currently located inside the boundaries of individual queries?" We present a covering tile-based (COVET) query index, where adjacent covering tiles touch each other only at... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of a remote quick design system for woven fabrics

    Publication Year: 2004, Page(s):182 - 188
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (569 KB)

    The development of a remote quick design system is presented. The system can access through the Web, which can be used to quickly generate an optimized set of weaving parameters. The developed system is a client/server configuration where Web browsers were used as a generic client environment serving interface linking the client's parameter input to the search system located on the server side thr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Algorithms for community subject-identification: experiments and test results

    Publication Year: 2004, Page(s):195 - 201
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (215 KB)

    We deal with the problem of finding the subject that a given set of pages deals with. The algorithms presented have been designed with a view to provide good results when pages that belong to community (or handle some common topic) are presented to them. When a set of pages are presented, the algorithms return a set of words ordered in the decreasing order of relevance. The words among the first f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An ASEP (advanced secure electronic payment) protocol design using 3BC and ECC(F2m) algorithm

    Publication Year: 2004, Page(s):341 - 346
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (302 KB)

    Unlike SET (secure electronic transaction) protocol. We propose an ASEP (advanced secure electronic payment) protocol, which uses ECC (elliptic curve cryptosystem with F2 not Fp) [N. Koblitz, (1987), V. S Miler, (1986), G. Harper et al., (1993)], SHA (secure hash algorithm) and 3BC (block byte bit cipher) instead of RSA and DES. To improve the strength of encryption and the s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security specification and implementation for mobile e-health services

    Publication Year: 2004, Page(s):241 - 248
    Cited by:  Papers (3)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB)

    Different IT applications require different security services. We have been working in the area of e-health applications in a mobile environment, and we have needed to integrate specific security services. We present those security services for mobile e-health services and how we have implemented them. First, the different security threats specially oriented to the e-health applications are descri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Structure-based analysis of Web sites

    Publication Year: 2004, Page(s):529 - 532
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (259 KB)

    The performance of information retrieval on the Web is heavily influenced by the organization of Web pages, user navigation patterns, and guidance-related functions. Having observed the lack of measures to reflect this factor, this paper focuses on an approach based on both structure properties and navigation data to analyze and improve the performance of Web site. Two types of indices are defined... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The design of QoS broker algorithms for QoS-capable Web services

    Publication Year: 2004, Page(s):17 - 24
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (270 KB)

    QoS (quality of service) support in Web services is an important issue. We present a QoS-capable Web service architecture, QCWS, by introducing a QoS broker module between service clients and providers (servers). The functions of the QoS broker module include collecting QoS information about servers, making selection decisions for clients, and negotiating with servers to get QoS commitments. We pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Matchmaking for business processes based on choreographies

    Publication Year: 2004, Page(s):359 - 368
    Cited by:  Papers (31)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (343 KB)

    Web services have a potential to enhance B2B e-commerce over the Internet by allowing companies and organizations to publish their business processes on service directories where potential trading partners can find them. This can give rise to new business paradigms based on ad-hoc trading relations as companies, particularly small to medium scale, can cheaply and flexibly enter into fruitful contr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study on contents distribution using electronic cash system

    Publication Year: 2004, Page(s):333 - 340
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (305 KB)

    Electronic cash systems are used as payment tools of e-commerce. They should be equipped with independence, transferability, and dividability, which are requirements of digital rights management (DRM) servicing contents. The contents can be recognized in terms of money. Its concept applies to reprint, copy, and anonymous users. This paper shows DRM model which adopted e-cash as a result of examini... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understanding the behavioral intention to digital piracy in virtual communities - a propose model

    Publication Year: 2004, Page(s):223 - 226
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (225 KB)

    With the rapid growth of the Internet in terms of the widespread acceptance and the increased bandwidth of connection, the situation of digital piracy has become increasingly serious. Due to increased prosecution by the authorities, we rarely find Web sites that provide copyrighted digital materials (music, movies, software, games, etc.) to download. Instead, end users share those copyrighted mate... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A mobile ticket validation by VSS tech with time-stamp

    Publication Year: 2004, Page(s):267 - 270
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (290 KB)

    Mobile commerce is becoming increasingly important in business. We find the e-ticket to be a popular way of implementing m-com. In order to solve some authentication drawback we propose a mobile ticket validation method using VSS (Visual Secret Sharing) technology with a time-stamp protocol on the mobile environment. The VSS encryption technology separates the ticket into two parts; one part of th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The challenge of exclusions in pervasive cyberspace

    Publication Year: 2004, Page(s):293 - 298
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (213 KB)

    The number of people who yet have either inferior service or no access needs to be a major concern to research and development leaders in engineering and e-commerce. The challenge for cyberspace leaders is to recognize and resolve the problem of the disenfranchised groups in the world who have not yet been touched by the concept of pervasive computing. The continued dominance of urban markets cont... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • XML schema-based discovery and invocation of mobile services

    Publication Year: 2004, Page(s):253 - 258
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB)

    A current problem that exists for mobile devices is the discovery, display and use of local or global services as they are found on-the-fly by a roaming mobile device. Currently service registries are centralized and typically use global ontologies. In addition given the multiple mobile device types, creating and maintaining multiple user interfaces for differing device types can be costly for pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Practical modification of an efficient public-key framework

    Publication Year: 2004, Page(s):554 - 557
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (259 KB)

    J. Zhou proposed a new public-key framework, in which the maximum lifetime of a certificate is divided into short periods and the certificate could expire at the end of any period under the control of the certificate owner (or his manager in a corporate environment). However, Zhou's public-key framework is not suitable on implementation in real world. Therefore, we review some security parameters ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Personalized product recommendation in e-commerce

    Publication Year: 2004, Page(s):413 - 420
    Cited by:  Papers (3)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (247 KB)

    The purpose is to analyze customers' purchasing behaviors based on product features from transaction records and product feature databases. Customers' preferences toward particular features of products are analyzed and then rules of customer interest profiles are thus derived in order to recommend customer products that have potential attraction with customers. The approach of this paper has its s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Portfolio management using hybrid recommendation system

    Publication Year: 2004, Page(s):202 - 206
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (282 KB)

    The goal of a decision support system is to provide the human user with an optimized decision recommendation when operating under uncertainty in complex environments. The particular focus of our discussion is the investment domain - the goal of investment decision-making is to select an optimal portfolio that satisfies the investor's objective, or, in other words, to maximize the investment return... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • e-Transformation technologies: case studies and the road ahead - a value chain perspective

    Publication Year: 2004, Page(s):509 - 516
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (811 KB)

    E-transformation technologies, for the past few years, have been evolving towards the goal of information integration and system interoperability. While there is no doubt that interoperable systems can enable many value-added functions and provide new business opportunities, whether the current development trend can really lead to some real impacts on people's daily lives is still a commonly asked... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multifunctioal ICMP messages for e-commerce

    Publication Year: 2004, Page(s):325 - 332
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (514 KB)

    Denial-of-Service (DoS) attacks has been threatening our evolving eCommerce and eServices on the Internet for years. Regarding today's stateless Internet environment, researchers have designed various schemes carrying additional information to providing information for defending packet flooding attacks, packet dropping attacks, and routing protocol attacks. We present a multifunctional scheme, the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new CEMBS based on RSA signatures and its application in constructing fair exchange protocol

    Publication Year: 2004, Page(s):558 - 562
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB)

    Fairness is one of the basic requirements of e-commerce protocols and applications. CEMBS is proved to be an important cryptographic building primitive in constructing fair exchange protocols. In this paper the drawbacks of existing CEMBS-implementing methods are analyzed. A new CEMBS-constructing method based on RSA signature is proposed, which is proved to be simple, efficient and secure. Afterw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.