Abstract is missing.
- A Redundant Nested Invocation Suppression Mechanism for Active Replication Fault-Tolerant Web ServiceChen-Liang Fang, De-Ron Liang, Chyouhwa Chen, PuSan Lin. 9-16 [doi]
- The Design of QoS Broker Algorithms for QoS-Capable Web ServicesTao Yu, Kwei-Jay Lin. 17-24 [doi]
- Recovery in Web Service ApplicationsWeiping He. 25-28 [doi]
- A Conceptual Analysis of the Role of Conversations in Web Services CompositionZakaria Maamar, Soraya Kouadri Mostéfaoui, Emad Bataineh. 29-32 [doi]
- Performance Engineering of a Java-Based eCommerce SystemTe-Kai Liu, Santhosh Kumaran, Jen-Yao Chung. 33-37 [doi]
- A Case Study in Developing Web Services for Capital MarketsFethi A. Rabhi, Feras T. Dabous, Hairong Yu, Boualem Benatallah, Yun Ki Lee. 38-41 [doi]
- Model-Driven Web Services DevelopmentRoy Grønmo, David Skogan, Ida Solheim, Jon Oldevik. 42-45 [doi]
- Application of eBusiness Strategies for SMEs in Developing CountriesMahesha Kapurubandara, Shiromi Arunatileka, Athula Ginige. 49-59 [doi]
- Simulation Models and Their Metainfo-Management Using RDF-Based ParadigmsMichael C. Jaeger, Moussa Lo, Robert J. Pefferly. 60-67 [doi]
- The Assessment of E-Commerce Awareness on Highly Valuable Traditional Products in ThailandSakuna Vanichvisuttikul, Chamnong Jungthirapanich. 68-75 [doi]
- Web Surveys for Electronic Commerce: A Review of the LiteratureHsiu-Mei Huang, Shu-Sheng Liaw. 76-79 [doi]
- Spreading Activation Models for Trust PropagationCai-Nicolas Ziegler, Georg Lausen. 83-97 [doi]
- A Two-Layer Cryptographic Scheme for an e-Service Framework Based on Mobile AgentsTzone I. Wang, Kun Hua Tsai, Ming-Che Lee. 98-105 [doi]
- A Division-of-Labor-Signature (t, n) Threshold-Authenticated Encryption Scheme with Message Linkage Based on the Elliptic Curve CryptosystemTzer-Shyong Chen, Kuo-Hsuan Huang, Yu-Fang Chung. 106-112 [doi]
- An e-Voting Scheme against Bribe and CoercionWei-Chi Ku, Chun-Ming Ho. 113-116 [doi]
- Trust and Privacy in Electronic CommerceJeng-Chung V. Chen, Yang Il Park. 117-120 [doi]
- Understand User Preference of Online ShoppersMelody Y. Kiang, Jenny Gilsdorf, Robert T. H. Chi. 123-130 [doi]
- A Multiple-Stage Cooperative NegotiationJen-Hsiang Chen, Kuo-Ming Chao, Nick Godwin, Von-Wun Soo. 131-138 [doi]
- A New Fair Micropayment System Based on Hash ChainZongkai Yang, Weimin Lang, Yunmeng Tan. 139-145 [doi]
- e-CLV: A Modeling Approach for Customer Lifetime Evaluation in e-Commerce Domains, with an Application and Case Study for Online AuctionsOpher Etzion, Amit Fisher, Segev Wasserkrug. 149-156 [doi]
- Quantitative Approach to Using E-Commerce Data to Monitor and Control the Performance of a Supply ChainTrung T. Pham. 157-162 [doi]
- Suppressing False Alarms of Intrusion Detection Using Improved Text Categorization MethodZonghua Zhang, Hong Shen. 163-166 [doi]
- e-Service as a New Paradigm for Developing Interactive Multidimensional City ModelingChengzhi Peng. 169-172 [doi]
- Three-Tier Multi-Agent Architecture for Asset Management Consultant Tung Wan Cheng, Wan Ling Wang, Shung Kwan Chan. 173-176 [doi]
- A Web Services-Based Collaborative Scheme for Credit Card Fraud DetectionChuang-Cheng Chiu, Chieh-Yuan Tsai. 177-181 [doi]
- Development of a Remote Quick Design System for Woven FabricsJeng-Jong Lin. 182-189 [doi]
- Algorithms for Community Subject Identification: Experiments and Test ResultsDeepak Subramoniam, Jyothi John. 195-201 [doi]
- Portfolio Management Using Hybrid Recommendation SystemChiu-Che Tseng. 202-206 [doi]
- An Efficient Approach for the Maintenance of Path Traversal PatternsShow-Jane Yen, Yue-Shi Lee, Chung-Wen Cho. 207-214 [doi]
- Single-Pass Algorithms for Mining Frequency Change Patterns with Limited Space in Evolving Append-Only and Dynamic Transaction Data StreamsHua-Fu Li, Suh-Yin Lee. 215-222 [doi]
- Understanding the Behavioral Intention to Digital Piracy in Virtual Communities - A Propose ModelTimothy C. H. Kwong, Matthew K. O. Lee. 223-226 [doi]
- Mining Traveling and Purchasing Behaviors of Customers in Electronic Commerce EnvironmentYue-Shi Lee, Show-Jane Yen, Ghi-Hua Tu, Min-Chi Hsieh. 227-231 [doi]
- Indexing Continual Range Queries for Location-Aware Mobile ServicesKun-Lung Wu, Shyh-Kwei Chen, Philip S. Yu. 233-240 [doi]
- Security Specification and Implementation for Mobile e-Health ServicesRamon Martí, Jaime Delgado, Xavier Perramon. 241-248 [doi]
- Mobile Target Advertising by Combining Self-Organization Map and Decision TreeShu-Chin Wang, Kuo-Qin Yan, C. H. Wei. 249-252 [doi]
- XML Schema-Based Discovery and Invocation of Mobile ServicesRobert Steele, Yuri Ventsov, Tharam S. Dillon. 253-258 [doi]
- A Personalized Restaurant Recommender Agent for Mobile E-ServiceHung-Wen Tung, Von-Wun Soo. 259-262 [doi]
- Personalizing Information Services on Wired and Wireless NetworksWei-Po Lee, Ming-Hsiang Su. 263-266 [doi]
- A Mobile Ticket Validation by VSS Tech with Time-StampChun-Te Chen, Te-Chung Lu. 267-270 [doi]
- Utilising Push and Pull Mechanism in Wireless E-Health EnvironmentAgustinus Borgy Waluyo, Raymond Hsieh, David Taniar, J. Wenny Rahayu, Bala Srinivasan. 271-274 [doi]
- An Analysis of Detailed Electronic Time-Stamping Using Digital TVTsutomu Morigaki, Kanta Matsuura, Osamu Sudo. 277-284 [doi]
- A Methodology to Find Web Site KeywordsJuan D. Velásquez, Richard Weber, Hiroshi Yasuda, Terumasa Aoki. 285-292 [doi]
- The Challenge of Exclusions in Pervasive CyberspaceTzong-Song Wang, Larry K. Bright. 293-298 [doi]
- QueryFind: Search Ranking Based on Users? Feedback and Expert?s AgreementPo-Hsiang Wang, Jung-Ying Wang, Hahn-Ming Lee. 299-304 [doi]
- A Personalized Courseware Recommendation System Based on FuzzyChih-Ming Chen, Ling-Jiun Duh, Chao-Yu Liu. 305-308 [doi]
- An Object-Oriented Approach on Web Information Representation and DerivationFaye F. Liu, Jidong Wang, Tharam S. Dillon. 309-314 [doi]
- Increasing the Customer?s Choice: Query Expansion Based on the Layer-Seeds Method and Its Application in E-CommerceLibo Chen, Marcello L Abbate, Ulrich Thiel, Erich J. Neuhold. 317-324 [doi]
- Multifunctional ICMP Messages for e-CommerceBao-Tung Wang, Henning Schulzrinne. 325-332 [doi]
- A Study on Contents Distribution Using Electronic Cash SystemDeok-Gyu Lee, Hyung-Geun Oh, Im-Yeong Lee. 333-340 [doi]
- An ASEP (Advanced Secure Electronic Payment) Protocol Design Using 3BC and ECC (F^2) AlgorithmByung kwan Lee, Tai-Chi Lee, Seung Hae Yang. 341-346 [doi]
- Value-Based Design of Collaboration Processes for e-CommercePascal van Eck, Jaap Gordijn, Roel Wieringa. 349-358 [doi]
- Matchmaking for Business Processes Based on ChoreographiesAndreas Wombacher, Peter Fankhauser, Bendick Mahleko, Erich J. Neuhold. 359-368 [doi]
- Economic Analysis of Consumer Purchase Intentions in Electronic and Traditional Retail Channels: Competitive and Strategic ImplicationsBo-chiuan Su, Alok Gupta, Zhiping D. Walter. 369-372 [doi]
- Robustness of Entrusted Data-Analysis in e-Science Research CollaborationKanta Matsuura. 373-378 [doi]
- A Privacy-Friendly Loyalty System for Electronic MarketplacesMatthias Enzmann, Markus Schneider 0002. 385-393 [doi]
- An Efficient, Secure and Delegable Micro-Payment SystemVishwas Patil, R. K. Shyamasundar. 394-404 [doi]
- On Using Query Neighbourhood for Better Navigation through a Product Catalog: SMART ApproachNenad Stojanovic. 405-412 [doi]
- Personalized Product Recommendation in e-CommerceSung-Shun Weng, Mei-Ju Liu. 413-420 [doi]
- Knowledge Oriented Negotiation for Agent-Based B2B Electronic CommerceZhuang Yan, Simon Fong, Meilin Shi. 421-424 [doi]
- A Decision Support System for Multiple Objective Linear Programming with Fuzzy ParametersFengjie Wu, Jie Lu, Guangquan Zhang. 425-429 [doi]
- Music Piracy on Peer-to-Peer NetworksMarc Fetscherin, Sabrina Zaugg. 431-440 [doi]
- Decision Tree Construction for Data Mining on Grid ComputingShu-Tzu Tsai, Chao-Tung Yang. 441-447 [doi]
- Design and Implementation of a Computational Grid for BioinformaticsChao-Tung Yang, Yu-Lun Kuo, Chuan-Lin Lai. 448-451 [doi]
- Building an E-Learning Platform by Access Grid and Data Grid TechnologiesHsin-Chuan Ho, Chao-Tung Yang, Chi-Chung Chang. 452-455 [doi]
- A Scheme for MAC Isolation to Realize Effective Management in Public Wireless LANLiquan Chen. 459-464 [doi]
- An Enhanced EDCG Replica Allocation Method in Ad Hoc NetworksEric Jui-Lin Lu, Chin-Wei Chen. 465-472 [doi]
- A Self-Adapting Mobile Ipv6 Model Based on MAPTian-han Gao, Nan Guo, Hong Zhao. 473-476 [doi]
- Optimal Placement of Web Proxies for Tree NetworksKeqiu Li, Hong Shen. 479-486 [doi]
- Distributed Plug-and-Play Network Management Model Based on Mobile AgentsNan Guo, Tian-han Gao, Hong Zhao. 487-491 [doi]
- A Table Presentation System for Database and Web ApplicationsWoei-kae Chen, Kuo-Hua Chung. 492-498 [doi]
- Data Extraction and Annotation for Dynamic Web PagesHui Song, Suraj Giri, Fanyuan Ma. 499-502 [doi]
- Using Element and Document Profile for Information ClusteringJun Lai, Ben Soh. 503-506 [doi]
- e-Transformation Technologies: Case Studies and the Road Ahead - A Value Chain PerspectiveWilliam Kwok-Wai Cheung. 510-517 [doi]
- MPEG-7 Based Dozen Dimensional Digital Content Architecture for Semantic Image Retrieval ServicesPei-Jeng Kuo, Terumasa Aoki, Hiroshi Yasuda. 518-525 [doi]
- An Encoding Scheme for Indexing XML DataWansong Zhang, Daxin Liu, Jian Li. 526-529 [doi]
- Structure-Based Analysis of Web SitesBenjamin Yen. 530-533 [doi]
- Secure Online Examination Architecture Based on Distributed FirewallChi-Chien Pan, Kai-Hsiang Yang, Tzao-Lin Lee. 534-537 [doi]
- On the Distributed Management of SCORM-Compliant Course ContentsSheng-Tun Li, Chu-Hung Lin, Yuan-Chun Chang, Jin-Tan David Yang. 538-539 [doi]
- Image Authentication Using Relation Measures of Wavelet CoefficientsYuan-Liang Tang, Ching-Ting Chen. 543-547 [doi]
- Smart Card-Based Irregular Access Patterns Detection SystemAntónio Leong, Simon Fong, Shirley Siu. 548-555 [doi]
- Practical Modification of an Efficient Public-Key FrameworkJong-Phil Yang, Chul Sur, Hwa-Sik Jang, Kyung Hyune Rhee. 556-559 [doi]
- A New CEMBS Based on RSA Signatures and Its Application in Constructing Fair Exchange ProtocolYong-Bin Zhou, Zhen-Feng Zhang, Si-Han Qing, Juan Liu. 560-564 [doi]
- Cryptanalysis of Aydos et al. s ECC-Based Wireless Authentication ProtocolHung-Min Sun, Bin-Tsan Hsieh, Shin-Mu Tseng. 565-568 [doi]
- Modified Cryptographic Key Assignment Scheme for Overcoming the Incorrectness of the CHW SchemeTzer-Shyong Chen, Kuo-Hsuan Huang, Yu-Fang Chung. 569-572 [doi]