The SCEAS System
Navigation Menu

Conferences in DBLP

Workshop on Advanced Issues of E-Commerce and Web/based Information Systems (WECWIS) (wecwis)
2005 (conf/wecwis/2005)


  1. Organizing Committee. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:- [Conf]

  2. Program Committee. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:- [Conf]

  3. Chairs' Message. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:- [Conf]

  4. Reviewers. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:- [Conf]
  5. Stuart I. Feldman
    The Impact of Services on Electronic Commerce. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:2- [Conf]
  6. Lutz Heuser
    Enterprise Services Architecture and Semantic Web Services. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:3- [Conf]
  7. Ramayya Krishnan
    E-Commerce and Decision Technologies: Research Opportunities and Challenges. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:4- [Conf]
  8. John Riedl
    Recommenders for Commerce, Content, and Community. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:5- [Conf]
  9. August-Wilhelm Scheer
    The Power of Business Processes in E-Commerce. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:6- [Conf]
  10. Sampath Kameshwaran, Lyès Benyoucef, Xiaolan Xie
    Design of Progressive Auctions for Procurement Based on Lagrangian Relaxation. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:9-16 [Conf]
  11. Arne Andersson, Jim Holmstrom, Mattias Willman
    An Auction Mechanism for Polynomial-Time Execution with Combinatorial Constraints. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:17-24 [Conf]
  12. Jie Zhong, Peter R. Wurman
    A Framework for Computing the Outcome of Proxied Combinatorial Auctions. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:25-32 [Conf]
  13. Vidya Narayanan, Nicholas R. Jennings
    An Adaptive Bilateral Negotiation Model for E-Commerce Settings. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:34-41 [Conf]
  14. Rema Ananthanarayanan, Manoj Kumar
    Negotiation Support in Online Markets, with Competition and Co-Operation. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:42-49 [Conf]
  15. Per Carlsson, Arne Andersson
    A Flexible Model for Tree-Structured Multi-commodity Markets. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:50-57 [Conf]
  16. Po-An Chen, Tyng-Ruey Chuang
    Truthful Online Auctions for Pricing Peer-to-Peer Services. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:59-66 [Conf]
  17. Sameer Korrapati, Peter R. Wurman
    An Auction for Scheduling Delivery of Highly Demanded Products. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:67-74 [Conf]
  18. Juong-Sik Lee, Boleslaw K. Szymanski
    A Novel Auction Mechanism for Selling Time-Sensitive E-Services. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:75-82 [Conf]
  19. Dong-Ho Kim, Il Im, Vijayalakshmi Atluri
    A Clickstream-Based Collaborative Filtering Recommendation Model for E-Commerce. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:84-91 [Conf]
  20. Alexander Felfernig
    Koba4MS: Selling Complex Products and Services Using Knowledge-Based Recommender Technologies. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:92-100 [Conf]
  21. Koung-Lung Lin, Jane Yung-jen Hsu, Han-Shen Huang, Chun-Nan Hsu
    A Recommender for Targeted Advertisement of Unsought Products in E-Commerce. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:101-108 [Conf]
  22. Shiow-yang Wu, Kuo-Chang Lin
    Cross Enterprise Business Modeling with AC Diagrams and Workflow Patterns. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:110-117 [Conf]
  23. Martina H. Gerst, Kai Jakobs
    e-Business Standardisation in the Automotive Industry - Two Approaches towards the Integration of SMEs. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:118-125 [Conf]
  24. Amir Ronen, Rina Talisman
    Towards Generic Low Payment Mechanisms for Decentralized Task Allocation: A Learning Based Approach. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:126-133 [Conf]
  25. Andrew Boyer, Bernd Brügge, Daniel P. Siewiorek
    Evaluating E-Commerce Cluster Architectures Using Simulation. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:135-142 [Conf]
  26. Shapiee Abd Rahman, Subhash Bhalla, Tetsuya Hashimoto
    Query-by-Object Interface for Information Requirement Elicitation in M-Commerce. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:143-150 [Conf]
  27. Srijith Krishnan Nair, Bogdan C. Popescu, Chandana Gamage, Bruno Crispo, Andrew S. Tanenbaum
    Enabling DRM-Preserving Digital Content Redistribution. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:151-158 [Conf]
  28. Piero De Sabbata, Nicola Gessa, Guido Cucchiara, Thomas Imolesi, Fabio Vitali
    Supporting eBusiness with a Dictionary Designed in a Vertical Standardisation Perspective. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:160-167 [Conf]
  29. Susanne Robra-Bissantz, Angela Zabel
    Push Concepts to Control Interactions in E-Commerce. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:168-175 [Conf]
  30. Yew-Huey Liu, Jih-Shyr Yih, Florian Pinel
    Collaborative Gift Registry in Multi-channel Retail Commerce. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:176-180 [Conf]
  31. Florian Lang, Constantin Brunn
    Pareto-Efficiency without Giving-In: A Two-Phased Protocol for Multiple-Attribute Negotiations. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:182-189 [Conf]
  32. Yuriy Nevmyvaka, Michael S. Kearns, Amy Papandreou, Katia P. Sycara
    Electronic Trading in Order-Driven Markets: Efficient Execution. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:190-197 [Conf]
  33. Boaz Golany, Oded Shmueli
    Catalog-Based Purchasing: Illustrating a Quantitative Approach to Electronic Commerce. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:198-205 [Conf]
  34. Y. Liu, M. Liang
    A Joint Link and Content Approach to Information Retrieval and Distillation. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:207-214 [Conf]
  35. Thomas Friese, Jörg P. Müller, Matthew Smith, Bernd Freisleben
    A Robust Business Resource Management Framework Based on a Peer-to-Peer Infrastructure. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:215-222 [Conf]
  36. Jianbin Wei, Cheng-Zhong Xu, Xiaobo Zhou
    An Integrated Feedback Control Approach for Proportional Slowdown Differentiation on Internet Servers. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:223-230 [Conf]
  37. Ching Lin, Vijay Varadharajan, Yan Wang, Vineet Pruthi
    Trust Enhanced Security for Mobile Agents. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:231-238 [Conf]
  38. Giovanni Maria Sacco
    The Intelligent e-Store: Easy Interactive Product Selection and Comparison. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:240-248 [Conf]
  39. Thomas Specht, Jens Drawehn, Maik Thränert, Stefan Kühne
    Modeling Cooperative Business Processes and Transformation to a Service Oriented Architecture. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:249-256 [Conf]
  40. Sheng Zhang, Weihong Wang, James Ford, Fillia Makedon, Justin D. Pearlman
    Using Singular Value Decomposition Approximation for Collaborative Filtering. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:257-264 [Conf]
  41. Ulrich Faisst, Oliver Prokein
    An Optimization Model for the Management of Security Risks in Banking Companies. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:266-273 [Conf]
  42. Dimitri do B. DeFigueiredo, Earl T. Barr
    TrustDavis: A Non-Exploitable Online Reputation System. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:274-283 [Conf]
  43. Michal Feldman, John Chuang
    The Evolution of Cooperation under Cheap Pseudonyms. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:284-291 [Conf]
  44. Blerim Rexha
    Increasing User Privacy in Online Transactions with X.509 v3 Certificate Private Extensions and Smartcards. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:293-300 [Conf]
  45. Lutz Lowis, Adolf Hohl
    Enabling Persistent Service Links. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:301-306 [Conf]
  46. Steven Taylor, Paul Andrew Watters
    Trustworthy E-mail Using Secure XML Web Services. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:307-312 [Conf]
  47. Baolin Wu, Mohammed Dewan, Li Li, Yun Yang
    Supply Chain Protocolling. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:314-321 [Conf]
  48. Koichi Hayashi, Reki Murakami
    Unicursal Supply Chain Management for Extending Traceability from Ordering to Distribution and Settlement. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:322-329 [Conf]
  49. Dinesh Garg, Yadati Narahari, Earnest Foster, Devadatta M. Kulkarni, Jeffrey D. Tew
    A Groves Mechanism Approach to Decentralized Design of Supply Chains. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:330-337 [Conf]
  50. Martin Bernhardt, Oliver Hinz
    Creating Value with Interactive Pricing Mechanisms - A Web Service-Oriented Architecture. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:339-346 [Conf]
  51. Denilson Sell, Liliana Cabral, Enrico Motta, John Domingue, Farshad Hakimpour, Roberto Pacheco
    A Semantic Web Based Architecture for Analytical Tools. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:347-354 [Conf]
  52. Liangzhao Zeng, Hui Lei, Jun-Jang Jeng, Jen-Yao Chung, Boualem Benatallah
    Policy-Driven Exception-Management for Composite Web Services. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:355-363 [Conf]
  53. Henner Gimpel, Juho Mäkiö, Christof Weinhardt
    Multi-Attribute Double Auctions in Financial Trading. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:366-369 [Conf]
  54. Werner Streitberger
    Framework for the Negotiation of Electronic Contracts in E-Business on Demand. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:370-373 [Conf]
  55. Hung-Wen Tung, Raymund J. Lin
    Automated Contract Negotiation Using a Mediation Service. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:374-377 [Conf]
  56. Jung-Ching Chen, Nicolas E. Gold, Nikolay Mehandjiev, Paul J. Layzell
    Managing Supply Chains of Software as a Service through Agent Negotiations. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:378-381 [Conf]
  57. Marisa Masvoula, George Kontolemakis, Panagiotis Kanellis, Drakoulis Martakos
    Design and Development of an Anthropocentric Negotiation Model. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:383-386 [Conf]
  58. Sören Preibusch
    Implementing Privacy Negotiation Techniques in E-Commerce. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:387-390 [Conf]
  59. Michael Schwind
    Design of Combinatorial Auctions for Allocation and Procurement Processes. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:391-395 [Conf]
  60. Aida Jertila, Mareike Schoop
    Electronic Contracts in Negotiation Support Systems: Challenges, Design and Implementation. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:396-399 [Conf]
  61. Samia Nefti, Farid Meziane, Mohd Khairudin Kasiran
    A Fuzzy Trust Model for E-Commerce. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:401-404 [Conf]
  62. Sudhir Agarwal, Steffen Lamparter
    SMART - A Semantic Matchmaking Portal for Electronic Markets. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:405-408 [Conf]
  63. Mao Chen, Jakka Sairamesh
    Ranking-Based Business Information Processing: Applications to Business Solutions and e-Commerce Systems. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:409-412 [Conf]
  64. Manos Dramitinos, George D. Stamoulis, Costas Courcoubetis
    An Innovative Decision Support System for Bidding in Simultaneous Ascending Auctions. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:414-417 [Conf]
  65. Dalu Zhang, Liqiang Jing
    Context-Based Integration of Numerical Information. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:418-421 [Conf]
  66. Uddam Chukmol, Rami Rifaieh, Aïcha-Nabila Benharkat
    EXSMAL: EDI/XML Semi-Automatic Schema Matching ALgorithm. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:422-425 [Conf]
  67. Livia Kacsukne Bruckner, Jozsef Cselenyi
    Principles and Algorithms of EMMIL Marketplaces. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:426-429 [Conf]
  68. Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang
    Privacy Enhanced Electronic Cheque System. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:431-434 [Conf]
  69. Sultan Almuhammadi, Clifford Neuman
    Security and Privacy Using One-Round Zero-Knowledge Proofs. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:435-438 [Conf]
  70. Martin Schmucker, Peter Ebinger
    Promotional and Commercial Content Distribution Based on a Legal and Trusted P2P Framework. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:439-442 [Conf]
  71. Kathrin Lehmann, Florian Matthes
    Meta Model Based Integration of Role-Based and Discretionary Access Control Using Path Expressions. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:443-446 [Conf]
  72. Changjie Wang, Dickson K. W. Chiu, Ho-fung Leung
    Anonymity and Security in Public Internet Forums. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:448-451 [Conf]
  73. Shaobin Wang, Fan Hong, Guohua Cui
    Secure Efficient Proxy Blind Signature Schemes Based DLP. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:452-455 [Conf]
  74. Byung kwan Lee, Tai-Chi Lee, Seung Hae Yang
    HESSL (Highly Enhanced Security Socket Layer) Protocol. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:456-460 [Conf]
  75. Michael Weiss, Daniel Amyot
    Design and Evolution of e-Business Models. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:462-466 [Conf]
  76. Wei-Lun Chang, Soe-Tsyr Yuan
    Ambient iCare e-Services for Quality Aging : Framework and Roadmap. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:467-470 [Conf]
  77. João Eduardo Ferreira, Osvaldo Kotaro Takai, Calton Pu
    Integration of Business Processes with Autonomous Information Systems: A Case Study in Government Services. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:471-474 [Conf]
  78. Florian Rosenberg, Schahram Dustdar
    Business Rules Integration in BPEL - A Service-Oriented Approach. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:476-479 [Conf]
  79. Vivying S. Y. Cheng, Patrick C. K. Hung
    Towards an Integrated Privacy Framework for HIPAA-Compliant Web Services. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:480-483 [Conf]
  80. Farshad Hakimpour, Denilson Sell, Liliana Cabral, John Domingue, Enrico Motta
    Semantic Web Service Composition in IRS-III: The Structured Approach. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:484-487 [Conf]
  81. Moritz Strasser
    Influence of Ubiquitous Computing on Organizational Structure. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:489-492 [Conf]
  82. Shuhua Liu
    Enhancing E-Business-Intelligence-Service: A Topic-Guided Text Summarization Framework. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:493-496 [Conf]
  83. Thomas Kwok, Thao Nguyen
    An Automatic Electronic Contract Document Signing System in a Secure Environment. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:497-502 [Conf]
  84. Petar Djekic, Claudia Löbbecke
    Software Piracy Prevention through Digital Rights Management Systems. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:504-507 [Conf]
  85. Ulrich Greveler
    How Pay-TV Becomes E-Commerce. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:508-511 [Conf]
  86. Vural Unlu, Thomas Hess
    The Access-Usage-Control-Matrix: A Heuristic Tool for Implementing a Selected Level of Technical Content Protection. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:512-517 [Conf]
  87. Jaime Delgado, Jose Prados, Eva Rodríguez
    Profiles for Interoperability between MPEG-21 REL and OMA DRM. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:518-521 [Conf]
  88. Stephen J. H. Yang, Norman W. Y. Shao, Addison Y. S. Sue, Jen-Yao Chung
    Pervasive Content Access for Mobile Commerce. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:523-526 [Conf]
  89. Theodore K. Apostolopoulos, Ilias S. Kapetanakis, George C. Oikonomou
    An Architecture for the Management of Smart Cards by Mobile Devices Using Java Technologies. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:527-530 [Conf]
  90. Katrin Gaßner, Guy Vollmer, Mirko Prehn, Martin Fiedler, Sebastian Ssmoller
    Smart Food: Mobile Guidance for Food-Allergic People. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:531-534 [Conf]
  91. Yuanchu Hwang, Soe-Tsyr Yuan
    Ambient e-Service Embracing Model. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:535-538 [Conf]
  92. Odorico von Susani, Philippe Dugerdil
    Contract-Based Cross-Organizational Automated Processes. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:540-543 [Conf]
  93. Martin Bierbaumer, Johann Eder, Horst Pichler
    Calculation of Delay Times for Workflows with Fixed-Date Constraints. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:544-547 [Conf]
  94. Yehia Thabet Kotb, Essameddin Badreddin
    Synchronization among Activities in a Workflow Using Extended Workflow Petri Nets. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:548-551 [Conf]
  95. Juho Tikkala, Paavo Kotinurmi, Timo Soininen
    Implementing a RosettaNet Business-to-Business Integration Platform Using J2EE and Web Services. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:553-558 [Conf]
  96. Ulf T. Mattsson
    A Practical Implementation of Transparent Encryption and Separation of Duties in Enterprise Databases: Protection against External and Internal Attacks on Databases. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:559-565 [Conf]
  97. Yutao Guo, Jörg P. Müller
    A Personalized Product Recommendation Algorithm Based on Preference and Intention Learning. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:566-569 [Conf]
  98. Beat Liver, Jeannette Braun, Beatrix Rentsch, Peter Roth
    Developing Flexible Service Portals. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:570-573 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002