Abstract is missing.
- User Acceptance in Different Electronic Negotiation Systems - A Comparative ApproachRicardo Buettner, Barbara Daxenberger, Christian Woesle. 1-8 [doi]
- Implementation Challenges for Supporting Coworking Virtual EnterprisesJavier Andrade, Juan Ares, Sonia Suárez, Adriana Giret. 9-16 [doi]
- Sequential Auctions with Budget-Constrained BiddersIoannis A. Vetsikas. 17-24 [doi]
- Redefining the Market Power of Small-Scale Electricity Consumers through Consumer Social NetworksKyriakos C. Chatzidimitriou, Konstantinos N. Vavliakis, Andreas L. Symeonidis, Pericles A. Mitkas. 25-31 [doi]
- Recommender System Based on Social Trust RelationshipsChaochao Chen, Jing Zeng, Xiaolin Zheng, Deren Chen. 32-37 [doi]
- Digital Cancellation Event Options in Limit Order Markets with Automated Liquidity Self-ProvisioningSafraz Rampersaud, Daniel Grosu. 38-43 [doi]
- How Much Should You Pay for Information?Ioannis A. Vetsikas, Madalina Croitoru. 44-49 [doi]
- Exploring Emergent Social Networks to Improve Agent Mediated E-CommerceVirginia Nascimento, Maria João Viamonte, Alda Canito, Nuno Silva. 50-55 [doi]
- SaaS Enterprise Resource Planning Systems: Challenges of Their Adoption in SMEsJacek Lewandowski, Adekemi O. Salako, Alexeis Garcia-Perez. 56-61 [doi]
- An Ecosystem for E-Learning in Mechatronics: The CLEM ProjectAnne E. James, Kuo-Ming Chao, Weidong Li, Adriana Matei, Antonios G. Nanos, Sergiu-Dan Stan, Giorgio Figliolini, Pierluigi Rea, Chedli B. Bouzgarrou, Daniel Bratanov, Joshua N. Cooper, Ansgar Wenzel, Jurgen Van Capelle, Kerstin Struckmeier. 62-69 [doi]
- Doing Better Business: Trading a Little Execution Time for High Energy Saving under SLA ConstraintsDian Shen, Fang Dong, Junzhou Luo, Wei Wang, Xiang Fei, Guoqing Jin, Weidong Li. 70-75 [doi]
- Is There Self-Similarity in Cloud QoS Data?Zia ur Rehman, Farookh Khadeer Hussain, Omar Khadeer Hussain, Jaipal Singh. 76-81 [doi]
- On Event-Driven Business IntegrationJoachim H. Frank, Liangzhao Zeng. 82-89 [doi]
- Modeling Technology Acceptance in E-Business EnvironmentsDiego Leyton, José A. Pino, Sergio F. Ochoa. 90-97 [doi]
- A Virtual Meeting System for the New AgeAntonios G. Nanos, Anne E. James. 98-105 [doi]
- Semantic Integration of E-Business Schemas via a Canonical Data Model: Assessing the Effort Reduction for B2B Message ExchangeMichael Dietrich, Jens Lemcke, Gunther Stuhec. 106-111 [doi]
- Syntactic File and Semantic File Alignment for E-Business Document Editing and ExchangeGuangyi Xiao, Jingzhi Guo, Zhigong Gong. 112-117 [doi]
- The Open Innovation Exchange Platform: Experiences of Implementing a Business Community Engagement Platform for Channeling IP Development and Collaboration with Local BusinessesMaurice Hendrix, Petros Lameras, Panagiotis Petridis, Ian Dunwell, Sylvester Arnab, Craig Stewart, Jim Hensman, Sara de Freitas, Brian More. 118-125 [doi]
- Time-Aware Automatic Process View GenerationSaoussen Cheikhrouhou, Slim Kallel, Nawal Guermouche, Mohamed Jmaiel. 126-131 [doi]
- Network-Based Conflict Resolution in Business ProcessesZakaria Maamar, Noura Faci, Soraya Kouadri Mostéfaoui, Ejub Kajan. 132-137 [doi]
- Unlocking the Marketing Potential of Social Capital: A Study to Identify the Dimensions of Social Capital Considered Represented within Online Brand CommunitiesStacey Li, Lillian Clark, Colin Wheeler. 138-141 [doi]
- An Intelligent Platform for Green Forecasting OptimizationChen-Fang Tsai, Shin-Li Lu. 142-148 [doi]
- An Analytical Business Process Modelling Language: An Illustrative ExampleAzeem Lodhi, Veit Köppen, Stefan Wind, Gunter Saake. 149-155 [doi]
- Hybrid Recommendation System for TourismJen-Hsiang Chen, Kuo-Ming Chao, Nazaraf Shah. 156-161 [doi]
- Leveraging Assets as a Service for Business Intelligence in Manufacturing Service EcosystemsManuel Hirsch, David Opresnik, Christian Zanetti, Marco Taisch. 162-167 [doi]
- Network Intrusion Detection Systems in High-Speed Traffic in Computer NetworksWaleed Bul'ajoul, Anne E. James, mandeep Pannu. 168-175 [doi]
- Achieving Probabilistic Anonymity Against One-to-Multiple Linkage AttacksYingpeng Sang, Hong Shen, Hui Tian, Zonghua Zhang. 176-183 [doi]
- Random Graph Based Benchmarking Methodology for RFID Security ProtocolsShan Chang, Hui Song, Li Lu, Qingsong Yao, Yong Qi. 184-191 [doi]
- Hybrid P2P Architecture for Transaction ManagementSteven Marrocco, Rachid Anane. 192-198 [doi]
- Detection of E-Commerce Systems with Sparse Features and Supervised ClassificationKurt Uwe Stoll, Martin Hepp. 199-206 [doi]
- Discovering Business Processes in Legacy Systems Using Business Rules and Log MiningGleison Samuel do Nascimento, Cirano Iochpe, Lucinéia Heloisa Thom, André Cristiano Kalsing. 207-212 [doi]
- Combining Multiple Features for Web Data Sources ClusteringAlsayed Algergawy, Gunter Saake. 213-218 [doi]
- SLinRA2S: A Simple Linear Regression Analysis Assisting SystemChien-Ho Wu, Jung-Bin Li, Tsair-Yuan Chang. 219-223 [doi]
- Diffusion Mechanisms of E-Commerce Model in Perspective of the Epidemic ModelYanyu Wang, Kuanrong Tian, Wei Xie. 224-229 [doi]
- Simulated Annealing Sales Combining Forecast in FMCGYanling Liu, Minbo Li, Zhu Zhu. 230-235 [doi]
- Contextualizing Business DocumentsDanijel Novakovic, Christian Huemer. 236-243 [doi]
- On Privacy Preserving Collaborative Filtering: Current Trends, Open Problems, and New IssuesFran Casino, Constantinos Patsakis, Domenec Puig, Agusti Solanas. 244-249 [doi]
- Mobile Operator's Dilemma: An Exploratory Study on the Co-diffusion of Mobile IM and Desktop IM of China MobileJin-Xing Hao, Xinping Xiao, Siqing Shan. 250-256 [doi]
- RP-Match: A Framework for Automatic Mapping of Regulations with Organizational ProcessesKrishna Sapkota, Arantza Aldea, Muhammad Younas, David A. Duce, René Bañares-Alcántara. 257-264 [doi]
- Knowledge Discovery of Service Satisfaction Based on Text Analysis of Critical Incident Dialogues and Clustering MethodsCharles V. Trappey, Hsin-Ying Wu, Kuan-Liang Liu, Feng-Teng Lin. 265-270 [doi]
- Applying Multidimensional Quality Module and Hotelling's T2 to Investigate Competitive Advantages of Digital Versatile Disc Patent PoolsYu-Hui Wang, Amy J. C. Trappey. 271-275 [doi]
- Economic Load Demand Response in Energy Management Information Systems: Data Mining Methods in the Safety and Quality of Building SystemsChing-Lung Lin, Hsueh-Hsien Chang. 276-281 [doi]
- Adoption of Internet Banking: An Empirical Study in VietnamFeng-Teng Lin, Hsin-Ying Wu, Tran Thi Nguyet Nga. 282-287 [doi]
- SESA: A Scalable Multi-channel Communication and Booking Solution for E-Commerce in the Tourism DomainIoan Toma, Dieter Fensel, Alex Oberhauser, Christoph Fuchs, Corneliu-Valentin Stanciu, Iker Larizgoitia. 288-293 [doi]
- Power Measurement with Economic Management by Using ZigBee RF TechnologyChing-Lung Lin, Yuan-Chuen Hwang, Hsueh-Hsien Chang, Ching-Feng Lin. 294-299 [doi]
- A Novel Scheme on Service Recommendation for Mobile Users Based on Location Privacy ProtectionChunhui Piao, Suqin Dong, Liang Cui. 300-305 [doi]
- Mobile Collaboration for Business Process Elicitation from an Agile Development Methodology ViewpointNelson Baloian, José A. Pino, Carlos Reveco, Gustavo Zurita. 306-311 [doi]
- When Social Network Meets Mobile Device! - An Efficient and Collaborative Framework for Mobile ApplicationTina Ho, Rebecca Chen. 312-317 [doi]
- Pervasive Computing by Mobile Complex Event ProcessingSebastian Stipkovic, Ralf Bruns, Jürgen Dunkel. 318-323 [doi]
- Improved Precision Recommendation Scheme by BPNN Algorithm in O2O CommerceYen-Chiu Chen, Hui-Ching Hsieh, He-Chih Lin. 324-328 [doi]
- Elaborating Requirements of Collaborative Networked Organizations with an Enhanced Goal ModelXixi Li, Yan Liu, Mei Chen. 329-336 [doi]
- A Novel Threat and Risk Assessment Mechanism for Security Controls in Service ManagementPing Wang, Kuo-Ming Chao, Chi-Chun Lo. 337-344 [doi]
- An Architecture for Justified Assessments of Service Provider ReputationNathan Griffiths, Simon Miles. 345-352 [doi]
- Trustworthiness Evaluation of Registered Information in a Trusted E-Commerce Data ServiceYinsheng Li, Feng Zhou, Jiao Li, Yi Liao, Yueting Chai. 353-357 [doi]
- Research of Ontology and Semantic Web Apply for Building Information ModelDing-Yuan Cheng, Tzu-Chin Chao, Chi-Chun Lo, Chi-Hua Chen. 358-363 [doi]
- RFID in Green Supply Chain: Proposal of a Multicriteria Decision Model Based on AHPFabio De Felice, Antonella Petrillo. 364-369 [doi]
- A N-Order Grey-GA Optimizer to Forecast Taiwan Pollution TrendsChen-Fang Tsai. 370-376 [doi]
- Towards an Efficient Sales Pitch with the Web of ThingsSujith Samuel Mathew, Yacine Atif, Quan Z. Sheng, Zakaria Maamar. 377-384 [doi]
- Learning Automata Based Contention Aware Data Forwarding Scheme for Safety Applications in Vehicular Ad Hoc NetworksNeeraj Kumar, Rahat Iqbal, Anne E. James, Amit Dua. 385-392 [doi]
- A Simplified Teaching-Learning-Based Optimization Algorithm for Disassembly Sequence PlanningKai Xia, Liang Gao, Lihui Wang, Weidong Li, Kuo-Ming Chao. 393-398 [doi]
- From Cloud Manufacturing to Cloud Remanufacturing: A Cloud-Based Approach for WEEEXi Vincent Wang, Lihui Wang, Liang Gao. 399-406 [doi]
- Recycling of PBDEs Containing Plastics from Waste Electrical and Electronic Equipment (WEEE): A ReviewYing Li, Jinhui Li, Lihui Wang. 407-412 [doi]
- Trading Privacy in the Cloud: A Fairer Way to Share Private InformationConstantinos Patsakis, Agusti Solanas. 413-418 [doi]
- A Semantic Service Match Approach Based on WordNet and SWRL RulesShao Yuan Lu, Kuo-Hsun Hsu, Li-Jing Kuo. 419-422 [doi]
- Web Service Discovery Using Lexical and Semantic Query ExpansionShang-Pin Ma, Chia-Hsueh Li, Yao-Yu Tsai, Ci-Wei Lan. 423-428 [doi]
- Emerging of New Service-Oriented Approach Based on the Internet of Services and Internet of ThingsMikhail M. Komarov, Maria D. Nemova. 429-434 [doi]
- Service Composition with Functional Flexibility Using Nondeterministic Service InterfaceChien-Hsiang Lee, San-Yih Hwang, I-Ling Yen. 435-440 [doi]
- Senior Executive and Staff: What Effect Do They Exert on Success of Information System?Xin Dai, Jianping Peng, Zhiyuan Fang. 441-444 [doi]
- A Cloud-Based Pan-Terminal Video Conferencing SystemFang Zhiyuan, Li Wei, Feng Zhang, Zhou Fang, Donghang Huang, Xin Dai. 445-449 [doi]
- Subscriber Centric Conditional Access System for Pay-TV SystemsMehari Msgna, Konstantinos Markantonakis, Keith Mayes, Raja Naeem Akram. 450-455 [doi]
- A Design of Smart Enterprise Asset ManagementChien Lin, Ci-Wei Lan, Jiunhau Ye, Yen-Ching Wu. 456-460 [doi]
- A Fuzzy Query Approach to Human Resource Web ServicesLien Fu Lai, Chao-Chin Wu, Yi-Ta Hsieh, Liang-Tsung Huang. 461-466 [doi]
- Spread of Influence on the Basis of the Graph Models in Network Community State SpaceO. A. Tsukanova, S. V. Maltseva. 467-471 [doi]
- Secure and Privacy-Preserving Proxy Voting SystemBernd Zwattendorfer, Christoph Hillebold, Peter Teufl. 472-477 [doi]
- Biopolis, Long Term Preservation of Digital User ContentEmmanuel Sardis, Vasilios Anagnostopoulos, Anastasios D. Doulamis, Theodora A. Varvarigou. 478-483 [doi]
- Integrating PowerMeeting into Blackboard Learning Environment: Synchronous Collaboration Support in Asynchronous Collaboration ContextWeigang Wang. 484-489 [doi]
- Privacy Preserving Collaborative Filtering with k-Anonymity through MicroaggregationFran Casino, Josep Domingo-Ferrer, Constantinos Patsakis, Domenec Puig, Agusti Solanas. 490-497 [doi]
- Remote Management: An Architecture for Mechatronic SystemsIonut Muntean, Sergiu-Dan Stan, Mihail Abrudean, Kuo-Ming Chao. 498-503 [doi]
- A Nonparametric GA-GWMA Sign Chart for Green SCM OptimizationShin-Li Lu, Chen-Fang Tsai. 504-508 [doi]
- Test Management Framework for Managing IT Projects in IndustryAzeem Lodhi, Stefan Wind, Klaus Turowski. 509-514 [doi]