2008 International Symposium on Electronic Commerce and Security最新文献

筛选
英文 中文
General Service Pricing Strategies Research Based on Dynamic Stochastic Wealth Model 基于动态随机财富模型的一般服务定价策略研究
2008 International Symposium on Electronic Commerce and Security Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.35
Yongming Cai, Wei Chen
{"title":"General Service Pricing Strategies Research Based on Dynamic Stochastic Wealth Model","authors":"Yongming Cai, Wei Chen","doi":"10.1109/ISECS.2008.35","DOIUrl":"https://doi.org/10.1109/ISECS.2008.35","url":null,"abstract":"The authors investigate cobweb type service price fluctuations with adaptive learning, and put forward a dynamic service pricing method based on the dynamic stochastic wealth model (DSWM). In this model, authors treat the service market as an expectation feedback system, where the current market equilibrium price of service determined by aggregated individual service providerpsilas expectations of next periodpsilas yield. After several rounds of price adjustment, optimal pricing strategies can be conducted. In order to describe the fluctuations of price in future, authors also developed a set of market impact functions with the technique of dynamic harmonic regression modification to simulate the market impact.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116566642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integrated Routing Wasp Algorithm and Scheduling Wasp Algorithm for Job Shop Dynamic Scheduling 作业车间动态调度的综合路由黄蜂算法和调度黄蜂算法
2008 International Symposium on Electronic Commerce and Security Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.168
Yan Cao, Yanli Yang, Huamin Wang
{"title":"Integrated Routing Wasp Algorithm and Scheduling Wasp Algorithm for Job Shop Dynamic Scheduling","authors":"Yan Cao, Yanli Yang, Huamin Wang","doi":"10.1109/ISECS.2008.168","DOIUrl":"https://doi.org/10.1109/ISECS.2008.168","url":null,"abstract":"Dynamic scheduling algorithms are gaining more and more special attention for their satisfying robustness when confronted with unexpected events as well as their considerably high performance in scheduling. The wasp colony algorithm is a newly presented dynamic scheduling algorithm, which bases on natural insect society behavior models. Based on the principle of the wasp colony algorithm, two different algorithms, namely the routing wasp algorithm and the scheduling wasp algorithm, are combined to solve the job shop dynamic scheduling problem. The algorithms are modified to better adapt to job shop dynamic scheduling environment. The algorithms are developed based on Eclipse 3.2 and J2SE 6.0. Simulation experiments are accomplished and experimental data are analyzed. The results show that the principle of the algorithms is simple, their computational quantity is small, and they can be applied to multi-batch dynamic scheduling with unpredictable entry time due to their favorable potential.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129508108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Implementing Multi-party Key Exchange by Linear Combination of Elliptic Curve Points 利用椭圆曲线点的线性组合实现多方密钥交换
2008 International Symposium on Electronic Commerce and Security Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.209
Jun Yang, Xianze Yang
{"title":"Implementing Multi-party Key Exchange by Linear Combination of Elliptic Curve Points","authors":"Jun Yang, Xianze Yang","doi":"10.1109/ISECS.2008.209","DOIUrl":"https://doi.org/10.1109/ISECS.2008.209","url":null,"abstract":"Efficient authenticated multi-party key agreement is both an open problem and one of the fundamental cryptographic primitives that has to be tackled for deploying secure e-commerce in the real world. In this paper, by taking one third of the order of a generator a basic version of a multi-party key agreement scheme is proposed based on the matrix-based ECC (Elliptic Curve Cryptog-raphy) by Climent et al. The basic security of the proposed scheme is based on the ECDLP (Elliptic Curve Discrete Logarithm Problem) and the DLP defined over a cyclic subgroup generated by a block matrix consisting of two matrices with entries in an optimal extension field and one matrix whose entries are points of an elliptic curve. Analysis indicates that besides several desirable security properties this system can get larger key spaces flexibly without having to increase the underlying elliptic curve and save the computational requirements inherent to the regeneration and revalidation of elliptic curves.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125756807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Customer Satisfaction Evaluation for Mobile Commerce Based on Fuzzy Comprehensive Evaluation 基于模糊综合评价的移动商务客户满意度评价
2008 International Symposium on Electronic Commerce and Security Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.181
Jinsong Gao, Jinhui Xu, Zibo Zhou, Zhuojun Li
{"title":"Customer Satisfaction Evaluation for Mobile Commerce Based on Fuzzy Comprehensive Evaluation","authors":"Jinsong Gao, Jinhui Xu, Zibo Zhou, Zhuojun Li","doi":"10.1109/ISECS.2008.181","DOIUrl":"https://doi.org/10.1109/ISECS.2008.181","url":null,"abstract":"This paper constructs 3-level evaluation model based on ACSI model and confirm the attribute weights by the means of entropy weight method, then compute the overall customer satisfaction index making use of fuzzy comprehensive evaluation method and illustrate the method by an empirical investigation. Results provide policymakers with insights into consumers' mental perception for M-commerce.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131115258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Application of Fuzzy Ontology to Information Retrieval for Electronic Commerce 模糊本体在电子商务信息检索中的应用
2008 International Symposium on Electronic Commerce and Security Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.177
Jun Zhai, Lixin Shen, Yiduo Liang, J. Jiang
{"title":"Application of Fuzzy Ontology to Information Retrieval for Electronic Commerce","authors":"Jun Zhai, Lixin Shen, Yiduo Liang, J. Jiang","doi":"10.1109/ISECS.2008.177","DOIUrl":"https://doi.org/10.1109/ISECS.2008.177","url":null,"abstract":"Ontology-based semantic retrieval is a hotspot of current research. In order to achieve fuzzy semantic retrieval, this paper applies a fuzzy ontology framework to information retrieval system in e-commerce. The framework includes three parts: concepts, properties of concepts and values of properties, in which propertypsilas value can be linguistic values of fuzzy concepts. The semantic query expansion is constructed by order relation, equivalence relation, inclusion relation, reversion relation and complement relation between fuzzy concepts defined in linguistic variable ontologies with resource description framework (RDF). The application to retrieve customer, product and supplier information shows that the framework can overcome the localization of other fuzzy ontology models, and this research facilitates the semantic retrieval of information through fuzzy concepts on the semantic Web.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132327813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Development of Internet-based Long-range Manufacture Quality Monitoring System 基于internet的远程制造质量监控系统的开发
2008 International Symposium on Electronic Commerce and Security Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.16
Jitao Fang, Shusong Yu, Xiangqian Ding
{"title":"Development of Internet-based Long-range Manufacture Quality Monitoring System","authors":"Jitao Fang, Shusong Yu, Xiangqian Ding","doi":"10.1109/ISECS.2008.16","DOIUrl":"https://doi.org/10.1109/ISECS.2008.16","url":null,"abstract":"This paper introduces the constitute, structure and the software model of a set of networked manufacturing quality monitoring system, using JAVA network technique to realize a set of three layer distributed manufacturing process monitoring system which is comprised with remote quality manage center, manufacturing process supervision center and the units of measure and control layer. The design using object-oriented technique based on JAVA can easily transport to different operation systems with high performance of the expansibility. The system is suitable for the production online analysis and judgment in the network environment. It can significantly increase the product quality and economic efficiency of enterprises.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132561721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Multipurpose Watermarking Scheme for Image Authentication and Copyright Protection 用于图像认证和版权保护的多用途水印方案
2008 International Symposium on Electronic Commerce and Security Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.124
Congxu Zhu, Yuping Hu
{"title":"A Multipurpose Watermarking Scheme for Image Authentication and Copyright Protection","authors":"Congxu Zhu, Yuping Hu","doi":"10.1109/ISECS.2008.124","DOIUrl":"https://doi.org/10.1109/ISECS.2008.124","url":null,"abstract":"In this paper, we present a novel multipurpose digital image watermarking scheme based on discrete wavelet transform (DWT) and chaotic map, which can be applied to image authentication and copyright protection. In the proposed scheme, by performing 2-level DWT of the host image, the robust watermarks are embedded in the low frequency sub-band LL2 of the host image, and the semi-fragile watermarks, generated by chaotic map, are embedded in the high frequency sub-bands HL2, LH2 or HH2, and the embedding coefficients are selected randomly by secret key. A improved quantization method (IQM) is utilized to embed robust watermarks. Watermarks can be extracted without the original image. Simulation results demonstrate the effectiveness of our algorithm in terms of robustness and fragility.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114909310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Formalization and Verification of Inter-organizational Workflow Modeling for E-Commerce 面向电子商务的组织间工作流模型的形式化与验证
2008 International Symposium on Electronic Commerce and Security Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.164
Jinhong Cui, Wangjie Xu
{"title":"Formalization and Verification of Inter-organizational Workflow Modeling for E-Commerce","authors":"Jinhong Cui, Wangjie Xu","doi":"10.1109/ISECS.2008.164","DOIUrl":"https://doi.org/10.1109/ISECS.2008.164","url":null,"abstract":"Reengineering and integration of inter-organizational workflow seems to be a necessity in order to survive and prosper in todaypsilas e-commerce environment. In order to improve competitive capacity, an enterprise is confronted with workflow formalization and integration. This paper is devoted to formalization and verification of inter-organizational workflow modeling for e-commerce. A framework of inter-organizational process management for e-commerce is proposed. An inter-organizational workflow model for e-commerce based on high-level Petri nets and the formative modelling methods are proposed. This modelling method is used to describe dynamic behaviours of inter-organizational workflows.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115611264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Knowledge and Trust in E-consumers' Online Shopping Behavior 知识与信任对电子消费者网上购物行为的影响
2008 International Symposium on Electronic Commerce and Security Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.117
Jui-Chin Jiang, Chun-An Chen, Chih-Chien Wang
{"title":"Knowledge and Trust in E-consumers' Online Shopping Behavior","authors":"Jui-Chin Jiang, Chun-An Chen, Chih-Chien Wang","doi":"10.1109/ISECS.2008.117","DOIUrl":"https://doi.org/10.1109/ISECS.2008.117","url":null,"abstract":"Consumer trust is a critical enabler to the success of online retailing and knowledge is one important factor influencing the level of trust. However, there is no consensus on the relationship between knowledge and trust. Some studies argued a negative relationship between knowledge and trust while the others argued positive. This study discussed the relationship between knowledge, trust in online shopping, and the intention to go shopping online. The results revealed that knowledge is positively associated with trust and online shopping activities. In other words, people who know more about online shopping will trust and go shopping more online. Online retailing practice should make the public knowledgeable about online transaction security mechanisms to build userspsila trust in online shopping.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115274948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
A Zero-Watermark Algorithm with Real-Mean for 2D Engineering Graphic 二维工程图形的实数均值零水印算法
2008 International Symposium on Electronic Commerce and Security Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.67
Qiaozhuo Du, Fei Peng
{"title":"A Zero-Watermark Algorithm with Real-Mean for 2D Engineering Graphic","authors":"Qiaozhuo Du, Fei Peng","doi":"10.1109/ISECS.2008.67","DOIUrl":"https://doi.org/10.1109/ISECS.2008.67","url":null,"abstract":"A zero-watermark algorithm for 2D engineering graphic with real-mean is proposed. The graphicpsilas vertexes are used as characteristic parameters, and confusion and compare operations are done to them to obtain the characteristic sequence of the graphic, after that, the characteristic sequence is encrypted by logistic chaotic system. The mapping relationship between the two sequences is constructed to obtain the meaningful zero-watermark. Experiment results show that the algorithm is robust against attacks such as scaling, even scaling, translation, rotation and deletion, even the combination of them. At the same time, without knowing the initial value of the chaotic system, the possibility of extracting the watermark is very low.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129418523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信