Default Cover Image

2014 IEEE 11th International Conference on e-Business Engineering (ICEBE)

Nov. 5 2014 to Nov. 7 2014

Guangzhou, China

Table of Contents

Title Page iFreely available from IEEE.pp. i-i
Title Page iiiFreely available from IEEE.pp. iii-iii
Copyright PageFreely available from IEEE.pp. iv-iv
Table of ContentsFreely available from IEEE.pp. v-x
Message from the ICEBE 2014 ChairsFreely available from IEEE.pp. xi-xi
Message from the ICEBE 2014 Program ChairsFreely available from IEEE.pp. xii-xiii
Message from the SOAIC 2014 Workshop Co-ChairsFreely available from IEEE.pp. xiv-xiv
ICEBE 2014 Organizing CommitteeFreely available from IEEE.pp. xv-xvi
ICEBE 2014 Program CommitteeFreely available from IEEE.pp. xvii-xix
SOAIC 2014 Workshop Co-chairs and Program CommitteeFreely available from IEEE.pp. xx-xx
ECE 2014 Workshop Co-chairsFreely available from IEEE.pp. xxi-xxi
Keynote: Evolvement Forecasts and China's Development Strategies of E-Commerce Marketplaces by Yueting ChaiFull-text access may be available. Sign in or learn about subscription options.pp. xxii-xxii
Computational Experiment of Service Policy in Collaborative ProcurementFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A Visualized Framework of Automatic Orchestration Engine Supporting Hybrid Cloud ResourcesFull-text access may be available. Sign in or learn about subscription options.pp. 7-12
A Human-centric User Model for Intelligent HealthcareFull-text access may be available. Sign in or learn about subscription options.pp. 13-18
Scenario-Based Method for Business Process Analysis and Improvement in SOAFull-text access may be available. Sign in or learn about subscription options.pp. 19-25
Dominant Bidding Strategy in Mobile App Advertising AuctionFull-text access may be available. Sign in or learn about subscription options.pp. 26-30
Minson: A Business Process Self-Adaptive Framework for Smart Office Based on Multi-agentFull-text access may be available. Sign in or learn about subscription options.pp. 31-37
Personal Healthcare Record Integration Method Based on Linked Data ModelFull-text access may be available. Sign in or learn about subscription options.pp. 38-43
Optimistic Fair-Exchange with Anonymity for Bitcoin UsersFull-text access may be available. Sign in or learn about subscription options.pp. 44-51
Value Evaluation of Enterprise Management Informatization Based on Comprehensive MethodFull-text access may be available. Sign in or learn about subscription options.pp. 52-60
Research on Undergraduates' Perception of Wechat AcceptanceFull-text access may be available. Sign in or learn about subscription options.pp. 61-67
Factors Influencing User Satisfaction of E-Tax Filing: The Study of Small and Medium Enterprises (SMEs)Full-text access may be available. Sign in or learn about subscription options.pp. 68-73
REA-Based Business Process AdaptationFull-text access may be available. Sign in or learn about subscription options.pp. 74-82
In-house Crowdsourcing-Based Entity Resolution: Dealing with Common NamesFull-text access may be available. Sign in or learn about subscription options.pp. 83-88
Collaborative Topic Modeling for Text TensorsFull-text access may be available. Sign in or learn about subscription options.pp. 89-96
Developing SWOT Analysis from Customer Satisfaction SurveysFull-text access may be available. Sign in or learn about subscription options.pp. 97-104
A Novel Top-K Automobiles Probabilistic Recommendation Model Using User Preference and User CommunityFull-text access may be available. Sign in or learn about subscription options.pp. 105-111
A Top-N Recommender Model with Partially Predefined StructureFull-text access may be available. Sign in or learn about subscription options.pp. 112-119
RWR-Based Resources Recommendation on Weighted and Clustered Folksonomy GraphFull-text access may be available. Sign in or learn about subscription options.pp. 120-125
Price Pattern Detection Using Finite State Machine with Fuzzy TransitionsFull-text access may be available. Sign in or learn about subscription options.pp. 126-130
An Operating Guideline Based Approach to Analyzing Timed Compatibility of Service CompositionFull-text access may be available. Sign in or learn about subscription options.pp. 131-138
Self-Adaptive Web Service Composition Based on Stochastic Context-Free GrammarFull-text access may be available. Sign in or learn about subscription options.pp. 139-144
Performance Prediction and Analysis of Quality of Services for Cross-Organizational WorkflowsFull-text access may be available. Sign in or learn about subscription options.pp. 145-150
Interactive Model Fitting for Human Robot CollaborationFull-text access may be available. Sign in or learn about subscription options.pp. 151-156
Towards Peer-to-Peer Based Service Hosting through Procurement Mechanism for Host SelectionFull-text access may be available. Sign in or learn about subscription options.pp. 157-163
A Semi-distributed Reputation Mechanism Based on Dynamic Data-Driven Application SystemFull-text access may be available. Sign in or learn about subscription options.pp. 164-169
A Robust Trust Management Model for E-Commerce SystemFull-text access may be available. Sign in or learn about subscription options.pp. 170-176
Research on the User Privacy Protection Method in Mobile CommerceFull-text access may be available. Sign in or learn about subscription options.pp. 177-184
Using Taint Analysis for Threat Risk of Cloud ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 185-190
Reputation by Design: Using VDML and Service ML for Reputation Systems ModelingFull-text access may be available. Sign in or learn about subscription options.pp. 191-198
An Object Transition Flow Model of Test Data Set for Simulation of RFID ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 199-206
Managing Uncertainties in RFID Applications - A SurveyFull-text access may be available. Sign in or learn about subscription options.pp. 220-225
Formalizing Workflow with Location Constraints by Colored Petri NetsFull-text access may be available. Sign in or learn about subscription options.pp. 226-231
Public Sentiment Analysis in Twitter Data for Prediction of a Company's Stock Price MovementsFull-text access may be available. Sign in or learn about subscription options.pp. 232-239
Leaning to Train: Linking Financial News Articles to Company Short NamesFull-text access may be available. Sign in or learn about subscription options.pp. 240-245
Discovering Event Evolution Graphs Based on News Articles RelationshipsFull-text access may be available. Sign in or learn about subscription options.pp. 246-251
Extraction of Product Information Object for TrustworthinessFull-text access may be available. Sign in or learn about subscription options.pp. 252-257
Big Log Analysis for E-Learning EcosystemFull-text access may be available. Sign in or learn about subscription options.pp. 258-263
Research on the Path Sorting Efficiency of TFTA Back-Tracing Algorithm Based on the Concept of EntropyFull-text access may be available. Sign in or learn about subscription options.pp. 264-267
A Comprehensive Service-Oriented Innovation Support System for E-Commerce Innovation ProcessFull-text access may be available. Sign in or learn about subscription options.pp. 274-279
A Hybrid Movie Recommendation Approach via Social TagsFull-text access may be available. Sign in or learn about subscription options.pp. 280-285
Towards a Fine-Grained Access Control for CloudFull-text access may be available. Sign in or learn about subscription options.pp. 286-291
Practice of Taipei Tour Planning System Based on Attribute Classification and Time Saver AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 292-297
A Patient-Centered Self-Care Support System for DiabeticsFull-text access may be available. Sign in or learn about subscription options.pp. 298-302
Authorship Authentication Using Short Messages from Social Networking SitesFull-text access may be available. Sign in or learn about subscription options.pp. 314-319
Complement Service Composition through Domain Template and Requirement ContextFull-text access may be available. Sign in or learn about subscription options.pp. 320-325
A Study of Middleware for Pluggable UI in IoT-Enabled EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 326-330
Study on P2P E-Finance Platform System: A Case in ChinaFull-text access may be available. Sign in or learn about subscription options.pp. 331-337
A Method to Measure User Influence in Social Network Based on Process LogFull-text access may be available. Sign in or learn about subscription options.pp. 338-343
A Web Service Recommendation Approach Based on Collaborative FilteringFull-text access may be available. Sign in or learn about subscription options.pp. 344-349
Digital Signature Modeling in E-BusinessFull-text access may be available. Sign in or learn about subscription options.pp. 350-354
An Intelligent Negotiation Model for Quality of Service ChainFull-text access may be available. Sign in or learn about subscription options.pp. 355-360
Author IndexFreely available from IEEE.pp. 361-363
Publisher's InformationFreely available from IEEE.pp. 364-364
Showing 70 out of 70