2016 IEEE 13th International Conference on e-Business Engineering (ICEBE)最新文献

筛选
英文 中文
Multi-stage Layout Optimization for Reverse Logistics Network of Rural E-Commerce under B2C Mode: A Case Study of E-Commerce Enterprises on 3C Products B2C模式下农村电子商务逆向物流网络多阶段布局优化——以电子商务企业3C产品为例
2016 IEEE 13th International Conference on e-Business Engineering (ICEBE) Pub Date : 2016-11-01 DOI: 10.1109/ICEBE.2016.056
Feng Cao, Jianquan Guo, Chengji Liang
{"title":"Multi-stage Layout Optimization for Reverse Logistics Network of Rural E-Commerce under B2C Mode: A Case Study of E-Commerce Enterprises on 3C Products","authors":"Feng Cao, Jianquan Guo, Chengji Liang","doi":"10.1109/ICEBE.2016.056","DOIUrl":"https://doi.org/10.1109/ICEBE.2016.056","url":null,"abstract":"The reverse logistics network of rural E-commerce under B2C mode is optimized by the multi-stage optimization model, which can solve the return and recycling problems of online-shopping products. The minimum of network cost and the maximum of customer satisfaction are taken as the objective function. Then the feasibility of optimization model is validated by applying a two-phase heuristic algorithm nesting GA with a calculation example. The results reveal that the multi-stage model not only reduces the uncertain risk of the system, but optimizes the input of different resources during the whole operation process. This study could provide a reference for the design of the reverse logistics network on online-shopping products, especially for that of rural E-commerce. And proper use of proposed process could help E-commerce enterprise manage the returning and recycling flow of online-shopping products effectively.","PeriodicalId":305614,"journal":{"name":"2016 IEEE 13th International Conference on e-Business Engineering (ICEBE)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128734001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Differential-Privacy-Based Citizen Privacy Preservation in E-Government Applications 电子政务应用中基于差分隐私的公民隐私保护
2016 IEEE 13th International Conference on e-Business Engineering (ICEBE) Pub Date : 2016-11-01 DOI: 10.1109/ICEBE.2016.035
Yajuan Shi, Chunhui Piao, Xiao Pan
{"title":"Differential-Privacy-Based Citizen Privacy Preservation in E-Government Applications","authors":"Yajuan Shi, Chunhui Piao, Xiao Pan","doi":"10.1109/ICEBE.2016.035","DOIUrl":"https://doi.org/10.1109/ICEBE.2016.035","url":null,"abstract":"In the era of big data, opening of the information in e-government applications and sharing of the information resources among government departments have become the requirements of the times, while how to protect the privacy of citizens has become one of the focus issues of the government and public. To prevent the disclosure or abuse of the citizens' privacy information, the citizens' privacy needs to be preserved in the process of information opening and sharing. However, most of the existing privacy preserving models cannot to be used to resist attacks with continuously growing background knowledge. This paper presents the method of applying differential privacy to protect the citizens' privacy information. By generalizing the citizens' sensitive information, the anonymity sets satisfying (K, L)-anonymity model are constructed, then differential method is used to add Laplace noise in the anonymity sets. Thus the citizen's privacy information can be protected even if the attacker gets strong background knowledge. Because the grouped information reduces the sensitivity of the query, the availability of citizens' information after adding noise can be guaranteed. The steps and usefulness of the discussed privacy preservation method is illustrated by an example.","PeriodicalId":305614,"journal":{"name":"2016 IEEE 13th International Conference on e-Business Engineering (ICEBE)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117182796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Testing of AJAX-Based Web Applications Using Hierarchical State Model 使用分层状态模型测试基于ajax的Web应用程序
2016 IEEE 13th International Conference on e-Business Engineering (ICEBE) Pub Date : 2016-11-01 DOI: 10.1109/ICEBE.2016.050
Chien-Hung Liu, Chiachih Wu, Hsi-Min Chen
{"title":"Testing of AJAX-Based Web Applications Using Hierarchical State Model","authors":"Chien-Hung Liu, Chiachih Wu, Hsi-Min Chen","doi":"10.1109/ICEBE.2016.050","DOIUrl":"https://doi.org/10.1109/ICEBE.2016.050","url":null,"abstract":"As Ajax, a widely used web development technique, is able to dynamically construct the structures of DOM elements on the browser side, more and more executions of business logic have been shifted from back-end servers to front-end browsers. Moreover, by means of Ajax technique, updates of Web content can take place asynchronously in the background without requesting the whole web pages from servers so it gains the benefit from reducing the amount of network traffic between browsers and web servers. However, in term of web application testing, the existing approaches, adopting web-browsing paths as test cases, are failed to apply in such web applications. In this paper, we propose a test model for Ajax-based web applications based on a hierarchical state machine. The test model is established from observing the state changes of HTML element's attributes and the events that trigger the changes, and then transformed into state transition test trees. Finally, it generates corresponding test cases composed by triggered events to test the behavior of Ajax-based web applications.","PeriodicalId":305614,"journal":{"name":"2016 IEEE 13th International Conference on e-Business Engineering (ICEBE)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116258537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An Efficient Flow Control Approach for SDN-Based Network Threat Detection and Migration Using Support Vector Machine 基于支持向量机的sdn网络威胁检测与迁移的高效流量控制方法
2016 IEEE 13th International Conference on e-Business Engineering (ICEBE) Pub Date : 2016-11-01 DOI: 10.1109/ICEBE.2016.020
Ping Wang, K. Chao, Hsiao-Chung Lin, Wen-Hui Lin, Chi-Chun Lo
{"title":"An Efficient Flow Control Approach for SDN-Based Network Threat Detection and Migration Using Support Vector Machine","authors":"Ping Wang, K. Chao, Hsiao-Chung Lin, Wen-Hui Lin, Chi-Chun Lo","doi":"10.1109/ICEBE.2016.020","DOIUrl":"https://doi.org/10.1109/ICEBE.2016.020","url":null,"abstract":"Most existing approaches for solving the network threat problems focus on the specific security mechanisms, for example, network intrusion detection system (NIDS) detection, firewall configuration, rather than on flow management approaches to defend network threats with an SDN (Software Defined Networking) architecture. Accordingly, this study proposes an improved behaviour-based SVM (support vector machine) with learning algorithm for use in the security monitoring system (SMS) to categorize network threats for network intrusion detection system. The model also adopted the ID3 decision tree theory to outrank raw features and determine the most qualified features to train support vector classifier (SVC) considering the overall detection precision rate of experiments which speeds up the learning of normal and intrusive patterns and and increases the accuracy of detecting intrusion. By using sFlow collector and analyzer associated with sFlow-RT toolset, the experimental results proved that the SMS enables a defender to classify the network threats with defence strategies and defend network threats.","PeriodicalId":305614,"journal":{"name":"2016 IEEE 13th International Conference on e-Business Engineering (ICEBE)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126206067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
Study of Innovation Approach for Business Model in Internet Enterprises 互联网企业商业模式创新途径研究
2016 IEEE 13th International Conference on e-Business Engineering (ICEBE) Pub Date : 2016-11-01 DOI: 10.1109/ICEBE.2016.037
Xiaoke Nan, Qu Wenfeng
{"title":"Study of Innovation Approach for Business Model in Internet Enterprises","authors":"Xiaoke Nan, Qu Wenfeng","doi":"10.1109/ICEBE.2016.037","DOIUrl":"https://doi.org/10.1109/ICEBE.2016.037","url":null,"abstract":"In face of the problems such as profit difficulty and oligopoly, the innovation of business model has become the indispensable choice of the Internet enterprises. Through review of the business model theory and features of Internet enterprises, this paper proposes that the business model in Internet enterprises is composed of four dimensions including value proposition, profit model, resource capability and isolating mechanism as well as eight elements. Innovation of business model can be realized through changing or regrouping the constituting elements. This paper also employs a case analysis of the business model innovation of Amazon and proposes the enlightenment and reference.","PeriodicalId":305614,"journal":{"name":"2016 IEEE 13th International Conference on e-Business Engineering (ICEBE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128111237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Pricing of Cloud Computing with Preferential Policies 具有优惠政策的云计算定价
2016 IEEE 13th International Conference on e-Business Engineering (ICEBE) Pub Date : 2016-11-01 DOI: 10.1109/ICEBE.2016.047
Zhang Rui, Bingyong Tang
{"title":"The Pricing of Cloud Computing with Preferential Policies","authors":"Zhang Rui, Bingyong Tang","doi":"10.1109/ICEBE.2016.047","DOIUrl":"https://doi.org/10.1109/ICEBE.2016.047","url":null,"abstract":"At present, the studies of cloud computing pricing remain at a single period market, and the change of customer demand as well as carrier strategy has been neglected. In this paper, we discuss the dynamic pricing and marketing strategies of carriers in the two-stage market by adding the factor of discount, compare the pricing models of one-stage market and two-stage market, and analyze the effects of network effects, switching costs and transportation cost to the prices. The result shows that cloud computing carriers usually set a higher price in the first stage and then a lower price in the second stage, carriers set the prices for various types of customers on the basis of switching cost in the second stage of the market, cloud carriers can widen the gap with others and improve their revenue by improving the features of their services and products.","PeriodicalId":305614,"journal":{"name":"2016 IEEE 13th International Conference on e-Business Engineering (ICEBE)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121692272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigation into the Regular and Chaotic States of Microblogging Networks as Applied to Social Media Monitoring 应用于社交媒体监控的微博网络规则与混沌状态研究
2016 IEEE 13th International Conference on e-Business Engineering (ICEBE) Pub Date : 2016-11-01 DOI: 10.1109/ICEBE.2016.057
A. Dmitriev, O. Tsukanova, S. Maltseva
{"title":"Investigation into the Regular and Chaotic States of Microblogging Networks as Applied to Social Media Monitoring","authors":"A. Dmitriev, O. Tsukanova, S. Maltseva","doi":"10.1109/ICEBE.2016.057","DOIUrl":"https://doi.org/10.1109/ICEBE.2016.057","url":null,"abstract":"The present paper is devoted to the investigation into the evolutionary dynamics of social microblogging networks. Different network states are considered. Regular and chaotic states of networks are described. A new model of a social microblogging network as a point dissipative system is suggested. Dynamic variables of such system are represented by the variations of tweet/retweet number around the equilibrium values. It is pointed out, that the system is in a condition of an asymptotically stable equilibrium when the intensity values of an external information are small (the number of tweets eventually tends to its equilibrium value). So far as the intensity values of external information do not exceed the critical value, the stable (almost harmonic) oscillations of tweets take place in the system. If the intensity values of external information exceed the critical value, then the chaotic oscillations of tweets are to be observed. A case of Twitter network is examined.","PeriodicalId":305614,"journal":{"name":"2016 IEEE 13th International Conference on e-Business Engineering (ICEBE)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122055042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A New Placement Optimization Approach in Hybrid Cloud Based on Genetic Algorithm 一种基于遗传算法的混合云布局优化方法
2016 IEEE 13th International Conference on e-Business Engineering (ICEBE) Pub Date : 2016-11-01 DOI: 10.1109/ICEBE.2016.046
Wissem Abbes, Zied Kechaou, A. Alimi
{"title":"A New Placement Optimization Approach in Hybrid Cloud Based on Genetic Algorithm","authors":"Wissem Abbes, Zied Kechaou, A. Alimi","doi":"10.1109/ICEBE.2016.046","DOIUrl":"https://doi.org/10.1109/ICEBE.2016.046","url":null,"abstract":"With the evolution of cloud computing technology, companies develop their private cloud to deploy and run applications. A company can also combine public and private cloud services through the deployment of a hybrid cloud. Thus, if the company needs exceed the capacity of the private cloud, they can migrate to the public cloud. The deployment of new applications consists to choose the placement of some components in the private cloud and some others in the public cloud. Our objective is to minimize the costs caused by the applications deployment in the public cloud and communication costs between application of the private and public cloud. For this purpose, we have proposed a new service placement optimization approach based on genetic algorithm. The experimental results show that our approach outperforms the related works and seems to be promising in respect to optimal solution.","PeriodicalId":305614,"journal":{"name":"2016 IEEE 13th International Conference on e-Business Engineering (ICEBE)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124619498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Can You Call the Software in Your Device be Firmware? 你能把你设备里的软件称为固件吗?
2016 IEEE 13th International Conference on e-Business Engineering (ICEBE) Pub Date : 2016-11-01 DOI: 10.1109/ICEBE.2016.040
Rashedul Hassan, K. Markantonakis, Raja Naeem Akram
{"title":"Can You Call the Software in Your Device be Firmware?","authors":"Rashedul Hassan, K. Markantonakis, Raja Naeem Akram","doi":"10.1109/ICEBE.2016.040","DOIUrl":"https://doi.org/10.1109/ICEBE.2016.040","url":null,"abstract":"In addition to storing a plethora of code and functionality, devices also possess a certain set of data and commands, known as firmware. The ability of devices to perform specific tasks relies on the firmware. In order to understand the scope of firmware we conducted a qualitative analysis of its properties, functionalities and security. We examined the use of the terminology over a period of years and found that \"firmware\" is used in numerous situations in a range of contexts. In this paper, we propose a taxonomy of firmware to classify the field and understand it better.","PeriodicalId":305614,"journal":{"name":"2016 IEEE 13th International Conference on e-Business Engineering (ICEBE)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131164209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Cost-Efficient Cooperative Sharing of a Complete Wi-Fi Signature Scheme for Indoor Localization in Shopping Malls 一种用于商场室内定位的完整Wi-Fi签名方案的成本效益协同共享
2016 IEEE 13th International Conference on e-Business Engineering (ICEBE) Pub Date : 2016-11-01 DOI: 10.1109/ICEBE.2016.041
Min Zhang, Juntao Wang, Xiaotie Deng
{"title":"Cost-Efficient Cooperative Sharing of a Complete Wi-Fi Signature Scheme for Indoor Localization in Shopping Malls","authors":"Min Zhang, Juntao Wang, Xiaotie Deng","doi":"10.1109/ICEBE.2016.041","DOIUrl":"https://doi.org/10.1109/ICEBE.2016.041","url":null,"abstract":"Wi-Fi-based indoor localization has drawn much attention since the last decade. However, the current Wi-Fi localization system highly depend on the demanding conditions of the environment, hindering its applications such as in shopping malls, a large, complex but profitable application scenario. To prompt the adoption of Wi-Fi localization system in shopping malls, we propose a coarse-grained Wi-Fi localization system constructed by the shops for mobile phone users at the shop level. The two objectives we pursue of the Wi-Fi localization system are the cost-efficiency, where only minimum number of access points (APs) are deployed, and incentives, where each shop is well-motivated to follow our scheme to install the APs. For the first objective, we propose a dynamic programming to compute the minimum Wi-Fi deployment scheme. For the second objective, we propose a valuation sharing scheme in cooperative game theory to balance the interest of each shop. Our results shed insight on how cost efficiency can be achieved for Wi-Fi localization system and on how to motivate agents to contribute to Wi-Fi localization system.","PeriodicalId":305614,"journal":{"name":"2016 IEEE 13th International Conference on e-Business Engineering (ICEBE)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116283559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信