EEE 2004:
Taipei,
Taiwan
2004 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 04), 29-31 March 2004, Taipei, Taiwan.
IEEE Computer Society 2004, ISBN 0-7695-2073-1 @proceedings{DBLP:conf/eee/2004,
title = {2004 IEEE International Conference on e-Technology, e-Commerce,
and e-Services (EEE 04), 29-31 March 2004, Taipei, Taiwan},
booktitle = {EEE},
publisher = {IEEE Computer Society},
year = {2004},
isbn = {0-7695-2073-1},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
Web Services
- Chen-Liang Fang, De-Ron Liang, Chyouhwa Chen, PuSan Lin:
A Redundant Nested Invocation Suppression Mechanism for Active Replication Fault-Tolerant Web Service.
9-16
- Tao Yu, Kwei-Jay Lin:
The Design of QoS Broker Algorithms for QoS-Capable Web Services.
17-24
- Weiping He:
Recovery in Web Service Applications.
25-28
- Zakaria Maamar, Soraya Kouadri Mostéfaoui, Emad Bataineh:
A Conceptual Analysis of the Role of Conversations in Web Services Composition.
29-32
- Te-Kai Liu, Santhosh Kumaran, Jen-Yao Chung:
Performance Engineering of a Java-Based eCommerce System.
33-37
- Fethi A. Rabhi, Feras T. Dabous, Hairong Yu, Boualem Benatallah, Yun Ki Lee:
A Case Study in Developing Web Services for Capital Markets.
38-41
- Roy Grønmo, David Skogan, Ida Solheim, Jon Oldevik:
Model-Driven Web Services Development.
42-45
eCommerce Applications
Security & Trust (1)
EC Technologies (1)
Intelligence
- Opher Etzion, Amit Fisher, Segev Wasserkrug:
e-CLV: A Modeling Approach for Customer Lifetime Evaluation in e-Commerce Domains, with an Application and Case Study for Online Auctions.
149-156
- Trung T. Pham:
Quantitative Approach to Using E-Commerce Data to Monitor and Control the Performance of a Supply Chain.
157-162
- Zonghua Zhang, Hong Shen:
Suppressing False Alarms of Intrusion Detection Using Improved Text Categorization Method.
163-166
Business Services
Intelligence & Agents
Mobile Services
- Kun-Lung Wu, Shyh-Kwei Chen, Philip S. Yu:
Indexing Continual Range Queries for Location-Aware Mobile Services.
233-240
- Ramon Martí, Jaime Delgado, Xavier Perramon:
Security Specification and Implementation for Mobile e-Health Services.
241-248
- Shu-Chin Wang, Kuo-Qin Yan, C. H. Wei:
Mobile Target Advertising by Combining Self-Organization Map and Decision Tree.
249-252
- Robert Steele, Yuri Ventsov, Tharam S. Dillon:
XML Schema-Based Discovery and Invocation of Mobile Services.
253-258
- Hung-Wen Tung, Von-Wun Soo:
A Personalized Restaurant Recommender Agent for Mobile E-Service.
259-262
- Wei-Po Lee, Ming-Hsiang Su:
Personalizing Information Services on Wired and Wireless Networks.
263-266
- Chun-Te Chen, Te-Chung Lu:
A Mobile Ticket Validation by VSS Tech with Time-Stamp.
267-270
- Agustinus Borgy Waluyo, Raymond Hsieh, David Taniar, J. Wenny Rahayu, Bala Srinivasan:
Utilising Push and Pull Mechanism in Wireless E-Health Environment.
271-274
Internet Technologies (1)
- Tsutomu Morigaki, Kanta Matsuura, Osamu Sudo:
An Analysis of Detailed Electronic Time-Stamping Using Digital TV.
277-284
- Juan D. Velásquez, Richard Weber, Hiroshi Yasuda, Terumasa Aoki:
A Methodology to Find Web Site Keywords.
285-292
- Tzong-Song Wang, Larry K. Bright:
The Challenge of Exclusions in Pervasive Cyberspace.
293-298
- Po-Hsiang Wang, Jung-Ying Wang, Hahn-Ming Lee:
QueryFind: Search Ranking Based on Users? Feedback and Expert?s Agreement.
299-304
- Chih-Ming Chen, Ling-Jiun Duh, Chao-Yu Liu:
A Personalized Courseware Recommendation System Based on Fuzzy.
305-308
- Faye F. Liu, Jidong Wang, Tharam S. Dillon:
An Object-Oriented Approach on Web Information Representation and Derivation.
309-314
EC Technologies (2)
Business Process
EC Technologies (3)
P2P/Grid
Mobile Technologies
Internet Technologies (2)
Internet Technologies (3)
Security & Trust (2)
- Yuan-Liang Tang, Ching-Ting Chen:
Image Authentication Using Relation Measures of Wavelet Coefficients.
543-547
- António Leong, Simon Fong, Shirley Siu:
Smart Card-Based Irregular Access Patterns Detection System.
548-555
- Jong-Phil Yang, Chul Sur, Hwa-Sik Jang, Kyung Hyune Rhee:
Practical Modification of an Efficient Public-Key Framework.
556-559
- Yong-Bin Zhou, Zhen-Feng Zhang, Si-Han Qing, Juan Liu:
A New CEMBS Based on RSA Signatures and Its Application in Constructing Fair Exchange Protocol.
560-564
- Hung-Min Sun, Bin-Tsan Hsieh, Shin-Mu Tseng:
Cryptanalysis of Aydos et al.'s ECC-Based Wireless Authentication Protocol.
565-568
- Tzer-Shyong Chen, Kuo-Hsuan Huang, Yu-Fang Chung:
Modified Cryptographic Key Assignment Scheme for Overcoming the Incorrectness of the CHW Scheme.
569-572
Copyright © Fri Mar 12 17:10:22 2010
by Michael Ley (ley@uni-trier.de)