IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004最新文献

筛选
英文 中文
A personalized courseware recommendation system based on fuzzy item response theory 基于模糊项目反应理论的个性化课件推荐系统
Chih-Ming Chen, Ling-Jiun Duh, Chao-Yu Liu
{"title":"A personalized courseware recommendation system based on fuzzy item response theory","authors":"Chih-Ming Chen, Ling-Jiun Duh, Chao-Yu Liu","doi":"10.1109/EEE.2004.1287327","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287327","url":null,"abstract":"With the rapid growth of computer and Internet technologies, e-learning has become a major trend in the computer assisted teaching and learning field currently. In past years, many researchers made efforts in developing e-learning systems with personalized learning mechanism to assist on-line learning. However, most of them focused on using learner's behaviors, interests, or habits to provide personalized e-learning services. These systems usually neglected to concern if learner's ability and the difficulty of courseware are matched each other. Generally, recommending an inappropriate courseware might result in learner's cognitive overhead or disorientation during a learning process. To promote learning efficiency and effectiveness, we present a personalized courseware recommendation system (PCRS) based on the proposed fuzzy item response theory (FIRT), which can recommend courseware with appropriate difficult level to learner through learner gives a fuzzy response of understanding percentage for the learned courseware. Experiment results show that applying the proposed fuzzy item response theory to Web-based learning can achieve personalized learning and help learners to learn more effectively and efficiently.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126450437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
Music piracy on peer-to-peer networks 点对点网络的音乐盗版
M. Fetscherin, Sabrina Zaugg
{"title":"Music piracy on peer-to-peer networks","authors":"M. Fetscherin, Sabrina Zaugg","doi":"10.1109/EEE.2004.1287343","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287343","url":null,"abstract":"Content providers from the music industry argue that peer-to-peer (P2P) networks such as KaZaA, Morpheus, iMesh, or Audiogalaxy are an enormous threat to their business. They furthermore blame these networks for their recent decline in sales figures. For this reason, an empirical investigation was conducted during a period of 6 weeks on one of the most popular files-sharing systems, in order to determine the quantity and quality of pirated music songs shared. We present empirical evidence as to what extent and in which quality music songs are being shared. A number of hypotheses are outlined and were tested. We studied, among other things, the number of users online and the number of flies accessible on such networks, the free riding problem, and the duration per search request. We further tested to see if there are any differences in the accessibility of songs based on the nationality of the artist, the language of the song, and the corresponding chart position. Finally, we outline the main hurdles users may face when downloading illegal music and the probability of obtaining high quality music tracks on such peer-to-peer networks.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126554569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
A decision support system for multiple objective linear programming 多目标线性规划决策支持系统
F. Wu, Jie Lu, Guangquan Zhang
{"title":"A decision support system for multiple objective linear programming","authors":"F. Wu, Jie Lu, Guangquan Zhang","doi":"10.1109/EEE.2004.1287342","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287342","url":null,"abstract":"A new approximate algorithm has been developed by Wu et al. for solving fuzzy multiple objective linear programming (FMOLP) problems with fuzzy parameters in any form of membership function in both objective functions and constraints. Based on the approximate algorithm, a fuzzy multiple objective decision support system (FMODSS) is developed. We focus on the description of use for FMODSS in detail, and an example is presented for demonstrating how to solve a FMOLP problem by the FMODSS.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127929038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Web surveys for electronic commerce: a review of the literature 电子商务的网络调查:文献综述
Hsiu-Mei Huang, S. Liaw
{"title":"Web surveys for electronic commerce: a review of the literature","authors":"Hsiu-Mei Huang, S. Liaw","doi":"10.1109/EEE.2004.1287292","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287292","url":null,"abstract":"E-commerce Websites often use animation, video, music and other multimedia effects to capture customers' attention. Thus, the design of a commercial Website plays an important role in attracting, sustaining and retaining the interest of a customer at a Web site. As we know, successful Web design gives high accessibility to anyone who visits the Website with Web browsers. With an increased percentage of the population using the Internet, Web surveys are particularly effective and useful to collect data for e-commerce. Whenever Web surveys are present and available, a potential threat to research exists due to the lack of sampling control. However, the use of access control might arouse potential suspicions about anonymity and confidentiality for respondents. To ensure validity and reliability, there is a need to view this dilemma along with its two accompanying issues: (1) sampling control, and (2) anonymous responses.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115208908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A conceptual analysis of the role of conversations in Web services composition 对Web服务组合中对话角色的概念分析
Z. Maamar, S. Mostéfaoui, Emad Bataineh
{"title":"A conceptual analysis of the role of conversations in Web services composition","authors":"Z. Maamar, S. Mostéfaoui, Emad Bataineh","doi":"10.1109/EEE.2004.1287285","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287285","url":null,"abstract":"We discuss the role of conversations in the composition of Web services. A Web service is an accessible application that other applications and humans can discover and trigger to satisfy needs. While much of the work has focused on low-level standards for publishing, discovering, and invoking Web services, it is deemed appropriate to start leveraging the Web services to the level of active components. Such components would be able for example to engage conversations and make decisions.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126053213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An efficient approach for the maintenance of path traversal patterns 维护路径遍历模式的有效方法
Show-Jane Yen, Yue-Shi Lee, Chung-Wen Cho
{"title":"An efficient approach for the maintenance of path traversal patterns","authors":"Show-Jane Yen, Yue-Shi Lee, Chung-Wen Cho","doi":"10.1109/EEE.2004.1287311","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287311","url":null,"abstract":"Mining frequent traversal patterns is to discover the consecutive reference paths traversed by a sufficient number of users from Web logs. The previous approaches for mining frequent traversal patterns need to repeatedly scan the traversal paths and take a large amount of computation time to find frequent traversal patterns. However, the discovered frequent traversal patterns may become invalid or inappropriate when the databases are updated. We propose an incremental updating technique to maintain the discovered frequent traversal patterns when the user sequences are inserted into or the database. Our approach partitions the database into some segments and scans the database segment by segment. For each segment scan, the candidate traversal sequences that cannot be frequent traversal sequences can be pruned and the frequent traversal sequences can be found out earlier. Besides, the number of database scans can be significantly reduced because some information can be computed by our approach. The experimental results show that our algorithms are more efficient than other algorithms for the maintenance of mining frequent traversal patterns.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"2451 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130951234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Trust and privacy in electronic commerce 电子商务中的信任与隐私
J. Chen, Yangil Park
{"title":"Trust and privacy in electronic commerce","authors":"J. Chen, Yangil Park","doi":"10.1109/EEE.2004.1287297","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287297","url":null,"abstract":"Trust and privacy have been widely recognized as important issues in the field of electronic commerce. We propose a research model with trust and privacy as two endogenous variables along with other exogenous variables like independent self-construal, interdependent self-construal, technological knowledge, and Web site quality, that are expected to effect Internet consumers' trust level and privacy concerns.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127238998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Development of a remote quick design system for woven fabrics 机织物远程快速设计系统的开发
Jeng-Jong Lin
{"title":"Development of a remote quick design system for woven fabrics","authors":"Jeng-Jong Lin","doi":"10.1109/EEE.2004.1287307","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287307","url":null,"abstract":"The development of a remote quick design system is presented. The system can access through the Web, which can be used to quickly generate an optimized set of weaving parameters. The developed system is a client/server configuration where Web browsers were used as a generic client environment serving interface linking the client's parameter input to the search system located on the server side through the common gateway interface. The searching mechanism, developed in Turbo C programming environment and theory based on genetic algorithm, can find several desired solutions of the weaving parameters for the production of woven fabrics under controlled cost through access to the Web side. Moreover, the search mechanism was implemented by integrating the Internet information server 3.0 (IIS 3.0) Web server and a user interface was developed and underlying 2000 server platform. Through the assistance of this Web-based system the weaving mill can integrate the resource of different divisions (e.g. design division, production division and financial division) located at various areas on the earth to fulfill a perfect design of woven fabrics and enhance the enterprise's global competition power.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133893588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart card-based irregular access patterns detection system 基于智能卡的不规则访问模式检测系统
A. Leong, S. Fong, Shirley W. I. Siu
{"title":"Smart card-based irregular access patterns detection system","authors":"A. Leong, S. Fong, Shirley W. I. Siu","doi":"10.1109/EEE.2004.1287363","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287363","url":null,"abstract":"This paper describes a smart-card based solution that further extends the concept of static access control list by performing real-time analysis over user's access patterns, thus allowing early detection of abnormal card usages. A list of irregular behaviors are identified and classified to formulate a logical model that quantifies abnormal usage behaviors. Based on this model, a real-time suspicious action detection prototype is developed, allowing rapid alert and reaction towards irregular behaviors. Finally, example scenarios on some applications on electronic commerce are discussed.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123860588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An ASEP (advanced secure electronic payment) protocol design using 3BC and ECC(F/sub 2//sup m/) algorithm 采用3BC和ECC(F/sub 2//sup m/)算法设计高级安全电子支付协议ASEP
Byung kwan Lee, Tai-Chi Lee, S. Yang
{"title":"An ASEP (advanced secure electronic payment) protocol design using 3BC and ECC(F/sub 2//sup m/) algorithm","authors":"Byung kwan Lee, Tai-Chi Lee, S. Yang","doi":"10.1109/EEE.2004.1287332","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287332","url":null,"abstract":"Unlike SET (secure electronic transaction) protocol. We propose an ASEP (advanced secure electronic payment) protocol, which uses ECC (elliptic curve cryptosystem with F/sub 2/ not F/sub p/) [N. Koblitz, (1987), V. S Miler, (1986), G. Harper et al., (1993)], SHA (secure hash algorithm) and 3BC (block byte bit cipher) instead of RSA and DES. To improve the strength of encryption and the speed of processing, the public key and the private key of ECC are used in SBC [I. S. Cho (2002)] algorithm, which generates session keys for the data encryption. In particular, when ECC is combined with SBC, the strength of security is improved significantly. As the process of the digital envelope used in the existing SET protocol is removed by the SBC algorithm, the processing time is substantially reduced. In addition, the use of multiple signatures has some advantages of reducing the size of transmission data as an intermediate payment agent and avoiding the danger of eavesdropping of private keys.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128579186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信