{"title":"Increasing the customer's choice: query expansion based on the layer-seeds method and its application in e-commerce","authors":"Libo Chen, M. L'Abbate, U. Thiel, E. Neuhold","doi":"10.1109/EEE.2004.1287329","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287329","url":null,"abstract":"In e-commerce it is often crucial to provide customers a large choice of relevant offers. As short and incomplete queries prevail, appropriate expansion methods are desirable. This work describes a method for the automatic construction of a thesaurus based on existing categories of documents. A clustering algorithm, the \"Layer-Seeds method\", is introduced, which facilitates the automatic generation of thesaurus reflecting the specific vocabulary occurring in a given collection of documents. The clustering works on terms extracted from the documents in a certain category and organizes them in a tree-like hierarchical structure - a thesaurus. The thesaurus is then employed for automatic query expansion in an e-commerce application in order to obtain better results for product searching. Experiments yield evidence that a significant increase of user satisfaction is achieved.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121931176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A scheme for MAC isolation to realize effective management in public wireless LAN","authors":"Liquan Chen","doi":"10.1109/EEE.2004.1287347","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287347","url":null,"abstract":"Recently, IEEE 802.11 wireless LAN (WLAN) technology was rapidly developed and the high-speed wireless access was stepping into our lives. In public areas, the architecture of public wireless LAN (public WLAN) is proposed to solve the emerging management problems such as authentication, accounting and authorization, etc. [J.A. Laurila et al., (2001)]. But there is no previous good solution mentions the management for use of network operators' equipments. We specify how to use MAC isolation to enhance the public WLAN effective management. For IEEE 802.11 compliance, we propose a scheme to implement the MAC isolation by re-design the state machine of distribution/spl I.bar/service component in WLAN access point. Finally, a WLAN access point solution based on MPC860 embedded processor hardware and embedded Linux software is specified, and the simulation of MAC isolation in public WLAN is also presented. The result shows that the scheme by re-design the state machine of distribution/spl I.bar/service component in IEEE 802.11 access point to realize MAC isolation is effective and realizable.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115162331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"e-Transformation technologies: case studies and the road ahead - a value chain perspective","authors":"W. K. Cheung","doi":"10.1109/EEE.2004.1287355","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287355","url":null,"abstract":"E-transformation technologies, for the past few years, have been evolving towards the goal of information integration and system interoperability. While there is no doubt that interoperable systems can enable many value-added functions and provide new business opportunities, whether the current development trend can really lead to some real impacts on people's daily lives is still a commonly asked question. In this paper, we first describe a value chain of e-transformation that starts from the availability of data from heterogeneous sources and stops at the ultimate goal of autonomous and context-aware computational services provision. Two prototypes, namely e-Bus Planner and e-Food Marketplace are described for demonstrating the promises that can be provided by information integration. We then argue that the value adding process should further be advanced along the chain by analyzing Web-based social networks. The ultimate objective is to benefit the end-users more directly and immediately.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125460915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Personalizing information services on wired and wireless networks","authors":"Wei-Po Lee, Ming-Hsiang Su","doi":"10.1109/EEE.2004.1287320","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287320","url":null,"abstract":"The increasing Internet contents cause the problem of information overload. We present a generic framework and discuss the main issues in personalizing Internet information services to solve this problem.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125587793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Personalized product recommendation in e-commerce","authors":"S. Weng, Meiran Liu","doi":"10.1109/EEE.2004.1287340","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287340","url":null,"abstract":"The purpose is to analyze customers' purchasing behaviors based on product features from transaction records and product feature databases. Customers' preferences toward particular features of products are analyzed and then rules of customer interest profiles are thus derived in order to recommend customer products that have potential attraction with customers. The approach of this paper has its strength to be able to recommend to customers brand new products or rarely purchased products as long as they fit customer interest profiles. This research also derives customers' interest profiles that can explain recommendation results. The interests on particular features of products can be referenced for product development.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128373367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed plug-and-play network management model based on mobile agents","authors":"Nan Guo, Tianhan Gao, Hong Zhao","doi":"10.1109/EEE.2004.1287351","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287351","url":null,"abstract":"As network is developing to distribution and heterogeneity, legacy network management systems do not work efficiently on operator-intensive distribution of management tasks. A distributed plug-and-play network management model is presented to implement an automatic and self-adapting network management system. In this model, network components can automatically locate the proper management stations, which are configured in specified function, as added to network and get initial management tasks without human intervention. We adopt mobile agent infrastructure to communicate and fulfill management tasks, thus improve the flexibility and autonomy. Moreover, it makes extension and update of management tasks at run-time, thus increases self-adapting capability of the model.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133327675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Algorithms for community subject-identification: experiments and test results","authors":"Deepak Subramoniam, J. John","doi":"10.1109/EEE.2004.1287309","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287309","url":null,"abstract":"We deal with the problem of finding the subject that a given set of pages deals with. The algorithms presented have been designed with a view to provide good results when pages that belong to community (or handle some common topic) are presented to them. When a set of pages are presented, the algorithms return a set of words ordered in the decreasing order of relevance. The words among the first few can be used to identify the topic that the set deals with. The algorithms have been tested by providing them with pages returned from a search engine for a given search query and their performance is assessed based on how high the words used in the search query are placed in the list returned by the algorithm.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131143318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A division-of-labor-signature (t, n) threshold-authenticated encryption scheme with message linkage based on the elliptic curve cryptosystem","authors":"Tzer-Shyong Chen, Kuo-Hsuan Huang, Yu-Fang Chung","doi":"10.1109/EEE.2004.1287295","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287295","url":null,"abstract":"We present a new (t, n) threshold-authenticated encryption scheme with message linkage to reduce the load on the signer using a division-of-labor signature. Only t signers can examine and sign an over-large message on behalf of the whole group, by dividing the whole message into a few readable submessage blocks; then, each signer needs only to examine and sign the designated submessage block rather than the whole message. Consequently, the load on the signer should be substantially reduced to improve the performance. Moreover, the proposed scheme is based on the elliptic curve cryptosystem, because of its highly efficient performance and comprehensiveness of security, supporting the practical use of the scheme.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132303871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using element and document profile for information clustering","authors":"J. Lai, B. Soh","doi":"10.1109/EEE.2004.1287354","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287354","url":null,"abstract":"The tremendous growth in the amount of information available and the number of visitors to Web sites in the recent years poses some key challenges for information filtering and retrieval. Web visitors not only expect high quality and relevant information, but also wish that the information be presented in an as efficient way as possible. The traditional filtering methods, however, only consider the relevant values of document. These conventional methods fail to consider the efficiency of documents retrieval. In this paper, we propose a new algorithm to calculate an index called document similarity score based on elements of the document. Using the index, document profile will be derived. Any documents with the similarity score above a given threshold are clustered. Using these pre-clustered documents, information filtering and retrieval can be made more efficient.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114956392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image authentication using relation measures of wavelet coefficients","authors":"Yuan-Liang Tang, Ching-Ting Chen","doi":"10.1109/EEE.2004.1287362","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287362","url":null,"abstract":"In this paper, a novel watermarking technique for image authentication is proposed. This technique operates in the wavelet domain and makes use of semifragile watermarks for achieving better robustness. The image is first transformed into the wavelet domain and the relations between neighboring coefficients are utilized to authenticate the integrity of the image content. By carefully designing the processes of feature extraction and watermark embedding, the proposed method is able to identify malicious changes made on the image, while very insensitive to common image processing. In addition, the system is secure because not only the watermark is protected by a private key but also building relations between coefficients significantly discourages an adversary from performing the collage attack.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125228125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}