Soo-Ho Chang, H. La, J. Bae, W. Jeon, Soo Dong Kim
{"title":"Design of a Dynamic Composition Handler for ESB-based Services","authors":"Soo-Ho Chang, H. La, J. Bae, W. Jeon, Soo Dong Kim","doi":"10.1109/ICEBE.2007.63","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.63","url":null,"abstract":"The capability to compose services dynamically is a unique feature of Service-Oriented Computing (SOC), where services are published, discovered, and composed at runtime to deliver the expected service functionality to service clients. With dynamic composition, published services are searched and the most appropriate services are selected and reused at runtime. Also, newly published services can be reused without changing the client programs, so it yields an opportunity for dynamic adaptation. Despite the benefits, current programming languages, SOC platforms, business process modeling languages, and tools have a limitation on supporting the full dynamic composition. Rather, they require either manual composition or static binding of available services. In this paper, we present a design of a Dynamic Composition Handler on Enterprise Service Bus (ESB). We analyze different types of service compositions to clarity what dynamic composition really holds in SOC. Then, we present a design of Dynamic Composition Handler which consists of four elements; Invocation Listener, Service Router, Service Discoverer, and Interface Adapter. Using the framework, services can be discovered, selected, composed, and adapted at runtime. Since practical dynamic composition method depends on certain standard middleware platforms, we adopt ESB for our framework. We believe that our framework enables practical dynamic composition and realizes the whole benefit of it.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132551419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information Retrieval through SVG-based Vector Images Using an Original Method","authors":"Kaiyuan Jiang, Z. Fang, Yuanting Ge, Yu Zhou","doi":"10.1109/ICEBE.2007.51","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.51","url":null,"abstract":"Vector images are becoming more advanced and diffused on the Internet due to their unique characteristics over traditional raster images. As a W3C standard, SVG is a brand-new vector-based image format built on readable/searchable plain-text source code which inherited from XML technology, thus is suitable for Content-based image retrieval. CBIR is the application of computer vision to the image retrieval problem, which analyzes the actual contents of the images themselves rather than relying on annotations or keywords generated by human labor. Without textual descriptions or label information, successful retrieval of relevant images from large- scale image collections is a very interesting yet challenging task, so in this paper, we propose a prototype system based on SVG technology and emphasize the method of similarity measurement, also covers the implementation of the principles, which provides CBIR services.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127614177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Case Study: Adoption of Information Technology in E-Business of United Arab Emirates","authors":"Fahim Akhter","doi":"10.1109/ICEBE.2007.29","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.29","url":null,"abstract":"This research conducted to identify factors that affect e-commerce adoption among people of United Arab Emirates. The focus of this research is to discover at what extent security and privacy factors contribute to the adoption of e-commerce. This study has been designed to explore why online shopping is growing so fast among some users, and so slowly among others. 2051 questionnaires were distributed by using different media such as email and Internet to the subjects and received back only 21% questionnaires from respondents. The result shows that all of the independent variables played important roles in determining the adoption of e-commerce and created a gap between users who are adopting e-commerce and those who have not. The finding also shows that there are two significant factors, making an impact on the adoption of e-commerce, which are the user's educational background and their understanding of security features implemented by the vendors.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124938900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Concurrent G-Negotiation Mechanism for Grid Resource Co-allocation","authors":"B. Shi, K. Sim","doi":"10.1109/ICEBE.2007.68","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.68","url":null,"abstract":"Since computationally intensive applications may often require more resources than a single computing machine can provide in one administrative domain, bolstering resource co-allocation is essential for realizing the grid vision. Given that resource providers and consumers may have different requirements and performance goals, successfully obtaining commitments through concurrent negotiations with multiple resource providers to simultaneously access several resources is a very challenging task for consumers. The novel contribution of this work is devising a concurrent mechanism that (i) coordinates multiple one-to-many concurrent negotiations between a consumer and multiple resource providers, and (ii) manages (de-)commitment for consumers during the one-to-many negotiation in grid co-allocation. In this work, a utility-oriented coordination strategy and three classes of commitment strategies for concurrent negotiation are presented. A series of simulations were carried out in a variety of settings and favorable results show that the strategies (both commitment strategies and the coordination strategy) outperformed existing models in terms of utility, negotiation speed, and success rate.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116247780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Task Oriented Web Service Requirement Framework","authors":"Yu Cheng, Hexin Lv, Ji Gao, Huamao Gu","doi":"10.1109/ICEBE.2007.24","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.24","url":null,"abstract":"Aiming to overcome the mismatch between coarse grain of Web service's functions and fine grain of current Web service requirements with inputs and outputs as functional requirements, a three layer task oriented Web service requirement framework is proposed. The top the is task layer which defines the tasks and their relationships, the middle is the method layer which represents multiple implementations of the primitive task, and the low is the operation layer which represents the abstract features of typical operations that a method owns. The task oriented Web service requirement framework proposed well matches the coarse grain feature of Web service's functions and provides a more natural way to express the service requirements.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115059160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Privacy Protection Method for P2P-based Web Service Discovery","authors":"Kuien Liu, Qing Wang, Jun-su Han, Hu Wu","doi":"10.1109/ICEBE.2007.113","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.113","url":null,"abstract":"Peer-to-Peer based Web service discovery systems have shown the high scalability and availability provided by high connectivity and dynamic accommodation. However, a serious difficulty in concurrent designing of such unauthoritative and decentralized controlled systems is how to deal with the privacy concerns and policy enforcement in such systems which may contain a considerable ratio of dishonest and unavailable peers. We present a privacy protection method implementing authorization model in the broker peers' platform with the supporting of Web service description composition algorithms and discovery protocols especially designed for privacy policy enforcement in P2P environments. We exploit the statistical stability of a large number of peers and analyze the quantitative result of privacy policies being betrayed and obeyed, as well as how to leverage the privacy assurance and availability to desired levels by adjusting the parameters of composition algorithms.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129178394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fang Zhiyuan, Zhan Jingchun, Wang Lei, Zhou Yu, Mou Minghui
{"title":"MCTSE: A Commerce Topic Faced P2P Search Engine for Mobile Devices","authors":"Fang Zhiyuan, Zhan Jingchun, Wang Lei, Zhou Yu, Mou Minghui","doi":"10.1109/ICEBE.2007.73","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.73","url":null,"abstract":"Along with the development of wireless technology and especially 3G's throw into commercial, the bandwidth of mobile devices will reach 2 Mbps which makes it possible to publish Webpage to mobile devices and personal digital assistant. However, mobile devices is restricted by display terminal and storage capability. So this paper attempts to implement a commerce topic faced P2P search engine system for mobile devices using WAP protocol: MCTSE. MCTSE is built on the operating system of RedHat Linux AS3 Update4: it builds the topic characteristic keywords set using extendable iterative select keyword (EISK) algorithm, and based on the set, it collects commerce topic information and builds layered content indexed by Internet commerce topic crawler and the voluntary publish of mobile user. A commerce topic search is implemented by mobile user to send query keywords. Results of simulation proved that under ideal conditions the system's average responding time is less than 70 ms and precision is above 85% when there are no more than 3000 simultaneous searching queries, and so the completeness and feasibility of the system's design is proved.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128875900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Measuring Website Usability of Chinese Enterprise with a Heuristic Procedure","authors":"Chang Jinling, Guan Huan","doi":"10.1109/ICEBE.2007.57","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.57","url":null,"abstract":"With the proliferation of the Internet, Chinese enterprises are all adopting technologies to build their Web sites. In this paper, the purpose is to measure the usability of these B2C e-commerce Web site. Five B2C e-commerce Web sites in China are evaluated, based on a comprehensive set of usability guidelines developed by Microsoft. The weights of each category and subcategory are assessed first by 350 users who are asked to assume the role of consumers. Then the usability grades of each category to each of the five chosen Web sites are rated. The conclusions under the statistic data analysis not only touch upon the rating of Web sites, but also highlights the strengths and weaknesses of each Web site. The evaluation of consumers with respect to the categories has also been included and some interesting finds are offered for researchers, Web site designers, and e-commerce users.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125960759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Tool Framework for KPI Application Development","authors":"M. Abe, J. Jeng, Yinggang Li","doi":"10.1109/ICEBE.2007.88","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.88","url":null,"abstract":"This paper describes a KPI (key performance indicator) modeling environment, coined Mozart, where modelers can use formal models to explicitly define the services of KPI and their relationships which are depicted by KPI net. Mozart provides us with methods for mining and modeling KPIs and supports smooth model transformation for generating monitoring applications based on a model driven approach. It also provides us with methods of service composition for KPI applications. We showed how it works with an example scenario of automobile data and found that \"mpg\" is most strongly influenced by four KPIs. The result showed which KPIs should be focused for human monitoring, and it can be an initial model for monitoring applications.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123789373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of RFID Adoption in China","authors":"Zongwei Luo, Zhining Tan, Zhicheng Ni, B. Yen","doi":"10.1109/ICEBE.2007.35","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.35","url":null,"abstract":"Radio-frequency identification (RFID) is an emerging technology for automatic data capturing, enabling real time information visibility. It promises great potentials in many industries to improve logistics operational efficiency, to help reduce inventory, and to automate asset/item track and trace, etc. The RFID adoption in China is a highly concerned topic as China has become a world manufacturing center. In this paper, we have presented an overview for China's current RFID adoption status. Based on Rogers's DOI theory, a methodology is developed for analyzing RFID adoption in China. With this methodology, China's RFID adoption status is identified, and ways to speed up the rate of adoption are also suggested.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114361239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}