The SCEAS System
Navigation Menu

Conferences in DBLP

e-Technology, e-Commerce and e-Service (eee)
2004 (conf/eee/2004)

  1. Chen-Liang Fang, De-Ron Liang, Chyouhwa Chen, PuSan Lin
    A Redundant Nested Invocation Suppression Mechanism for Active Replication Fault-Tolerant Web Service. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:9-16 [Conf]
  2. Tao Yu, Kwei-Jay Lin
    The Design of QoS Broker Algorithms for QoS-Capable Web Services. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:17-24 [Conf]
  3. Weiping He
    Recovery in Web Service Applications. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:25-28 [Conf]
  4. Zakaria Maamar, Soraya Kouadri Mostéfaoui, Emad Bataineh
    A Conceptual Analysis of the Role of Conversations in Web Services Composition. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:29-32 [Conf]
  5. Te-Kai Liu, Santhosh Kumaran, Jen-Yao Chung
    Performance Engineering of a Java-Based eCommerce System. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:33-37 [Conf]
  6. Fethi A. Rabhi, Feras T. Dabous, Hairong Yu, Boualem Benatallah, Yun Ki Lee
    A Case Study in Developing Web Services for Capital Markets. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:38-41 [Conf]
  7. Roy Grønmo, David Skogan, Ida Solheim, Jon Oldevik
    Model-Driven Web Services Development. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:42-45 [Conf]
  8. Mahesha Kapurubandara, Shiromi Arunatileka, Athula Ginige
    Application of eBusiness Strategies for SMEs in Developing Countries. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:49-59 [Conf]
  9. Michael C. Jaeger, Moussa Lo, Robert J. Pefferly
    Simulation Models and Their Metainfo-Management Using RDF-Based Paradigms. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:60-67 [Conf]
  10. Sakuna Vanichvisuttikul, Chamnong Jungthirapanich
    The Assessment of E-Commerce Awareness on Highly Valuable Traditional Products in Thailand. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:68-75 [Conf]
  11. Hsiu-Mei Huang, Shu-Sheng Liaw
    Web Surveys for Electronic Commerce: A Review of the Literature. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:76-79 [Conf]
  12. Cai-Nicolas Ziegler, Georg Lausen
    Spreading Activation Models for Trust Propagation. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:83-97 [Conf]
  13. Tzone I. Wang, Kun Hua Tsai, Ming-Che Lee
    A Two-Layer Cryptographic Scheme for an e-Service Framework Based on Mobile Agents. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:98-105 [Conf]
  14. Tzer-Shyong Chen, Kuo-Hsuan Huang, Yu-Fang Chung
    A Division-of-Labor-Signature (t, n) Threshold-Authenticated Encryption Scheme with Message Linkage Based on the Elliptic Curve Cryptosystem. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:106-112 [Conf]
  15. Wei-Chi Ku, Chun-Ming Ho
    An e-Voting Scheme against Bribe and Coercion. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:113-116 [Conf]
  16. Jeng-Chung V. Chen, Yang Il Park
    Trust and Privacy in Electronic Commerce. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:117-120 [Conf]
  17. Melody Y. Kiang, Jenny Gilsdorf, Robert T. H. Chi
    Understand User Preference of Online Shoppers. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:123-130 [Conf]
  18. Jen-Hsiang Chen, Kuo-Ming Chao, Nick Godwin, Von-Wun Soo
    A Multiple-Stage Cooperative Negotiation. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:131-138 [Conf]
  19. Zongkai Yang, Weimin Lang, Yunmeng Tan
    A New Fair Micropayment System Based on Hash Chain. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:139-145 [Conf]
  20. Opher Etzion, Amit Fisher, Segev Wasserkrug
    e-CLV: A Modeling Approach for Customer Lifetime Evaluation in e-Commerce Domains, with an Application and Case Study for Online Auctions. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:149-156 [Conf]
  21. Trung T. Pham
    Quantitative Approach to Using E-Commerce Data to Monitor and Control the Performance of a Supply Chain. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:157-162 [Conf]
  22. Zonghua Zhang, Hong Shen
    Suppressing False Alarms of Intrusion Detection Using Improved Text Categorization Method. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:163-166 [Conf]
  23. Chengzhi Peng
    e-Service as a New Paradigm for Developing Interactive Multidimensional City Modeling. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:169-172 [Conf]
  24. Tung Wan Cheng, Wan Ling Wang, Shung Kwan Chan
    Three-Tier Multi-Agent Architecture for Asset Management Consultant . [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:173-176 [Conf]
  25. Chuang-Cheng Chiu, Chieh-Yuan Tsai
    A Web Services-Based Collaborative Scheme for Credit Card Fraud Detection. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:177-181 [Conf]
  26. Jeng-Jong Lin
    Development of a Remote Quick Design System for Woven Fabrics. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:182-189 [Conf]
  27. Deepak Subramoniam, Jyothi John
    Algorithms for Community Subject Identification: Experiments and Test Results. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:195-201 [Conf]
  28. Chiu-Che Tseng
    Portfolio Management Using Hybrid Recommendation System. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:202-206 [Conf]
  29. Show-Jane Yen, Yue-Shi Lee, Chung-Wen Cho
    An Efficient Approach for the Maintenance of Path Traversal Patterns. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:207-214 [Conf]
  30. Hua-Fu Li, Suh-Yin Lee
    Single-Pass Algorithms for Mining Frequency Change Patterns with Limited Space in Evolving Append-Only and Dynamic Transaction Data Streams. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:215-222 [Conf]
  31. Timothy C. H. Kwong, Matthew K. O. Lee
    Understanding the Behavioral Intention to Digital Piracy in Virtual Communities - A Propose Model. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:223-226 [Conf]
  32. Yue-Shi Lee, Show-Jane Yen, Ghi-Hua Tu, Min-Chi Hsieh
    Mining Traveling and Purchasing Behaviors of Customers in Electronic Commerce Environment. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:227-231 [Conf]
  33. Kun-Lung Wu, Shyh-Kwei Chen, Philip S. Yu
    Indexing Continual Range Queries for Location-Aware Mobile Services. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:233-240 [Conf]
  34. Ramon Martí, Jaime Delgado, Xavier Perramon
    Security Specification and Implementation for Mobile e-Health Services. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:241-248 [Conf]
  35. Shu-Chin Wang, Kuo-Qin Yan, C. H. Wei
    Mobile Target Advertising by Combining Self-Organization Map and Decision Tree. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:249-252 [Conf]
  36. Robert Steele, Yuri Ventsov, Tharam S. Dillon
    XML Schema-Based Discovery and Invocation of Mobile Services. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:253-258 [Conf]
  37. Hung-Wen Tung, Von-Wun Soo
    A Personalized Restaurant Recommender Agent for Mobile E-Service. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:259-262 [Conf]
  38. Wei-Po Lee, Ming-Hsiang Su
    Personalizing Information Services on Wired and Wireless Networks. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:263-266 [Conf]
  39. Chun-Te Chen, Te-Chung Lu
    A Mobile Ticket Validation by VSS Tech with Time-Stamp. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:267-270 [Conf]
  40. Agustinus Borgy Waluyo, Raymond Hsieh, David Taniar, J. Wenny Rahayu, Bala Srinivasan
    Utilising Push and Pull Mechanism in Wireless E-Health Environment. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:271-274 [Conf]
  41. Tsutomu Morigaki, Kanta Matsuura, Osamu Sudo
    An Analysis of Detailed Electronic Time-Stamping Using Digital TV. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:277-284 [Conf]
  42. Juan D. Velásquez, Richard Weber, Hiroshi Yasuda, Terumasa Aoki
    A Methodology to Find Web Site Keywords. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:285-292 [Conf]
  43. Tzong-Song Wang, Larry K. Bright
    The Challenge of Exclusions in Pervasive Cyberspace. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:293-298 [Conf]
  44. Po-Hsiang Wang, Jung-Ying Wang, Hahn-Ming Lee
    QueryFind: Search Ranking Based on Users? Feedback and Expert?s Agreement. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:299-304 [Conf]
  45. Chih-Ming Chen, Ling-Jiun Duh, Chao-Yu Liu
    A Personalized Courseware Recommendation System Based on Fuzzy. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:305-308 [Conf]
  46. Faye F. Liu, Jidong Wang, Tharam S. Dillon
    An Object-Oriented Approach on Web Information Representation and Derivation. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:309-314 [Conf]
  47. Libo Chen, Marcello L'Abbate, Ulrich Thiel, Erich J. Neuhold
    Increasing the Customer?s Choice: Query Expansion Based on the Layer-Seeds Method and Its Application in E-Commerce. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:317-324 [Conf]
  48. Bao-Tung Wang, Henning Schulzrinne
    Multifunctional ICMP Messages for e-Commerce. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:325-332 [Conf]
  49. Deok-Gyu Lee, Hyung-Geun Oh, Im-Yeong Lee
    A Study on Contents Distribution Using Electronic Cash System. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:333-340 [Conf]
  50. Byung kwan Lee, Tai-Chi Lee, Seung Hae Yang
    An ASEP (Advanced Secure Electronic Payment) Protocol Design Using 3BC and ECC (F^2) Algorithm. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:341-346 [Conf]
  51. Pascal van Eck, Jaap Gordijn, Roel Wieringa
    Value-Based Design of Collaboration Processes for e-Commerce. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:349-358 [Conf]
  52. Andreas Wombacher, Peter Fankhauser, Bendick Mahleko, Erich J. Neuhold
    Matchmaking for Business Processes Based on Choreographies. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:359-368 [Conf]
  53. Bo-chiuan Su, Alok Gupta, Zhiping D. Walter
    Economic Analysis of Consumer Purchase Intentions in Electronic and Traditional Retail Channels: Competitive and Strategic Implications. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:369-372 [Conf]
  54. Kanta Matsuura
    Robustness of Entrusted Data-Analysis in e-Science Research Collaboration. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:373-378 [Conf]
  55. Matthias Enzmann, Markus Schneider 0002
    A Privacy-Friendly Loyalty System for Electronic Marketplaces. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:385-393 [Conf]
  56. Vishwas Patil, R. K. Shyamasundar
    An Efficient, Secure and Delegable Micro-Payment System. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:394-404 [Conf]
  57. Nenad Stojanovic
    On Using Query Neighbourhood for Better Navigation through a Product Catalog: SMART Approach. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:405-412 [Conf]
  58. Sung-Shun Weng, Mei-Ju Liu
    Personalized Product Recommendation in e-Commerce. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:413-420 [Conf]
  59. Zhuang Yan, Simon Fong, Shi Meilin
    Knowledge Oriented Negotiation for Agent-Based B2B Electronic Commerce. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:421-424 [Conf]
  60. Fengjie Wu, Jie Lu, Guangquan Zhang
    A Decision Support System for Multiple Objective Linear Programming with Fuzzy Parameters. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:425-429 [Conf]
  61. Marc Fetscherin, Sabrina Zaugg
    Music Piracy on Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:431-440 [Conf]
  62. Shu-Tzu Tsai, Chao-Tung Yang
    Decision Tree Construction for Data Mining on Grid Computing. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:441-447 [Conf]
  63. Chao-Tung Yang, Yu-Lun Kuo, Chuan-Lin Lai
    Design and Implementation of a Computational Grid for Bioinformatics. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:448-451 [Conf]
  64. Hsin-Chuan Ho, Chao-Tung Yang, Chi-Chung Chang
    Building an E-Learning Platform by Access Grid and Data Grid Technologies. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:452-455 [Conf]
  65. Liquan Chen
    A Scheme for MAC Isolation to Realize Effective Management in Public Wireless LAN. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:459-464 [Conf]
  66. Eric Jui-Lin Lu, Chin-Wei Chen
    An Enhanced EDCG Replica Allocation Method in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:465-472 [Conf]
  67. Tian-han Gao, Nan Guo, Hong Zhao
    A Self-Adapting Mobile Ipv6 Model Based on MAP. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:473-476 [Conf]
  68. Keqiu Li, Hong Shen
    Optimal Placement of Web Proxies for Tree Networks. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:479-486 [Conf]
  69. Nan Guo, Tian-han Gao, Hong Zhao
    Distributed Plug-and-Play Network Management Model Based on Mobile Agents. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:487-491 [Conf]
  70. Woei-Kae Chen, Kuo-Hua Chung
    A Table Presentation System for Database and Web Applications. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:492-498 [Conf]
  71. Hui Song, Suraj Giri, Fanyuan Ma
    Data Extraction and Annotation for Dynamic Web Pages. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:499-502 [Conf]
  72. Jun Lai, Ben Soh
    Using Element and Document Profile for Information Clustering. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:503-506 [Conf]
  73. William Kwok-Wai Cheung
    e-Transformation Technologies: Case Studies and the Road Ahead - A Value Chain Perspective. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:510-517 [Conf]
  74. Pei-Jeng Kuo, Terumasa Aoki, Hiroshi Yasuda
    MPEG-7 Based Dozen Dimensional Digital Content Architecture for Semantic Image Retrieval Services. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:518-525 [Conf]
  75. Wansong Zhang, Daxin Liu, Jian Li
    An Encoding Scheme for Indexing XML Data. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:526-529 [Conf]
  76. Benjamin Yen
    Structure-Based Analysis of Web Sites. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:530-533 [Conf]
  77. Chi-Chien Pan, Kai-Hsiang Yang, Tzao-Lin Lee
    Secure Online Examination Architecture Based on Distributed Firewall. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:534-537 [Conf]
  78. Sheng-Tun Li, Chu-Hung Lin, Yuan-Chun Chang, Jin-Tan David Yang
    On the Distributed Management of SCORM-Compliant Course Contents. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:538-539 [Conf]
  79. Yuan-Liang Tang, Ching-Ting Chen
    Image Authentication Using Relation Measures of Wavelet Coefficients. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:543-547 [Conf]
  80. António Leong, Simon Fong, Shirley Siu
    Smart Card-Based Irregular Access Patterns Detection System. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:548-555 [Conf]
  81. Jong-Phil Yang, Chul Sur, Hwa-Sik Jang, Kyung Hyune Rhee
    Practical Modification of an Efficient Public-Key Framework. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:556-559 [Conf]
  82. Yong-Bin Zhou, Zhen-Feng Zhang, Si-Han Qing, Juan Liu
    A New CEMBS Based on RSA Signatures and Its Application in Constructing Fair Exchange Protocol. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:560-564 [Conf]
  83. Hung-Min Sun, Bin-Tsan Hsieh, Shin-Mu Tseng
    Cryptanalysis of Aydos et al.'s ECC-Based Wireless Authentication Protocol. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:565-568 [Conf]
  84. Tzer-Shyong Chen, Kuo-Hsuan Huang, Yu-Fang Chung
    Modified Cryptographic Key Assignment Scheme for Overcoming the Incorrectness of the CHW Scheme. [Citation Graph (0, 0)][DBLP]
    EEE, 2004, pp:569-572 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002