By Topic

e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004 IEEE International Conference on

28-31 March 2004

Filter Results

Displaying Results 1 - 25 of 94
  • Data extraction and annotation for dynamic Web pages

    Publication Year: 2004, Page(s):499 - 502
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (203 KB)

    Many Web sites contain large sets of pages generated dynamically using a common template. The structured data extracted from these pages with semantic annotation are valuable for information system. We proposed a system, ADeaD, to automatically extract data values from these Web pages and annotate the data schema. Experimental evaluation on a lot of real Web page collections indicates our algorith... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Smart card-based irregular access patterns detection system

    Publication Year: 2004, Page(s):546 - 553
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (504 KB)

    This paper describes a smart-card based solution that further extends the concept of static access control list by performing real-time analysis over user's access patterns, thus allowing early detection of abnormal card usages. A list of irregular behaviors are identified and classified to formulate a logical model that quantifies abnormal usage behaviors. Based on this model, a real-time suspici... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A table presentation system for database and Web applications

    Publication Year: 2004, Page(s):492 - 498
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (525 KB)

    Report generation is arguably the most important task for database applications. It is especially important for e-commerce applications, since dynamic Web pages consisting of database reports are essential to almost every transaction. When a report is generated, the layout of the data sources must be converted to the layout of the report. This conversion is called data transformation. It has been ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Web services-based collaborative scheme for credit card fraud detection

    Publication Year: 2004, Page(s):177 - 181
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (229 KB)

    A Web services-based collaborative scheme for credit card fraud detection is proposed. With the proposed scheme, participant banks can share the knowledge about fraud patterns in a heterogeneous and distributed environment and further enhance their fraud detection capability and reduce financial loss. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quantitative approach to using e-commerce data to monitor and control the performance of a supply chain

    Publication Year: 2004, Page(s):157 - 162
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (307 KB)

    We present a quantitative approach to using e-commerce data to measure, monitor, and control the performance of a supply chain. The performance is measured in terms of the turn-around time for a business transaction. This performance is monitored and correlated to a set of parameters so that the resulting mathematical relation is used as a model to design control measures to bring the performance ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image authentication using relation measures of wavelet coefficients

    Publication Year: 2004, Page(s):541 - 545
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (458 KB)

    In this paper, a novel watermarking technique for image authentication is proposed. This technique operates in the wavelet domain and makes use of semifragile watermarks for achieving better robustness. The image is first transformed into the wavelet domain and the relations between neighboring coefficients are utilized to authenticate the integrity of the image content. By carefully designing the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Personalized product recommendation in e-commerce

    Publication Year: 2004, Page(s):413 - 420
    Cited by:  Papers (9)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (247 KB)

    The purpose is to analyze customers' purchasing behaviors based on product features from transaction records and product feature databases. Customers' preferences toward particular features of products are analyzed and then rules of customer interest profiles are thus derived in order to recommend customer products that have potential attraction with customers. The approach of this paper has its s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed plug-and-play network management model based on mobile agents

    Publication Year: 2004, Page(s):487 - 491
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (220 KB)

    As network is developing to distribution and heterogeneity, legacy network management systems do not work efficiently on operator-intensive distribution of management tasks. A distributed plug-and-play network management model is presented to implement an automatic and self-adapting network management system. In this model, network components can automatically locate the proper management stations... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understand user preference of online shoppers

    Publication Year: 2004, Page(s):123 - 130
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (230 KB)

    The tremendous growth of the Internet has created opportunities for consumers and firms to participate in an online global marketplace. It is conceivable that in the future every person with access to a computer will interact with firms marketing on the Internet. We foresee that advances in electronic commerce dramatically alter the structure of businesses, especially in the marketing area. We ext... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Three-tier multi-agent architecture for asset management consultant

    Publication Year: 2004, Page(s):173 - 176
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4494 KB)

    To keep the advantage, enterprises need to implement customer relationship management (CRM). By integrating and sharing information, an enterprise can improve its efficiency and quality of services. Especially in financial service market, efficiency and 24 hour services is the most important. We bring up a three-tier multiagent asset management consultant CRM service system. This system supports t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • e-CLV: a modelling approach for customer lifetime evaluation in e-commerce domains, with an application and case study for online auctions

    Publication Year: 2004, Page(s):149 - 156
    Cited by:  Papers (1)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (245 KB)

    E-commerce companies understand that customers are their most important asset and that it is imperative to estimate the potential value of this asset. Hence, a model for calculating customer's value is essential in these domains. We describe a general modeling approach, based on Markov chain models, for calculating customer value in the e-commerce domain. This model extends existing models from th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the distributed management of SCORM-compliant course contents

    Publication Year: 2004, Page(s):537 - 538
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB)

    SCORM's environment and its complex metadata make distributed LMSs difficult to communicate with each other, therefore hindering the content management and sharing. In order to overcome these two shortcomings, we propose a hybrid scheme which is composed of a XML binding model and an LDAP-based directory service. A preliminary experiment shows how it has helped SCORM evolve towards intelligent e-l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile target advertising by combining self-organization map and decision tree

    Publication Year: 2004, Page(s):249 - 252
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (569 KB)

    Internet brings us convenient communication and changes many aspects of existing businesses and generated new companies with new business models, business opportunity. In order to achieve a sustainable competitive advantage, enterprises must first understand then please their customers. To satisfy customer needs, enterprises have to reach personalized and interaction channels. We proposed electron... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On using query neighbourhood for better navigation through a product catalog: SMART approach

    Publication Year: 2004, Page(s):405 - 412
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (310 KB)

    We present an approach for efficient navigation through an on-line product catalog. The goals of the approach are (i) to support a user in a step-by-step searching for a product and (ii) to ensure the product he has found is the best solution for his need. The product database is based on a light-weighted ontology and structured in the form of a lattice that enables hierarchicals clustering of use... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The challenge of exclusions in pervasive cyberspace

    Publication Year: 2004, Page(s):293 - 298
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (213 KB)

    The number of people who yet have either inferior service or no access needs to be a major concern to research and development leaders in engineering and e-commerce. The challenge for cyberspace leaders is to recognize and resolve the problem of the disenfranchised groups in the world who have not yet been touched by the concept of pervasive computing. The continued dominance of urban markets cont... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An encoding scheme for indexing XML data

    Publication Year: 2004, Page(s):525 - 528
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (217 KB)

    E-services are becoming a promising technology for the effective automation of application integration across the Web. They build upon XML, as data format for exchanging messages between applications. Accompanied with WSDL, UDDI, and SOAP, XML has clearly influenced positively the development of applications running on the Web. As the basic technology, indexing scheme for XML data have been studie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal placement of Web proxies for tree networks

    Publication Year: 2004, Page(s):479 - 486
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (351 KB)

    Placement of Web proxy servers is an important avenue to save network bandwidth, alleviate server load, and reduce latency experienced by users. The general problem of Web proxy placement is to compute the optimal locations for placing k Web proxies in a network such that the objective concerned is minimized or maximized. We address this problem for tree networks and propose a novel mathematical m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A conceptual analysis of the role of conversations in Web services composition

    Publication Year: 2004, Page(s):29 - 32
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (230 KB)

    We discuss the role of conversations in the composition of Web services. A Web service is an accessible application that other applications and humans can discover and trigger to satisfy needs. While much of the work has focused on low-level standards for publishing, discovering, and invoking Web services, it is deemed appropriate to start leveraging the Web services to the level of active compone... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trust and privacy in electronic commerce

    Publication Year: 2004, Page(s):117 - 120
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (198 KB)

    Trust and privacy have been widely recognized as important issues in the field of electronic commerce. We propose a research model with trust and privacy as two endogenous variables along with other exogenous variables like independent self-construal, interdependent self-construal, technological knowledge, and Web site quality, that are expected to effect Internet consumers' trust level and privac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building an e-learning platform by access grid and data grid technologies

    Publication Year: 2004, Page(s):452 - 455
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (301 KB)

    Due to overall popularity of the Internet, e-learning has become a hot method of learning in recent years. Through the Internet, learners can freely absorb new knowledge without the restriction of time and place. Many companies have adopted e-learning to train their employees. The e-learning system can make an enterprise more competitive by increasing the knowledge of its employees. As we know, e-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Value-based design of collaboration processes for e-commerce

    Publication Year: 2004, Page(s):349 - 358
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (299 KB)

    Designing cross-organizational e-business applications faces the problem that the collaborating businesses must align their commercial interests without any central decision making authority. The design process must therefore yield a clear view of the commercial value of the collaboration for each economic actor, as well as a clear specification of the activities to be performed by each actor and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Single-pass algorithms for mining frequency change patterns with limited space in evolving append-only and dynamic transaction data streams

    Publication Year: 2004, Page(s):215 - 222
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (275 KB)

    We propose an online single-pass algorithm MFC-append (mining frequency change patterns in append-only data streams) for online mining frequent frequency change items in continuous append-only data streams. An online space-efficient data structure called Change-Sketch is developed for providing fast response time to compute dynamic frequency changes between data streams. A modified approach MFC-dy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spreading activation models for trust propagation

    Publication Year: 2004, Page(s):83 - 97
    Cited by:  Papers (51)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (354 KB)

    Semantic Web endeavors have mainly focused on issues pertaining to knowledge representation and ontology design. However, besides understanding information metadata stated by subjects, knowing about their credibility becomes equally crucial. Hence, trust and trust metrics, conceived as computational means to evaluate trust relationships between individuals, come into play. Our major contributions ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • e-service as a new paradigm for interactive multidimensional city modeling

    Publication Year: 2004, Page(s):169 - 172
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (435 KB)

    We present our recent attempt to develop interactive multidimensional city modeling through an e-service approach. We experiment with a multitier Web service architecture in developing a prototype interactive city modeling platform. Some advantages of the e-service approach are identified in terms of supporting sustainable urban data development and of delivering user-centered retrieval and intera... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A decision support system for multiple objective linear programming

    Publication Year: 2004, Page(s):425 - 428
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (330 KB)

    A new approximate algorithm has been developed by Wu et al. for solving fuzzy multiple objective linear programming (FMOLP) problems with fuzzy parameters in any form of membership function in both objective functions and constraints. Based on the approximate algorithm, a fuzzy multiple objective decision support system (FMODSS) is developed. We focus on the description of use for FMODSS in detail... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.