2015 IEEE 12th International Conference on e-Business Engineering最新文献

筛选
英文 中文
An Identity Management Framework for Internet of Things 物联网身份管理框架
2015 IEEE 12th International Conference on e-Business Engineering Pub Date : 2015-10-23 DOI: 10.1109/ICEBE.2015.67
Ju Chen, Yi Liu, Y. Chai
{"title":"An Identity Management Framework for Internet of Things","authors":"Ju Chen, Yi Liu, Y. Chai","doi":"10.1109/ICEBE.2015.67","DOIUrl":"https://doi.org/10.1109/ICEBE.2015.67","url":null,"abstract":"The Internet of Things (IoT) has been developing rapidly in the past few years. In IoT, an enormous number of smart devices are connected to the network, where communication and interaction occurs extensively among end users, smart devices and Internet services. Due to the great diversity of devices, broader scope of interactions and other characteristics of IoT, current IdM model for Internet needs to be extended and improved. The objective of this article is to analyze the main features of IoT and key issues of the IdM for IoT, and then present an IdM framework for IoT, which consists of three parts: the standard information model, user-centric architecture and multi-channel authentication.","PeriodicalId":153535,"journal":{"name":"2015 IEEE 12th International Conference on e-Business Engineering","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115078265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
User Interface Design as a Catalyst for Organisation Change 用户界面设计是组织变革的催化剂
2015 IEEE 12th International Conference on e-Business Engineering Pub Date : 2015-10-23 DOI: 10.1109/ICEBE.2015.39
Mark Anderson, Max Gilbert
{"title":"User Interface Design as a Catalyst for Organisation Change","authors":"Mark Anderson, Max Gilbert","doi":"10.1109/ICEBE.2015.39","DOIUrl":"https://doi.org/10.1109/ICEBE.2015.39","url":null,"abstract":"This paper presents a case study that explores the impact of a re-engineering project on a Small to Medium Enterprise in the United Kingdom as a means of delivering improved employee performance. In this paper, the link between the actions undertaken my teams of co-workers and the relationship with the environment provided by IT systems is considered. As an organization evolves over an extended period of time, both the IT systems and also the working practices employed to complete the day to day tasks essential to meet the needs of an organisation's customers, particularly in the service sector, rapidly become unfit for purpose. This soon becomes an issue both in meeting the needs of customers and also in meeting regulatory requirements. The case study considered in this paper reviews the requisite practices adopted by a service provider in the wet stock management industry, and the positive impact that the company realized through the re-engineering of both IT systems and business workflows. The central driver for the changes implemented was a need identified in the business to implement improved visualization of data relating to working practices in the organization and its clients. Through a regular review process, issues were identified in a key area of the business that impacted upon the time taken to complete essential tasks. The underlying reasons for this inefficiency were analysed and, through the Agile software engineering methodology, a solution was designed to resolve these issues.","PeriodicalId":153535,"journal":{"name":"2015 IEEE 12th International Conference on e-Business Engineering","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129272871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Dynamic Taint Approach for Malware Threat 利用动态染色方法检测恶意软件威胁
2015 IEEE 12th International Conference on e-Business Engineering Pub Date : 2015-10-23 DOI: 10.1109/ICEBE.2015.75
Ping Wang, Wen-Hui Lin, Wun Jie Chao, K. Chao, Chi-Chun Lo
{"title":"Using Dynamic Taint Approach for Malware Threat","authors":"Ping Wang, Wen-Hui Lin, Wun Jie Chao, K. Chao, Chi-Chun Lo","doi":"10.1109/ICEBE.2015.75","DOIUrl":"https://doi.org/10.1109/ICEBE.2015.75","url":null,"abstract":"Most existing approaches focus on examining the values are dangerous for information flow within inter-suspicious modules of cloud applications (apps) in a host by using malware threat analysis, rather than the risk posed by suspicious apps were connected to the cloud computing server. Accordingly, this paper proposes a taint propagation analysis model incorporating a weighted spanning tree analysis scheme to track data with taint marking using several taint checking tools. In the proposed model, Android programs perform dynamic taint propagation to analyse the spread of and risks posed by suspicious apps were connected to the cloud computing server. In determining the risk of taint propagation, risk and defence capability are used for each taint path for assisting a defender in recognising the attack results against network threats caused by malware infection and estimate the losses of associated taint sources. Finally, a case of threat analysis of a typical cyber security attack is presented to demonstrate the proposed approach. Our approach verified the details of an attack sequence for malware infection by incorporating a finite state machine (FSM) to appropriately reflect the real situations at various configuration settings and safeguard deployment. The experimental results proved that the threat analysis model allows a defender to convert the spread of taint propagation to loss and practically estimate the risk of a specific threat by using behavioural analysis with real malware infection.","PeriodicalId":153535,"journal":{"name":"2015 IEEE 12th International Conference on e-Business Engineering","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127229846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Qualitative Analysis of Cross-Border E-Commerce Based on Transaction Costs Theory 基于交易成本理论的跨境电子商务定性分析
2015 IEEE 12th International Conference on e-Business Engineering Pub Date : 2015-10-23 DOI: 10.1109/ICEBE.2015.36
Li Wang, Y. Chai, Yi Liu, Yang Xu
{"title":"Qualitative Analysis of Cross-Border E-Commerce Based on Transaction Costs Theory","authors":"Li Wang, Y. Chai, Yi Liu, Yang Xu","doi":"10.1109/ICEBE.2015.36","DOIUrl":"https://doi.org/10.1109/ICEBE.2015.36","url":null,"abstract":"Cross-border e-commerce is a newly arising and burgeoning model of cross-border trade. This paper qualitatively analyzes the reasons of cross-border e-commerce's emerging based on transaction costs theory. First, we introduce cross-border e-commerce and describe the supply chains of B2C and B2B2C cross-border e-commerce models. Then we give an overview of the development of transaction costs theory and analyze the composition of transaction costs from four different perspectives. Finally, we compare the transaction costs of three main cross-border e-commerce models to traditional cross-border trade based on the work above and draw a conclusion that the decrease of transaction costs is a fundamental cause of its development.","PeriodicalId":153535,"journal":{"name":"2015 IEEE 12th International Conference on e-Business Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130401865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Application Based on PSO of Hopfield Neural Network Algorithm in Dynamic VRPSPD 基于PSO的Hopfield神经网络算法在动态VRPSPD中的应用
2015 IEEE 12th International Conference on e-Business Engineering Pub Date : 2015-10-23 DOI: 10.1109/ICEBE.2015.27
Lan Liu, Xia Wang
{"title":"Application Based on PSO of Hopfield Neural Network Algorithm in Dynamic VRPSPD","authors":"Lan Liu, Xia Wang","doi":"10.1109/ICEBE.2015.27","DOIUrl":"https://doi.org/10.1109/ICEBE.2015.27","url":null,"abstract":"There are so many uncertainties in VRP problem. DVRP has become a hotspot in this research area all over the world. Then, the technical supports are provided to solve DVRP with the development of Data Warehouse and Data Mining. This paper sets up a Data Mining Model aiming at Dynamic VRPSPD with the demands of both pick-up and delivery services, showing a successful solution to a given case solved by heuristic algorithm.","PeriodicalId":153535,"journal":{"name":"2015 IEEE 12th International Conference on e-Business Engineering","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133334149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Extending the Multiple Domain Matrix by Using Business Process Model and Notation for Business Process Analysis 用业务流程模型和符号扩展多域矩阵用于业务流程分析
2015 IEEE 12th International Conference on e-Business Engineering Pub Date : 2015-10-23 DOI: 10.1109/ICEBE.2015.60
Wen-Tin Lee, Shang-Pin Ma, Shin-Jie Lee, Po-Jen Law, Ting-Shao Chang
{"title":"Extending the Multiple Domain Matrix by Using Business Process Model and Notation for Business Process Analysis","authors":"Wen-Tin Lee, Shang-Pin Ma, Shin-Jie Lee, Po-Jen Law, Ting-Shao Chang","doi":"10.1109/ICEBE.2015.60","DOIUrl":"https://doi.org/10.1109/ICEBE.2015.60","url":null,"abstract":"Effective business process management can reduce development cost, improve work efficiency, and reduce system errors. This paper defines multiple-domain matrix (MDM) extensions called the business process model and notation-MDM (BPMN-MDM) to analyze structures of and relations among processes modeled in the BPMN. The extensions were verified using workflow patterns, which are basic process elements to model processes and describe behaviors of business process executions. Most business processes can be transformed and described in the MDM by using activity and organization design structure matrices, which verify the effectiveness of the BPMN-MDM. A standard business process example was used and analyzed using the BPMN-MDM for illustration and validation purposes. By applying an organizational-activity MDM partitioning algorithm, coupled activities of each organizational member and coupled relations among members provide process structure information in a matrix perspective, which can serve as a basis to devise new methods and algorithms for process analysis and optimization.","PeriodicalId":153535,"journal":{"name":"2015 IEEE 12th International Conference on e-Business Engineering","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133081394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards Solving the Cold Start Transition Problem in Dynamic Recommender Systems 动态推荐系统中冷启动过渡问题的解决
2015 IEEE 12th International Conference on e-Business Engineering Pub Date : 2015-10-23 DOI: 10.1109/ICEBE.2015.25
Cheng Luo, Xiongcai Cai, N. Chowdhury
{"title":"Towards Solving the Cold Start Transition Problem in Dynamic Recommender Systems","authors":"Cheng Luo, Xiongcai Cai, N. Chowdhury","doi":"10.1109/ICEBE.2015.25","DOIUrl":"https://doi.org/10.1109/ICEBE.2015.25","url":null,"abstract":"The ability to model the tendency of both user preferences and product attractiveness is vital to the success of recommender systems, which is not covered well in the literature. It is challenging to learn a personalized tendency for recommender systems since users often leave feedback on an item only once and on only one period, i.e. The cold start transition problem. To tackle such a problem, we develop a novel probabilistic personalized and item-wise temporal model without prior assumptions on the structure of the dynamics, which solves the cold start transition problem by collaborative tendencies. The proposed method is evaluated on two benchmark datasets for recommender systems. The experimental results demonstrate that our proposed models significantly outperform a variety of existing methods for the top-k recommendation task.","PeriodicalId":153535,"journal":{"name":"2015 IEEE 12th International Conference on e-Business Engineering","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130678128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Ant Colony Clustering Algorithm Based on LF Algorithm 一种基于LF算法的改进蚁群聚类算法
2015 IEEE 12th International Conference on e-Business Engineering Pub Date : 2015-10-23 DOI: 10.1109/ICEBE.2015.40
Hao Jiang, Guilin Zhang, Jie Cai
{"title":"An Improved Ant Colony Clustering Algorithm Based on LF Algorithm","authors":"Hao Jiang, Guilin Zhang, Jie Cai","doi":"10.1109/ICEBE.2015.40","DOIUrl":"https://doi.org/10.1109/ICEBE.2015.40","url":null,"abstract":"Aiming at the deficiencies of ant colony clustering algorithms in distance measure, convergence rate, similarity clustering, and other aspects, WALF algorithm is presented as an improvement to the LF algorithm. Using weighted hybrid distance as distance measure, and introducing the adaptive mechanism during the process of clustering, ant colonies can adjust the radius of neighborhoods dynamically and merge similar clusters in the process, meeting the clustering requirements while improving the convergence speed. Finally WALF algorithm has been shown through experiments to be better than LF algorithm both in clustering results and efficiency.","PeriodicalId":153535,"journal":{"name":"2015 IEEE 12th International Conference on e-Business Engineering","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114822008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Method of E-Commerce Trading Process Construction Based on PaaS Platform 基于PaaS平台的电子商务交易流程构建方法
2015 IEEE 12th International Conference on e-Business Engineering Pub Date : 2015-10-23 DOI: 10.1109/ICEBE.2015.45
Zongshui Xiao, Wenbin Zhang, Qingzhong Li, Lei Liu, Li-zhen Cui
{"title":"A Method of E-Commerce Trading Process Construction Based on PaaS Platform","authors":"Zongshui Xiao, Wenbin Zhang, Qingzhong Li, Lei Liu, Li-zhen Cui","doi":"10.1109/ICEBE.2015.45","DOIUrl":"https://doi.org/10.1109/ICEBE.2015.45","url":null,"abstract":"E-commerce applications is a typical scale collaborative application, which includes many complex trading processes and small applications, such as portals of buyers and sellers, product management, online payment and billing, logistics system, and so on. But it is a challenge to develop such large-scale collaborative application using traditional method starting from scratch, since many application collaboration technologies should be solved, such as application collaboration relationship management and customization, collaboration application execution scheduling, and so on. Cloud and PaaS (Platform as a Service) service model provide a new opportunity for this problem solution. So, a method of trading process construction based on PaaS (Platform as a Service) platform supporting applications collaboration is proposed. Both ISV and ecommerce operator can construct collaborative applications easily. This method contains two aspects: one is the application collaboration semantic meta-model, the other is the method of trading process construction. The application collaboration semantic meta-model is used to be a container in e-commerce PaaS to specify each kind of E-commerce application attributes and relationships between one application and the others. Based on the application collaboration semantic meta-model, PaaS platform can automatically construct a whole customized e-commerce collaboration application according to e-commerce operators' requirements. This method is based on HTN (Hierarchical Task Network) planning theory. In the end, through cases analysis, the proposed PaaS platform and method is proved to construct a variety of collaboration applications easily based on the application collaboration semantic meta-model.","PeriodicalId":153535,"journal":{"name":"2015 IEEE 12th International Conference on e-Business Engineering","volume":"285 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121065633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Discovering the Causal Network of Terms from the Text Corpus 从文本语料库中发现词的因果网络
2015 IEEE 12th International Conference on e-Business Engineering Pub Date : 2015-10-23 DOI: 10.1109/ICEBE.2015.11
Yue Wang
{"title":"Discovering the Causal Network of Terms from the Text Corpus","authors":"Yue Wang","doi":"10.1109/ICEBE.2015.11","DOIUrl":"https://doi.org/10.1109/ICEBE.2015.11","url":null,"abstract":"As the \"bag of words\" approaches cut down the linkage between the words, they are hardly to be applied to explore the causal relations between the terms described from the text corpuses. To discover the networked causal knowledge from the corpus, we (1) propose the algorithm pv-swapping and the PV-parse-tree to adjust the term orders for the sentences by observing the relationship between the grammatical voice and causal relation, provide the NLP approaches to transform the corpus to the sets of ordered terms sequences (OTS) by preserving the semantic orders of the phrases in the sentences, (2) formalize the causal network extracting problem in the corpus and show that it is a NP-hard problem, (3) propose the algorithms NE-IC and heuristic-majority-vote to extract the causal network of the terms based on the OTS sequences. We provide sufficient experiments on the real data sets. The experimental results show that our methods are both effective and efficient to discover the causal network of the terms, and the resulted causal networks of heuristic-majority-vote with less conflict causal relations or cycles than the results of NE-IC. At the last, we also provide experiments on several causal knowledge discovering tasks based on the resulted causal networks to show their interesting applications.","PeriodicalId":153535,"journal":{"name":"2015 IEEE 12th International Conference on e-Business Engineering","volume":"165 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132528040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信