default search action
ICEBE 2012: Hangzhou, China
- Ninth IEEE International Conference on e-Business Engineering, ICEBE 2012, Hangzhou, China, September 9-11, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-2601-8
- Chaogang Tang, Shiting Wen, Qing Li, Yan Xiong, An Liu:
Probabilistic Top-k Dominating Composite Service Selection. 1-8 - Jingnan Xu, Xiaolin Zheng, Weifeng Ding:
Personalized Recommendation Based on Reviews and Ratings Alleviating the Sparsity Problem of Collaborative Filtering. 9-16 - Xiao Pan, Lei Wu, Chunhui Piao:
k*NNCA: A Location Privacy Preserving Method for Semi-honest Mobile Users. 17-24 - Chunhui Piao, Shuzhen Wang, Fengtao Yang:
Research on Trust Evaluation Model for Mobile Commerce Based on Structural Equation Modeling. 25-32 - Bing-Jia Shao, Bei-Bei Ning:
The Impact of Online Channel on the Performance of China's Listed Retailers. 33-38 - Yongbing Jiao, Jian Yang, Zhanfeng Zhu:
An Empirical Study of Customer Loyalty to Internet Banking in China. 39-44 - Limin Liu, Xiaoping Fan:
A New Selective Clustering Ensemble Algorithm. 45-49 - Liu-ai Wu, Wen-Qing Fan:
A Parameter Model of Genetic Algorithm Regulating Ant Colony Algorithm. 50-54 - Na Xue, Jin-Xing Hao, Suling Jia, Qiang Wang:
An Interval Fuzzy Ontology Based Peer Review Assignment Method. 55-60 - Dongyao Wu, Jun Wei, Chushu Gao, Wensheng Dou:
A Highly Concurrent Process Virtual Machine Based on Event-driven Process Execution Model. 61-69 - Nikolaus Huber, André van Hoorn, Anne Koziolek, Fabian Brosig, Samuel Kounev:
S/T/A: Meta-Modeling Run-Time Adaptation in Component-Based System Architectures. 70-77 - Pen-Choug Sun, Michael O. Odetayo, Rahat Iqbal, Anne E. James:
A Core Broking Model for E-Markets. 78-85 - Jingzhi Guo, Iok Ham Lam:
Semantic Consistency Maintenance in Editing Cross-Context Common Vocabulary. 86-94 - Hang Song, Jun Na, Bin Zhang, Jun Guo, Zhiliang Zhu:
Building an Optimal Service Environment for ASBS Based on Pareto Dominance. 95-102 - Ping Wang:
Managing Service Reputation with Vague Sets. 103-110 - San-Yih Hwang, Yi-Hsuan Hsieh, Chien-Hsiang Lee:
Data Providing Web Service Selection Using Bayesian Network. 111-116 - Chengying Mao, Jifu Chen, Xinxin Yu:
An Empirical Study on Meta-Heuristic Search-Based Web Service Composition. 117-122 - Wendi Gao, Meina Song, Ke Xu:
Design and Implement of SOA-based Bridge Monitoring System Data Layer. 123-127 - Tina Ho, Rebecca Chen, Jerry Chang:
Do We Have Tools for Developing Green Applications? - IDE Tool with Power Management Computation Plugin. 128-132 - Zongyao Zhu, Cuixiao Fu, Haihua Meng:
A Transformation Process Model for Chinese Enterprises to the Platform-Based B2B e-commerce. 133-138 - Yun Liu:
The Business Model Ontology for Web 2.0 Websites. 139-144 - Alireza Faed, Omar Khadeer Hussain, Mehdi Faed, Zahra Saberi:
Linear Modelling and Optimization to Evaluate Customer Satisfaction and Loyalty. 145-150 - Fangtian Hou, Cheng Yang, Jianbo Liu, Yichun Zhang, Jiayin Tian, Yakun Zhang:
HB-MAP Protocol: A New Secure Bidirectional Light-Wight Authentication Protocol of HB. 151-155 - Qing Li, Jinfu Chen, Yongzhao Zhan, Chengying Mao, Huanhuan Wang:
Combinatorial Mutation Approach to Web Service Vulnerability Testing Based on SOAP Message Mutations. 156-162 - Hao Zeng, Dianfu Ma, Zhuqing Li, Yongwang Zhao:
A Policy-Based Architecture for Web Services Security Processing. 163-169 - Saqib Ali, Maitham H. Al Lawati, Syed J. Naqvi:
Unified Threat Management System Approach for Securing SME's Network Infrastructure. 170-176 - Chang-Shing Perng, Rong N. Chang:
Methodology and Tool Design for Building Return on Investment Models for IT Transformations. 177-184 - Zhongjie Wang, Qian Wu, Xiaofei Xu:
Value-Added Analysis of Bi-Lateral e-Business Services. 185-192 - Christoph Fritsch, Günther Pernul:
User-Controlled Dynamic Access Credential Enrichment for Run-time Service Selection. 193-200 - Jing Liu, Chao Liu, Dongliang Jiao, Jiaopeng Chen:
The Research of a Multi-Factor Dynamic Authorization Model. 201-205 - Jörn Eichler:
SecEPM: A Security Engineering Process Model for Electronic Business Processes. 206-213 - Yinsheng Li, Jiao Li, Feng Zhou, Yong Fang, Hao Chen:
CloudExplorer: A User-Centered Cloud Browser for Cloud Services. 214-220 - Lihong Jiang, Boyi Xu, Lu Fang, Hongming Cai:
A Ubiquitous Clinic Data Accessing Method Based on Resource Model. 221-226 - Chuncai Lin, Hailan Gu, Yanpeng He:
An Empirical Study of User Behavioral Intention to Accept of Mobile TV: An Integration of TAM with Entertainment. 227-231 - Weidong Fang, Guoqing Jia, Jingyan Mo:
Studying Applications and Evaluation on the Next Generation Services of Broadband Communication. 232-237 - Ayad Ibrahim, Hai Jin, Ali A. Yassin, Deqing Zou:
Approximate Keyword-based Search over Encrypted Cloud Data. 238-245 - Zia ur Rehman, Omar Khadeer Hussain, Farookh Khadeer Hussain:
Iaas Cloud Selection using MCDM Methods. 246-251 - Yanhua Du, Xiaofei Wang, Lifeng Ai, Xitong Li:
Dynamic Selection of Services under Temporal Constraints in Cloud Computing. 252-259 - Zhaoxing Wang, Qiaoyan Wen, Teng Wang, Hua Zhang:
A Fault Detection Method for Wireless Sensor Networks Based on Credible Sensor Nodes Set. 260-264 - Shin-Jer Yang, Yi-Ru Chen, Yung-Ming Hsieh:
Design Dynamic Data Allocation Scheduler to Improve MapReduce Performance in Heterogeneous Clouds. 265-270 - Rui Liu, Xin Sheng Mao:
Resource Oriented Composite Transactions. 271-278 - Guan Le, Ke Xu, Junde Song:
Gossip-based Hybrid Multi-attribute Overlay for Resource Discovery in Federated Clouds. 279-284 - Trieu C. Chieu, Manas Singh, Chunqiang Tang, Mahesh Viswanathan, Ashu Gupta:
Automation System for Validation of Configuration and Security Compliance in Managed Cloud Services. 285-291 - Jundian Song, Shaohua Zhang, Yanxue Gong, Bingrong Dai:
A QoS Evaluation Model for Test-Bed in the Cloud Computing Environment. 292-295 - Bingqing Shen, Jingzhi Guo, Philip Chen:
A Survey of P2P Virtual World Infrastructure. 296-303 - Dongjiu Li, Hao Li, Qingnian Zhang, Jiali Wang:
Transport Hub-and-spoke Network Optimization Model Construction of Pharmaceuticals Cold-chain Logistics. 304-307 - Yinghua Sun, Zhehui Wu, Guanfeng Liu, Zhenkuan Pan:
Computing Resources Market in Grid and Cloud Based on Contract Management. 308-312 - Ming Li, Liangzhao Zeng:
A Scalable and Elastic Business Event Processing System. 313-320 - Zhiyuan Fang, Li Wei, Wei Chen, Yangjun He:
A RFID-Based Kindergarten Intelligence Security System. 321-326 - Peng Wang, Yang Xiang, Shaohua Zhang:
Cyber-Physical System Components Composition Analysis and Formal Verification Based on Service-Oriented Architecture. 327-332 - Feng Zhou, Yong Fang, Hao Chen:
Personalized Travel Service Discovery and Usage in Cloud Environment. 333-337 - Rick C. S. Chen, Chung-Ting Kao, Hui-Kuang Chung:
Efficient Usage of Network Bandwidth in the Cloud Architecture. 338-343 - Yi Chun Teng, Fu-Ming Huang, Yu-Hsiang Huang, Meng-Chang Chen:
PLASH: An ESB-based Platform for Developing and Deploying Location Aware Services with SOC Concepts. 344-349 - Lei Sun, Hongming Cai, Lihong Jiang:
A Checking Consistency Framework Based on Multi-View Models Towards Business Process Model Repository. 350-355 - Wenping Zhang, Raymond Lau, Xiaohui Tao:
Mining Contextual Knowledge for Context-Aware Recommender Systems. 356-360 - Whisker T. Y. Law, Dickson K. W. Chiu, Haiyang Hu, Yi Zhuang, Hua Hu:
An Advanced Rapid Alert System for Food Safety. 361-366 - Jianhua Zhang, Wenbo Zhang, Heng Wu, Tao Huang:
VMFDF: A Virtualization-based Multi-Level Fault Detection Framework for High Availability Computing. 367-373
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.