


default search action
ISECS 2008: Guangzhou, China
- Fei Yu, Qi Luo, Yongjun Chen, Zhigang Chen:

Proceedings of The International Symposium on Electronic Commerce and Security, ISECS 2008, August 3-5, 2008, Guangzhou, China. IEEE Computer Society 2008, ISBN 978-0-7695-3258-5
Intelligent Computing
- Yueqin Zhang, Shiying Chen, Jinfeng Liu, Fu Duan:

The Application of Genetic Algorithm in Vehicle Routing Problem. 3-6 - Shulin Chen, Lei Wang:

The Algorithm of Obtaining Best Rules Based on Rough Set. 7-10 - Kaizhong Jiang, Zhao Lu, Yuan-Qiong Wu, Junzhong Gu:

An Algorithm of Topic Distillation Based on Anchor Text. 11-15 - Chin-Chen Chang, The Duc Kieu, Yung-Chen Chou:

A High Payload Steganographic Scheme Based on (7, 4) Hamming Code for Digital Images. 16-21 - Liaojun Pang, Huixian Li, Ye Yao, Yumin Wang:

A Verifiable (t, n) Multiple Secret Sharing Scheme and Its Analyses. 22-26 - Bingru Yang, Zefeng Song, Yinglong Wang, Wei Song

:
A New Web Text Clustering Algorithm Based on DFSSM. 27-32 - Ruzhi Xu, Peiyao Nie, Peiguang Lin, Dongsheng Chu:

Cloud Model-based Data Attributes Reduction for Clustering. 33-36 - T. J. Jia:

Construction of Learning Algorithm based on SGA Bayesian Network. 37-40 - Ting Wu, Min Zhang

, Xiaoliang Xu, Rongbo Wang:
Improved Algorithm for Tate Pairing Computation. 41-45 - Dazhen Wang, Kwang Mong Sim, Benyun Shi:

A Deadline and Cost Constrained Optimization Algorithm for Scheduling Applications in Grids Based on Proportional Share Systems. 46-50
Web Applications
- Nie Gang:

A Scheme of Workflow Management System Based on Web Services. 53-56 - Ying Mei, Liangsheng Zhu:

High Efficiency Association Rules Mining Algorithm for Bank Cost Analysis. 57-60 - Wenli Dong:

Dynamic Reconfiguration Method for Web Service Based on Policy. 61-65 - Qisong Chen, Yun Wu, Xiaowei Chen:

Research on Customers Demand Forecasting for E-business Web Site Based on LS-SVM. 66-70 - Sheng Chai, Yang Cheng, Jifan Qiu, Wei Zhou:

An XML based Flexible Security E-Commerce Mode. 71-73 - Aimin Wang, Jipeng Wang:

The Design and Implementation of the Distribution Resource Planning Management System Based on WEB. 74-77 - Zhaoyang Qu, Hong Gao, Yi Zhu:

Research on High-accuracy Position Prediction Algorithm in Online Game. 78-81 - Jianbin Huang, Heli Sun

:
A Reliable Web Service Implementation Approach for Large Commercial Applications. 82-85 - Hui Chen, Zheng Li:

The Factors Influencing Chinese Online Shopper's Satisfaction in Web2.0 Era. 86-90 - Yi Jiang, Qingling Yue, Zhaogui Qin:

A Novel Constructing Algorithm of E-learning Community. 91-94 - Wu Deng

, Xinhua Yang
, Huimin Zhao, Dan Lei, Hua Li:
Study on EAI Based on Web Services and SOA. 95-98 - Hongqi Li, Zhuang Wu, Xiaogang Ji:

Research on the Techniques for Effectively Searching and Retrieving Information from Internet. 99-102
Networks
- Zenggang Xiong, Xuemin Zhang, Jianxin Chen:

Research on Grid Resource Discovery Scheme Integrated P2P Mode. 105-109 - Shuang Xiang, Mingdi Xu, Li Wang, Huanguo Zhang:

Design Secure Contexts Detect Based on Lattice for Grid Computing Environment. 110-113 - Yejiang Zhang, Zhitang Li, Zhengbing Hu

, Hao Tu, Huaiqing Lin:
A P2P E-commerce Related Network Security Issue: P2P Worm. 114-117 - Shufen Peng, Jingsha He

, Yao Meng:
Reputation-based Trust Update in Network Environment. 118-123 - GaoJun Fan, Feng Liang, Shiyao Jin:

An Efficient Approach for Point Coverage Problem of Sensor Network. 124-128 - Chunhua Ju, Qibei Lu, Zhongyong Kong:

The Research and Design of Grid-based Business Intelligence Network-BGBIN. 129-132 - Yang Cheng, Zhishu Li, Wei Zhou, Sheng Cai, Peng Zhou:

Design of Network Interface in Distributed Data Acquisition System for E-Commerce. 133-136 - Jingbo Hao, Jianping Yin:

A Preliminary Study of Coordinated Worm Networks. 137-140
Information Processing
- Juan Yang, Yun Bai, Yuhui Qiu:

To Select the Service in Context Aware Systems Using Concept Similarity Mechanism. 143-147 - Jianhu Cai, Huanhuan Wang, Gengui Zhou:

Study on a Two-Echelon Supply Chain VMI Model under Demand Uncertainty. 148-152 - Huawei Zhao, Wenyu Zhang:

Definitions and Analysis of Integrity in Strand Spaces Model. 153-158 - Wei Zhou, Christoph Meinel:

Enforcing Information Flow Constraints in RBAC Environments. 159-164 - Han-ling Zhang, Shuyi Wang:

A New Steganalysis Method Using High-pass Filter for JPEG Image. 165-168 - Yi Ren, Zhiting Xiao, Sipei Guo:

An Extended RBAC Model for Uniform Implementation of Role Hierarchy and Constraint. 169-174 - Xiaofeng Zhang:

A New Modeling Method for the Data Analysis Solution in Business. 175-178 - Yali Liu, Xinchun Yin, Liang Qiu:

ID-Based Forward-Secure Signature Scheme from the Bilinear Pairings. 179-183 - Chin-Chen Chang, Chia-Chen Lin

, T. Hoang Ngan Le
, Hoai Bac Le:
A Probabilistic Visual Secret Sharing Scheme for Grayscale Images with Voting Strategy. 184-188 - Xu E, Shaocheng Tong, Yuan Wang, Shang Xu, Peng Li:

Approach to Missing Data Recovery. 189-192
Machine Learning
- Shanli Wang:

Research on a New Effective Data Mining Method Based on Neural Networks. 195-198 - Yang Cheng, Zhishu Li, Peng Zhou, Sheng Chai, Wei Zhou:

Study on Data Enriching Algorithm Based on Rough Set in E-commerce. 199-202 - Xiao-neng Xie, Fei Wu:

Automatic Video Summarization by Affinity Propagation Clustering and Semantic Content Mining. 203-208 - Wenzhe Qi, Chenghui Yang, Jianjun Meng:

Circuit Failure Diagnosis Analysis and Research Based On Neural Network. 209-212 - Quan Zhang, Yahong Li, Jing Huang:

An Entropy-based Approach for Supplier Selection with Interval Information. 213-216 - Li Jian:

An Agent Bilateral Multi-issue Alternate Bidding Negotiation Protocol Based on Reinforcement Learning and its Application in E-commerce. 217-220 - Jun Zhai, Lixin Shen, Yiduo Liang, Jiatao Jiang:

Application of Fuzzy Ontology to Information Retrieval for Electronic Commerce. 221-225 - Wei Han, Lingbo Liu, Huaili Zheng:

Dynamic Pricing by Multiagent Reinforcement Learning. 226-229 - Jizi Li, Baishun Li, Zhiping Li:

Selecting Supplier of Cluster Supply Chain Based on Fuzzy Measurement. 230-233
Mobile Commerce
- Tao Zhou:

The Impact of Perceived Value on User Acceptance of Mobile Commerce. 237-240 - Tao Zhou:

Exploring Mobile User Acceptance Based on UTAUT and Contextual Offering. 241-245 - Decai Meng, Qingfei Min, Yuping Li:

Study on Trust in Mobile Commerce Adoption - A Conceptual Model. 246-249 - Shaojing Fan, Zhongkun He, Yongping Zhang, Hongmei Zhang, Rina Su:

An m-Business Model Based on Session Initiation Protocol. 250-253 - Liang Wang, Yajun Guo, Huifang Yan:

A Fuzzy Anonymity Analysis Model for Mobility in Anonymity System. 254-257 - Qi Yuan, Zhao Xiaokang, Zhang Qiong:

Key Technology and System Design in Mobile Supply Chain Management. 258-262 - Zhihong Li, Minxia Li:

Research on Influencing Factors of Consumer Initial Trust Based on Mobile Commerce. 263-267 - Jin Yan, Li Tong:

Compare and Analysis of Security Strategy in WAP and I-Mode Network. 268-271 - Guoling Lao, Xinwang Wang:

Application Analysis of M-commerce in Digitized Urban Management. 272-275 - Xiang Yi-ming, Chen Qi:

A Study on M-Commerce Industry Development and Market Structure in China. 276-280
Applied Cryptography (I)
- Shan-Qing Guo, Zhong-Hua Zhao:

An Anomaly Intrusion Detection Model Based on Limited Labeled Instances. 283-287 - Guicheng Shen, Xuefeng Zheng:

Research on Implementation of Elliptic Curve Cryptosystem in E-Commerce. 288-291 - Zemao Chen, Xiaoping Wu, Weimin Tang:

An Executable Code Authorization Model for Secure Operating System. 292-295 - Yang Lu, Jiguo Li, Junmo Xiao:

Applying the Fujisaki-Okamoto Conversion to Certificate-based Encryption. 296-300 - Jianyong Chen, Xiaomin Wang, Liwen He:

An Architecture for Differentiated Security Service. 301-304 - Tianjie Cao, Peng Shen, Elisa Bertino:

Cryptanalysis of the LCSS RFID Authentication Protocol. 305-309 - Like Chen, Runtong Zhang:

A Key-dependent Cipher DSDP. 310-313 - Xiangran Cheng, Xingyuan Chen, Bin Zhang, Yan Yang:

A Novel Trust Collecting Mechanism Based on Publish/Subscribe Scheme in Grid Computing. 314-317 - Jian-min Han, Huiqun Yu, Yu Juan, Ting-ting Cen:

A Complete (alpha, k)-Anonymity Model for Sensitive Values Individuation Preservation. 318-323
Applied Cryptography (II)
- Xiaojun Ye, Lei Jin, Bin Li:

A Multi-Dimensional K-Anonymity Model for Hierarchical Data. 327-332 - Qing Zhang, Qiaoyan Wen, Gengli Chen:

Efficient Fair Contract Signing Protocol from Bilinear Pairings. 333-337 - Shimin Wei, Zepeng Zhuo:

Research on PKI Model Based on NTRU. 338-342 - Xinxia Song, Zhigang Chen:

A Distributed Electronic Authentication Scheme in E-Business System. 343-346 - Yunpeng Zhang, Fei Zuo, Zhengjun Zhai, Xiaobin Cai:

A New Image Encryption Algorithm Based on Multiple Chaos System. 347-350 - Bin Jiang, Xijian Ping, Tao Zhang:

Pattern Analysis Applied on Steganalysis for Binary Text Images. 351-354 - Debasis Giri

, Parmeshwary Dayal Srivastava:
Cryptanalysis and Improvement of a Remote User Authentication Scheme using Smart Cards. 355-361 - Shangping Wang

, Zhiqiang Chen, Xiaofeng Wang:
A New Certificateless Electronic Cash Scheme with Multiple Banks Based on Group Signatures. 362-366 - Roy Ng, LinYing Dong:

An Information Assurance Framework on Trusted Autonomic Communications. 367-373
Information Security (I)
- Hu Ruo, Xu Hong:

Independent Coordination Solutions of Dynamic Information Security. 377-380 - Liu Yihe, Tang Nianqing, He Wenxiao:

An Information Security Model Based on P2P Network. 381-384 - Hung-Min Sun, King-Hang Wang

:
Defending Secret-Key Based Authentication Protocols against the Stolen-Secret Attack. 385-389 - Zhiming Qu, Tongbin Ma, Yunlong Zhang:

Application of Parameter Modulation in E-Commerce Security Based on Chaotic Encryption. 390-393 - Shigen Shen

, Guangxue Yue:
Unified Certificate Validation System DNS-OCSP. 394-397 - Jian Wang, Jian Gu, Fang Mei, Zhe Zhang, Yanheng Liu:

One New BRAS Model Based on Trusted Network. 398-401 - Zheng Wu, Debao Xiao, Min Xiao, Xi Peng:

Using Multilevel Correlation in a Unified Platform of Network Security Management: Design and Implementation. 402-406 - Chunming Tang, Dingyi Pei, Zheng-an Yao:

5-Round Computational Zero-Knowledge Proof with Negligible Error Probability for Any NP from Any One-Way Permutation. 407-411 - Wenhua Xu, Qianhua He, Yanxiong Li, Tao Li:

Cancelable Voiceprint Templates Based on Knowledge Signatures. 412-415 - Rui Guo, Bosheng Zhou:

Cross Cookie: A Cookie Protocol for Web Mashups. 416-420 - Qiong Wei, Yansheng Lu:

Preservation of Privacy in Publishing Social Network Data. 421-425 - Feng Chen, Jinshu Su

:
A Flexible Approach to Measuring Network Security Using Attack Graphs. 426-431 - Jiandong Liu, Shuhong Wang, Youming Yu:

TDHA-A One-Way Hash Algorithm Based on Extended Integer Tent Maps with Dynamic Properties. 432-436
Information Security (II)
- Ding Yong:

Tamper Difficult Technique for Data Residing on Passive Storage. 439-442 - Ling Zhan, Jiguang Wan

, Peng Gu:
Metadata Management for Distributed Multimedia Storage System. 443-447 - Jian He, Mingdi Xu:

Research on Storage Security Based on Trusted Computing Platform. 448-452 - Wei Sun, Xiangwei Kong, Dequan He, Xingang You:

Information Security Game Analysis with Penalty Parameter. 453-456 - Liqiang Zhang, Huanguo Zhang:

An Introduction to Data Capturing. 457-461 - Shaohui Wang:

Modification and Improvement on Group Signature Scheme without Random Oracles. 462-466 - Jianjun Meng, Chenghui Yang, Wenzhe Qi:

Servicing Work Safety Supervision System for Electric Locomotive Based on Configuration Software. 467-470 - Jun Ye, Zhishu Li, Yanyan Ma:

JSON Based Decentralized SSO Security Architecture in E-Commerce. 471-475 - Changqiong Shi, Dawei Wang, Hui Huang, Dafang Zhang:

Network Intrusion Rules Extraction Based on Rough Set and Niche Genetic Algorithm. 476-481 - Huijuan Lu, Jianguo Chen, Wei Wei:

Two Stratum Bayesian Network Based Anomaly Detection Model for Intrusion Detection System. 482-487 - Xiaogang Ji:

Research on the Automatic Summarization Model based on Genetic Algorithm and Mathematical Regression. 488-491 - Siyuan Wu, Zhixing Huang:

A Gossip-based Opinion Diffusion Model via Uninorm Aggregation Operator. 492-496 - Yaling Zhang, Xiaofeng Wang:

Message Substitute Attack on Concurrent Signatures Protocol and its Improvement. 497-501 - Liu Wei-Peng, Hu Ju:

A Formal Model of Trust and Security for Task-Oriented Information System. 502-506
Information Security (III)
- Wuwei Li, Yuhong Wang, Ao Chen:

Grey Relational Evaluation on Vendor Selection Based on E-business. 509-513 - Shaobo Zhong:

Information Intelligent System based on Web Data Mining. 514-517 - Leon Pan:

Using Criterion-Based Access Control for Multilevel Database Security. 518-522 - Juan Wang, Yajie Zhou, Huanguo Zhang:

The Simplified Inductive Approach to Verifying Security Protocols. 523-526 - Lingyan Bi, Zewei Feng, Min Liu, Weining Wang:

Design and Implementation of the Airline Luggage Inspection System Base on Link Structure of QR Code. 527-530 - Amontip Jumratjaroenvanit, Yunyong Teng-Amnuay:

Probability of Attack Based on System Vulnerability Life Cycle. 531-535 - Jianqiang Hu, Feng E. Luo, Jun Li, Xin Tong, Guiping Liao:

SOA-based Enterprise Service Bus. 536-539 - Hong Tang, Liehuang Zhu, Yuanda Cao, Dazhen Wang:

A Novel Tree-based Authenticated Dynamic Group Key Agreement Protocol for Wireless Sensor Network. 540-544 - Dong Li, Zhitang Li, Jie Ma:

Processing Intrusion Detection Alerts in Large-scale Network. 545-548 - Zhenhua Wu:

Biometrics Authentication System on Open Network and Security Analysis. 549-553 - Wei Sun, Xiangwei Kong, Dequan He, Xingang You:

Information Security Problem Research Based on Game Theory. 554-557 - Jia Yu, Fanyu Kong, Rong Hao, Dexiang Zhang:

Construction of Server-assisted Forward Secure Signature Using Bellare-Miner Scheme. 558-561 - Wei Cheng, Zhenhua Tan, Xiaoxing Gao, Guiran Chang, Jia Wen:

High Speed Serial Interface & Some Key Technology Research. 562-566
Risk Analysis
- Chong Wang, Wenkuan Chen, Peiji Shao:

E-business Enterprise Credit Risk Evaluation Based on Markov Chain. 569-572 - Liu Jindi, Xu Yong:

The Credit Risk Analysis and Prevention of Third Party Payment Platform. 573-576 - Bin Liu, Wentian Cui, Chunlin Xin:

Cash Management and Its Risk Control under No-Stationary Uncertain Demand. 577-581 - Fang Fang, Ye Xin, Xia Yun, Xu Haitao:

An Opponent's Negotiation Behavior Model to Facilitate Buyer-seller Negotiations in Supply Chain Management. 582-587 - Lixia Yang, Xun Liu, Changyong Xu:

Hindrances to the Development of Tourism E-Commerce in China. 588-591 - Junfeng Tian, Tao Liu, Hongqiang Jiao:

Entropy Weight Coefficient Method for Evaluating Intrusion Detection Systems. 592-598 - Limao Yang, Xuan Tang:

Research of C2C E-Business Trust Evaluation Model Based on Entropy Method. 599-602 - Ranzhe Jing, Jianwei Yu, Zuo Jiang:

Exploring Influencing Factors in E-Commerce Transaction Behaviors. 603-607 - Chen Pang, Xiaofen Ji:

An Empirical Study on Predicting User Purchase Intention on the Creative Product: A Case of Apparel. 608-611 - Jun Yu, Bin Xu:

A Framework for Seamless Integration of Legacy Business Applications into Enterprise Business Intelligent System. 612-616 - Jun Yang, Xianze Yang:

Implementing Multi-party Key Exchange by Linear Combination of Elliptic Curve Points. 617-622 - Hong Zhang, Lei Liu:

An Abstract Interpretation Frame of the Calculus of Boxed Ambients Based on the Ambient Occurrence Counting. 623-626
Business Process Integration
- Hongju Zhang, Jiajia Liu, Zhijun Yan:

A Research of Outsourcing Decision-making Based on Outsourcing Market Maturity. 629-632 - Yongming Cai, Wei Chen:

General Service Pricing Strategies Research Based on Dynamic Stochastic Wealth Model. 633-637 - Lilin Diao, Yanan Ma:

A Versatile SOA-based E-Business Platform. 638-641 - Guangshu Chang:

The Analysis of Supply Chain Procurement Strategy in E-Commerce. 642-646 - Yongjian Fan, Yanguang Shen, Jianying Mai:

Study of the Model of E-commerce Personalized Recommendation System Based on Data Mining. 647-651 - Jui-Chin Jiang, Chun-An Chen, Chih-Chien Wang

:
Knowledge and Trust in E-consumers' Online Shopping Behavior. 652-656 - Li Yu, Ming Dong, Rong Wang:

Taxonomy for Personalized Recommendation Service. 657-660 - Peide Liu, Hongtao Du:

The Research of Supplier Selection Based on Hybrid Decision-Making Index and VIKOR Method. 661-664 - Chunhua Ju, Chaohua Zhang:

A Collaboration Model for E-government Based on Semantics and Multi-agent. 665-669 - Chunhua Ju, Feipeng Guo:

Research and Application of Customer Churn Analysis in Chain Retail Industry. 670-673 - Yan Cao, Yanli Yang, Huamin Wang:

Integrated Routing Wasp Algorithm and Scheduling Wasp Algorithm for Job Shop Dynamic Scheduling. 674-678 - Jinsong Gao, Jinhui Xu, Zibo Zhou, Zhuojun Li:

Customer Satisfaction Evaluation for Mobile Commerce Based on Fuzzy Comprehensive Evaluation. 679-682
Electronic Commerce Applications
- Jitao Fang, Shusong Yu, Xiangqian Ding:

Development of Internet-based Long-range Manufacture Quality Monitoring System. 685-689 - Qing Yao, Jing Zhang, Haiyang Wang:

Business Process-Oriented Software Architecture for Supporting Business Process Change. 690-694 - Xinwu Li:

Automobile Enterprise's Mixed Sale Mode Based on E-commerce Supply Chain Management. 695-698 - Benyun Shi, Kwang Mong Sim:

A Regression-based Coordination for Concurrent Negotiation. 699-703 - Zhongquan Zou:

The Study on Electronic Commerce and Development of International Logistics. 704-707 - Hongli Wang:

Research on Representation of Preference of Negotiator in Negotiation Support System. 708-713 - Zhiyong Sui, Lixin Huang:

Study on an E-Commerce System based on Multi-Agent Technology. 714-717 - Xiaoming Han:

Research on the Security of Information and Data in the Communication. 718-721 - Jianhong Zhou, Xie Yi:

Design of Customer Relationship Management Systems Based on Data Mining. 722-725 - Mehdi Fasanghari

:
Assessing the Impact of Information Technology on Supply Chain Management. 726-730
Electronic Payment
- Zhu Haibo:

Analysis of Electronic Innovation of Securities Trading in China using a Hypercube Model. 733-736 - Yiqun Li, Zhaoran Xu:

The Online Third-party Payment Strategies under Price War. 737-742 - Xuewang Zhang, Linlin Wang:

Key Technologies for Security Enhancing of Payment Gateway. 743-748 - Chunhua Yang, Jiancheng Wan:

An Approach to Separating Security Concerns in E-Commerce Systems at the Architecture Level. 749-753 - Hua Jiang:

Study on Mobile E-commerce Security Payment System. 754-757 - Changji Wang, Rongbo Lu:

An ID-based Transferable Off-line E-Cash System with Revokable Anonymity. 758-762 - Shahriar Mohammadi, Sanaz Abedi:

ECC-Based Biometric Signature: A New Approach in Electronic Banking Security. 763-766 - Li Yu, Xiaoping Yang, Qian Li:

Recommender Oriented to Complicate Task in E-commerce. 767-770 - Han-xia Liu, Rong-jun Li:

Responsibility of Net-bank in Electronic Payment. 771-775 - Lihua Ruan, Ding Tian:

A Research of Trust Based on E-Commerce. 776-779 - Yong Xu:

The Mechanism Design of Third Party Assure-Payment Platform. 780-784
Innovative E-Business Models
- Min Liu:

Optimization of an Indicator System for Measuring E-Business: An Empirical Study by Firms. 787-791 - Zhongjun Li, He Lijuan, Qihai Zhou:

The Reconstruction, Exploration and Innovation of Logos of E-commerce. 792-795 - Zhu Qiang:

A New Co-evolutionary Genetic Algorithm for Traveling Salesman Problem. 796-799 - Wang Cheng, Lan Hailin, Xie Hongming

:
Antecedents and Consequences of Process Innovation on E-Commerce. 800-804 - Ching-Huai Peng:

The Relationships between the Antecedents of Innovativeness and Business Performance. 805-809 - Xianjun Qi, Hongping Yang:

Research on the Shift of Default Risk in Supply Chain Based on the Credit Default Swap. 810-813 - Wenli Dong:

Test Case Reduction Technique for BPEL-based Testing. 814-817 - Yun-he Li, Shan-yu Wu:

Research on a New E-voting Method based on the Cellular Phone. 818-821 - Zhihong Li:

A Study on the Factors Influencing Knowledge Transfer among Organizations in Strategic Alliances. 822-825
Enterprise Integration Applications
- Qi Yue, Hailin Lan, Luan Jiang:

Ownership Motivation and Corporate Performance in IT Industry under the Wave of E-Commerce: An Empirical Study based on Chinese Public Companies. 829-833 - Qingying Zhang, Weihong Yue, Chengfang Wang:

Research on the Application of CSCW in Shipbuilding Industry. 834-837 - Peizhi Wang, Xinying Liu, Wenbo Li:

Analysis on Features and Countermeasures of Foreign-founded Enterprises' Sole Proprietorship in China. 838-842 - Xing Wan, Lei Huang:

Research on e-Commerce Application Architecture Based on the Integration of Workflow and Agile Service. 843-849 - Delin Hou, Huosong Xia:

Application of Streaming Media Technology in Electronic Commerce. 850-853 - Huiwen Tu, Feng Xie:

A Study of Consumer Trust Formation in Electronic-Commerce. 854-857 - Minghua Han, Chunhua Ju:

Research and Application on OLAP-based Farm Products Examination Model. 858-861 - Jinhong Cui, Wang Xu:

Formalization and Verification of Inter-organizational Workflow Modeling for E-Commerce. 862-865 - Yang Liu:

An Analysis of Knowledge Sharing Incentive Mechanism inside the Enterprise Based on Evolutionary Game. 866-869 - Mehdi Fasanghari

, Navid Gholamy, Seyed Kamal Chaharsooghi, Shohre Qadami, Mohammad Soltani Delgosha:
The Fuzzy Evaluation of E-Commerce Customer Satisfaction Utilizing Fuzzy TOPSIS. 870-874
Information Hiding and Watermarking (I)
- Zhihua Xie, Shengqian Wang, Lixin Gan, Lin Zhang, Zhenghua Shu:

Content Based Image Watermarking in the Ridgelet Domain. 877-881 - Yuping Hu:

A Watermarking Protocol for Piracy Tracing. 882-885 - Fu Yu, Xiaoping Wu, Zemao Chen, Qing Ye:

A Wavelet Digital Watermarking Algorithm Based on Chaotic Mapping. 886-889 - Qiaozhuo Du, Fei Peng

:
A Zero-Watermark Algorithm with Real-Mean for 2D Engineering Graphic. 890-893 - Daofang Cheng, Xiaolong Li, Wenfa Qi, Bin Yang:

A Statistics-Based Watermarking Scheme Robust to Print-and-Scan. 894-898 - Minghui Deng, Fang Yang, Jingbo Zhen:

Robust Image Watermarking Algorithm against Shearing. 899-903 - Yongzhong Li, Hua Zhu, Ruiqing Yu, Ge Yang, Jing Xu:

An Adaptive Blind Watermarking Algorithm Based on DCT and Modified Watson's Visual Model. 904-907 - Jiaxin Yu, Xinsheng Wang, Jianfei Li, Xu Nan:

An Effective Fragile Document Watermarking Technique. 908-911 - Zhihua Hu, Jiping Niu:

A Numeric Watermark Method Based on Valve-Value Surface. 912-915 - Xia Sun, Ziqiang Wang, Dexian Zhang:

A Watermarking Algorithm Based on MA and DWT. 916-919
Information Hiding and Watermarking (II)
- Mina Deng, Bart Preneel:

Attacks on Two Buyer-Seller Watermarking Protocols and an Improvement for Revocable Anonymity. 923-929 - Congxu Zhu, Yuping Hu:

A Multipurpose Watermarking Scheme for Image Authentication and Copyright Protection. 930-933 - Jianquan Xie, Chunhua Yang

, Dazu Huang, Duosi Xie:
A Large Capacity Blind Information Hiding Algorithm. 934-937 - Ruisong Ye, Huiliang Li:

A Novel Image Scrambling and Watermarking Scheme Based on Cellular Automata. 938-941 - Na Li, Xiaoshi Zheng, Yanling Zhao, Huimin Wu, Shifeng Li:

Robust Algorithm of Digital Image Watermarking Based on Discrete Wavelet Transform. 942-945 - Gengming Zhu:

Research on an Advanced Novel Watermarking Technology with Higher Robustness. 946-950 - Xiaoming Zhang, Xiong Yin, Zhaoyang Yu:

Histogram Specification-based Audio Watermarking Technology against Filtering Attacks in Time Domain. 951-956 - Huajun Huang, Shaohong Zhong, Xingming Sun:

Steganalysis of Information Hidden in Webpage Based on Higher-order Statistics. 957-960
Intelligent Systems
- Shouqiang Liu, Deyu Qi, Jun Xiang, Baogang Chen:

Research and Design on Reputation Services (RS) System. 963-966 - Shijue Zheng, Shaojun Xiong, Yin Huang, Shixiao Wu:

Using Methods of Association Rules Mining Optimizationin in Web-Based Mobile-Learning System. 967-970 - Yong Feng, Hongyan Xu, Song Yan:

Research on the Construction of Customer-centered Integrative Knowledge Push System. 971-975 - Guoyin Jiang, Lihong Dong:

Comparative Research of Modeling Methods for Workflow Process. 976-980 - Tao Liu, Zhifeng Hu, Yan Zhou, Zhijie Wang:

A Modified Resource Limited Artificial Immune System. 981-985 - Yan Li:

The Research on Multi-agent Framework for Decision Support System and Its Application. 986-989 - Shuliang Zhao, Haifeng Liu, Zhaohao Sun

:
Scalable Trust in Multi-agent E-commerce System. 990-993
International Finance
- Qihai Zhou, Tao Huang, Wang Tao:

Analysis of Business Intelligence and Its Derivative - Financial Intelligence. 997-1000 - Jiang-bo Zheng:

A Modeling Framework for the Planning of Logistics Nodes in Strategic Supply Chain Based on Complex Network. 1001-1005 - Wenfang Sun, Huaizhen Ye:

Research on Entropy Model of Order Degree of Fractal Supply Chain Network. 1006-1009 - Fei Zhu, Qiang Lv:

ACEAC: A Novel Access Control Model for Cooperative Editing with Workflow. 1010-1014 - Changbing Jiang

:
The Classification of Urban Logistics Infrastructure: Evidence from the Yangtze River Delta Region in China. 1015-1019 - Haiquan Chen, Quanxiong Zhou, Xiangke Kong:

Management Innovation and Development of Manufacturer-Retailer Relationships for Large Electric Appliances Chain Stores in China. 1020-1024 - Luchuan Liu, Jing Lu, Xiaohong Yang:

Enterprise E-Business Transformation: A Case Study in China. 1025-1029
Other Topics
- Hong-Jiao Ma, Yu Hua, Wei Guo:

Electronic Time Stamping Safety and Efficiency Optimize Technique Research. 1033-1036 - Qi Ming, Xie Jingxu:

Research on Witkey Model Based on TRIZ. 1037-1040 - Yong-Zhong He, Zhen Han, Ye Du:

Context Active RBAC and its Applications. 1041-1044 - Qiaolian Cheng, Ruijin Zhang, Yezhuang Tian:

Study on Information Technology Capabilities based on Value Net Theory. 1045-1050 - Guan Xu, Jian Su, Hongda Pan, Donglin Zhang:

A Novel Method for Wheel Rim Recognition. 1051-1054 - Ming Qi, Beilei Shangguan:

Design of the Knowledge Management Integrated System Based on TRIZ. 1055-1058 - Zhong-hua Deng, Bin Su:

Development Course for Information Platform Based on MDA. 1059-1062 - Hui Tan:

The Application of RFID Technology in the Warehouse Management Information System. 1063-1067

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














