{"title":"SLA representation and applications in the NGI service management","authors":"Zhang Ruo-ying, Qiu Xue-song, Meng Luo-ming","doi":"10.1109/CEC-EAST.2004.59","DOIUrl":"https://doi.org/10.1109/CEC-EAST.2004.59","url":null,"abstract":"The emerging new service and its QoS management requirements are challenging the NGI service management, demanding extendibility and scalability. SLA has been considered as an effective way of solving QoS management. First the characteristics of a normative SLA representation are presented. Then a neutral template of SLA representation service-independent and technology-independent is proposed. At last the application scenarios in the NGI service management -XML-based SLA, SLA negotiation in the stage of service fulfillment, QoS violation in the stage of service assurance- are discussed in details according to the template","PeriodicalId":433885,"journal":{"name":"IEEE International Conference on E-Commerce Technology for Dynamic E-Business","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130209681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A sense-and-respond approach to business transformation","authors":"P. Huang, Shubir Kapoor, Steve Buckley","doi":"10.1109/CEC-EAST.2004.9","DOIUrl":"https://doi.org/10.1109/CEC-EAST.2004.9","url":null,"abstract":"Business process technology has been one of the drivers and enablers of business transformation in the last decade. In essence, a business process represents a specific way of executing and coordinating business activities. Middleware that can help model and execute business processes along with integrating those processes with multiple vendor applications has been used widely in many large enterprises, and is fast gaining momentum in the small and medium business sector. As automated business processes become prevalent, we have seen a new wave of business transformation emerging: enterprises start looking for capabilities to intelligently monitor and control their business operations, and to link the operational performance with their business strategy. This new wave of business transformation is aimed to achieve a higher level of governance, i.e., to support \"smart\" decision-making and control of business processes. In this paper, we propose a sense-and-respond approach to intelligent business process control. A sense-and-respond loop typically consists of three steps: sensing, analyzing and decision-making, and execution. In this paper we focus on the design of a decision-making framework","PeriodicalId":433885,"journal":{"name":"IEEE International Conference on E-Commerce Technology for Dynamic E-Business","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125369387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Measuring globalization of ICT industries: empirical evidence across six economies of East Asia and over time","authors":"Yi-Min Chen, F. Lin","doi":"10.1109/CEC-EAST.2004.45","DOIUrl":"https://doi.org/10.1109/CEC-EAST.2004.45","url":null,"abstract":"This paper presents an objective measurement of industry globalization for ICT industries across six economies, China. Hong Kong, Japan, Singapore, South Korea, and Taiwan. Previous studies on the measurement of industry globalization had focused on the chemical and manufacturing industries rather than ICT sectors, and aimed at the advanced countries, especially the United States, rather than the developing countries. Since information technology is still one of the emergent ideas that are changing the way business is done, and East Asia is becoming the world's manufacturing center of ICT sectors, this study explores where there is the same ground for industry globalization of ICT sectors across economies of East Asia. Based on the levels of international linkages and the integration of value-added activities within the industry, the result shows that most of East Asia's ICT industries are highly global-oriented, either simple or integrated global, except Japan's communications equipment sector, which is multidomestic transitional","PeriodicalId":433885,"journal":{"name":"IEEE International Conference on E-Commerce Technology for Dynamic E-Business","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122326265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xingxin Gao, Zhe Xiang, Hao Wang, Jun Shen, Jian Huang, Song Song
{"title":"An approach to security and privacy of RFID system for supply chain","authors":"Xingxin Gao, Zhe Xiang, Hao Wang, Jun Shen, Jian Huang, Song Song","doi":"10.1109/CEC-EAST.2004.14","DOIUrl":"https://doi.org/10.1109/CEC-EAST.2004.14","url":null,"abstract":"Radio frequency identification (RFID) is expected to become pervasive and ubiquitous, as it can be embedded into everyday items as smart labels. A typical scenario of exploiting RFID is supply chain. The RFID based supply chain management yields convenience, efficiency and productivity gains. However, RFID systems create new risks to security and privacy. We briefly present the current solutions to RFID security and privacy. A new approach is then proposed, which exploits randomized read access control and thus prevents hostile tracking and man-in-the-middle attack. In addition, compared with current schemes that achieve the similar security level, the proposed approach dramatically decreases the computation load. Another benefit is that it is suitable for RFID systems with a large number of tags","PeriodicalId":433885,"journal":{"name":"IEEE International Conference on E-Commerce Technology for Dynamic E-Business","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121172500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new idea of e-learning: establishing video library in University Network League","authors":"Lin Cai, Yafei Yang, Yixian Yang","doi":"10.1109/CEC-EAST.2004.4","DOIUrl":"https://doi.org/10.1109/CEC-EAST.2004.4","url":null,"abstract":"This paper proposes a new idea of e-learning that is different from the distant education: Establishing video library in University Network League. In this project, enormous database needs to be established to storage classified prelection video of excellent instructors. Universities will be invited to join the Network League, and the unbalanced distribution of education resources will be greatly alleviated, which benefit both the students and faculty. Through analyzing its feasibility, possible problems and framework, this paper provides a practical project that can be developed widely in developing countries","PeriodicalId":433885,"journal":{"name":"IEEE International Conference on E-Commerce Technology for Dynamic E-Business","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134300533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Business models and solution architectures for SMB financing in a supply chain ecosystem","authors":"Wei Sun, Jing Li, Dong Liu, G. Feng, Peng Li","doi":"10.1109/CEC-EAST.2004.26","DOIUrl":"https://doi.org/10.1109/CEC-EAST.2004.26","url":null,"abstract":"In this paper, characteristics of financing requests from SMB supply chain trading partners is investigated, and new financing models are proposed: transaction based credit financing is developed for SMB suppliers to raise financing requests using transaction related documents, risk is mitigated by the credit line transferred from downstream core manufacturer; Mortgage based warehouse financing is explored for SMB dealer and distributor to raise financing requests using stock deposit at the warehouse. In this way risk is reduced by the control of stock. Business integration and risk control related techniques are essential for the proposed business models. Key technologies and architecture that support the proposed financing models are discussed","PeriodicalId":433885,"journal":{"name":"IEEE International Conference on E-Commerce Technology for Dynamic E-Business","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133835274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A study of the self-organization modeling of distributed manufacturing network","authors":"Gang Li, Linyan Sun, Haiquan Li","doi":"10.1109/CEC-EAST.2004.10","DOIUrl":"https://doi.org/10.1109/CEC-EAST.2004.10","url":null,"abstract":"Distributed manufacturing network provides flexibility and agility in responding to customer demand shifts. The fundamental premise of this philosophy is: self-organization behavior emerges from the interactions between multiple autonomous business entities represented in it. Self-organization behavior in the distributed manufacturing network leads the system to find a reasonable solution for complex manufacturing problems and evolve with changes. This paper proposes a three layer conceptual model of the distributed manufacturing network and develops agent based approaches for the modeling and problem solving of self-organization distributed manufacturing network. The coordination mechanism based on stigmergy and swarm intelligence in the system provides a high degree of flexibility and adaptability","PeriodicalId":433885,"journal":{"name":"IEEE International Conference on E-Commerce Technology for Dynamic E-Business","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133862227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Heterogeneity resolution based on ontology in Web services composition","authors":"Derong Shen, Yu Ge, Yin Nan, Tiezheng Nie","doi":"10.1109/CEC-EAST.2004.41","DOIUrl":"https://doi.org/10.1109/CEC-EAST.2004.41","url":null,"abstract":"Heterogeneity issues in Web services composition are discussed and classified into heterogeneity between semantic equivalent Web services and heterogeneity between sequent Web services in a process flow, we induce these heterogeneity issues into six types of conflicts, namely semantic conflict, data type conflict, Structure conflict, parameter number conflict, data unit conflict and data precision conflict. Then, an ontology based conflict resolution is designed, including the definition of domain ontology knowledge for business specification, the definition of domain and industry terms ontology knowledge for describing the profile information of Web services and the definition of meta-ontology knowledge for transformation. Furthermore, the implementation issues are presented","PeriodicalId":433885,"journal":{"name":"IEEE International Conference on E-Commerce Technology for Dynamic E-Business","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114709780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new layered P2P architecture with efficient resource location strategy","authors":"Hai Jin, Xiangzhou Guo, Chao Zhang, Quan Yuan","doi":"10.1109/CEC-EAST.2004.5","DOIUrl":"https://doi.org/10.1109/CEC-EAST.2004.5","url":null,"abstract":"The usability of peer-to-peer (P2P) systems depends on effective techniques to find and retrieve data. In this paper, we propose a scalable structure for P2P system, with hierarchical topology and an efficient resource location strategy. Furthermore, performance evaluation for the propose search strategy by comparing with flooding scheme and k-walker random walk are also provided","PeriodicalId":433885,"journal":{"name":"IEEE International Conference on E-Commerce Technology for Dynamic E-Business","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114423493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive fuzzy approach to estimate supplier's competitiveness in open e-bidding","authors":"T. Pham, S.K. Fuchter, G. Chen","doi":"10.1109/CEC-EAST.2004.12","DOIUrl":"https://doi.org/10.1109/CEC-EAST.2004.12","url":null,"abstract":"This paper presents an adaptive fuzzy approach to estimate the competition of the suppliers in an open electronic bidding. The competition is formulated as the supply curve relating pricing against requested quantity. A set of supply curves, each from a competitor, is formulated into fuzzy expression to allow flexibility for a supplier to prepare an optimal pricing policy that deals with the fact that other competitors are also adapting at some unknown rate. The pricing policy is formulated into a mathematical expression that is easily adjusted as new information on the competitors becomes available. A revision of pricing policy for a supplier to compete on the pricing basis while maintaining an optimal profit margin is derived as an application. Computer simulations are provided to demonstrate the workability of this approach","PeriodicalId":433885,"journal":{"name":"IEEE International Conference on E-Commerce Technology for Dynamic E-Business","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129215760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}