Abstract is missing.
- The Application of Genetic Algorithm in Vehicle Routing ProblemYueqin Zhang, Shiying Chen, Jinfeng Liu, Fu Duan. 3-6 [doi]
- The Algorithm of Obtaining Best Rules Based on Rough SetShulin Chen, Lei Wang. 7-10 [doi]
- An Algorithm of Topic Distillation Based on Anchor TextJiang Kaizhong, Lu Zhao, Wu Yuan-qiong, Gu Jun-zhong. 11-15 [doi]
- A High Payload Steganographic Scheme Based on (7, 4) Hamming Code for Digital ImagesChin-Chen Chang, The Duc Kieu, Yung-Chen Chou. 16-21 [doi]
- A Verifiable (t, n) Multiple Secret Sharing Scheme and Its AnalysesLiaojun Pang, Huixian Li, Ye Yao, YuMin Wang. 22-26 [doi]
- A New Web Text Clustering Algorithm Based on DFSSMBingru Yang, Zefeng Song, Yinglong Wang, Wei Song. 27-32 [doi]
- Cloud Model-based Data Attributes Reduction for ClusteringXu Ru-zhi, Nie Pei-yao, Lin Pei-guang, Chu Dong-sheng. 33-36 [doi]
- Construction of Learning Algorithm based on SGA Bayesian NetworkT. J. Jia. 37-40 [doi]
- Improved Algorithm for Tate Pairing ComputationTing Wu, Min Zhang, Xiaoliang Xu, Rongbo Wang. 41-45 [doi]
- A Deadline and Cost Constrained Optimization Algorithm for Scheduling Applications in Grids Based on Proportional Share SystemsDazhen Wang, Kwang Mong Sim, Benyun Shi. 46-50 [doi]
- A Scheme of Workflow Management System Based on Web ServicesNie Gang. 53-56 [doi]
- High Efficiency Association Rules Mining Algorithm for Bank Cost AnalysisYing Mei, Liangsheng Zhu. 57-60 [doi]
- Dynamic Reconfiguration Method for Web Service Based on PolicyWenli Dong. 61-65 [doi]
- Research on Customers Demand Forecasting for E-business Web Site Based on LS-SVMQisong Chen, Yun Wu, Xiaowei Chen. 66-70 [doi]
- An XML based Flexible Security E-Commerce ModeSheng Chai, Yang Cheng, Jifan Qiu, Wei Zhou. 71-73 [doi]
- The Design and Implementation of the Distribution Resource Planning Management System Based on WEBAimin Wang, Jipeng Wang. 74-77 [doi]
- Research on High-accuracy Position Prediction Algorithm in Online GameZhaoyang Qu, Hong Gao, Yi Zhu. 78-81 [doi]
- A Reliable Web Service Implementation Approach for Large Commercial ApplicationsJianbin Huang, Heli Sun. 82-85 [doi]
- The Factors Influencing Chinese Online Shopper s Satisfaction in Web2.0 EraHui Chen, Zheng Li. 86-90 [doi]
- A Novel Constructing Algorithm of E-learning CommunityYi Jiang, Qingling Yue, Zhaogui Qin. 91-94 [doi]
- Study on EAI Based on Web Services and SOAWu Deng, Xinhua Yang, Huimin Zhao, Dan Lei, Hua Li. 95-98 [doi]
- Research on the Techniques for Effectively Searching and Retrieving Information from InternetHongqi Li, Zhuang Wu, Xiaogang Ji. 99-102 [doi]
- Research on Grid Resource Discovery Scheme Integrated P2P ModeZenggang Xiong, Xuemin Zhang, Jianxin Chen. 105-109 [doi]
- Design Secure Contexts Detect Based on Lattice for Grid Computing EnvironmentShuang Xiang, Mingdi Xu, Li Wang, Huanguo Zhang. 110-113 [doi]
- A P2P E-commerce Related Network Security Issue: P2P WormYejiang Zhang, Zhitang Li, Zhengbing Hu, Hao Tu, Huaiqing Lin. 114-117 [doi]
- Reputation-based Trust Update in Network EnvironmentShufen Peng, Jingsha He, Yao Meng. 118-123 [doi]
- An Efficient Approach for Point Coverage Problem of Sensor NetworkGaoJun Fan, Feng Liang, Shiyao Jin. 124-128 [doi]
- The Research and Design of Grid-based Business Intelligence Network-BGBINChunhua Ju, Qibei Lu, Zhongyong Kong. 129-132 [doi]
- Design of Network Interface in Distributed Data Acquisition System for E-CommerceYang Cheng, Zhishu Li, Wei Zhou, Sheng Cai, Peng Zhou. 133-136 [doi]
- A Preliminary Study of Coordinated Worm NetworksJingbo Hao, Jianping Yin. 137-140 [doi]
- To Select the Service in Context Aware Systems Using Concept Similarity MechanismJuan Yang, Yun Bai, Yuhui Qiu. 143-147 [doi]
- Study on a Two-Echelon Supply Chain VMI Model under Demand UncertaintyJianhu Cai, Huanhuan Wang, Gengui Zhou. 148-152 [doi]
- Definitions and Analysis of Integrity in Strand Spaces ModelZhao Huawei, Zhang Wenyu. 153-158 [doi]
- Enforcing Information Flow Constraints in RBAC EnvironmentsWei Zhou, Christoph Meinel. 159-164 [doi]
- A New Steganalysis Method Using High-pass Filter for JPEG ImageHan-ling Zhang, Shu-yi Wang. 165-168 [doi]
- An Extended RBAC Model for Uniform Implementation of Role Hierarchy and ConstraintYi Ren, Zhiting Xiao, Sipei Guo. 169-174 [doi]
- A New Modeling Method for the Data Analysis Solution in BusinessXiaofeng Zhang. 175-178 [doi]
- ID-Based Forward-Secure Signature Scheme from the Bilinear PairingsYali Liu, Xinchun Yin, Liang Qiu. 179-183 [doi]
- A Probabilistic Visual Secret Sharing Scheme for Grayscale Images with Voting StrategyChin-Chen Chang, Chia-Chen Lin, T. Hoang Ngan Le, Hoai Bac Le. 184-188 [doi]
- Approach to Missing Data RecoveryE. Xu, Shaocheng Tong, Yuan Wang, Shang Xu, Peng Li. 189-192 [doi]
- Research on a New Effective Data Mining Method Based on Neural NetworksShanli Wang. 195-198 [doi]
- Study on Data Enriching Algorithm Based on Rough Set in E-commerceYang Cheng, Zhishu Li, Peng Zhou, Sheng Chai, Wei Zhou. 199-202 [doi]
- Automatic Video Summarization by Affinity Propagation Clustering and Semantic Content MiningXiao-neng Xie, Fei Wu. 203-208 [doi]
- Circuit Failure Diagnosis Analysis and Research Based On Neural NetworkWenzhe Qi, Chenghui Yang, Jianjun Meng. 209-212 [doi]
- An Entropy-based Approach for Supplier Selection with Interval InformationQuan Zhang, Yahong Li, Jing Huang. 213-216 [doi]
- An Agent Bilateral Multi-issue Alternate Bidding Negotiation Protocol Based on Reinforcement Learning and its Application in E-commerceLi Jian. 217-220 [doi]
- Application of Fuzzy Ontology to Information Retrieval for Electronic CommerceJun Zhai, Lixin Shen, Yiduo Liang, Jiatao Jiang. 221-225 [doi]
- Dynamic Pricing by Multiagent Reinforcement LearningWei Han, Lingbo Liu, Huaili Zheng. 226-229 [doi]
- Selecting Supplier of Cluster Supply Chain Based on Fuzzy MeasurementJizi Li, Baishun Li, Zhiping Li. 230-233 [doi]
- The Impact of Perceived Value on User Acceptance of Mobile CommerceTao Zhou. 237-240 [doi]
- Exploring Mobile User Acceptance Based on UTAUT and Contextual OfferingTao Zhou. 241-245 [doi]
- Study on Trust in Mobile Commerce Adoption - A Conceptual ModelDecai Meng, Qingfei Min, Yuping Li. 246-249 [doi]
- An m-Business Model Based on Session Initiation ProtocolShaojing Fan, Zhongkun He, Yongping Zhang, Hongmei Zhang, Rina Su. 250-253 [doi]
- A Fuzzy Anonymity Analysis Model for Mobility in Anonymity SystemWang Liang, Guo Yajun, Yan Huifang. 254-257 [doi]
- Key Technology and System Design in Mobile Supply Chain ManagementQi Yuan, Zhao Xiaokang, Zhang Qiong. 258-262 [doi]
- Research on Influencing Factors of Consumer Initial Trust Based on Mobile CommerceZhihong Li, Minxia Li. 263-267 [doi]
- Compare and Analysis of Security Strategy in WAP and I-Mode NetworkJin Yan, Li Tong. 268-271 [doi]
- Application Analysis of M-commerce in Digitized Urban ManagementGuoling Lao, Xinwang Wang. 272-275 [doi]
- A Study on M-Commerce Industry Development and Market Structure in ChinaXiang Yi-ming, Chen Qi. 276-280 [doi]
- An Anomaly Intrusion Detection Model Based on Limited Labeled InstancesShan-Qing Guo, Zhong-Hua Zhao. 283-287 [doi]
- Research on Implementation of Elliptic Curve Cryptosystem in E-CommerceGuicheng Shen, Xuefeng Zheng. 288-291 [doi]
- An Executable Code Authorization Model for Secure Operating SystemChen Zemao, Wu Xiaoping, Tang Weimin. 292-295 [doi]
- Applying the Fujisaki-Okamoto Conversion to Certificate-based EncryptionYang Lu, Jiguo Li, Junmo Xiao. 296-300 [doi]
- An Architecture for Differentiated Security ServiceJianyong Chen, Xiaomin Wang, Liwen He. 301-304 [doi]
- Cryptanalysis of the LCSS RFID Authentication ProtocolTianjie Cao, Peng Shen, Elisa Bertino. 305-309 [doi]
- A Key-dependent Cipher DSDPLike Chen, Runtong Zhang. 310-313 [doi]
- A Novel Trust Collecting Mechanism Based on Publish/Subscribe Scheme in Grid ComputingXiangran Cheng, Xingyuan Chen, Bin Zhang, Yan Yang. 314-317 [doi]
- A Complete (alpha, k)-Anonymity Model for Sensitive Values Individuation PreservationHan Jian-min, Yu Hui-qun, Yu Juan, Cen Ting-ting. 318-323 [doi]
- A Multi-Dimensional K-Anonymity Model for Hierarchical DataXiaojun Ye, Lei Jin, Bin Li. 327-332 [doi]
- Efficient Fair Contract Signing Protocol from Bilinear PairingsQing Zhang, Qiaoyan Wen, Gengli Chen. 333-337 [doi]
- Research on PKI Model Based on NTRUShimin Wei, Zepeng Zhuo. 338-342 [doi]
- A Distributed Electronic Authentication Scheme in E-Business SystemXinxia Song, Zhigang Chen. 343-346 [doi]
- A New Image Encryption Algorithm Based on Multiple Chaos SystemYunpeng Zhang, Fei Zuo, Zhengjun Zhai, Xiaobin Cai. 347-350 [doi]
- Pattern Analysis Applied on Steganalysis for Binary Text ImagesBin Jiang, Xijian Ping, Tao Zhang. 351-354 [doi]
- Cryptanalysis and Improvement of a Remote User Authentication Scheme using Smart CardsDebasis Giri, P. D. Srivastava. 355-361 [doi]
- A New Certificateless Electronic Cash Scheme with Multiple Banks Based on Group SignaturesShangping Wang, Zhiqiang Chen, Xiaofeng Wang. 362-366 [doi]
- An Information Assurance Framework on Trusted Autonomic CommunicationsRoy Ng, Linying Dong. 367-373 [doi]
- Independent Coordination Solutions of Dynamic Information SecurityHu Ruo, Xu Hong. 377-380 [doi]
- An Information Security Model Based on P2P NetworkLiu Yihe, Tang Nianqing, He Wenxiao. 381-384 [doi]
- Defending Secret-Key Based Authentication Protocols against the Stolen-Secret AttackHung-Min Sun, King-Hang Wang. 385-389 [doi]
- Application of Parameter Modulation in E-Commerce Security Based on Chaotic EncryptionZhiming Qu, Tongbin Ma, YunLong Zhang. 390-393 [doi]
- Unified Certificate Validation System DNS-OCSPShigen Shen, Guangxue Yue. 394-397 [doi]
- One New BRAS Model Based on Trusted NetworkJian Wang, Jian Gu, Fang Mei, Zhe Zhang, Yanheng Liu. 398-401 [doi]
- Using Multilevel Correlation in a Unified Platform of Network Security Management: Design and ImplementationZheng Wu, Debao Xiao, Min Xiao, Xi Peng. 402-406 [doi]
- 5-Round Computational Zero-Knowledge Proof with Negligible Error Probability for Any NP from Any One-Way PermutationChunming Tang, Dingyi Pei, Zheng-an Yao. 407-411 [doi]
- Cancelable Voiceprint Templates Based on Knowledge SignaturesWenhua Xu, Qianhua He, Yanxiong Li, Tao Li. 412-415 [doi]
- Cross Cookie: A Cookie Protocol for Web MashupsRui Guo, Bosheng Zhou. 416-420 [doi]
- Preservation of Privacy in Publishing Social Network DataQiong Wei, Yansheng Lu. 421-425 [doi]
- A Flexible Approach to Measuring Network Security Using Attack GraphsChen Feng, Su Jin-Shu. 426-431 [doi]
- TDHA-A One-Way Hash Algorithm Based on Extended Integer Tent Maps with Dynamic PropertiesJiandong Liu, Shuhong Wang 0002, Youming Yu. 432-436 [doi]
- Tamper Difficult Technique for Data Residing on Passive StorageDing Yong. 439-442 [doi]
- Metadata Management for Distributed Multimedia Storage SystemLing Zhan, Ji-Guang Wan, Peng Gu. 443-447 [doi]
- Research on Storage Security Based on Trusted Computing PlatformJian He, Mingdi Xu. 448-452 [doi]
- Information Security Game Analysis with Penalty ParameterWei Sun, Xiangwei Kong, Dequan He, Xingang You. 453-456 [doi]
- An Introduction to Data CapturingLiqiang Zhang, Huanguo Zhang. 457-461 [doi]
- Modification and Improvement on Group Signature Scheme without Random OraclesWang Shaohui. 462-466 [doi]
- Servicing Work Safety Supervision System for Electric Locomotive Based on Configuration SoftwareJianjun Meng, Chenghui Yang, Wenzhe Qi. 467-470 [doi]
- JSON Based Decentralized SSO Security Architecture in E-CommerceYe Jun, Li Zhishu, Ma Yanyan. 471-475 [doi]
- Network Intrusion Rules Extraction Based on Rough Set and Niche Genetic AlgorithmShi Changqiong, Wang Dawei, Huang Hui, Dafang Zhang. 476-481 [doi]
- Two Stratum Bayesian Network Based Anomaly Detection Model for Intrusion Detection SystemLu Huijuan, Chen Jianguo, Wei Wei. 482-487 [doi]
- Research on the Automatic Summarization Model based on Genetic Algorithm and Mathematical RegressionXiaogang Ji. 488-491 [doi]
- A Gossip-based Opinion Diffusion Model via Uninorm Aggregation OperatorSiyuan Wu, Zhixing Huang. 492-496 [doi]
- Message Substitute Attack on Concurrent Signatures Protocol and its ImprovementYaling Zhang, Xiaofeng Wang. 497-501 [doi]
- A Formal Model of Trust and Security for Task-Oriented Information SystemLiu Wei-Peng, Hu Ju. 502-506 [doi]
- Grey Relational Evaluation on Vendor Selection Based on E-businessWuwei Li, Yuhong Wang, Ao Chen. 509-513 [doi]
- Information Intelligent System based on Web Data MiningShaobo Zhong. 514-517 [doi]
- Using Criterion-Based Access Control for Multilevel Database SecurityLeon Pan. 518-522 [doi]
- The Simplified Inductive Approach to Verifying Security ProtocolsWang Juan, Zhou Yajie, Zhang Huanguo. 523-526 [doi]
- Design and Implementation of the Airline Luggage Inspection System Base on Link Structure of QR CodeLingyan Bi, Zewei Feng, Min Liu, Weining Wang. 527-530 [doi]
- Probability of Attack Based on System Vulnerability Life CycleAmontip Jumratjaroenvanit, Yunyong Teng-Amnuay. 531-535 [doi]
- SOA-based Enterprise Service BusJianqiang Hu, Feng E. Luo, Jun Li, Xin Tong, Guiping Liao. 536-539 [doi]
- A Novel Tree-based Authenticated Dynamic Group Key Agreement Protocol for Wireless Sensor NetworkHong Tang, Liehuang Zhu, Yuanda Cao, Dazhen Wang. 540-544 [doi]
- Processing Intrusion Detection Alerts in Large-scale NetworkDong Li, Zhitang Li, Jie Ma. 545-548 [doi]
- Biometrics Authentication System on Open Network and Security AnalysisZhenhua Wu. 549-553 [doi]
- Information Security Problem Research Based on Game TheoryWei Sun, Xiangwei Kong, Dequan He, Xingang You. 554-557 [doi]
- Construction of Server-assisted Forward Secure Signature Using Bellare-Miner SchemeJia Yu, Fanyu Kong, Rong Hao, Dexiang Zhang. 558-561 [doi]
- High Speed Serial Interface & Some Key Technology ResearchWei Cheng, Zhenhua Tan, Xiaoxing Gao, Guiran Chang, Jia Wen. 562-566 [doi]
- E-business Enterprise Credit Risk Evaluation Based on Markov ChainChong Wang, Wenkuan Chen, Peiji Shao. 569-572 [doi]
- The Credit Risk Analysis and Prevention of Third Party Payment PlatformLiu Jindi, Xu Yong. 573-576 [doi]
- Cash Management and Its Risk Control under No-Stationary Uncertain DemandLiu Bin, Cui Wentian, Xin Chunlin. 577-581 [doi]
- An Opponent s Negotiation Behavior Model to Facilitate Buyer-seller Negotiations in Supply Chain ManagementFang Fang, Ye Xin, Xia Yun, Xu Haitao. 582-587 [doi]
- Hindrances to the Development of Tourism E-Commerce in ChinaLixia Yang, Xun Liu, Changyong Xu. 588-591 [doi]
- Entropy Weight Coefficient Method for Evaluating Intrusion Detection SystemsJunfeng Tian, Tao Liu, Hongqiang Jiao. 592-598 [doi]
- Research of C2C E-Business Trust Evaluation Model Based on Entropy MethodLimao Yang, Xuan Tang. 599-602 [doi]
- Exploring Influencing Factors in E-Commerce Transaction BehaviorsRanzhe Jing, Jianwei Yu, Zuo Jiang. 603-607 [doi]
- An Empirical Study on Predicting User Purchase Intention on the Creative Product: A Case of ApparelChen Pang, Xiaofen Ji. 608-611 [doi]
- A Framework for Seamless Integration of Legacy Business Applications into Enterprise Business Intelligent SystemJun Yu, Bin Xu. 612-616 [doi]
- Implementing Multi-party Key Exchange by Linear Combination of Elliptic Curve PointsJun Yang, Xianze Yang. 617-622 [doi]
- An Abstract Interpretation Frame of the Calculus of Boxed Ambients Based on the Ambient Occurrence CountingZhang Hong, Liu Lei. 623-626 [doi]
- A Research of Outsourcing Decision-making Based on Outsourcing Market MaturityHongju Zhang, Jiajia Liu, Zhijun Yan. 629-632 [doi]
- General Service Pricing Strategies Research Based on Dynamic Stochastic Wealth ModelYongming Cai, Wei Chen. 633-637 [doi]
- A Versatile SOA-based E-Business PlatformLilin Diao, Yanan Ma. 638-641 [doi]
- The Analysis of Supply Chain Procurement Strategy in E-CommerceGuangshu Chang. 642-646 [doi]
- Study of the Model of E-commerce Personalized Recommendation System Based on Data MiningYongjian Fan, Yanguang Shen, Jianying Mai. 647-651 [doi]
- Knowledge and Trust in E-consumers Online Shopping BehaviorJui-Chin Jiang, Chun-An Chen, Chih-Chien Wang. 652-656 [doi]
- Taxonomy for Personalized Recommendation ServiceLi Yu, Ming Dong, Rong Wang. 657-660 [doi]
- The Research of Supplier Selection Based on Hybrid Decision-Making Index and VIKOR MethodPeide Liu, Hongtao Du. 661-664 [doi]
- A Collaboration Model for E-government Based on Semantics and Multi-agentChunhua Ju, Chaohua Zhang. 665-669 [doi]
- Research and Application of Customer Churn Analysis in Chain Retail IndustryChunhua Ju, Feipeng Guo. 670-673 [doi]
- Integrated Routing Wasp Algorithm and Scheduling Wasp Algorithm for Job Shop Dynamic SchedulingYan Cao, Yanli Yang, Huamin Wang. 674-678 [doi]
- Customer Satisfaction Evaluation for Mobile Commerce Based on Fuzzy Comprehensive EvaluationJinsong Gao, Jinhui Xu, Zibo Zhou, Zhuojun Li. 679-682 [doi]
- Development of Internet-based Long-range Manufacture Quality Monitoring SystemJitao Fang, Shusong Yu, Xiangqian Ding. 685-689 [doi]
- Business Process-Oriented Software Architecture for Supporting Business Process ChangeQing Yao, Jing Zhang, Haiyang Wang. 690-694 [doi]
- Automobile Enterprise s Mixed Sale Mode Based on E-commerce Supply Chain ManagementLi Xinwu. 695-698 [doi]
- A Regression-based Coordination for Concurrent NegotiationBenyun Shi, Kwang Mong Sim. 699-703 [doi]
- The Study on Electronic Commerce and Development of International LogisticsZhongquan Zou. 704-707 [doi]
- Research on Representation of Preference of Negotiator in Negotiation Support SystemHongli Wang. 708-713 [doi]
- Study on an E-Commerce System based on Multi-Agent TechnologyZhiyong Sui, Lixin Huang. 714-717 [doi]
- Research on the Security of Information and Data in the CommunicationXiaoming Han. 718-721 [doi]
- Design of Customer Relationship Management Systems Based on Data MiningZhou Jianhong, Xie Yi. 722-725 [doi]
- Assessing the Impact of Information Technology on Supply Chain ManagementMehdi Fasanghari. 726-730 [doi]
- Analysis of Electronic Innovation of Securities Trading in China using a Hypercube ModelZhu Haibo. 733-736 [doi]
- The Online Third-party Payment Strategies under Price WarYiqun Li, Zhaoran Xu. 737-742 [doi]
- Key Technologies for Security Enhancing of Payment GatewayXuewang Zhang, Linlin Wang. 743-748 [doi]
- An Approach to Separating Security Concerns in E-Commerce Systems at the Architecture LevelChunhua Yang, Jiancheng Wan. 749-753 [doi]
- Study on Mobile E-commerce Security Payment SystemHua Jiang. 754-757 [doi]
- An ID-based Transferable Off-line E-Cash System with Revokable AnonymityChangji Wang, Rongbo Lu. 758-762 [doi]
- ECC-Based Biometric Signature: A New Approach in Electronic Banking SecurityShahriar Mohammadi, Sanaz Abedi. 763-766 [doi]
- Recommender Oriented to Complicate Task in E-commerceLi Yu, Xiaoping Yang, Qian Li. 767-770 [doi]
- Responsibility of Net-bank in Electronic PaymentLiu Han-xia, Li Rong-jun. 771-775 [doi]
- A Research of Trust Based on E-CommerceLihua Ruan, Ding Tian. 776-779 [doi]
- The Mechanism Design of Third Party Assure-Payment PlatformYong Xu. 780-784 [doi]
- Optimization of an Indicator System for Measuring E-Business: An Empirical Study by FirmsMin Liu. 787-791 [doi]
- The Reconstruction, Exploration and Innovation of Logos of E-commerceLi Zhongjun, He Lijuan, Zhou Qihai. 792-795 [doi]
- A New Co-evolutionary Genetic Algorithm for Traveling Salesman ProblemZhu Qiang. 796-799 [doi]
- Antecedents and Consequences of Process Innovation on E-CommerceWang Cheng, Lan Hailin, Xie Hongming. 800-804 [doi]
- The Relationships between the Antecedents of Innovativeness and Business PerformanceChing-Huai Peng. 805-809 [doi]
- Research on the Shift of Default Risk in Supply Chain Based on the Credit Default SwapXianjun Qi, Hongping Yang. 810-813 [doi]
- Test Case Reduction Technique for BPEL-based TestingWenli Dong. 814-817 [doi]
- Research on a New E-voting Method based on the Cellular PhoneYun-he Li, Shan-yu Wu. 818-821 [doi]
- A Study on the Factors Influencing Knowledge Transfer among Organizations in Strategic AlliancesZhihong Li. 822-825 [doi]
- Ownership Motivation and Corporate Performance in IT Industry under the Wave of E-Commerce: An Empirical Study based on Chinese Public CompaniesQi Yue, Hailin Lan, Luan Jiang. 829-833 [doi]
- Research on the Application of CSCW in Shipbuilding IndustryQingying Zhang, Weihong Yue, Chengfang Wang. 834-837 [doi]
- Analysis on Features and Countermeasures of Foreign-founded Enterprises Sole Proprietorship in ChinaPeizhi Wang, Xinying Liu, Wenbo Li. 838-842 [doi]
- Research on e-Commerce Application Architecture Based on the Integration of Workflow and Agile ServiceXing Wan, Lei Huang. 843-849 [doi]
- Application of Streaming Media Technology in Electronic CommerceDelin Hou, Huosong Xia. 850-853 [doi]
- A Study of Consumer Trust Formation in Electronic-CommerceHuiwen Tu, Feng Xie. 854-857 [doi]
- Research and Application on OLAP-based Farm Products Examination ModelMinghua Han, Chunhua Ju. 858-861 [doi]
- Formalization and Verification of Inter-organizational Workflow Modeling for E-CommerceCui Jin-hong, Wang Xu. 862-865 [doi]
- An Analysis of Knowledge Sharing Incentive Mechanism inside the Enterprise Based on Evolutionary GameYang Liu. 866-869 [doi]
- The Fuzzy Evaluation of E-Commerce Customer Satisfaction Utilizing Fuzzy TOPSISMehdi Fasanghari, Navid Gholamy, S. Kamal Chaharsooghi, Shohre Qadami, Mohamad Soltani Delgosha. 870-874 [doi]
- Content Based Image Watermarking in the Ridgelet DomainZhihua Xie, Shengqian Wang, Lixin Gan, Lin Zhang, Zhenghua Shu. 877-881 [doi]
- A Watermarking Protocol for Piracy TracingYuping Hu. 882-885 [doi]
- A Wavelet Digital Watermarking Algorithm Based on Chaotic MappingFu Yu, Wu Xiaoping, Chen Zemao, Ye Qing. 886-889 [doi]
- A Zero-Watermark Algorithm with Real-Mean for 2D Engineering GraphicQiaozhuo Du, Fei Peng. 890-893 [doi]
- A Statistics-Based Watermarking Scheme Robust to Print-and-ScanDaofang Cheng, Xiaolong Li, Wenfa Qi, Bin Yang. 894-898 [doi]
- Robust Image Watermarking Algorithm against ShearingDeng Minghui, Yang Fang, Zhen Jingbo. 899-903 [doi]
- An Adaptive Blind Watermarking Algorithm Based on DCT and Modified Watson’s Visual ModelYongzhong Li, Hua Zhu, Ruiqing Yu, Ge Yang, Jing Xu. 904-907 [doi]
- An Effective Fragile Document Watermarking TechniqueJiaxin Yu, Xinsheng Wang, Jianfei Li, Xu Nan. 908-911 [doi]
- A Numeric Watermark Method Based on Valve-Value SurfaceHu Zhihua, Niu Jiping. 912-915 [doi]
- A Watermarking Algorithm Based on MA and DWTXia Sun, Ziqiang Wang, Dexian Zhang. 916-919 [doi]
- Attacks on Two Buyer-Seller Watermarking Protocols and an Improvement for Revocable AnonymityMina Deng, Bart Preneel. 923-929 [doi]
- A Multipurpose Watermarking Scheme for Image Authentication and Copyright ProtectionCongxu Zhu, Yuping Hu. 930-933 [doi]
- A Large Capacity Blind Information Hiding AlgorithmJianquan Xie, Chunhua Yang, Dazu Huang, Duosi Xie. 934-937 [doi]
- A Novel Image Scrambling and Watermarking Scheme Based on Cellular AutomataRuisong Ye, Huiliang Li. 938-941 [doi]
- Robust Algorithm of Digital Image Watermarking Based on Discrete Wavelet TransformNa Li, Xiaoshi Zheng, Yanling Zhao, Huimin Wu, Shifeng Li. 942-945 [doi]
- Research on an Advanced Novel Watermarking Technology with Higher RobustnessGengming Zhu. 946-950 [doi]
- Histogram Specification-based Audio Watermarking Technology against Filtering Attacks in Time DomainXiaoming Zhang, Xiong Yin, Zhaoyang Yu. 951-956 [doi]
- Steganalysis of Information Hidden in Webpage Based on Higher-order StatisticsHuajun Huang, Shaohong Zhong, Xingming Sun. 957-960 [doi]
- Research and Design on Reputation Services (RS) SystemShouqiang Liu, Deyu Qi, Jun Xiang, Baogang Chen. 963-966 [doi]
- Using Methods of Association Rules Mining Optimizationin in Web-Based Mobile-Learning SystemShijue Zheng, Shaojun Xiong, Yin Huang, Shixiao Wu. 967-970 [doi]
- Research on the Construction of Customer-centered Integrative Knowledge Push SystemYong Feng, Hongyan Xu, Song Yan. 971-975 [doi]
- Comparative Research of Modeling Methods for Workflow ProcessGuoyin Jiang, Lihong Dong. 976-980 [doi]
- A Modified Resource Limited Artificial Immune SystemTao Liu, Zhifeng Hu, Yan Zhou, Zhijie Wang. 981-985 [doi]
- The Research on Multi-agent Framework for Decision Support System and Its ApplicationYan Li. 986-989 [doi]
- Scalable Trust in Multi-agent E-commerce SystemShuliang Zhao, Haifeng Liu, Zhaohao Sun. 990-993 [doi]
- Analysis of Business Intelligence and Its Derivative - Financial IntelligenceZhou Qihai, Huang Tao, Wang Tao. 997-1000 [doi]
- A Modeling Framework for the Planning of Logistics Nodes in Strategic Supply Chain Based on Complex NetworkJiang-bo Zheng. 1001-1005 [doi]
- Research on Entropy Model of Order Degree of Fractal Supply Chain NetworkWenfang Sun, Huaizhen Ye. 1006-1009 [doi]
- ACEAC: A Novel Access Control Model for Cooperative Editing with WorkflowFei Zhu, Qiang Lv. 1010-1014 [doi]
- The Classification of Urban Logistics Infrastructure: Evidence from the Yangtze River Delta Region in ChinaChangbing Jiang. 1015-1019 [doi]
- Management Innovation and Development of Manufacturer-Retailer Relationships for Large Electric Appliances Chain Stores in ChinaChen Haiquan, Zhou Quanxiong, Kong Xiangke. 1020-1024 [doi]
- Enterprise E-Business Transformation: A Case Study in ChinaLuchuan Liu, Jing Lu, Xiaohong Yang. 1025-1029 [doi]
- Electronic Time Stamping Safety and Efficiency Optimize Technique ResearchHong-Jiao Ma, Yu Hua, Wei Guo. 1033-1036 [doi]
- Research on Witkey Model Based on TRIZQi Ming, Xie Jingxu. 1037-1040 [doi]
- Context Active RBAC and its ApplicationsYong-Zhong He, Zhen Han, Ye Du. 1041-1044 [doi]
- Study on Information Technology Capabilities based on Value Net TheoryQiaolian Cheng, Ruijin Zhang, Yezhuang Tian. 1045-1050 [doi]
- A Novel Method for Wheel Rim RecognitionGuan Xu, Jian Su, Hongda Pan, Donglin Zhang. 1051-1054 [doi]
- Design of the Knowledge Management Integrated System Based on TRIZMing Qi, Beilei Shangguan. 1055-1058 [doi]
- Development Course for Information Platform Based on MDAZhong-hua Deng, Bin Su. 1059-1062 [doi]
- The Application of RFID Technology in the Warehouse Management Information SystemHui Tan. 1063-1067 [doi]