Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ICEBE
ICEBE 2008
Generate Citations
2008 IEEE International Conference on e-Business Engineering
Oct. 22 2008 to Oct. 24 2008
ISBN: 978-0-7695-3395-7
Table of Contents
Papers
[Copyright notice]
Freely available from IEEE.
pp. iv
Papers
Table of contents
Freely available from IEEE.
pp. v-xiv
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Papers
Message from ICEBE 2008 General Chairs
Freely available from IEEE.
pp. xv-xvi
Papers
Message from ICEBE 2008 Program Chairs
Freely available from IEEE.
pp. xvii-xviii
Papers
ICEBE 2008 Organizing Committee
Freely available from IEEE.
pp. xix-xx
Papers
ICEBE 2008 Program Committee
Freely available from IEEE.
pp. xxi-xxii
Papers
ICEBE 2008 Keynote I
Freely available from IEEE.
pp. xxiii
Papers
ICEBE 2008 Keynote II
Freely available from IEEE.
pp. xxiv
Papers
ICEBE 2008 Keynote III
Freely available from IEEE.
pp. xxv
Papers
Message from the AiR 2008 Chairs
Freely available from IEEE.
pp. xxvi
Papers
AiR 2008 Chairs and Committee
Freely available from IEEE.
pp. xxvii
Papers
Message from the EM2I 2008 Chairs
Freely available from IEEE.
pp. xxviii
Context-Driven Business Process Adaptation for Ad Hoc Changes
Full-text access may be available. Sign in or learn about subscription options.
pp. 53-60
by
Yonglin Xia
,
Jun Wei
Papers
EM2I 2008 Chairs and Committee
Freely available from IEEE.
pp. xxix
Papers
Message from the SOAIC 2008 Chairs
Freely available from IEEE.
pp. xxx
Papers
SOAIC 2008 Chairs and Committee
Freely available from IEEE.
pp. xxxi
Papers
Message from the SOKM 2008 Chairs
Freely available from IEEE.
pp. xxxii
Papers
SOKM 2008 Chairs and Committee
Freely available from IEEE.
pp. xxxiii
Papers
Message from the BIMA 2008 Chairs
Freely available from IEEE.
pp. xxxiv
Papers
BIMA 2008 Chairs and Committee
Freely available from IEEE.
pp. xxxv
Papers
Message from the DKEEE 2008 Chair
Freely available from IEEE.
pp. xxxvi
Papers
DKEEE 2008 Chairs and Committee
Freely available from IEEE.
pp. xxxvii
Papers
Architectural Design of the Online Auction System with AOSAD
Full-text access may be available. Sign in or learn about subscription options.
pp. 5-12
by
Wen Jing
,
Ying Shi
,
NiYou Cong
,
Zhang LinLin
Papers
Determining the Level of Perceived Risk in e-business Web 2.0 Interactions
Full-text access may be available. Sign in or learn about subscription options.
pp. 13-20
by
Omar Hussain
,
Elizabeth Chang
,
Tharam Dillon
,
Farookh Hussain
Papers
Service-Oriented User Interface Modeling and Composition
Full-text access may be available. Sign in or learn about subscription options.
pp. 21-28
by
Wei-Tek Tsai
,
Qian Huang
,
Jay Elston
,
Yinong Chen
Papers
A Model-Driven SOA Implementation of Multi-Channel Websphere Commerce Gift Center
Full-text access may be available. Sign in or learn about subscription options.
pp. 29-34
by
Yew-Huey Liu
,
Jih-Shyr Yih
,
Florian Pinel
,
Trieu Chieu
Papers
Performance Implications of Next-Generation Multi-processing Platforms on e-Business Server Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 37-44
by
Qi Ming Teng
,
Xiao Zhong
,
Ying Li
,
Ying Chen
Papers
A Component-Oriented Development Approach to E-Business Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 45-52
by
Wang Chu
,
Depei Qian
Papers
Context-Aware Distributed Reputation Management System
Full-text access may be available. Sign in or learn about subscription options.
pp. 61-68
by
Jinhwan Lee
,
Kwei-Jay Lin
Papers
A Federated UDDI System for Concurrent Access to Service Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 71-78
by
Qianhui Liang
,
Jen-Yao Chung
Papers
Service-Enabled Automatic Framework for Testing and Tuning Multi-tier System
Full-text access may be available. Sign in or learn about subscription options.
pp. 79-86
by
Dong Jun Lan
,
Pei Ni Liu
,
Jun Hou
,
Meng Ye
,
Leslie S. Liu
Papers
Supporting Crisis Management Processes by Wirelessly Interconnected Tablet-PCs
Full-text access may be available. Sign in or learn about subscription options.
pp. 87-93
by
Cl?udio Sapateiro
,
Pedro Antunes
,
Gustavo Zurita
,
Nelson Baloian
,
Rodrigo Vogt
Papers
A Study and Performance Evaluation of the Multi-Tenant Data Tier Design Patterns for Service Oriented Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 94-101
by
Zhi Hu Wang
,
Chang Jie Guo
,
Bo Gao
,
Wei Sun
,
Zhen Zhang
,
Wen Hao An
Papers
A Model-Driven Object Store
Full-text access may be available. Sign in or learn about subscription options.
pp. 105-112
by
Liangzhao Zeng
,
Hui Lei
,
Trieu Chieu
,
Henry Chang
Papers
Answering an Inquiry from Heterogeneous Contexts
Full-text access may be available. Sign in or learn about subscription options.
pp. 113-120
by
Jingzhi Guo
,
Zhuo Hu
,
Grigoris Antoniou
,
Chi-Kit Chan
Papers
A Data Model for Heterogeneous Data Sources
Full-text access may be available. Sign in or learn about subscription options.
pp. 121-127
by
Chaiyaporn Chirathamjaree
Papers
An Adapted Alternation Approach for Recommender Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 128-135
by
Carme Juli?
,
Angel D. Sappa
,
Felipe Lumbreras
,
Joan Serrat
,
Antonio L?pez
Papers
The New CIO: From Technician to Business Strategist and the Implications for E-Commerce
Full-text access may be available. Sign in or learn about subscription options.
pp. 139-146
by
Andres Fortino
Papers
URL Rule Based Focused Crawler
Full-text access may be available. Sign in or learn about subscription options.
pp. 147-154
by
Xiaolin Zheng
,
Tao Zhou
,
Zukun Yu
,
Deren Chen
Papers
Constrained Skyline Computing over Data Streams
Full-text access may be available. Sign in or learn about subscription options.
pp. 155-161
by
Jin-xian Lin
,
Jing-jing Wei
Papers
Towards Personalized Ranking in Web Service Selection
Full-text access may be available. Sign in or learn about subscription options.
pp. 165-172
by
Wenge Rong
,
Kecheng Liu
,
Lin Liang
Papers
Metadata Discovery for a Service-Broker Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 173-178
by
Raymond Farmer
,
Adam Raybone
,
Rehan Uddin
,
Michael Odetayo
,
Kuo-Ming Chao
Papers
A Run-Time Service Discovery Tool for Web Services Compositions
Full-text access may be available. Sign in or learn about subscription options.
pp. 179-187
by
Mohsen Rouached
,
Claude Godart
Papers
Structured NL Representation for Bridging the Knowledge Gap in Semantic Web Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 188-194
by
William Song
,
Joe Geldart
Papers
A RESTful Architecture for Service-Oriented Business Process Execution
Full-text access may be available. Sign in or learn about subscription options.
pp. 197-204
by
Santhosh Kumaran
,
Rong Liu
,
Pankaj Dhoolia
,
Terry Heath
,
Prabir Nandi
,
Florian Pinel
A Semantic-Enabled Mobile Directory Service for RFID-Based Logistics Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 333-340
by
Michele Ruta
,
Tommaso Di Noia
,
Eugenio Di Sciascio
,
Giacomo Piscitelli
,
Floriano Scioscia
Papers
Automated Configuration of System Infrastructure for SOA-Based Enterprise Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 205-212
by
Thomas Phan
,
Wen-Syan Li
Papers
Ensuring the Consistent Concurrent Execution of Service Composition under Relaxed Isolation
Full-text access may be available. Sign in or learn about subscription options.
pp. 213-220
by
Li Lin
,
Zongtao Zhao
,
Hua Zhong
,
Jun Wei
Papers
A Formal Approach to Devising a Practical Method for Modeling Reusable Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 221-228
by
Jin Sun Her
,
Hyun Jung La
,
Soo Dong Kim
Papers
A General QoS Error Detection and Diagnosis Framework for Accountable SOA
Full-text access may be available. Sign in or learn about subscription options.
pp. 231-238
by
Soo Ho Chang
,
Kwei-Jay Lin
Papers
Robust Application-Level QoS Management in Service-Oriented Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 239-246
by
Qianhui Liang
,
Hoong Chuin Lau
,
Xindong Wu
Papers
ACORD Standards Based SOA Solution for Insurance Industry - Combine ACORD eForms with Business Services through XForms Standard
Full-text access may be available. Sign in or learn about subscription options.
pp. 247-254
by
Qiang Wang
,
Ying Chun Guo
,
Min Li
,
Xiao Feng Zhao
Papers
A Service Engineering Approach to a Mobile Parking Guidance System in uHealthcare
Full-text access may be available. Sign in or learn about subscription options.
pp. 255-261
by
Weider D. Yu
,
Margaret Chan
Papers
The Evaluation of Situational Transaction Trust in E-Service Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 265-272
by
Yan Wang
,
Ee-Peng Lim
Papers
AHP-Based Multi-Dimension Credit Evaluation Model for E-Commerce
Full-text access may be available. Sign in or learn about subscription options.
pp. 273-278
by
Xiang Chen
,
Yi Liu
,
Hao Sun
Papers
A Real-Time Payment Scheme for SIP Service Based on Hash Chain
Full-text access may be available. Sign in or learn about subscription options.
pp. 279-286
by
Jianguo Hao
,
Jia Zou
,
Yiqi Dai
Papers
PGMAP: A Privacy Guaranteed Mutual Authentication Protocol Conforming to EPC Class 1 Gen 2 Standards
Full-text access may be available. Sign in or learn about subscription options.
pp. 289-296
by
Jiahao Wang
,
Edward C. Wong
,
Terry Ye
Papers
Privacy Preserving in Ubiquitous Computing: Challenges & Issues
Full-text access may be available. Sign in or learn about subscription options.
pp. 297-301
by
Tinghuai Ma
,
Shin-Dug Kim
,
Jun Wang
,
Yawei Zhao
Papers
How to Trust DRE Voting Machines Preserving Voter Privacy
Full-text access may be available. Sign in or learn about subscription options.
pp. 302-307
by
Yunho Lee
,
Seungjoo Kim
,
Dongho Won
Papers
Security Weaknesses in Chang and Wu?s Key Agreement Protocol for a Multi-Server Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 308-314
by
Youngsook Lee
,
Dongho Won
Papers
SmartRF-A Flexible and Light-Weight RFID Middleware
Full-text access may be available. Sign in or learn about subscription options.
pp. 317-324
by
Anirudh Ghayal
,
Zuber Khan
,
Rajat Moona
Papers
New Programming Model for Pervasive Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 325-332
by
Qingsong Yao
,
Shan Chang
,
Yong Qi
,
Li Ming
Papers
User Acceptance Testing of Mobile Payment in Various Scenarios
Full-text access may be available. Sign in or learn about subscription options.
pp. 341-348
by
Henry Ho
,
Simon Fong
,
Zhuang Yan
Papers
Applying Pattern Approach for Solution Architecture Design: A Case Study in Retail Solution
Full-text access may be available. Sign in or learn about subscription options.
pp. 351-358
by
Xin Zhang
,
Zhongjie Li
,
Wei Sun
,
Zhongbo Jiang
,
Jonathan Adams
,
Paul Verschueren
Papers
A Web Services Integration to Manage Invoice Identification, Metadata Extraction, Storage and Retrieval in a Multi-tenancy SaaS Application
Full-text access may be available. Sign in or learn about subscription options.
pp. 359-366
by
Thomas Kwok
,
Jim Laredo
,
Sridhar Maradugu
Papers
A Supplier Performance Evaluation Solution for Proactive Supplier Quality Management
Full-text access may be available. Sign in or learn about subscription options.
pp. 367-373
by
Sai Zeng
,
Mitchell A. Cohen
,
Benjamin J. Steele
,
Jakka Sairamesh
Papers
Applying SOA and Web 2.0 to Telecom: Legacy and IMS Next-Generation Architectures
Full-text access may be available. Sign in or learn about subscription options.
pp. 374-379
by
Rebecca Chen
,
Victor Shen
,
Tony Wrobel
,
Christina Lin
Papers
Modeling Electronic Money Dynamics: A Complex System Perspective
Full-text access may be available. Sign in or learn about subscription options.
pp. 385-389
by
Hao Sun
,
Yueting Chai
,
Yi Liu
Papers
Managed Business Artifacts
Full-text access may be available. Sign in or learn about subscription options.
pp. 390-395
by
Anil Nigam
,
Jun-Jang Jeng
,
Tian Chao
,
Henry Chang
Papers
A Framework of User Model Based on Semi-Supervised Techniques
Full-text access may be available. Sign in or learn about subscription options.
pp. 396-401
by
Xiaojian Ding
,
Yuancheng Li
,
Yinliang Zhao
Papers
Agile Partner Selection Based on Meta-heuristic Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 402-407
by
Zheng Lin
,
Lubin Wang
Papers
Automatic Product Information Acquisition for Supermarkets Using Internet and RF Wireless Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 411-416
by
Lin-Song Weng
,
Ching-Lung Lin
,
Hsueh-Hsien Chang
Papers
BPMN-Based Modeling of B2B Business Processes from the Neutral Perspective of UMM/BPSS
Full-text access may be available. Sign in or learn about subscription options.
pp. 417-422
by
Hyoung Do Kim
Papers
Structural Analysis of R & D Division from Patent Documents
Full-text access may be available. Sign in or learn about subscription options.
pp. 423-428
by
Yurie Iino
,
Yasuhiro Yamada
,
Sachio Hirokawa
Papers
Real-time Performance Monitoring for an Enterprise Information Management System
Full-text access may be available. Sign in or learn about subscription options.
pp. 429-434
by
Trieu C. Chieu
,
Liangzhao Zeng
Papers
A Disclosure Framework for Service Accountability in SOA
Full-text access may be available. Sign in or learn about subscription options.
pp. 437-442
by
Joe Zou
,
Christopher J. Pavlovski
,
Yan Wang
Papers
Design Support for Advanced Network Programming Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 443-448
by
Dionisis Adamopoulos
Papers
Data Messaging Based Approach for Web Service Composition
Full-text access may be available. Sign in or learn about subscription options.
pp. 449-454
by
Nawal Guermouche
,
Boualem Benatallah
,
Claude Godart
Papers
Access Control for Human Tasks in Service Oriented Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 455-460
by
Xin Wang
,
Yanchun Zhang
,
Hao Shi
Security of an RFID Protocol for Supply Chains
Full-text access may be available. Sign in or learn about subscription options.
pp. 568-573
by
Ton van Deursen
,
Sasa Radomirovic
Papers
SCPM: Facilitating Process-Centric Deployment in Enterprise System Implementation
Full-text access may be available. Sign in or learn about subscription options.
pp. 461-466
by
Qinhua Wang
,
Changrui Ren
,
Shao Bing
,
Jin Dong
,
Hongwei Ding
,
Wei Wang
Papers
An Amphibian Service-Oriented Agent Model for Cooperative Distributed Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 467-472
by
Ying Daisy Wang
,
Hamada Ghenniwa
,
Weiming Shen
Papers
A Trust and Risk Framework to Enhance Reliable Interaction in E-Commerce
Full-text access may be available. Sign in or learn about subscription options.
pp. 475-480
by
Yan Li
,
Ming Zhao
,
Huiping Sun
,
Zhong Chen
Papers
Automated Trust Negotiation Based on Concurrent Zero-Knowledge for e-Business Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 481-486
by
Shangyuan Guan
,
Xiaoshe Dong
,
Yiduo Mei
,
Weiguo Wu
,
Zhengdong Zhu
Papers
Trust Routing Protocol Framework Based on Behavior Assessment for Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 487-492
by
Huanzhao Wang
,
Xinjian Zhai
,
Peijun Chen
Papers
Towards Practical Privacy Preserving Technology Adoption Analysis Service Platform
Full-text access may be available. Sign in or learn about subscription options.
pp. 493-498
by
Zongwei Luo
Papers
Detecting SYN Flooding Agents under Any Type of IP Spoofing
Full-text access may be available. Sign in or learn about subscription options.
pp. 499-505
by
Dalia Nashat
,
Xiaohong Jiang
,
Susumu Horiguchi
Papers
Overview of Security Threats for Smart Cards in the Public Transport Industry
Full-text access may be available. Sign in or learn about subscription options.
pp. 506-513
by
Konstantinos Markantonakis
,
Keith Mayes
,
Damien Sauveron
,
Ioannis G. Askoxylakis
Papers
Supporting High Updates Disk-Based Index in Road Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 517-522
by
Liangxu Liu
,
Weimin Li
,
Yongming Guo
,
Jiajin Le
IT and Business Integration through the Convergence of Virtualization, SOA and Distributed Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 615-620
by
Jackson He
,
Enrique Castro-Leon
Papers
BlueStar: Managed Services for Enterprise Mobility
Full-text access may be available. Sign in or learn about subscription options.
pp. 523-527
by
Steve Mastrianni
,
David Bantz
,
Terrence Beuchner
,
Tom Chefalas
,
George Edwards
,
Dongjun Lan
,
Gary Leonardi
,
Leslie Liu
,
Randy Moulic
,
Dennis G. Shea
,
Jinho Song
,
Drew Wyskida
Papers
User-Centered Design and Evaluation of WAP-Based Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 528-533
by
Rahat Iqbal
,
Nazaraf Shah
,
Kuo-Ming Chao
,
Konstantian Karatsivi
Papers
Strategic Co-operative R&D and Firm Performance in Emerging B2B E-Commerce
Full-text access may be available. Sign in or learn about subscription options.
pp. 537-542
by
Jijiao Jiang
,
Jingwen Zhang
A Peer-to-Peer e-Market Organized within Mobile Devices Based on Distributed Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 633-636
by
Zhou Yu
,
Zhiyuan Fang
,
Li Ning
Papers
Cognition Change from Skype Internet Phone User by Qualitative Perspectives
Full-text access may be available. Sign in or learn about subscription options.
pp. 543-548
by
Yung-Chih Yen
,
Chia-Chen Yen
,
Jih-Shih Hsu
Papers
A Web-based CMS/PDM Integration for Product Design and Manufacturing
Full-text access may be available. Sign in or learn about subscription options.
pp. 549-553
by
Chia-Chen Yen
,
Chiaming Yen
,
Jih-Shih Hsu
Verifying Service-Oriented Requirements Using Model Checking
Full-text access may be available. Sign in or learn about subscription options.
pp. 643-648
by
Xiaoxia Cao
,
Huaikou Miao
,
Qingguo Xu
Papers
QTS ALOHA: A Hybrid Collision Resolution Protocol for Dense RFID Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 557-562
by
Yan Xinqing
,
Yin Zhouping
,
Xiong Youlun
Showing 100 out of 136
Load More
Load All