{"title":"SemreX: Towards Large-Scale Literature Information Retrieval and Browsing with Semantic Association","authors":"Xiaomin Ning, Hai Jin, Hao Wu","doi":"10.1109/ICEBE.2006.87","DOIUrl":"https://doi.org/10.1109/ICEBE.2006.87","url":null,"abstract":"Access to scientific literature information is a very important, as well as time-consuming daily work for scientific researchers. Current methods of retrieval are usually limited to keyword-based searching using information retrieval techniques. In this paper, we present SemreX which implements efficient large-scale literature retrieval and browsing with a single access point based on semantic Web technologies. The concept of semantic association is proposed to reveal explicit or implicit relationships between semantic entities, combining with the ontology-based information visualization technique so as to facilitate researchers retrieving semantically relevant information, as well as context relationships which can capture user's current search intentions while preserving an overall picture of scientific knowledge","PeriodicalId":439165,"journal":{"name":"2006 IEEE International Conference on e-Business Engineering (ICEBE'06)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117165162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Simulation Approach for Analyzing the Competition among e-Auction Marketplaces","authors":"Xin Chen, J. Mäkiö","doi":"10.1109/ICEBE.2006.14","DOIUrl":"https://doi.org/10.1109/ICEBE.2006.14","url":null,"abstract":"In recent years, many e-auction marketplaces have been built and some of them provide similar e-auction services. The sellers and buyers who want to trade via online auctions then have the opportunities to compare and select a marketplace to trade. Therefore, the marketplaces compete with each other to attract participants. This paper proposed a simulation approach for studying such competition between marketplaces. We consider one simple scenario with two competing marketplaces and built the simulation model. This model is implemented within a simulation framework, which is designed and can be applied to many other models generally. Simulation experiments are configured and executed afterwards. The experiment results works not only as a proof of concept, but also confirms theoretical results. The simulation approach proposed in this paper enables a novel way for analyzing the competition among e-auction marketplaces, and such approach can be easily applied for a wide range of competition scenarios between e-auction marketplaces","PeriodicalId":439165,"journal":{"name":"2006 IEEE International Conference on e-Business Engineering (ICEBE'06)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124747161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel algorithm SF for mining attack scenarios model","authors":"Li Wang, Zhitang Li, Jie Lei, Yao Li","doi":"10.1109/ICEBE.2006.9","DOIUrl":"https://doi.org/10.1109/ICEBE.2006.9","url":null,"abstract":"Large volume of security data can overwhelm security managers and keep them from performing effective analysis and initiating timely response. Therefore, it is important to develop an advanced alert correlation system to reduce alert redundancy, intelligently correlate security alerts and detect attack strategies. In our system, we introduced statistical filtering method in attack plan recognition. We apply statistical-based techniques to filter out separated and scattered attack behavior and mining frequent attack sequence patterns from the remainder. We use correlativity between two elements in frequent attack sequences to correlate the attack behavior and identify potential attack intentions based on it. We evaluate our approaches using DARPA 2000 data sets. The experiment shows that our approach can effectively discover attack scenarios in reality, provide a quantitative analysis of attack scenarios","PeriodicalId":439165,"journal":{"name":"2006 IEEE International Conference on e-Business Engineering (ICEBE'06)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122018981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Untraceable Electronic Cash System Using Fair Blind Signatures","authors":"Hui-Feng Huang, Chinchen Chang","doi":"10.1109/ICEBE.2006.25","DOIUrl":"https://doi.org/10.1109/ICEBE.2006.25","url":null,"abstract":"Since the blind signature scheme has the unlinkability property, it can be used for untraceable electronic cash systems. The unlinkability property protects the privacy of users; however, it may be abused by criminals, e.g., to launder money or to safely get a ransom. The techniques of fair blind signature are developed to withstand the misuse of unlinkability property. In this paper, we propose not only a user-efficient but also a signer-efficient fair blind signature scheme for untraceable electronic cash. Only with the help from a judge or government, the signer or the banker can derive the link between a signature and the instance of the signing protocol which produces the signature when the unlinkability property is abused. Comparing with existing fair blind signature schemes, our method greatly reduces the computational load of an on-line judge. Hence, the proposed method with an efficient judge can let the signer provide more efficient services to the signature requesters. It is also suitable for the limited computation capacities of users such as smart cards or mobile units. So, the proposed scheme is very useful for e-commerce transactions","PeriodicalId":439165,"journal":{"name":"2006 IEEE International Conference on e-Business Engineering (ICEBE'06)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122876376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Taxonomy of Java Web Application Frameworks","authors":"T. Shan, Winnie W. Hua","doi":"10.1109/ICEBE.2006.98","DOIUrl":"https://doi.org/10.1109/ICEBE.2006.98","url":null,"abstract":"This paper describes various Web application frameworks and related emerging technologies pertinent to the Java EE model from a technical perspective. A definition of \"Web application framework\" is specified, as this terminology has been widely used and implies drastically different meanings in different contexts. The value proposition of a Web application framework is presented to illustrate how a framework can improve the application development productivity and quality. The design philosophy of Web application frameworks is articulated. A comprehensive taxonomic scheme is defined to classify various software frameworks and Web application frameworks into appropriate categories. Among dozens of Web application frameworks available as commercial and open source solutions, the predominant products are investigated, followed by the selection guidelines and recommendations. A reference card is constructed to summarize the key aspects of Web application frameworks. Relevant technologies and future trends are also discussed","PeriodicalId":439165,"journal":{"name":"2006 IEEE International Conference on e-Business Engineering (ICEBE'06)","volume":"26 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125855462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zongwei Luo, Terry Chan, Jenny S. Li, E. Wong, W. K. Cheung, Victor C. Ng, W. Fok
{"title":"Experimental Analysis of an RFID Security Protocol","authors":"Zongwei Luo, Terry Chan, Jenny S. Li, E. Wong, W. K. Cheung, Victor C. Ng, W. Fok","doi":"10.1109/ICEBE.2006.49","DOIUrl":"https://doi.org/10.1109/ICEBE.2006.49","url":null,"abstract":"Radio frequency identification (RFID) technology is expected to become a critical and ubiquitous infrastructure technology of logistics and supply chain management (SCM) related processes and services. Low-cost has been the key to RFID adoption in many logistics/SCM applications. However, the deployment of such tags may create new threats to user privacy due to the powerful track and trace capabilities of the tags, in addition to tag/reader manufacturing challenges. As a result, some security mechanisms must be imposed on the RFID tags for addressing the privacy problems. This paper provides detailed discussion on our proposal of a lightweight RFID security protocol. It examines the features and issues through experimental analysis pertinent to efficiency and scalability to meet the requirements of the proposed security protocol in metering and payment e-commerce applications","PeriodicalId":439165,"journal":{"name":"2006 IEEE International Conference on e-Business Engineering (ICEBE'06)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128885385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Discovering Innovation","authors":"C. Lasser","doi":"10.1109/ICEBE.2006.42","DOIUrl":"https://doi.org/10.1109/ICEBE.2006.42","url":null,"abstract":"Summary form only given. Some have called it the \"big blue brain storm\" (Business week Aug 8, 2006). Led by its CEO Sam Palmisano, IBM is reaching out to its worldwide workforce, calling on family and friends and business associates and inviting them to participate in a world innovation JAM. IBM has brought together over 104,000 participants in a marathon 76 hour online session in the hopes of linking ideas and technologies that will lead to new business for IBM, help to solve societal problems and maybe revolutionize industry. The technologies that IBM used as its started set were from its worldwide research centers. These included biometric authentication which uses secure identity cards with your biometric information as a way to protect you against identity theft. There's communication pattern analysis with collaborative organizational analysis technology that analyzes communications within a company to both uncover internal patterns and identify potential changes that can be made to improve the organization's efficiency. And the last example is Super Simulations. These are systems like IBM's Blue Gene that are able to handle very sophisticated mathematical models that use real-time streams of real-world data to simulate everything from the weather to biological processes, and allow us to begin making predictions about real-world behaviors. The JAM is the latest in IBM's continuing efforts to create a culture of innovative thinking in its company. But that's only one of the ways IBM thinks about innovation there are others. The Global Innovation Outlook (GIO), has opened up IBM's technical and business forecasting processes to include external leaders from business, academia, the public sector, NGOs and other influential constituents of the world community. The GIO takes a deep look at some of the most pressing issues facing the world and works toward providing solutions to those needs: the future of the enterprise; energy and the environment; and transportation and mobility","PeriodicalId":439165,"journal":{"name":"2006 IEEE International Conference on e-Business Engineering (ICEBE'06)","volume":"330 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121584661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A User-Centred Design Approach For Agent Based E-Business Systems","authors":"R. Iqbal, N. Shah, K. Chao, Anne E. James","doi":"10.1109/ICEBE.2006.15","DOIUrl":"https://doi.org/10.1109/ICEBE.2006.15","url":null,"abstract":"An important aspect of designing for ubiquitous e-business applications is addressing the issues concerning user requirements and culture in which the system is to be deployed. The value of ethnographic analysis in this respect is gaining increasing acceptance. In this paper, we present an approach based on ethnography and multi-agents systems to address these issues. The usage of ethnographic approach provides an understanding of user requirements and explains the semantics, functionality and detailed business needs of e-business applications. We also stress the need of employing artificial intelligent agents that are suitable for e-business applications due to their autonomy, flexible behaviour and negotiating capabilities. Secondly, ethnographic concepts can directly be mapped onto the BDI (belief desire, intention) model of an agent. In this paper, we also demonstrate the usefulness of this approach by presenting a real life case study of a tailoring system","PeriodicalId":439165,"journal":{"name":"2006 IEEE International Conference on e-Business Engineering (ICEBE'06)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115936795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An environment of modeling business centric monitoring and control applications","authors":"M. Abe, Teruo Koyanagi, J. Jeng, L. An","doi":"10.1109/ICEBE.2006.23","DOIUrl":"https://doi.org/10.1109/ICEBE.2006.23","url":null,"abstract":"To succeed in today's business environment, an enterprise needs agility. Business performance monitoring and control systems have become critical in enabling enterprises to manage their business performance. In prior efforts, we have adopted model-driven development for manufacturing monitoring and control applications. This paper presents a business level modeling environment, coined as BPM authoring tool, for the environment of modeling, analyzing and developing the monitoring and control systems","PeriodicalId":439165,"journal":{"name":"2006 IEEE International Conference on e-Business Engineering (ICEBE'06)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121381186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Context-Aware Personalization in Pervasive Communications","authors":"Yuping Yang, M. H. Williams, R. Pooley, R. Dewar","doi":"10.1109/ICEBE.2006.34","DOIUrl":"https://doi.org/10.1109/ICEBE.2006.34","url":null,"abstract":"This paper gives a brief overview of the Daidalos Personalization architecture, the aim of which is to improve user experience by personalizing services, including third-party services and Daidalos enabling services in pervasive computing environments. Personalization plays a paramount role in service composition, elucidation of user preferences and reservation of resources for users, where user privacy has been well considered. In this paper, we discuss how personalization is exploited and investigated to give a completely personalized service offering to a user at any time, any where","PeriodicalId":439165,"journal":{"name":"2006 IEEE International Conference on e-Business Engineering (ICEBE'06)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130518923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}