{"title":"A new method in multi-issue negotiation","authors":"Ning Zhang, Song Zhang, Lei Wang, Jie Yang","doi":"10.1109/CEC-EAST.2004.6","DOIUrl":"https://doi.org/10.1109/CEC-EAST.2004.6","url":null,"abstract":"In this paper we describe a mechanism for automated negotiation in which artificial agents can deal with a multiissue negotiation in a one-to-many way based on some strategies. The negotiation process are governed dynamically by some strategies that emphasize on the diverse processing methods under the considering of different commodity attributes, including dynamic delayed evaluation and response to the received offers, generation of offer group with the same utility. Our analysis shows that the mechanism ensures that bargaining agents could reach a better agreement automatically. We also implement a prototype system to verify the advantages of our mechanism","PeriodicalId":433885,"journal":{"name":"IEEE International Conference on E-Commerce Technology for Dynamic E-Business","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124988307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An interest group model for content location in peer-to-peer systems","authors":"Guangmin Xue, Jingbo You, Zhaoqing Jia","doi":"10.1109/CEC-EAST.2004.19","DOIUrl":"https://doi.org/10.1109/CEC-EAST.2004.19","url":null,"abstract":"Intuitively, the peers who share common interests tend to have a high probability of connecting to each other and sharing the resources. In this paper, we use the probabilistic decision tree to represent user's interests. Based on the interest probabilistic decision tree, we use an interest group model to organize the peers with common interests into one group. When using our algorithm, a significant amount of flooding can be avoided so as to make the unstructured peer-to-peer network a more competitive solution. The extensive simulation results show the effectiveness of the proposed model in a peer-to-peer system","PeriodicalId":433885,"journal":{"name":"IEEE International Conference on E-Commerce Technology for Dynamic E-Business","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125188477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The HMM-based model for evaluating recommender's reputation","authors":"Weihua Song, V. Phoha, Xin Xu","doi":"10.1109/CEC-EAST.2004.64","DOIUrl":"https://doi.org/10.1109/CEC-EAST.2004.64","url":null,"abstract":"There is limited research on evaluating an agent's reputation as a recommender. A key challenge is that a recommender's reputation is affected by both the recommender's trustworthiness and the recommender's expertise, including the recommender's trust knowledge of others and the reliability of the recommender's trust evaluation models. We give an ordered depth-first search with threshold (ODFST) algorithm to find the optimal referral chain. We then develop a hidden Markov model (HMM) based approach to measure an agent's reputation as a recommender. This approach models chained recommendation events as an HMM. The features of the trust model are: (1) no explicit requirement of chained recommendation reputations; (2) flexible recommendation network with presence of loops; and (3) integration of learning speed into trust evaluation reliability. The experimental results showed the convergence and reliability of the proposed trust model","PeriodicalId":433885,"journal":{"name":"IEEE International Conference on E-Commerce Technology for Dynamic E-Business","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129473538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Visibility and measurability for trust management in cooperative business operations","authors":"M. Castellanos, F. Casati, M. Shan, U. Dayal","doi":"10.1109/CEC-EAST.2004.73","DOIUrl":"https://doi.org/10.1109/CEC-EAST.2004.73","url":null,"abstract":"Trust is essential to establish relationships with other entities like business partners and service providers. A key aspect of trust is transparency. Only by having a certain level of visibility into what others are doing on our behalf, we can build trust in our relationships with them. In this paper we present a framework and a platform for trust management that facilitates visibility and measurability into the execution of requested or outsourced services. The key benefit of the proposed approach is that service providers can offer visibility over their processes in a selective fashion, by allowing providers to define process-oriented views over business operations and by letting prospective and current customers assess process execution quality without exposing confidential information","PeriodicalId":433885,"journal":{"name":"IEEE International Conference on E-Commerce Technology for Dynamic E-Business","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130483137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pricing strategies for information products: a review","authors":"Wang Kanliang","doi":"10.1109/CEC-EAST.2004.52","DOIUrl":"https://doi.org/10.1109/CEC-EAST.2004.52","url":null,"abstract":"Information product grows rapidly with the penetration of the Internet and communication technologies. Due to its unique cost structure and characteristics, it is almost impossible for its publisher to follow the traditional pricing strategy (cost plus). The essay presents a brief review of the available pricing strategies based on the framework of Pigou's typology of price discrimination. Some recent advances related to the pricing strategy of information products are outlined","PeriodicalId":433885,"journal":{"name":"IEEE International Conference on E-Commerce Technology for Dynamic E-Business","volume":"21 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131520486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The design and implementation of a directory based wireless network operation management system","authors":"lng-Yi Chen, Chao Huang, Chen-Hsin Tsai","doi":"10.1109/CEC-EAST.2004.63","DOIUrl":"https://doi.org/10.1109/CEC-EAST.2004.63","url":null,"abstract":"The goal of this research is to implement a hierarchical wireless network operation management system based on LDAP technology. The architecture of such a management system is particularly beneficial in reducing the cost of ownership for any information system built to enable device management service and AAA service - the two major services required by WISPs. Two subsystems have been successfully implemented in the proposed wireless network operation management system: device management center and aaa service center. The results of this research can enhance WISPs' competitiveness significantly in today's demanding wireless market","PeriodicalId":433885,"journal":{"name":"IEEE International Conference on E-Commerce Technology for Dynamic E-Business","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129854961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient interval indexing for content-based subscription e-commerce and e-service","authors":"Kun-Lung Wu, S.-K. Chen, P. Yu, M. Mei","doi":"10.1109/CEC-EAST.2004.38","DOIUrl":"https://doi.org/10.1109/CEC-EAST.2004.38","url":null,"abstract":"This paper presents a dynamic interval index for fast event matching against a large number of predicate intervals specified by content-based subscriptions. A set of virtual construct intervals (VCIs) are predefined, with a unique ID and an associated ID list. Each predicate interval is decomposed into one or more VCIs, which become activated by the predicate. The predicate ID is then inserted into the ID lists associated with the decomposed VCIs. To facilitate fast search, we start with a bitmap vector to indicate the activation of VCIs that cover an attribute value. Then, we study various techniques to reduce the storage cost, including logarithmic construct intervals (LCI), which reduce the total number of VCIs, bitmap clipping which prunes certain positions of a bitmap vector, and bitmap virtualization, which eliminates the bitmap. Simulations are conducted to evaluate and compare these techniques","PeriodicalId":433885,"journal":{"name":"IEEE International Conference on E-Commerce Technology for Dynamic E-Business","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114219343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Realizing business components, business operations and business services","authors":"David Flaxer, A. Nigam","doi":"10.1109/CEC-EAST.2004.55","DOIUrl":"https://doi.org/10.1109/CEC-EAST.2004.55","url":null,"abstract":"Business components are founded on the notion that complex business organizations can be decomposed into discrete into self-functioning logical units. Decomposing an enterprise into business components facilitates a logical understanding of business design and can be leveraged to provide finer levels of detailed analysis on how it operates. This involves a range of improvements, from evaluating and validating business organization structures, extending to ways of expressing dynamic relationships among business components, and finally, influencing the IT application base and infrastructure that realize the business intent","PeriodicalId":433885,"journal":{"name":"IEEE International Conference on E-Commerce Technology for Dynamic E-Business","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123610501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The value of a university-based content provider: a case study of SunnyNet","authors":"F. Lin, K. Huarng","doi":"10.1109/CEC-EAST.2004.67","DOIUrl":"https://doi.org/10.1109/CEC-EAST.2004.67","url":null,"abstract":"In view of the sheer growth of electronic commerce, users and organizations rushed online to exchange information and conduct commerce. There are full of data, information, and knowledge which can be accessed on the Internet. The learning is not restricted to the physical classroom. Students can explore the knowledge from the online data source. As a consequence, many universities have focused on the training of information literacy. This paper introduces a university-based content provider to demonstrate the work of resource-based learning. This is done through a detailed examination of the structure of the organization, the personnel, and the training process. We focus on the concept of designing and maintaining a self-organizing and self-learning student group","PeriodicalId":433885,"journal":{"name":"IEEE International Conference on E-Commerce Technology for Dynamic E-Business","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127483751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"P2P research and reality: some preliminary thoughts","authors":"Zheng Zhang","doi":"10.1109/CEC-EAST.2004.49","DOIUrl":"https://doi.org/10.1109/CEC-EAST.2004.49","url":null,"abstract":"In this paper, we start by recounting some of the myth and truth of P2P systems. We perform researches that understand the fundamental properties, and that actually build the environment and forester the creativity of new applications","PeriodicalId":433885,"journal":{"name":"IEEE International Conference on E-Commerce Technology for Dynamic E-Business","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115464998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}