Seventh IEEE International Conference on E-Commerce Technology (CEC'05)最新文献

筛选
英文 中文
A recommender for targeted advertisement of unsought products in e-commerce 针对电子商务中未被搜索到的产品进行定向广告推荐
Seventh IEEE International Conference on E-Commerce Technology (CEC'05) Pub Date : 2005-07-19 DOI: 10.1109/ICECT.2005.10
Koung-Lung Lin, Jane Yung-jen Hsu, Han-Shen Huang, Chun-Nan Hsu
{"title":"A recommender for targeted advertisement of unsought products in e-commerce","authors":"Koung-Lung Lin, Jane Yung-jen Hsu, Han-Shen Huang, Chun-Nan Hsu","doi":"10.1109/ICECT.2005.10","DOIUrl":"https://doi.org/10.1109/ICECT.2005.10","url":null,"abstract":"Recommender systems are a powerful tool for promoting sales in electronic commerce. An effective shopping recommender system can help boost the retailer's sales by reminding customers to purchase additional products originally not on their shopping lists. Existing recommender systems are designed to identify the top selling items, also called hot sellers, based on the store's sales data and customer purchase behaviors. It turns out that timely reminders for unsought products, which are cold sellers that the consumer either does not know about or does not normally think of buying, present great opportunities for significant sales growth. In this paper, we propose the framework and process of a recommender system that identifies potential customers of unsought products using boosting-SVM. The empirical results show that the proposed approach provides a promising solution to targeted advertisement for unsought products in an e-commerce environment.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123311591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Meta model based integration of role-based and discretionary access control using path expressions 基于元模型的基于角色的集成和使用路径表达式的任意访问控制
Seventh IEEE International Conference on E-Commerce Technology (CEC'05) Pub Date : 2005-07-19 DOI: 10.1109/ICECT.2005.59
K. Lehmann, F. Matthes
{"title":"Meta model based integration of role-based and discretionary access control using path expressions","authors":"K. Lehmann, F. Matthes","doi":"10.1109/ICECT.2005.59","DOIUrl":"https://doi.org/10.1109/ICECT.2005.59","url":null,"abstract":"Business applications have to deal with two types of access control models: the role-based and the discretionary access control model. The main contribution of this paper is that both data models are unified in a single description language. Starting from a meta model of an object oriented data model, this paper shows how to describe and integrate access control needs in common business applications using an authorization model based on path expressions. These path expressions can be used to construct set-oriented queries for access control decisions derived from the data model of the application.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117108914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A novel auction mechanism for selling time-sensitive e-services 一种新的拍卖机制,用于销售时间敏感的电子服务
Seventh IEEE International Conference on E-Commerce Technology (CEC'05) Pub Date : 2005-07-19 DOI: 10.1109/ICECT.2005.7
Juong-Sik Lee, B. Szymanski
{"title":"A novel auction mechanism for selling time-sensitive e-services","authors":"Juong-Sik Lee, B. Szymanski","doi":"10.1109/ICECT.2005.7","DOIUrl":"https://doi.org/10.1109/ICECT.2005.7","url":null,"abstract":"Many e-services are time-sensitive as the users request them for a specific time period. Such services need to be repeatedly offered to keep them constantly utilized. This paper studies winner selection strategies in a recurring auction for such time-sensitive e-services. We observe that because of uneven wealth distribution, the least wealthy bidders tend to drop out of recurring auction as they persistently loose. The bidders dropping out of an auction decrease competition and can cause a collapse of winning prices. We propose and evaluate a novel auction mechanism that enables bidder drop control. Compared to traditional auction mechanisms, ours increases revenue of the e-service provider and decreases loss of fairness of the e-service allocation.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130977970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
Framework for the negotiation of electronic contracts in e-business on demand 按需电子商务中电子合约的谈判框架
Seventh IEEE International Conference on E-Commerce Technology (CEC'05) Pub Date : 2005-07-19 DOI: 10.1109/ICECT.2005.49
W. Streitberger
{"title":"Framework for the negotiation of electronic contracts in e-business on demand","authors":"W. Streitberger","doi":"10.1109/ICECT.2005.49","DOIUrl":"https://doi.org/10.1109/ICECT.2005.49","url":null,"abstract":"This paper presents a realized framework for the negotiation of electronic contracts for e-business on demand, in which resource demands occur unpredictably and have to be fulfilled immediately. Proposals for services are exchanged between clients and service providers, and offers are negotiated and contracted. On demand service contracts mostly have a smaller trading volume as ordinary offline contracts, but their frequency of occurrence increases. Due to the high number of contracts they should be negotiated electronically, which lowers costs of the contract process notably. The software framework presented in this paper can support this process. The core components of the framework have generic interfaces. These interfaces can be used as a base for developing domain specific applications to implement negotiations of electronic contracts. The framework is part of a contract management system extending its functionality of negotiating contracts.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114091234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Anonymity and security in public Internet forums 公共互联网论坛的匿名性和安全性
Seventh IEEE International Conference on E-Commerce Technology (CEC'05) Pub Date : 2005-07-19 DOI: 10.1109/ICECT.2005.22
Changjie Wang, Dickson K. W. Chiu, Ho-fung Leung
{"title":"Anonymity and security in public Internet forums","authors":"Changjie Wang, Dickson K. W. Chiu, Ho-fung Leung","doi":"10.1109/ICECT.2005.22","DOIUrl":"https://doi.org/10.1109/ICECT.2005.22","url":null,"abstract":"In this paper, we first introduce the privacy and security requirements in public forums, which include anonymity, traceability, impossibility of impersonation, unforgeability, verifiability, fairness, easy anonymity revocation, and un-involvement of authorities. We then propose an anonymous and secure forum protocol based on a concept of alias certificate with detailed analysis to show that our scheme satisfies all these requirements. In particular, participants only need to register once with the authorities and the authorities are not involved during message postings, yet the anonymity of participants and the traceability of malicious information can be achieved. This can greatly increase the usability and efficiency as participants often post messages frequently.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115409673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An adaptive bilateral negotiation model for e-commerce settings 电子商务环境下的自适应双边谈判模型
Seventh IEEE International Conference on E-Commerce Technology (CEC'05) Pub Date : 2005-07-19 DOI: 10.1109/ICECT.2005.15
V. Narayanan, N. Jennings
{"title":"An adaptive bilateral negotiation model for e-commerce settings","authors":"V. Narayanan, N. Jennings","doi":"10.1109/ICECT.2005.15","DOIUrl":"https://doi.org/10.1109/ICECT.2005.15","url":null,"abstract":"This paper studies adaptive bilateral negotiation between software agents in e-commerce environments. Specifically, we assume that the agents are self-interested, the environment is dynamic, and both agents have deadlines. Such dynamism means that the agents' negotiation parameters (such as deadlines and reservation prices) are functions of both the state of the encounter and the environment. Given this, we develop an algorithm that the negotiating agents can use to adapt their strategies to changes in the environment in order to reach an agreement within their specific deadlines and before the resources available for negotiation are exhausted. In more detail, we formally define an adaptive negotiation model and cast it as a Markov decision process. Using a value iteration algorithm, we then indicate a novel solution technique for determining optimal policies for the negotiation problem without explicit knowledge of the dynamics of the system. We also solve a representative negotiation decision problem using this technique and show that it is a promising approach for analyzing negotiations in dynamic settings. Finally, through empirical evaluation, we show that the agents using our algorithm learn a negotiation strategy that adapts to the environment and enables them to reach agreements in a timely manner.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123647997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
HESSL (highly enhanced security socket layer) protocol HESSL(高度增强的安全套接字层)协议
Seventh IEEE International Conference on E-Commerce Technology (CEC'05) Pub Date : 2005-07-19 DOI: 10.1109/ICECT.2005.50
B. Lee, Tai-Chi Lee, S. Yang
{"title":"HESSL (highly enhanced security socket layer) protocol","authors":"B. Lee, Tai-Chi Lee, S. Yang","doi":"10.1109/ICECT.2005.50","DOIUrl":"https://doi.org/10.1109/ICECT.2005.50","url":null,"abstract":"SSL (secure socket layer) is currently the most widely deployed security protocol, and consists of many security algorithms, but it has some problems on processing time and security. This paper proposes an HESSL (highly enhanced security socket layer) protocol that provides better security and processing time than an existing SSL protocol. As HESSL consists of just F/sub 2m/ ECC (elliptic curve cryptosystem), F/sub 2m/ HECC, BSB, and SHA algorithm, this protocol reduces handshaking process by concatenating a shared private key of F/sub 2m/ ECC, F/sub 2m/ HECC and proposed BSB and improves processing time. In particular, BSB algorithm provides better confidentiality than those used by SSL because of four processes of byte-exchange key, shift round key, ASCII code key and bit-xor key after selecting two blocks randomly.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123666949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A robust business resource management framework based on a peer-to-peer infrastructure 基于对等基础设施的健壮的业务资源管理框架
Seventh IEEE International Conference on E-Commerce Technology (CEC'05) Pub Date : 2005-07-19 DOI: 10.1109/ICECT.2005.11
T. Friese, J. Müller, Matthew Smith, Bernd Freisleben
{"title":"A robust business resource management framework based on a peer-to-peer infrastructure","authors":"T. Friese, J. Müller, Matthew Smith, Bernd Freisleben","doi":"10.1109/ICECT.2005.11","DOIUrl":"https://doi.org/10.1109/ICECT.2005.11","url":null,"abstract":"In this paper, we present the design and implementation of a business resource management framework (BRMF) that allows to manage various business resources on top of a peer-to-peer infrastructure which is highly scalable and resilient against node failure. It is geared towards the management of static business resources such as business documents, Web service descriptions and business process specifications involved in business interactions among various partners. Additionally, it offers the possibility to incorporate management functionality for the control of active business resources such as Web services and business process execution engines. It is shown how the BRMF can be used to implement an application that supports business process execution engines by realizing additional fault tolerance based on a distributed service registry.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"04 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130009139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Contract-based cross-organizational automated processes 基于契约的跨组织自动化流程
Seventh IEEE International Conference on E-Commerce Technology (CEC'05) Pub Date : 2005-07-19 DOI: 10.1109/ICECT.2005.31
Odorico von Susani, P. Dugerdil
{"title":"Contract-based cross-organizational automated processes","authors":"Odorico von Susani, P. Dugerdil","doi":"10.1109/ICECT.2005.31","DOIUrl":"https://doi.org/10.1109/ICECT.2005.31","url":null,"abstract":"The number of cross-organizational automated interactions or processes (B2B) is expected to increase strongly along with the trend to outsource non-core business tasks. Furthermore, the possibility of offering new services or processes based on the composition of both internal and external services is raising this number even faster. Many tools and technologies have been developed to implement these interactions. As the interactions become more complex, these new technologies are similar to existing workflow management systems, which are currently being adapted to handle these cross-organizational aspects. In fact, there has been extensive research in all the domains of workflow management systems, including specification languages, workflow patterns and execution environments. However, in the context of automated cross-organizational workflows, little attention has been paid to the consequences of component maintenance and version evolution. In this paper, we highlight the similarities between the field of dynamic reconfiguration of distributed applications and the evolution of the components of a cross-organizational workflow. Then, we emphasize the need for providers of cross-organizational outsourced processes to be contractually bound to the consumers of these processes.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"531 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124515146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Multi-attribute double auctions in financial trading 金融交易中的多属性双重拍卖
Seventh IEEE International Conference on E-Commerce Technology (CEC'05) Pub Date : 2005-07-19 DOI: 10.1109/ICECT.2005.61
Henner Gimpel, J. Mäkiö, Christof Weinhardt
{"title":"Multi-attribute double auctions in financial trading","authors":"Henner Gimpel, J. Mäkiö, Christof Weinhardt","doi":"10.1109/ICECT.2005.61","DOIUrl":"https://doi.org/10.1109/ICECT.2005.61","url":null,"abstract":"Double-sided auctions are popular market mechanisms for determining the price of standardized commodities. However, many trades - like for example OTC trades of financial derivatives and bonds - require multi-attribute handling. To this end, the class of continuous-time multi-attribute double auction mechanisms is introduced. The paper outlines requirements, characterizes the class of auction mechanisms, points out design options, and discusses the implementation in the meet2trade/sup 2/ system.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121274144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信