The Community for Technology Leaders
e-Technology, e-Commerce, and e-Services, IEEE International Conference on (2004)
Taipei, Taiwan
Mar. 28, 2004 to Mar. 31, 2004
ISBN: 0-7695-2073-1
TABLE OF CONTENTS

Preface (PDF)

pp. xvi-xvii
Introduction

Preface (PDF)

pp. xvi-xvii

Program Committee (PDF)

pp. xix-xx

Reviewers (PDF)

pp. xxi
Tutorials A
Tutorials P
Keynote

null (PDF)

pp. null
Web Services

null (PDF)

pp. null

A Redundant Nested Invocation Suppression Mechanism for Active Replication Fault-Tolerant Web Service (Abstract)

Chen-Liang Fang , Jin-Wen Institute of Technology and National Taiwan University of Science and Technology
Chyouhwa Chen , National Taiwan University of Science and Technology
PuSan Lin , National Taiwan Ocean University
Deron Liang , Academia Sinica and National Taiwan Ocean University
pp. 9-16

The Design of QoS Broker Algorithms for QoS-Capable Web Services (Abstract)

Kwei-Jay Lin , University of California at Irvine
Tao Yu , University of California at Irvine
pp. 17-24

Performance Engineering of a Java-Based eCommerce System (Abstract)

Santhosh Kumaran , IBM T. J. Watson Research Center
Jen-Yao Chung , IBM T. J. Watson Research Center
Te-Kai Liu , IBM T. J. Watson Research Center
pp. 33-37

A Case Study in Developing Web Services for Capital Markets (Abstract)

Yun Ki Lee , University of New South Wales
Hairong Yu , University of New South Wales
Fethi A. Rabhi , University of New South Wales
Boualem Benatallah , University of New South Wales
Feras T. Dabous , University of New South Wales
pp. 38-41

Model-Driven Web Services Development (Abstract)

Ida Solheim , SINTEF Telecom and Informatics
Roy Grønmo , SINTEF Telecom and Informatics
Jon Oldevik , SINTEF Telecom and Informatics
David Skogan , SINTEF Telecom and Informatics
pp. 42-45
eCommerce Applications

null (PDF)

pp. null

Application of eBusiness Strategies for SMEs in Developing Countries (Abstract)

Shiromi Arunatileka , University of Western Sydney
Mahesha Kapurubandara , University of Western Sydney
Athula Gnige , University of Western Sydney
pp. 49-59

Simulation Models and Their Metainfo-Management Using RDF-Based Paradigms (Abstract)

Robert J. Pefferly , Institut Francais du Petrole
Moussa Lo , Université de Pau et des Pays de léAdour
Michael C. Jaeger , Technische Universität Berlin
pp. 60-67

Web Surveys for Electronic Commerce: A Review of the Literature (Abstract)

Shu-Sheng Liaw , China Medical University
Hsiu-Mei Huang , National Taichung Institute of Technology
pp. 76-79
Security & Trust (1)

null (PDF)

pp. null

Spreading Activation Models for Trust Propagation (Abstract)

Georg Lausen , Universität Freiburg
Cai-Nicolas Ziegler , Universität Freiburg
pp. 83-97

A Two-Layer Cryptographic Scheme for an e-Service Framework Based on Mobile Agents (Abstract)

Ming-Che Lee , National Cheng Kung University
Tzone I Wang , National Cheng Kung University
K. H. Tsai , National Cheng Kung University
pp. 98-105

An e-Voting Scheme against Bribe and Coercion (Abstract)

Chun-Ming Ho , Fu Jen Catholic University
Wei-Chi Ku , Fu Jen Catholic University
pp. 113-116

Trust and Privacy in Electronic Commerce (Abstract)

Yang Il Park , University of Wisconsin at La Crosse
Jeng-Chung V. Chen , University of Wisconsin at La Crosse
pp. 117-120
EC Technologies (1)

null (PDF)

pp. null

Understand User Preference of Online Shoppers (Abstract)

Jenny Gilsdorf , California State University at Long Beach
Robert T. Chi , California State University at Long Beach
Melody Y. Kiang , California State University at Long Beach
pp. 123-130

A Multiple-Stage Cooperative Negotiation (Abstract)

J-H Chen , Coventry University
K-M Chao , Coventry University
V-W Soo , National Tsing- Hua University
N. Godwin , Coventry University
pp. 131-138

A New Fair Micropayment System Based on Hash Chain (Abstract)

Tan Yunmeng , E.I. & HuaZhong University of Science and Technology
Yang Zongkai , E.I. & HuaZhong University of Science and Technology
Lang Weimin , E.I. & HuaZhong University of Science and Technology
pp. 139-145
Intelligence

null (PDF)

pp. null

e-CLV: A Modeling Approach for Customer Lifetime Evaluation in e-Commerce Domains, with an Application and Case Study for Online Auctions (Abstract)

Amit Fisher , Technion & Israel Institute of Technology
Opher Etzion , IBM Research Laboratory in Haifa
Segev Wasserkrug , IBM Research Laboratory in Haifa
pp. 149-156

Suppressing False Alarms of Intrusion Detection Using Improved Text Categorization Method (Abstract)

Hong Shen , Japan Advanced Institute of Science and Technology
Zonghua Zhang , Japan Advanced Institute of Science and Technology
pp. 163-166
Business Services

null (PDF)

pp. null

Three-Tier Multi-Agent Architecture for Asset Management Consultant (Abstract)

Shung Kwan Chan , National Taiwan University
Tung Wan Cheng , National Chiao Tung University
Wan Ling Wang , National Chengchi University
pp. 173-176
Panel

null (PDF)

pp. null
Keynote

null (PDF)

pp. null
Intelligence & Agents

null (PDF)

pp. null

Portfolio Management Using Hybrid Recommendation System (Abstract)

Chiu-Che Tseng , Texas A&M University-Commerce
pp. 202-206

An Efficient Approach for the Maintenance of Path Traversal Patterns (Abstract)

Show-Jane Yen , Fu Jen Catholic University
Yue-Shi Lee , Ming Chuan University
Chung-Wen Cho , National Tsing Hua University
pp. 207-214

Mining Traveling and Purchasing Behaviors of Customers in Electronic Commerce Environment (Abstract)

Show-Jane Yen , Fu Jen Catholic University
Ghi-Hua Tu , Ming Chuan University
Yue-Shi Lee , Ming Chuan University
Min-Chi Hsieh , Ming Chuan University
pp. 227-231
Mobile Services

null (PDF)

pp. null

Indexing Continual Range Queries for Location-Aware Mobile Services (Abstract)

Kun-Lung Wu , IBM T.J. Watson Research Center
Philip S. Yu , IBM T.J. Watson Research Center
Shyh-Kwei Chen , IBM T.J. Watson Research Center
pp. 233-240

Security Specification and Implementation for Mobile e-Health Services (Abstract)

Xavier Perramon , Universitat Pompeu Fabra
Jaime Delgado , Universitat Pompeu Fabra
Ramon Mart? , Universitat Pompeu Fabra
pp. 241-248

Mobile Target Advertising by Combining Self-Organization Map and Decision Tree (Abstract)

C.H. Wei , Chaoyang University of Technology
K.Q. Yan , Chaoyang University of Technology
S.C. Wang , Chaoyang University of Technology
pp. 249-252

XML Schema-Based Discovery and Invocation of Mobile Services (Abstract)

Yuri Ventsov , University of Technology, Sydney
Robert Steele , University of Technology, Sydney
Tharam Dillon , University of Technology, Sydney
pp. 253-258

A Personalized Restaurant Recommender Agent for Mobile E-Service (Abstract)

Hung-Wen Tung , National Tsing Hua University
Von-Wun Soo , National Tsing Hua University
pp. 259-262

Personalizing Information Services on Wired and Wireless Networks (Abstract)

Wei-Po Lee , National University of Kaohsiung
Ming-Hsiang Su , National Pingtung University of Science and Technology
pp. 263-266

A Mobile Ticket Validation by VSS Tech with Time-Stamp (Abstract)

Chun-Te Chen , Huafan University
Te-Chung Lu , Huafan University
pp. 267-270

Utilising Push and Pull Mechanism in Wireless E-Health Environment (Abstract)

David Taniar , Monash University
Wenny Rahayu , Latrobe University
Bala Srinivasan , Monash University
Raymond Hsieh , Monash University
Agustinus Borgy Waluyo , Monash University
pp. 271-274
Internet Technologies (1)

null (PDF)

pp. null

An Analysis of Detailed Electronic Time-Stamping Using Digital TV (Abstract)

Osamu Sudo , University of Tokyo
Kanta Matsuura , University of Tokyo
Tsutomu Morigaki , University of Tokyo
pp. 277-284

A Methodology to Find Web Site Keywords (Abstract)

Juan D. Velásquez , University of Tokyo
Hiroshi Yasuda , University of Tokyo
Richard Weber , University of Tokyo
Terumasa Aoki , University of Tokyo
pp. 285-292

The Challenge of Exclusions in Pervasive Cyberspace (Abstract)

Tzong-Song Wang , Tajen Institute of Technology
Larry K. Bright , University of South Dakota
pp. 293-298

QueryFind: Search Ranking Based on Users? Feedback and Expert?s Agreement (Abstract)

Hahn-Ming Lee , National Taiwan University of Science and Technology
Po-Hsiang Wang , National Taiwan University of Science and Technology
Jung-Ying Wang , National Taiwan University of Science and Technology
pp. 299-304

A Personalized Courseware Recommendation System Based on Fuzzy Item Response Theory (Abstract)

Ling-Jiun Duh , National Taiwan Normal University
Chih-Ming Chen , National Hualien Teachers College
Chao-Yu Liu , National Hualien Teachers College
pp. 305-308

An Object-Oriented Approach on Web Information Representation and Derivation (Abstract)

Tharam S. Dillon , University of Technology Sydney
Jidong Wang , RMIT University
Faye F. Liu , La Trobe University
pp. 309-314
EC Technologies (2)

null (PDF)

pp. null

Multifunctional ICMP Messages for e-Commerce (Abstract)

Bao-Tung Wang , Columbia University
Henning Schulzrinne , Columbia University
pp. 325-332

A Study on Contents Distribution Using Electronic Cash System (Abstract)

Im-Yeong Lee , Soonchunhyang University
Hyung-Geun Oh , National Security Research Institute
Deok-Gyu Lee , Soonchunhyang University
pp. 333-340

An ASEP (Advanced Secure Electronic Payment) Protocol Design Using 3BC and ECC (F^2) Algorithm (Abstract)

Seung Hae Yang , Kwandong University
Tai-Chi Lee , Saginaw Valley State University
Byung kwan Lee , Kwandong University
pp. 341-346
Business Process

null (PDF)

pp. null

Value-Based Design of Collaboration Processes for e-Commerce (Abstract)

Roel Wieringa , University of Twente
Pascal van Eck , University of Twente
Jaap Gordijn , Vrije Universiteit
pp. 349-358

Matchmaking for Business Processes Based on Choreographies (Abstract)

Erich Neuhold , Fraunhofer Gesellschaft, Integrated Publication and Information Systems Institute
Andreas Wombacher , Fraunhofer Gesellschaft, Integrated Publication and Information Systems Institute
Peter Fankhauser , Fraunhofer Gesellschaft, Integrated Publication and Information Systems Institute
Bendick Mahleko , Fraunhofer Gesellschaft, Integrated Publication and Information Systems Institute
pp. 359-368
Panel

null (PDF)

pp. null
Keynote

null (PDF)

pp. null

null (PDF)

pp. null
EC Technologies (3)

null (PDF)

pp. null

A Privacy-Friendly Loyalty System for Electronic Marketplaces (Abstract)

Matthias Enzmann , Fraunhofer Gesellschaft (FhG), Institute for Secure Telecooperation
Markus Schneider , Fraunhofer Gesellschaft (FhG), Institute for Secure Telecooperation
pp. 385-393

An Efficient, Secure and Delegable Micro-Payment System (Abstract)

R. K. Shyamasundar , Tata Institute of Fundamental Research
Vishwas Patil , Tata Institute of Fundamental Research
pp. 394-404

Personalized Product Recommendation in e-Commerce (Abstract)

Mei-Ju Liu , Fu Jen University
Sung-Shun Weng , Fu Jen University
pp. 413-420

Knowledge Oriented Negotiation for Agent-Based B2B Electronic Commerce (Abstract)

Shi Meilin , Tsinghua University
Zhuang Yan , Universidade de Macau
Simon Fong , Universidade de Macau
pp. 421-424

A Decision Support System for Multiple Objective Linear Programming with Fuzzy Parameters (Abstract)

Jie Lu , University of Technology, Sydney
Guangquan Zhang , University of Technology, Sydney
Fengjie Wu , University of Technology, Sydney
pp. 425-429
P2P/Grid

null (PDF)

pp. null

Music Piracy on Peer-to-Peer Networks (Abstract)

Marc Fetscherin , University of Bern
Sabrina Zaugg , University of Bern
pp. 431-440

Decision Tree Construction for Data Mining on Grid Computing (Abstract)

Chao-Tung Yang , Tunghai University
Shu-Tzu Tsai , Tunghai University
pp. 441-447

Design and Implementation of a Computational Grid for Bioinformatics (Abstract)

Yu-Lun Kuo , Tunghai University
Chao-Tung Yang , Tunghai University
Chuan-Lin Lai , Tunghai University
pp. 448-451

Building an E-Learning Platform by Access Grid and Data Grid Technologies (Abstract)

Hsin-Chuan Ho , Tungahi University
Chao-Tung Yang , Tungahi University
Chi-Chung Chang , National Dali Senior High School
pp. 452-455
Mobile Technologies

null (PDF)

pp. null

An Enhanced EDCG Replica Allocation Method in Ad Hoc Networks (Abstract)

Chin-Wei Chen , Chaoyang University of Technology
Eric Jui-Lin Lu , Chaoyang University of Technology
pp. 465-472

A Self-Adapting Mobile Ipv6 Model Based on MAP (Abstract)

Hong Zhao , Northeastern University
Nan Guo , Northeastern University
Tian-han Gao , Northeastern University
pp. 473-476
Internet Technologies (2)

null (PDF)

pp. null

Optimal Placement of Web Proxies for Tree Networks (Abstract)

Keqiu Li , Japan Advanced Institute of Science and Technology
Hong Shen , Japan Advanced Institute of Science and Technology
pp. 479-486

Distributed Plug-and-Play Network Management Model Based on Mobile Agents (Abstract)

Nan Guo , Northeastern University
Hong Zhao , Northeastern University
Tianhan Gao , Northeastern University
pp. 487-491

A Table Presentation System for Database and Web Applications (Abstract)

Woei-Kae Chen , National Taipei University of Technology
Kuo-Hua Chung , National Taipei University of Technology
pp. 492-498

Data Extraction and Annotation for Dynamic Web Pages (Abstract)

Fanyuan Ma , Shanghai Jiaotong University
Hui Song , Shanghai Jiaotong University
Suraj Giri , Shanghai Jiaotong University
pp. 499-502

Using Element and Document Profile for Information Clustering (Abstract)

Jun Lai , La Trobe University Bundoora
Ben Soh , La Trobe University Bundoora
pp. 503-506
Internet Technologies (3)

null (PDF)

pp. null

An Encoding Scheme for Indexing XML Data (Abstract)

Jian Li , Harbin Engineering University
Daxin Liu , Harbin Engineering University
Wansong Zhang , Harbin Engineering University
pp. 526-529

Structure-Based Analysis of Web Sites (Abstract)

Benjamin Yen , University of Hong Kong
pp. 530-533

Secure Online Examination Architecture Based on Distributed Firewall (Abstract)

Tzao-Lin Lee , National Taiwan University
Kai-Hsiang Yang , National Taiwan University
Chi-Chien Pan , National Taiwan University
pp. 534-537

On the Distributed Management of SCORM-Compliant Course Contents (PDF)

Yuan-Chun Chang , National Kaohsiung First University of Science and Technology
Sheng-Tun Li , National Cheng Kung University
Chu-Hung Lin , National Kaohsiung First University of Science and Technology
Jin-Tan David Yang , National Kaohsiung Normal University
pp. 538-539
Security & Trust (2)

null (PDF)

pp. null

Image Authentication Using Relation Measures of Wavelet Coefficients (Abstract)

Yuan-Liang Tang , Chaoyang University of Technology
Ching-Ting Chen , Chaoyang University of Technology
pp. 543-547

Smart Card-Based Irregular Access Patterns Detection System (Abstract)

Ant?nio Leong , University of Macau
Simon Fong , University of Macau
Shirley Siu , Max-Planck-Institut f?r Informatik
pp. 548-555

Practical Modification of an Efficient Public-Key Framework (Abstract)

Jong-Phil Yang , Pukyong National University
Chul Sur , Pukyong National University
Hwa-Sik Jang , DaeDuk College
Kyung-Hyune Rhee , Pukyong National University
pp. 556-559

A New CEMBS Based on RSA Signatures and Its Application in Constructing Fair Exchange Protocol (Abstract)

Yong-Bin Zhou , China Academy of Sciences
Juan Liu , Yunnan University for Nationalities
Si-Han Qing , China Academy of Sciences
Zhen-Feng Zhang , China Academy of Sciences
pp. 560-564

Cryptanalysis of Aydos et al.?s ECC-Based Wireless Authentication Protocol (Abstract)

Hung-Min Sun , National Tsing Hua University
Shin-Mu Tseng , National Cheng Kung University
Bin-Tsan Hsieh , National Cheng Kung University
pp. 565-568

Modified Cryptographic Key Assignment Scheme for Overcoming the Incorrectness of the CHW Scheme (Abstract)

Yu-Fang Chung , National Taiwan University
Tzer-Shyong Chen , Tunghai University
Kuo-Hsuan Huang , National Taiwan University
pp. 569-572
Panel

null (PDF)

pp. null
Author Index

Author Index (PDF)

pp. 575-577
105 ms
(Ver )