Default Cover Image

2008 IEEE International Conference on e-Business Engineering

Oct. 22 2008 to Oct. 24 2008

ISBN: 978-0-7695-3395-7

Table of Contents

Papers
[Copyright notice]Freely available from IEEE.pp. iv
Papers
Table of contentsFreely available from IEEE.pp. v-xiv
Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
Message from ICEBE 2008 General ChairsFreely available from IEEE.pp. xv-xvi
Papers
Message from ICEBE 2008 Program ChairsFreely available from IEEE.pp. xvii-xviii
Papers
ICEBE 2008 Organizing CommitteeFreely available from IEEE.pp. xix-xx
Papers
ICEBE 2008 Program CommitteeFreely available from IEEE.pp. xxi-xxii
Papers
ICEBE 2008 Keynote IFreely available from IEEE.pp. xxiii
Papers
ICEBE 2008 Keynote IIFreely available from IEEE.pp. xxiv
Papers
ICEBE 2008 Keynote IIIFreely available from IEEE.pp. xxv
Papers
Message from the AiR 2008 ChairsFreely available from IEEE.pp. xxvi
Papers
AiR 2008 Chairs and CommitteeFreely available from IEEE.pp. xxvii
Papers
Message from the EM2I 2008 ChairsFreely available from IEEE.pp. xxviii
Context-Driven Business Process Adaptation for Ad Hoc ChangesFull-text access may be available. Sign in or learn about subscription options.pp. 53-60
Papers
EM2I 2008 Chairs and CommitteeFreely available from IEEE.pp. xxix
Papers
Message from the SOAIC 2008 ChairsFreely available from IEEE.pp. xxx
Papers
SOAIC 2008 Chairs and CommitteeFreely available from IEEE.pp. xxxi
Papers
Message from the SOKM 2008 ChairsFreely available from IEEE.pp. xxxii
Papers
SOKM 2008 Chairs and CommitteeFreely available from IEEE.pp. xxxiii
Papers
Message from the BIMA 2008 ChairsFreely available from IEEE.pp. xxxiv
Papers
BIMA 2008 Chairs and CommitteeFreely available from IEEE.pp. xxxv
Papers
Message from the DKEEE 2008 ChairFreely available from IEEE.pp. xxxvi
Papers
DKEEE 2008 Chairs and CommitteeFreely available from IEEE.pp. xxxvii
Papers
Architectural Design of the Online Auction System with AOSADFull-text access may be available. Sign in or learn about subscription options.pp. 5-12
Papers
Determining the Level of Perceived Risk in e-business Web 2.0 InteractionsFull-text access may be available. Sign in or learn about subscription options.pp. 13-20
Papers
Service-Oriented User Interface Modeling and CompositionFull-text access may be available. Sign in or learn about subscription options.pp. 21-28
Papers
A Model-Driven SOA Implementation of Multi-Channel Websphere Commerce Gift CenterFull-text access may be available. Sign in or learn about subscription options.pp. 29-34
Papers
Performance Implications of Next-Generation Multi-processing Platforms on e-Business Server ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 37-44
Papers
A Component-Oriented Development Approach to E-Business ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 45-52
Papers
Context-Aware Distributed Reputation Management SystemFull-text access may be available. Sign in or learn about subscription options.pp. 61-68
Papers
A Federated UDDI System for Concurrent Access to Service DataFull-text access may be available. Sign in or learn about subscription options.pp. 71-78
Papers
Service-Enabled Automatic Framework for Testing and Tuning Multi-tier SystemFull-text access may be available. Sign in or learn about subscription options.pp. 79-86
Papers
Supporting Crisis Management Processes by Wirelessly Interconnected Tablet-PCsFull-text access may be available. Sign in or learn about subscription options.pp. 87-93
Papers
A Model-Driven Object StoreFull-text access may be available. Sign in or learn about subscription options.pp. 105-112
Papers
Answering an Inquiry from Heterogeneous ContextsFull-text access may be available. Sign in or learn about subscription options.pp. 113-120
Papers
A Data Model for Heterogeneous Data SourcesFull-text access may be available. Sign in or learn about subscription options.pp. 121-127
Papers
An Adapted Alternation Approach for Recommender SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 128-135
Papers
The New CIO: From Technician to Business Strategist and the Implications for E-CommerceFull-text access may be available. Sign in or learn about subscription options.pp. 139-146
Papers
URL Rule Based Focused CrawlerFull-text access may be available. Sign in or learn about subscription options.pp. 147-154
Papers
Constrained Skyline Computing over Data StreamsFull-text access may be available. Sign in or learn about subscription options.pp. 155-161
Papers
Towards Personalized Ranking in Web Service SelectionFull-text access may be available. Sign in or learn about subscription options.pp. 165-172
Papers
Metadata Discovery for a Service-Broker ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 173-178
Papers
A Run-Time Service Discovery Tool for Web Services CompositionsFull-text access may be available. Sign in or learn about subscription options.pp. 179-187
Papers
Structured NL Representation for Bridging the Knowledge Gap in Semantic Web ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 188-194
Papers
A RESTful Architecture for Service-Oriented Business Process ExecutionFull-text access may be available. Sign in or learn about subscription options.pp. 197-204
Papers
Automated Configuration of System Infrastructure for SOA-Based Enterprise ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 205-212
Papers
Ensuring the Consistent Concurrent Execution of Service Composition under Relaxed IsolationFull-text access may be available. Sign in or learn about subscription options.pp. 213-220
Papers
A Formal Approach to Devising a Practical Method for Modeling Reusable ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 221-228
Papers
A General QoS Error Detection and Diagnosis Framework for Accountable SOAFull-text access may be available. Sign in or learn about subscription options.pp. 231-238
Papers
Robust Application-Level QoS Management in Service-Oriented SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 239-246
Papers
A Service Engineering Approach to a Mobile Parking Guidance System in uHealthcareFull-text access may be available. Sign in or learn about subscription options.pp. 255-261
Papers
The Evaluation of Situational Transaction Trust in E-Service EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 265-272
Papers
AHP-Based Multi-Dimension Credit Evaluation Model for E-CommerceFull-text access may be available. Sign in or learn about subscription options.pp. 273-278
Papers
A Real-Time Payment Scheme for SIP Service Based on Hash ChainFull-text access may be available. Sign in or learn about subscription options.pp. 279-286
Papers
PGMAP: A Privacy Guaranteed Mutual Authentication Protocol Conforming to EPC Class 1 Gen 2 StandardsFull-text access may be available. Sign in or learn about subscription options.pp. 289-296
Papers
Privacy Preserving in Ubiquitous Computing: Challenges & IssuesFull-text access may be available. Sign in or learn about subscription options.pp. 297-301
Papers
How to Trust DRE Voting Machines Preserving Voter PrivacyFull-text access may be available. Sign in or learn about subscription options.pp. 302-307
Papers
Security Weaknesses in Chang and Wu?s Key Agreement Protocol for a Multi-Server EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 308-314
Papers
SmartRF-A Flexible and Light-Weight RFID MiddlewareFull-text access may be available. Sign in or learn about subscription options.pp. 317-324
Papers
New Programming Model for Pervasive ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 325-332
Papers
User Acceptance Testing of Mobile Payment in Various ScenariosFull-text access may be available. Sign in or learn about subscription options.pp. 341-348
Papers
Applying Pattern Approach for Solution Architecture Design: A Case Study in Retail SolutionFull-text access may be available. Sign in or learn about subscription options.pp. 351-358
Papers
A Supplier Performance Evaluation Solution for Proactive Supplier Quality ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 367-373
Papers
Applying SOA and Web 2.0 to Telecom: Legacy and IMS Next-Generation ArchitecturesFull-text access may be available. Sign in or learn about subscription options.pp. 374-379
Papers
Modeling Electronic Money Dynamics: A Complex System PerspectiveFull-text access may be available. Sign in or learn about subscription options.pp. 385-389
Papers
Managed Business ArtifactsFull-text access may be available. Sign in or learn about subscription options.pp. 390-395
Papers
A Framework of User Model Based on Semi-Supervised TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 396-401
Papers
Agile Partner Selection Based on Meta-heuristic AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 402-407
Papers
Automatic Product Information Acquisition for Supermarkets Using Internet and RF Wireless NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 411-416
Papers
BPMN-Based Modeling of B2B Business Processes from the Neutral Perspective of UMM/BPSSFull-text access may be available. Sign in or learn about subscription options.pp. 417-422
Papers
Structural Analysis of R & D Division from Patent DocumentsFull-text access may be available. Sign in or learn about subscription options.pp. 423-428
Papers
Real-time Performance Monitoring for an Enterprise Information Management SystemFull-text access may be available. Sign in or learn about subscription options.pp. 429-434
Papers
A Disclosure Framework for Service Accountability in SOAFull-text access may be available. Sign in or learn about subscription options.pp. 437-442
Papers
Design Support for Advanced Network Programming ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 443-448
Papers
Data Messaging Based Approach for Web Service CompositionFull-text access may be available. Sign in or learn about subscription options.pp. 449-454
Papers
Access Control for Human Tasks in Service Oriented ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 455-460
Security of an RFID Protocol for Supply ChainsFull-text access may be available. Sign in or learn about subscription options.pp. 568-573
Papers
SCPM: Facilitating Process-Centric Deployment in Enterprise System ImplementationFull-text access may be available. Sign in or learn about subscription options.pp. 461-466
Papers
An Amphibian Service-Oriented Agent Model for Cooperative Distributed SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 467-472
Papers
A Trust and Risk Framework to Enhance Reliable Interaction in E-CommerceFull-text access may be available. Sign in or learn about subscription options.pp. 475-480
Papers
Automated Trust Negotiation Based on Concurrent Zero-Knowledge for e-Business ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 481-486
Papers
Trust Routing Protocol Framework Based on Behavior Assessment for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 487-492
Papers
Towards Practical Privacy Preserving Technology Adoption Analysis Service PlatformFull-text access may be available. Sign in or learn about subscription options.pp. 493-498
Papers
Detecting SYN Flooding Agents under Any Type of IP SpoofingFull-text access may be available. Sign in or learn about subscription options.pp. 499-505
Papers
Overview of Security Threats for Smart Cards in the Public Transport IndustryFull-text access may be available. Sign in or learn about subscription options.pp. 506-513
Papers
Supporting High Updates Disk-Based Index in Road NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 517-522
IT and Business Integration through the Convergence of Virtualization, SOA and Distributed ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 615-620
Papers
User-Centered Design and Evaluation of WAP-Based SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 528-533
Papers
Strategic Co-operative R&D and Firm Performance in Emerging B2B E-CommerceFull-text access may be available. Sign in or learn about subscription options.pp. 537-542
A Peer-to-Peer e-Market Organized within Mobile Devices Based on Distributed ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 633-636
Papers
Cognition Change from Skype Internet Phone User by Qualitative PerspectivesFull-text access may be available. Sign in or learn about subscription options.pp. 543-548
Papers
A Web-based CMS/PDM Integration for Product Design and ManufacturingFull-text access may be available. Sign in or learn about subscription options.pp. 549-553
Verifying Service-Oriented Requirements Using Model CheckingFull-text access may be available. Sign in or learn about subscription options.pp. 643-648
Papers
QTS ALOHA: A Hybrid Collision Resolution Protocol for Dense RFID NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 557-562
Showing 100 out of 136