Default Cover Image

International Conference on Services Systems and Services Management

June 13 2005 to June 15 2005

Chongquing, China

ISBN: 0-7803-8971-9

Volume:

Table of Contents

Papers
Blank PageFreely available from IEEE.pp. 0_2
Papers
Organizing CommitteeFreely available from IEEE.pp. iv
Papers
Conference Chair's MessageFreely available from IEEE.pp. v
Papers
Blank PageFreely available from IEEE.pp. vi
Papers
PrefaceFreely available from IEEE.pp. vii
Papers
Blank PageFreely available from IEEE.pp. viii
ContentsFreely available from IEEE.pp. viii-xxiii
Papers
A key agreement protocol using mutual authentication for ad-hoc networksFull-text access may be available. Sign in or learn about subscription options.pp. 814-818 Vol. 2
Papers
Algorithm of reliability about ELSFull-text access may be available. Sign in or learn about subscription options.pp. 819-822
Papers
Critical failure factors of information system projects in Chinese enterprisesFull-text access may be available. Sign in or learn about subscription options.pp. 823-827 Vol. 2
Papers
Improving reliability and speed in service mass customization: a case study in Chinese restaurantFull-text access may be available. Sign in or learn about subscription options.pp. 828-834 Vol. 2
Papers
Intrusion detection and simulation for high-speed networksFull-text access may be available. Sign in or learn about subscription options.pp. 835-840 Vol. 2
Papers
Network information content security: a framework for intelligent analysis and monitoringFull-text access may be available. Sign in or learn about subscription options.pp. 841-843 Vol. 2
Papers
Network surveillance and multi-group intrusion classificationFull-text access may be available. Sign in or learn about subscription options.pp. 844-848 Vol. 2
Papers
Secure e-transactions using mobile agents with agent brokerFull-text access may be available. Sign in or learn about subscription options.pp. 849-855 Vol. 2
Papers
Secure transactions using mobile agents with TTPFull-text access may be available. Sign in or learn about subscription options.pp. 856-862 Vol. 2
Papers
A novel hybrid intelligent maintenance system and its applicationFull-text access may be available. Sign in or learn about subscription options.pp. 863-867 Vol. 2
Papers
A prototype system for using structured document to support knowledge sharingFull-text access may be available. Sign in or learn about subscription options.pp. 868-873 Vol. 2
Papers
Building synergies in industrial service production through life cycle thinking and complexity based knowledge managementFull-text access may be available. Sign in or learn about subscription options.pp. 874-879 Vol. 2
Papers
Co-evolution in an organization population of which knowledge-intensive service organizations form a partFull-text access may be available. Sign in or learn about subscription options.pp. 880-885 Vol. 2
Papers
Consideration on a service system for knowledge management in scientific laboratoriesFull-text access may be available. Sign in or learn about subscription options.pp. 886-891 Vol. 2
Papers
Knowledge chain, knowledge chain management and knowledge advantageFull-text access may be available. Sign in or learn about subscription options.pp. 892-897 Vol. 2
Papers
Knowledge management in virtual organizationsFull-text access may be available. Sign in or learn about subscription options.pp. 898-902 Vol. 2
Papers
Knowledge management support of real-time decision making for customer service support systemsFull-text access may be available. Sign in or learn about subscription options.pp. 903-907 Vol. 2
Papers
Knowledge-intensive service organizations as agents in a business ecosystemFull-text access may be available. Sign in or learn about subscription options.pp. 908-912 Vol. 2
Papers
Meanings of the knowledge in knowledge managementFull-text access may be available. Sign in or learn about subscription options.pp. 913-916 Vol. 2
Papers
Motivation factors that make knowledge workers share their tacit knowledge in universities: an empirical researchFull-text access may be available. Sign in or learn about subscription options.pp. 923-927 Vol. 2
Papers
New path of intellectual capital value increasing in the knowledge-based enterpriseFull-text access may be available. Sign in or learn about subscription options.pp. 928-931 Vol. 2
Papers
Research on innovational knowledge platform within a regionFull-text access may be available. Sign in or learn about subscription options.pp. 932-936 Vol. 2
Papers
Research on mathematical model for automatic summarizationFull-text access may be available. Sign in or learn about subscription options.pp. 937-941 Vol. 2
Papers
The study on mechanism of knowledge intensive services in knowledge system: the case of management consultancyFull-text access may be available. Sign in or learn about subscription options.pp. 942-946 Vol. 2
Papers
Agility analysis framework and model of inter-organizational processesFull-text access may be available. Sign in or learn about subscription options.pp. 947-950 Vol. 2
Papers
Business process modeling based on workflow model reuseFull-text access may be available. Sign in or learn about subscription options.pp. 951-954 Vol. 2
Papers
Cross training for efficient and flexible service system portfoliosFull-text access may be available. Sign in or learn about subscription options.pp. 955-960 Vol. 2
Papers
Discussion of ETC online system based on PHSFull-text access may be available. Sign in or learn about subscription options.pp. 961-965 Vol. 2
Papers
Inter-organizational business process modeling for electronic commerce based on pi-calculusFull-text access may be available. Sign in or learn about subscription options.pp. 966-970 Vol. 2
Papers
Model analysis of business process integration: take Chinese after service industry's endogenous networking as an exampleFull-text access may be available. Sign in or learn about subscription options.pp. 971-975 Vol. 2
Papers
Modeling diffusion of innovation with cellular automataFull-text access may be available. Sign in or learn about subscription options.pp. 976-980 Vol. 2
Papers
A dynamic multi-agent based framework for global supply chainFull-text access may be available. Sign in or learn about subscription options.pp. 981-984 Vol. 2
Papers
A generalized particle model for social coordination and autonomy in MASFull-text access may be available. Sign in or learn about subscription options.pp. 985-990 Vol. 2
Papers
A multi-agent based intelligent system for Internet shoppingFull-text access may be available. Sign in or learn about subscription options.pp. 991-995 Vol. 2
Papers
Co-evolution of agents in self-organized criticalityFull-text access may be available. Sign in or learn about subscription options.pp. 996-999 Vol. 2
Papers
EDI data monitoring and analyzing system based on agentFull-text access may be available. Sign in or learn about subscription options.pp. 1000-1004 Vol. 2
Papers
Supply chain system planning in complex adaptive system perspectiveFull-text access may be available. Sign in or learn about subscription options.pp. 1005-1008 Vol. 2
Papers
A data mining approach to performance measurement in the banking industryFull-text access may be available. Sign in or learn about subscription options.pp. 1009-1012 Vol. 2
Papers
A formal approach to modeling agents based on object semanticsFull-text access may be available. Sign in or learn about subscription options.pp. 1013-1015 Vol. 2
Papers
A new clustering algorithm based on distance and densityFull-text access may be available. Sign in or learn about subscription options.pp. 1016-1021 Vol. 2
Papers
A new method of decision rule mining for IT project risk management based on rough setFull-text access may be available. Sign in or learn about subscription options.pp. 1022-1026 Vol. 2
Papers
Adaptive neural network filter in compensation of time interleaved A/D converter systemFull-text access may be available. Sign in or learn about subscription options.pp. 1027-1030 Vol. 2
Papers
Amnestic neural network for classification: application on stock trend predictionFull-text access may be available. Sign in or learn about subscription options.pp. 1031-1034 Vol. 2
Papers
An enterprise crisis predicting system based on outlier data miningFull-text access may be available. Sign in or learn about subscription options.pp. 1035-1038 Vol. 2
Papers
An intelligent face recognition method based on artificial neural network and principle componentFull-text access may be available. Sign in or learn about subscription options.pp. 1039-1041 Vol. 2
Papers
Applications of clustering data mining in customer analysis in department storeFull-text access may be available. Sign in or learn about subscription options.pp. 1042-1046 Vol. 2
Papers
Applications of data warehousing and data mining in the retail industryFull-text access may be available. Sign in or learn about subscription options.pp. 1047-1050 Vol. 2
Papers
Applying sensitivity analysis to missing data in classifiersFull-text access may be available. Sign in or learn about subscription options.pp. 1051-1056 Vol. 2
Papers
Case-based reasoning and rule-based reasoning for railway incidents preventionFull-text access may be available. Sign in or learn about subscription options.pp. 1057-1060 Vol. 2
Papers
Data mining application in prosecution committee for unsupervised learningFull-text access may be available. Sign in or learn about subscription options.pp. 1061-1064 Vol. 2
Papers
Data mining techniques of common information platform based on ATMSFull-text access may be available. Sign in or learn about subscription options.pp. 1065-1070 Vol. 2
Papers
Detecting the content related parts of Web pagesFull-text access may be available. Sign in or learn about subscription options.pp. 1071-1074 Vol. 2
Papers
Efficient storing well-formed XML documents using RDBMSFull-text access may be available. Sign in or learn about subscription options.pp. 1075-1080 Vol. 2
Papers
Financial service innovation based on grid computingFull-text access may be available. Sign in or learn about subscription options.pp. 1081-1084 Vol. 2
Papers
Legal risks and solutions to e-marketers' data miningFull-text access may be available. Sign in or learn about subscription options.pp. 1085-1089 Vol. 2
Papers
Managing hot XML data in memory for high performanceFull-text access may be available. Sign in or learn about subscription options.pp. 1090-1094 Vol. 2
Papers
Optimized allocation of resources based on neural dynamic systemFull-text access may be available. Sign in or learn about subscription options.pp. 1095-1098 Vol. 2
Papers
R-C4.5 decision tree model and its applications to health care datasetFull-text access may be available. Sign in or learn about subscription options.pp. 1099-1103 Vol. 2
Papers
Recognition for soft information based on the theory of soft setsFull-text access may be available. Sign in or learn about subscription options.pp. 1104-1106 Vol. 2
Papers
Research on methodology of document classification based on statistical learning theoryFull-text access may be available. Sign in or learn about subscription options.pp. 1107-1109 Vol. 2
Papers
Revision of the observed data based on neural networksFull-text access may be available. Sign in or learn about subscription options.pp. 1110-1112 Vol. 2
Papers
The research of applying domain ontology to case-based reasoning systemFull-text access may be available. Sign in or learn about subscription options.pp. 1113-1117 Vol. 2
Papers
The role of XML in service level agreements managementFull-text access may be available. Sign in or learn about subscription options.pp. 1118-1120 Vol. 2
Papers
Web mining: a key enabler in e-businessFull-text access may be available. Sign in or learn about subscription options.pp. 1121-1125 Vol. 2
Papers
A decision support model based on GIS for vehicle routingFull-text access may be available. Sign in or learn about subscription options.pp. 1126-1129 Vol. 2
Papers
A rough neural expert system for medical diagnosisFull-text access may be available. Sign in or learn about subscription options.pp. 1130-1135 Vol. 2
Papers
A user-friendly adaptive dynamic financial analysis systemFull-text access may be available. Sign in or learn about subscription options.pp. 1136-1140 Vol. 2
Papers
An agent-based negotiation support system with fuzzy multi-objective decision-making methodFull-text access may be available. Sign in or learn about subscription options.pp. 1141-1144 Vol. 2
Papers
Analysis of moment invariant's stability to gray-level adjustmentFull-text access may be available. Sign in or learn about subscription options.pp. 1145-1148 Vol. 2
Papers
Conduction rules of conduction transformation in decision-making of service managementFull-text access may be available. Sign in or learn about subscription options.pp. 1149-1152 Vol. 2
Papers
Decision support systems based on knowledge managementFull-text access may be available. Sign in or learn about subscription options.pp. 1153-1156 Vol. 2
Papers
GIS and spatial information in business decision support: the case of automobile service network planningFull-text access may be available. Sign in or learn about subscription options.pp. 1157-1161 Vol. 2
Papers
Multi-attribute decision-making model for virtual enterprise partners selection under uncertain information conditionFull-text access may be available. Sign in or learn about subscription options.pp. 1162-1165 Vol. 2
Papers
Multi-target optimized decision in the IT surveillanceFull-text access may be available. Sign in or learn about subscription options.pp. 1166-1171 Vol. 2
Papers
On the multi-objective stochastic optimal route of a mobile agent in multi-provider network QoS with uncertain parametersFull-text access may be available. Sign in or learn about subscription options.pp. 1172-1176 Vol. 2
Papers
Quantum computation patent mapping - a strategic view for the information technique of tomorrowFull-text access may be available. Sign in or learn about subscription options.pp. 1177-1181 Vol. 2
Papers
Research and implementation of remote monitoring system based on real-time uClinuxFull-text access may be available. Sign in or learn about subscription options.pp. 1182-1187 Vol. 2
Papers
Research on intranet service system & application of SCM software of enterpriseFull-text access may be available. Sign in or learn about subscription options.pp. 1188-1193 Vol. 2
Papers
Security policy selection method of pipeline transportation based on analytic hierarchy processFull-text access may be available. Sign in or learn about subscription options.pp. 1194-1198 Vol. 2
Papers
Service-oriented software engineering (SOSE) frameworkFull-text access may be available. Sign in or learn about subscription options.pp. 1199-1204 Vol. 2
Papers
Study on a roadmapping system as a decision making process for supporting scientific researchFull-text access may be available. Sign in or learn about subscription options.pp. 1205-1209 Vol. 2
Papers
Web-based portfolio management with multi-criteria decision and bundle tradingFull-text access may be available. Sign in or learn about subscription options.pp. 1210-1216 Vol. 2
Papers
A research of deposit insurance mechanism overcoming moral hazardFull-text access may be available. Sign in or learn about subscription options.pp. 1217-1221 Vol. 2
Papers
An analysis of daily volatility in the Japanese foreign exchange marketFull-text access may be available. Sign in or learn about subscription options.pp. 1222-1227 Vol. 2
Papers
An empirical analysis of the relationship between the market response of the SEOs and the growth opportunityFull-text access may be available. Sign in or learn about subscription options.pp. 1228-1232 Vol. 2
Papers
Calculation method for portfolio's value at risk based on principal factor analysisFull-text access may be available. Sign in or learn about subscription options.pp. 1233-1236 Vol. 2
Papers
Constructing quality-satisfaction-loyalty chain system: an empirical study of insurance industry in ChinaFull-text access may be available. Sign in or learn about subscription options.pp. 1237-1241 Vol. 2
Papers
Credit system of the food safety in retail trade based on information technologyFull-text access may be available. Sign in or learn about subscription options.pp. 1242-1247 Vol. 2
Papers
Developed nations financial support and risk investment of technology innovation: institutional frame and comparisonFull-text access may be available. Sign in or learn about subscription options.pp. 1248-1253 Vol. 2
Notice of Violation of IEEE Publication Principles: Electricity consumption and economic growth in ChinaFull-text access may be available. Sign in or learn about subscription options.pp. 1331-1334 Vol. 2
Papers
POS access pricing problem in China - analyze from network economy viewFull-text access may be available. Sign in or learn about subscription options.pp. 1254-1258 Vol. 2
Showing 100 out of 156