{"title":"General Service Pricing Strategies Research Based on Dynamic Stochastic Wealth Model","authors":"Yongming Cai, Wei Chen","doi":"10.1109/ISECS.2008.35","DOIUrl":"https://doi.org/10.1109/ISECS.2008.35","url":null,"abstract":"The authors investigate cobweb type service price fluctuations with adaptive learning, and put forward a dynamic service pricing method based on the dynamic stochastic wealth model (DSWM). In this model, authors treat the service market as an expectation feedback system, where the current market equilibrium price of service determined by aggregated individual service providerpsilas expectations of next periodpsilas yield. After several rounds of price adjustment, optimal pricing strategies can be conducted. In order to describe the fluctuations of price in future, authors also developed a set of market impact functions with the technique of dynamic harmonic regression modification to simulate the market impact.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116566642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integrated Routing Wasp Algorithm and Scheduling Wasp Algorithm for Job Shop Dynamic Scheduling","authors":"Yan Cao, Yanli Yang, Huamin Wang","doi":"10.1109/ISECS.2008.168","DOIUrl":"https://doi.org/10.1109/ISECS.2008.168","url":null,"abstract":"Dynamic scheduling algorithms are gaining more and more special attention for their satisfying robustness when confronted with unexpected events as well as their considerably high performance in scheduling. The wasp colony algorithm is a newly presented dynamic scheduling algorithm, which bases on natural insect society behavior models. Based on the principle of the wasp colony algorithm, two different algorithms, namely the routing wasp algorithm and the scheduling wasp algorithm, are combined to solve the job shop dynamic scheduling problem. The algorithms are modified to better adapt to job shop dynamic scheduling environment. The algorithms are developed based on Eclipse 3.2 and J2SE 6.0. Simulation experiments are accomplished and experimental data are analyzed. The results show that the principle of the algorithms is simple, their computational quantity is small, and they can be applied to multi-batch dynamic scheduling with unpredictable entry time due to their favorable potential.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129508108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementing Multi-party Key Exchange by Linear Combination of Elliptic Curve Points","authors":"Jun Yang, Xianze Yang","doi":"10.1109/ISECS.2008.209","DOIUrl":"https://doi.org/10.1109/ISECS.2008.209","url":null,"abstract":"Efficient authenticated multi-party key agreement is both an open problem and one of the fundamental cryptographic primitives that has to be tackled for deploying secure e-commerce in the real world. In this paper, by taking one third of the order of a generator a basic version of a multi-party key agreement scheme is proposed based on the matrix-based ECC (Elliptic Curve Cryptog-raphy) by Climent et al. The basic security of the proposed scheme is based on the ECDLP (Elliptic Curve Discrete Logarithm Problem) and the DLP defined over a cyclic subgroup generated by a block matrix consisting of two matrices with entries in an optimal extension field and one matrix whose entries are points of an elliptic curve. Analysis indicates that besides several desirable security properties this system can get larger key spaces flexibly without having to increase the underlying elliptic curve and save the computational requirements inherent to the regeneration and revalidation of elliptic curves.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125756807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Customer Satisfaction Evaluation for Mobile Commerce Based on Fuzzy Comprehensive Evaluation","authors":"Jinsong Gao, Jinhui Xu, Zibo Zhou, Zhuojun Li","doi":"10.1109/ISECS.2008.181","DOIUrl":"https://doi.org/10.1109/ISECS.2008.181","url":null,"abstract":"This paper constructs 3-level evaluation model based on ACSI model and confirm the attribute weights by the means of entropy weight method, then compute the overall customer satisfaction index making use of fuzzy comprehensive evaluation method and illustrate the method by an empirical investigation. Results provide policymakers with insights into consumers' mental perception for M-commerce.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131115258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Fuzzy Ontology to Information Retrieval for Electronic Commerce","authors":"Jun Zhai, Lixin Shen, Yiduo Liang, J. Jiang","doi":"10.1109/ISECS.2008.177","DOIUrl":"https://doi.org/10.1109/ISECS.2008.177","url":null,"abstract":"Ontology-based semantic retrieval is a hotspot of current research. In order to achieve fuzzy semantic retrieval, this paper applies a fuzzy ontology framework to information retrieval system in e-commerce. The framework includes three parts: concepts, properties of concepts and values of properties, in which propertypsilas value can be linguistic values of fuzzy concepts. The semantic query expansion is constructed by order relation, equivalence relation, inclusion relation, reversion relation and complement relation between fuzzy concepts defined in linguistic variable ontologies with resource description framework (RDF). The application to retrieve customer, product and supplier information shows that the framework can overcome the localization of other fuzzy ontology models, and this research facilitates the semantic retrieval of information through fuzzy concepts on the semantic Web.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132327813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of Internet-based Long-range Manufacture Quality Monitoring System","authors":"Jitao Fang, Shusong Yu, Xiangqian Ding","doi":"10.1109/ISECS.2008.16","DOIUrl":"https://doi.org/10.1109/ISECS.2008.16","url":null,"abstract":"This paper introduces the constitute, structure and the software model of a set of networked manufacturing quality monitoring system, using JAVA network technique to realize a set of three layer distributed manufacturing process monitoring system which is comprised with remote quality manage center, manufacturing process supervision center and the units of measure and control layer. The design using object-oriented technique based on JAVA can easily transport to different operation systems with high performance of the expansibility. The system is suitable for the production online analysis and judgment in the network environment. It can significantly increase the product quality and economic efficiency of enterprises.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132561721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Multipurpose Watermarking Scheme for Image Authentication and Copyright Protection","authors":"Congxu Zhu, Yuping Hu","doi":"10.1109/ISECS.2008.124","DOIUrl":"https://doi.org/10.1109/ISECS.2008.124","url":null,"abstract":"In this paper, we present a novel multipurpose digital image watermarking scheme based on discrete wavelet transform (DWT) and chaotic map, which can be applied to image authentication and copyright protection. In the proposed scheme, by performing 2-level DWT of the host image, the robust watermarks are embedded in the low frequency sub-band LL2 of the host image, and the semi-fragile watermarks, generated by chaotic map, are embedded in the high frequency sub-bands HL2, LH2 or HH2, and the embedding coefficients are selected randomly by secret key. A improved quantization method (IQM) is utilized to embed robust watermarks. Watermarks can be extracted without the original image. Simulation results demonstrate the effectiveness of our algorithm in terms of robustness and fragility.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114909310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Formalization and Verification of Inter-organizational Workflow Modeling for E-Commerce","authors":"Jinhong Cui, Wangjie Xu","doi":"10.1109/ISECS.2008.164","DOIUrl":"https://doi.org/10.1109/ISECS.2008.164","url":null,"abstract":"Reengineering and integration of inter-organizational workflow seems to be a necessity in order to survive and prosper in todaypsilas e-commerce environment. In order to improve competitive capacity, an enterprise is confronted with workflow formalization and integration. This paper is devoted to formalization and verification of inter-organizational workflow modeling for e-commerce. A framework of inter-organizational process management for e-commerce is proposed. An inter-organizational workflow model for e-commerce based on high-level Petri nets and the formative modelling methods are proposed. This modelling method is used to describe dynamic behaviours of inter-organizational workflows.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115611264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Knowledge and Trust in E-consumers' Online Shopping Behavior","authors":"Jui-Chin Jiang, Chun-An Chen, Chih-Chien Wang","doi":"10.1109/ISECS.2008.117","DOIUrl":"https://doi.org/10.1109/ISECS.2008.117","url":null,"abstract":"Consumer trust is a critical enabler to the success of online retailing and knowledge is one important factor influencing the level of trust. However, there is no consensus on the relationship between knowledge and trust. Some studies argued a negative relationship between knowledge and trust while the others argued positive. This study discussed the relationship between knowledge, trust in online shopping, and the intention to go shopping online. The results revealed that knowledge is positively associated with trust and online shopping activities. In other words, people who know more about online shopping will trust and go shopping more online. Online retailing practice should make the public knowledgeable about online transaction security mechanisms to build userspsila trust in online shopping.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115274948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Zero-Watermark Algorithm with Real-Mean for 2D Engineering Graphic","authors":"Qiaozhuo Du, Fei Peng","doi":"10.1109/ISECS.2008.67","DOIUrl":"https://doi.org/10.1109/ISECS.2008.67","url":null,"abstract":"A zero-watermark algorithm for 2D engineering graphic with real-mean is proposed. The graphicpsilas vertexes are used as characteristic parameters, and confusion and compare operations are done to them to obtain the characteristic sequence of the graphic, after that, the characteristic sequence is encrypted by logistic chaotic system. The mapping relationship between the two sequences is constructed to obtain the meaningful zero-watermark. Experiment results show that the algorithm is robust against attacks such as scaling, even scaling, translation, rotation and deletion, even the combination of them. At the same time, without knowing the initial value of the chaotic system, the possibility of extracting the watermark is very low.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129418523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}