By Topic

e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004 IEEE International Conference on

28-31 March 2004

Filter Results

Displaying Results 1 - 25 of 94
  • A self-adapting mobile IPv6 model based on MAP

    Publication Year: 2004, Page(s):473 - 476
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (335 KB)

    A self-adapting mobile IPv6 model based on MAP is presented to optimize the performance when mobile node moves frequently at remote region. Through enhancing the MAP, adopting the self-adapting binding update policy and intra-CN process, the model optimizes mobile node's moving performance, owns the capability of self-adapting to exterior network changes as well as improves the utilization of netw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An enhanced EDCG replica allocation method in ad hoc networks

    Publication Year: 2004, Page(s):465 - 472
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4495 KB)

    The maturity of wireless technology has led to an ever-increasing interest in mobile ad hoc networks (MANETs). Many applications are expected to be developed using MANETs. However, the connectivity among mobile hosts may change due to their mobility which results in frequent disconnections. Thus, data accessibility in MANETs is lower than that in traditional fixed networks. To ensure high data acc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Structure-based analysis of Web sites

    Publication Year: 2004, Page(s):529 - 532
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (259 KB)

    The performance of information retrieval on the Web is heavily influenced by the organization of Web pages, user navigation patterns, and guidance-related functions. Having observed the lack of measures to reflect this factor, this paper focuses on an approach based on both structure properties and navigation data to analyze and improve the performance of Web site. Two types of indices are defined... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A scheme for MAC isolation to realize effective management in public wireless LAN

    Publication Year: 2004, Page(s):459 - 464
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3142 KB)

    Recently, IEEE 802.11 wireless LAN (WLAN) technology was rapidly developed and the high-speed wireless access was stepping into our lives. In public areas, the architecture of public wireless LAN (public WLAN) is proposed to solve the emerging management problems such as authentication, accounting and authorization, etc. [J.A. Laurila et al., (2001)]. But there is no previous good solution mention... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Suppressing false alarms of intrusion detection using improved text categorization method

    Publication Year: 2004, Page(s):163 - 166
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (274 KB)

    Although some text processing techniques can be employed to intrusion detection based on the characterization of the frequencies of the system calls executed by the privileged programs, and achieve satisfactory detection accuracy, high false alarms make it hardly practicable in real life. We modify the traditional weighting method tf-idf for suppressing false alarms by considering the necessary in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understanding the behavioral intention to digital piracy in virtual communities - a propose model

    Publication Year: 2004, Page(s):223 - 226
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (225 KB)

    With the rapid growth of the Internet in terms of the widespread acceptance and the increased bandwidth of connection, the situation of digital piracy has become increasingly serious. Due to increased prosecution by the authorities, we rarely find Web sites that provide copyrighted digital materials (music, movies, software, games, etc.) to download. Instead, end users share those copyrighted mate... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of e-business strategies for SMEs in developing countries

    Publication Year: 2004, Page(s):49 - 59
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (293 KB)

    Through e-business, information and communications technology (ICT) has changed the way trade and commerce is carried out. The developed nations of the world are taking advantage of these new technologies to expand their markets. Many countries, developed as well as developing, encourage the SMEs to form clusters to strengthen their marketing and buying power. Clustering is found to be a good stra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data extraction and annotation for dynamic Web pages

    Publication Year: 2004, Page(s):499 - 502
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (203 KB)

    Many Web sites contain large sets of pages generated dynamically using a common template. The structured data extracted from these pages with semantic annotation are valuable for information system. We proposed a system, ADeaD, to automatically extract data values from these Web pages and annotate the data schema. Experimental evaluation on a lot of real Web page collections indicates our algorith... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of a remote quick design system for woven fabrics

    Publication Year: 2004, Page(s):182 - 188
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (569 KB)

    The development of a remote quick design system is presented. The system can access through the Web, which can be used to quickly generate an optimized set of weaving parameters. The developed system is a client/server configuration where Web browsers were used as a generic client environment serving interface linking the client's parameter input to the search system located on the server side thr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spreading activation models for trust propagation

    Publication Year: 2004, Page(s):83 - 97
    Cited by:  Papers (49)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (354 KB)

    Semantic Web endeavors have mainly focused on issues pertaining to knowledge representation and ontology design. However, besides understanding information metadata stated by subjects, knowing about their credibility becomes equally crucial. Hence, trust and trust metrics, conceived as computational means to evaluate trust relationships between individuals, come into play. Our major contributions ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An encoding scheme for indexing XML data

    Publication Year: 2004, Page(s):525 - 528
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (217 KB)

    E-services are becoming a promising technology for the effective automation of application integration across the Web. They build upon XML, as data format for exchanging messages between applications. Accompanied with WSDL, UDDI, and SOAP, XML has clearly influenced positively the development of applications running on the Web. As the basic technology, indexing scheme for XML data have been studie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building an e-learning platform by access grid and data grid technologies

    Publication Year: 2004, Page(s):452 - 455
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (301 KB)

    Due to overall popularity of the Internet, e-learning has become a hot method of learning in recent years. Through the Internet, learners can freely absorb new knowledge without the restriction of time and place. Many companies have adopted e-learning to train their employees. The e-learning system can make an enterprise more competitive by increasing the knowledge of its employees. As we know, e-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quantitative approach to using e-commerce data to monitor and control the performance of a supply chain

    Publication Year: 2004, Page(s):157 - 162
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (307 KB)

    We present a quantitative approach to using e-commerce data to measure, monitor, and control the performance of a supply chain. The performance is measured in terms of the turn-around time for a business transaction. This performance is monitored and correlated to a set of parameters so that the resulting mathematical relation is used as a model to design control measures to bring the performance ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Increasing the customer's choice: query expansion based on the layer-seeds method and its application in e-commerce

    Publication Year: 2004, Page(s):317 - 324
    Cited by:  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (447 KB)

    In e-commerce it is often crucial to provide customers a large choice of relevant offers. As short and incomplete queries prevail, appropriate expansion methods are desirable. This work describes a method for the automatic construction of a thesaurus based on existing categories of documents. A clustering algorithm, the "Layer-Seeds method", is introduced, which facilitates the automatic generatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A decision support system for multiple objective linear programming

    Publication Year: 2004, Page(s):425 - 428
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (330 KB)

    A new approximate algorithm has been developed by Wu et al. for solving fuzzy multiple objective linear programming (FMOLP) problems with fuzzy parameters in any form of membership function in both objective functions and constraints. Based on the approximate algorithm, a fuzzy multiple objective decision support system (FMODSS) is developed. We focus on the description of use for FMODSS in detail... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Portfolio management using hybrid recommendation system

    Publication Year: 2004, Page(s):202 - 206
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (282 KB)

    The goal of a decision support system is to provide the human user with an optimized decision recommendation when operating under uncertainty in complex environments. The particular focus of our discussion is the investment domain - the goal of investment decision-making is to select an optimal portfolio that satisfies the investor's objective, or, in other words, to maximize the investment return... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Single-pass algorithms for mining frequency change patterns with limited space in evolving append-only and dynamic transaction data streams

    Publication Year: 2004, Page(s):215 - 222
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (275 KB)

    We propose an online single-pass algorithm MFC-append (mining frequency change patterns in append-only data streams) for online mining frequent frequency change items in continuous append-only data streams. An online space-efficient data structure called Change-Sketch is developed for providing fast response time to compute dynamic frequency changes between data streams. A modified approach MFC-dy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robustness of entrusted data-analysis in e-science research collaboration

    Publication Year: 2004, Page(s):373 - 378
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (443 KB)

    In e-science, a participant may entrust data-analysis to a third party. This analysis may necessitate digital watermarking for security/privacy reasons. When we use watermarking, there is a robustness requirement that the data be kept acceptable. By using a phantom experiment, We demonstrate that the traditional robustness evaluation does not always work in the e-science scenario. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Practical modification of an efficient public-key framework

    Publication Year: 2004, Page(s):554 - 557
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (259 KB)

    J. Zhou proposed a new public-key framework, in which the maximum lifetime of a certificate is divided into short periods and the certificate could expire at the end of any period under the control of the certificate owner (or his manager in a corporate environment). However, Zhou's public-key framework is not suitable on implementation in real world. Therefore, we review some security parameters ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understand user preference of online shoppers

    Publication Year: 2004, Page(s):123 - 130
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (230 KB)

    The tremendous growth of the Internet has created opportunities for consumers and firms to participate in an online global marketplace. It is conceivable that in the future every person with access to a computer will interact with firms marketing on the Internet. We foresee that advances in electronic commerce dramatically alter the structure of businesses, especially in the marketing area. We ext... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Matchmaking for business processes based on choreographies

    Publication Year: 2004, Page(s):359 - 368
    Cited by:  Papers (39)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (343 KB)

    Web services have a potential to enhance B2B e-commerce over the Internet by allowing companies and organizations to publish their business processes on service directories where potential trading partners can find them. This can give rise to new business paradigms based on ad-hoc trading relations as companies, particularly small to medium scale, can cheaply and flexibly enter into fruitful contr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The challenge of exclusions in pervasive cyberspace

    Publication Year: 2004, Page(s):293 - 298
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (213 KB)

    The number of people who yet have either inferior service or no access needs to be a major concern to research and development leaders in engineering and e-commerce. The challenge for cyberspace leaders is to recognize and resolve the problem of the disenfranchised groups in the world who have not yet been touched by the concept of pervasive computing. The continued dominance of urban markets cont... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Personalizing information services on wired and wireless networks

    Publication Year: 2004, Page(s):263 - 266
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (211 KB)

    The increasing Internet contents cause the problem of information overload. We present a generic framework and discuss the main issues in personalizing Internet information services to solve this problem. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model-driven Web services development

    Publication Year: 2004, Page(s):42 - 45
    Cited by:  Papers (26)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (220 KB)

    Web service technologies are becoming increasingly important for integrating systems and services. There is much activity and interest around standardization and usage of Web service technologies. The unified modeling language (UML) and the model driven architecture (MDA)™ provide a framework that can be applied to Web service development. We describe a model-driven Web service development p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A table presentation system for database and Web applications

    Publication Year: 2004, Page(s):492 - 498
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (525 KB)

    Report generation is arguably the most important task for database applications. It is especially important for e-commerce applications, since dynamic Web pages consisting of database reports are essential to almost every transaction. When a report is generated, the layout of the data sources must be converted to the layout of the report. This conversion is called data transformation. It has been ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.