


default search action
EEE 2004: Taipei, Taiwan
- 2004 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 04), 29-31 March 2004, Taipei, Taiwan. IEEE Computer Society 2004, ISBN 0-7695-2073-1

Web Services
- Chen-Liang Fang, De-Ron Liang, Chyouhwa Chen, PuSan Lin:

A Redundant Nested Invocation Suppression Mechanism for Active Replication Fault-Tolerant Web Service. 9-16 - Tao Yu, Kwei-Jay Lin:

The Design of QoS Broker Algorithms for QoS-Capable Web Services. 17-24 - Weiping He:

Recovery in Web Service Applications. 25-28 - Zakaria Maamar, Soraya Kouadri Mostéfaoui, Emad Bataineh:

A Conceptual Analysis of the Role of Conversations in Web Services Composition. 29-32 - Te-Kai Liu, Santhosh Kumaran, Jen-Yao Chung:

Performance Engineering of a Java-Based eCommerce System. 33-37 - Fethi A. Rabhi

, Feras T. Dabous, Hairong Yu, Boualem Benatallah, Yun Ki Lee:
A Case Study in Developing Web Services for Capital Markets. 38-41 - Roy Grønmo, David Skogan, Ida Solheim, Jon Oldevik:

Model-Driven Web Services Development. 42-45
eCommerce Applications
- Mahesha Kapurubandara, Shiromi Arunatileka, Athula Ginige

:
Application of eBusiness Strategies for SMEs in Developing Countries. 49-59 - Michael C. Jaeger, Moussa Lo, Robert J. Pefferly:

Simulation Models and Their Metainfo-Management Using RDF-Based Paradigms. 60-67 - Sakuna Vanichvisuttikul, Chamnong Jungthirapanich:

The Assessment of E-Commerce Awareness on Highly Valuable Traditional Products in Thailand. 68-75 - Hsiu-Mei Huang, Shu-Sheng Liaw:

Web Surveys for Electronic Commerce: A Review of the Literature. 76-79
Security & Trust (1)
- Cai-Nicolas Ziegler, Georg Lausen:

Spreading Activation Models for Trust Propagation. 83-97 - Tzone I. Wang, Kun Hua Tsai, Ming-Che Lee:

A Two-Layer Cryptographic Scheme for an e-Service Framework Based on Mobile Agents. 98-105 - Tzer-Shyong Chen, Kuo-Hsuan Huang, Yu-Fang Chung:

A Division-of-Labor-Signature (t, n) Threshold-Authenticated Encryption Scheme with Message Linkage Based on the Elliptic Curve Cryptosystem. 106-112 - Wei-Chi Ku, Chun-Ming Ho:

An e-Voting Scheme against Bribe and Coercion. 113-116 - Jengchung V. Chen, Yangil Park:

Trust and Privacy in Electronic Commerce. 117-120
EC Technologies (1)
- Melody Y. Kiang, Jenny Gilsdorf, Robert T. H. Chi:

Understand User Preference of Online Shoppers. 123-130 - Jen-Hsiang Chen, Kuo-Ming Chao

, Nick Godwin, Von-Wun Soo:
A Multiple-Stage Cooperative Negotiation. 131-138 - Zongkai Yang, Weimin Lang, Yunmeng Tan:

A New Fair Micropayment System Based on Hash Chain. 139-145
Intelligence
- Opher Etzion, Amit Fisher, Segev Wasserkrug:

e-CLV: A Modeling Approach for Customer Lifetime Evaluation in e-Commerce Domains, with an Application and Case Study for Online Auctions. 149-156 - Trung T. Pham:

Quantitative Approach to Using E-Commerce Data to Monitor and Control the Performance of a Supply Chain. 157-162 - Zonghua Zhang, Hong Shen:

Suppressing False Alarms of Intrusion Detection Using Improved Text Categorization Method. 163-166
Business Services
- Chengzhi Peng:

e-Service as a New Paradigm for Developing Interactive Multidimensional City Modeling. 169-172 - Tung Wan Cheng, Wan Ling Wang, Shung Kwan Chan:

Three-Tier Multi-Agent Architecture for Asset Management Consultant . 173-176 - Chuang-Cheng Chiu, Chieh-Yuan Tsai:

A Web Services-Based Collaborative Scheme for Credit Card Fraud Detection. 177-181 - Jeng-Jong Lin:

Development of a Remote Quick Design System for Woven Fabrics. 182-189
Intelligence & Agents
- Deepak Subramoniam, Jyothi John:

Algorithms for Community Subject Identification: Experiments and Test Results. 195-201 - Chiu-Che Tseng:

Portfolio Management Using Hybrid Recommendation System. 202-206 - Show-Jane Yen, Yue-Shi Lee, Chung-Wen Cho:

An Efficient Approach for the Maintenance of Path Traversal Patterns. 207-214 - Hua-Fu Li, Suh-Yin Lee:

Single-Pass Algorithms for Mining Frequency Change Patterns with Limited Space in Evolving Append-Only and Dynamic Transaction Data Streams. 215-222 - Timothy C. H. Kwong, Matthew K. O. Lee

:
Understanding the Behavioral Intention to Digital Piracy in Virtual Communities - A Propose Model. 223-226 - Yue-Shi Lee, Show-Jane Yen, Ghi-Hua Tu, Min-Chi Hsieh:

Mining Traveling and Purchasing Behaviors of Customers in Electronic Commerce Environment. 227-231
Mobile Services
- Kun-Lung Wu, Shyh-Kwei Chen, Philip S. Yu:

Indexing Continual Range Queries for Location-Aware Mobile Services. 233-240 - Ramon Martí

, Jaime Delgado
, Xavier Perramon
:
Security Specification and Implementation for Mobile e-Health Services. 241-248 - Shu-Chin Wang, Kuo-Qin Yan, C. H. Wei:

Mobile Target Advertising by Combining Self-Organization Map and Decision Tree. 249-252 - Robert Steele, Yuri Ventsov, Tharam S. Dillon:

XML Schema-Based Discovery and Invocation of Mobile Services. 253-258 - Hung-Wen Tung, Von-Wun Soo:

A Personalized Restaurant Recommender Agent for Mobile E-Service. 259-262 - Wei-Po Lee, Ming-Hsiang Su:

Personalizing Information Services on Wired and Wireless Networks. 263-266 - Chun-Te Chen, Te-Chung Lu:

A Mobile Ticket Validation by VSS Tech with Time-Stamp. 267-270 - Agustinus Borgy Waluyo, Raymond Hsieh, David Taniar, J. Wenny Rahayu, Bala Srinivasan:

Utilising Push and Pull Mechanism in Wireless E-Health Environment. 271-274
Internet Technologies (1)
- Tsutomu Morigaki, Kanta Matsuura

, Osamu Sudo:
An Analysis of Detailed Electronic Time-Stamping Using Digital TV. 277-284 - Juan D. Velásquez, Richard Weber, Hiroshi Yasuda, Terumasa Aoki:

A Methodology to Find Web Site Keywords. 285-292 - Tzong-Song Wang, Larry K. Bright:

The Challenge of Exclusions in Pervasive Cyberspace. 293-298 - Po-Hsiang Wang, Jung-Ying Wang, Hahn-Ming Lee:

QueryFind: Search Ranking Based on Users? Feedback and Expert?s Agreement. 299-304 - Chih-Ming Chen, Ling-Jiun Duh, Chao-Yu Liu:

A Personalized Courseware Recommendation System Based on Fuzzy. 305-308 - Faye F. Liu

, Jidong Wang, Tharam S. Dillon:
An Object-Oriented Approach on Web Information Representation and Derivation. 309-314
EC Technologies (2)
- Libo Chen, Marcello L'Abbate, Ulrich Thiel, Erich J. Neuhold:

Increasing the Customer?s Choice: Query Expansion Based on the Layer-Seeds Method and Its Application in E-Commerce. 317-324 - Bao-Tung Wang, Henning Schulzrinne:

Multifunctional ICMP Messages for e-Commerce. 325-332 - Deok-Gyu Lee, Hyung-Geun Oh, Im-Yeong Lee:

A Study on Contents Distribution Using Electronic Cash System. 333-340 - Byung kwan Lee, Tai-Chi Lee, Seung Hae Yang:

An ASEP (Advanced Secure Electronic Payment) Protocol Design Using 3BC and ECC (F^2) Algorithm. 341-346
Business Process
- Pascal van Eck, Jaap Gordijn

, Roel J. Wieringa:
Value-Based Design of Collaboration Processes for e-Commerce. 349-358 - Andreas Wombacher, Peter Fankhauser, Bendick Mahleko, Erich J. Neuhold:

Matchmaking for Business Processes Based on Choreographies. 359-368 - Bo-chiuan Su, Alok Gupta

, Zhiping D. Walter:
Economic Analysis of Consumer Purchase Intentions in Electronic and Traditional Retail Channels: Competitive and Strategic Implications. 369-372 - Kanta Matsuura

:
Robustness of Entrusted Data-Analysis in e-Science Research Collaboration. 373-378
EC Technologies (3)
- Matthias Enzmann, Markus Schneider:

A Privacy-Friendly Loyalty System for Electronic Marketplaces. 385-393 - Vishwas Patil, R. K. Shyamasundar:

An Efficient, Secure and Delegable Micro-Payment System. 394-404 - Nenad Stojanovic:

On Using Query Neighbourhood for Better Navigation through a Product Catalog: SMART Approach. 405-412 - Sung-Shun Weng, Mei-Ju Liu:

Personalized Product Recommendation in e-Commerce. 413-420 - Zhuang Yan, Simon Fong, Meilin Shi:

Knowledge Oriented Negotiation for Agent-Based B2B Electronic Commerce. 421-424 - Fengjie Wu, Jie Lu, Guangquan Zhang:

A Decision Support System for Multiple Objective Linear Programming with Fuzzy Parameters. 425-429
P2P/Grid
- Marc Fetscherin, Sabrina Zaugg:

Music Piracy on Peer-to-Peer Networks. 431-440 - Shu-Tzu Tsai, Chao-Tung Yang:

Decision Tree Construction for Data Mining on Grid Computing. 441-447 - Chao-Tung Yang, Yu-Lun Kuo, Chuan-Lin Lai:

Design and Implementation of a Computational Grid for Bioinformatics. 448-451 - Hsin-Chuan Ho, Chao-Tung Yang, Chi-Chung Chang:

Building an E-Learning Platform by Access Grid and Data Grid Technologies. 452-455
Mobile Technologies
- Liquan Chen:

A Scheme for MAC Isolation to Realize Effective Management in Public Wireless LAN. 459-464 - Eric Jui-Lin Lu, Chin-Wei Chen:

An Enhanced EDCG Replica Allocation Method in Ad Hoc Networks. 465-472 - Tian-han Gao, Nan Guo, Hong Zhao:

A Self-Adapting Mobile Ipv6 Model Based on MAP. 473-476
Internet Technologies (2)
- Keqiu Li, Hong Shen:

Optimal Placement of Web Proxies for Tree Networks. 479-486 - Nan Guo, Tianhan Gao, Hong Zhao:

Distributed Plug-and-Play Network Management Model Based on Mobile Agents. 487-491 - Woei-Kae Chen, Kuo-Hua Chung:

A Table Presentation System for Database and Web Applications. 492-498 - Hui Song, Suraj Giri, Fanyuan Ma:

Data Extraction and Annotation for Dynamic Web Pages. 499-502 - Jun Lai, Ben Soh:

Using Element and Document Profile for Information Clustering. 503-506
Internet Technologies (3)
- William Kwok-Wai Cheung

:
e-Transformation Technologies: Case Studies and the Road Ahead - A Value Chain Perspective. 510-517 - Pei-Jeng Kuo, Terumasa Aoki, Hiroshi Yasuda:

MPEG-7 Based Dozen Dimensional Digital Content Architecture for Semantic Image Retrieval Services. 518-525 - Wan-Song Zhang, Daxin Liu, Jian Li:

An Encoding Scheme for Indexing XML Data. 526-529 - Benjamin P.-C. Yen:

Structure-Based Analysis of Web Sites. 530-533 - Chi-Chien Pan, Kai-Hsiang Yang, Tzao-Lin Lee:

Secure Online Examination Architecture Based on Distributed Firewall. 534-537 - Sheng-Tun Li, Chu-Hung Lin, Yuan-Chun Chang, Jin-Tan David Yang:

On the Distributed Management of SCORM-Compliant Course Contents. 538-539
Security & Trust (2)
- Yuan-Liang Tang, Ching-Ting Chen:

Image Authentication Using Relation Measures of Wavelet Coefficients. 543-547 - António Leong, Simon Fong, Shirley W. I. Siu:

Smart Card-Based Irregular Access Patterns Detection System. 548-555 - Jong-Phil Yang, Chul Sur, Hwa-Sik Jang, Kyung Hyune Rhee:

Practical Modification of an Efficient Public-Key Framework. 556-559 - Yongbin Zhou, Zhenfeng Zhang, Sihan Qing, Juan Liu:

A New CEMBS Based on RSA Signatures and Its Application in Constructing Fair Exchange Protocol. 560-564 - Hung-Min Sun, Bin-Tsan Hsieh, Shin-Mu Tseng:

Cryptanalysis of Aydos et al.'s ECC-Based Wireless Authentication Protocol. 565-568 - Tzer-Shyong Chen, Kuo-Hsuan Huang, Yu-Fang Chung:

Modified Cryptographic Key Assignment Scheme for Overcoming the Incorrectness of the CHW Scheme. 569-572

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














