{"title":"A framework for computing the outcome of proxied combinatorial auctions","authors":"J. Zhong, Peter R. Wurman","doi":"10.1109/ICECT.2005.3","DOIUrl":"https://doi.org/10.1109/ICECT.2005.3","url":null,"abstract":"Proxy bidding has been proposed for combinatorial auctions as a means to speed up the auctions, to simplify the user interface, and to limit strategic behavior. The only previously known solution method for proxy bidding in combinatorial auctions requires the auctioneer to run the auction with myopic bidders to determine the outcome. In this paper we present a radically different approach that computes the bidders' allocation of their attention across the bundles only at the points at which they change their bidding patterns. This algorithm has several advantages over alternatives, including that it computes exact solutions and is invariant to the magnitude of the bids. We present a general framework and apply it to Ausubel and Milgrom's APA mechanism and our own simple combinatorial proxy auction. We present an example in which the approach is applied to a multistage proxy auction, and report on some preliminary computational results.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"283 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116091657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EXSMAL: EDI/XML semi-automatic schema matching algorithm","authors":"U. Chukmol, Rami Rifaieh, A. Benharkat","doi":"10.1109/ICECT.2005.48","DOIUrl":"https://doi.org/10.1109/ICECT.2005.48","url":null,"abstract":"We describe a schema matching algorithm EXSMAL that automates the semantic correspondence discovery between the EDI (electronic data interchange) messages of various standards (EDIFACT, SWIFT...) by using XML schema as the pivot format. This algorithm takes two schemata of EDI messages as the input, computes the basic similarity between each pair of elements by comparing their textual description and data type. Then, it computes the structural similarity value basing on the structural neighbors of each element (ancestor, sibling, immediate children and leaf elements) with an aggregation function. The basic similarity and structural similarity values are used in the pair wise element similarity computing which is the final similarity value between two elements.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134431490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Katrin Gaßner, Guy Vollmer, M. Prehn, Martin Fiedler, Sebastian Ssmoller
{"title":"Smart food: mobile guidance for food-allergic people","authors":"Katrin Gaßner, Guy Vollmer, M. Prehn, Martin Fiedler, Sebastian Ssmoller","doi":"10.1109/ICECT.2005.85","DOIUrl":"https://doi.org/10.1109/ICECT.2005.85","url":null,"abstract":"Food-allergic people need comprehensible, complete, reliable, and personalized information about food products. Today, such integrated information is not available mainly because of different interests of the stakeholders in the food value chain. Within this paper we introduce an approach to providing mobile assistance for product-specific on-site advice in a supermarket. A revenue-model is discussed and finally a prototype is introduced.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"247 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132348426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The evolution of cooperation under cheap pseudonyms","authors":"M. Feldman, J. Chuang","doi":"10.1109/ICECT.2005.91","DOIUrl":"https://doi.org/10.1109/ICECT.2005.91","url":null,"abstract":"A wide variety of interactions on the Internet are characterized by the availability of cheap pseudonyms, where users can obtain new identities freely or at a low cost. Due to the availability of cheap pseudonyms, incentive schemes that are based on reward and punishment are vulnerable to the whitewashing attack, where users continuously discard their old identity and acquire a new one to escape the consequences of their bad behavior. In this paper, we study the implications of the whitewashing attack from an evolutionary perspective. Not surprisingly, the whitewashing attack degrades the evolutionary stability of strategies that are otherwise stable. In particular, the tit-for-tat strategy and its variant, probabilistic TFT, are not stable against white-washers, unless identity costs are sufficiently large. In addition, we extend the indirect reciprocity model and find that discriminators can defeat whitewashers only if the probability to cooperate with strangers is small enough, which in turn degrades social welfare.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"354 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115897312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Influence of ubiquitous computing on organizational structure","authors":"Moritz Strasser","doi":"10.1109/ICECT.2005.55","DOIUrl":"https://doi.org/10.1109/ICECT.2005.55","url":null,"abstract":"The changeover of client-server to distributed embedded systems, discussed in the area of ubiquitous computing (UC), entails a large automated processing of tasks due to the fact that the user cannot interact with each application in an explicit way. This technical situation gives cause to consider the repercussions of technology on organisational forms. On the basis of scheduling processes in hospital, the EMIKA project shows the automatability of scheduling under the computing paradigm of self-organization.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114660172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How pay-TV becomes e-commerce","authors":"Ulrich Greveler","doi":"10.1109/ICECT.2005.51","DOIUrl":"https://doi.org/10.1109/ICECT.2005.51","url":null,"abstract":"In this paper we highlight the fact that existing pay-TV schemes operating on countries or world regions could be transformed into a global system as the digital television broadcasting technology offers the possibility to put different regional content into one transmission so that each user could decode the content according to his personal needs. As the Internet could be used for selling pay-per-view licenses and the digital multimedia content can be played by personal computers the existing pay-TV systems could become a global electronic commerce solution reducing the transmission cost per content.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123862747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Principles and algorithms of EMMIL marketplaces","authors":"L. K. Bruckner, J. Cselenyi","doi":"10.1109/ICECT.2005.67","DOIUrl":"https://doi.org/10.1109/ICECT.2005.67","url":null,"abstract":"EMMIL - e-marketplace model integrated with logistics - represents a new approach to B2B e-commerce. EMMIL structures bring together three entity types - seller, buyer and third party logistics service provider - within the same transaction thus enabling combined total cost optimisation for purchase and delivery. We give an overview of the general principles of EMMIL then present the case of buyer oriented marketplaces in more detail. A composite procurement auction is introduced in which bids from sellers of goods and from logistics providers are combined. After formulating the optimisation problem, we investigate possible solution methods for different scenarios.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125160589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Stephen J. H. Yang, Norman W. Y. Shao, A. S. Sue, Jen-Yao Chung
{"title":"Pervasive content access for mobile commerce","authors":"Stephen J. H. Yang, Norman W. Y. Shao, A. S. Sue, Jen-Yao Chung","doi":"10.1109/ICECT.2005.65","DOIUrl":"https://doi.org/10.1109/ICECT.2005.65","url":null,"abstract":"With promising progress of mobile devices and wireless network technology, the mobile commerce is becoming a feasible extension of electric commerce. However, Web content and applications are mainly designed for desktop computing, which limits the content accessibility of mobile devices. In this paper, we address solutions of utilizing context aware service oriented content adaptation to enhance pervasive Web accessibility and apply this technique to mobile commerce. A preliminary experiment result and experience we learned from a mobile commerce on auction is also discussed in this paper.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125555421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A personalized product recommendation algorithm based on preference and intention learning","authors":"Yutao Guo, J. Müller","doi":"10.1109/ICECT.2005.8","DOIUrl":"https://doi.org/10.1109/ICECT.2005.8","url":null,"abstract":"We propose a hybrid learning approach to provide automated assistance for personalized product recommendation. The novel feature of this work is that the system learns and uses models of both user preferences and the user's intentional context. Both learning types are based on the same user input, but elicit different aspects of the user model. User preference is learned via support vector machine (SVM) with user ratings on the products, whereas the user's intentional context is inferred using a hidden Markov model (HMM) from given product access sequences. We propose a product recommendation scheme based on an analysis on both the preference and intentional context model. An empirical analysis shows that the hybrid approach is able to support users with different preference structures and intentional contexts.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127246238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An optimization model for the management of security risks in banking companies","authors":"Ulrich Faisst, Oliver Prokein","doi":"10.1109/ICECT.2005.21","DOIUrl":"https://doi.org/10.1109/ICECT.2005.21","url":null,"abstract":"The increasing importance of information and communication technologies (ICT), new regulatory obligations (e.g. Basel II) and growing external risks (e.g. hacker attacks) put security risks in the management focus of banking companies. The management has to decide whether to accept expected losses or to invest in technical security mechanisms in order to decrease the frequency of events or to invest in insurance policies in order to lower the severity of events. This paper contributes to the development of an optimization model that aims to determine the optimal amount to be invested in technical security mechanisms and insurance policies. Furthermore the model considers budget and risk limits as constraints and is supposed to help practitioners in controlling security risks.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128883807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}