Abstract is missing.
- Organizing Committee [doi]
- Reviewers [doi]
- Program Committee [doi]
- Chairs Message [doi]
- The Impact of Services on Electronic CommerceStuart I. Feldman. 2 [doi]
- Enterprise Services Architecture and Semantic Web ServicesLutz Heuser. 3 [doi]
- E-Commerce and Decision Technologies: Research Opportunities and ChallengesRamayya Krishnan. 4 [doi]
- Recommenders for Commerce, Content, and CommunityJohn Riedl. 5 [doi]
- The Power of Business Processes in E-CommerceAugust-Wilhelm Scheer. 6 [doi]
- Design of Progressive Auctions for Procurement Based on Lagrangian RelaxationSampath Kameshwaran, Lyès Benyoucef, Xiaolan Xie. 9-16 [doi]
- An Auction Mechanism for Polynomial-Time Execution with Combinatorial ConstraintsArne Andersson, Jim Holmstrom, Mattias Willman. 17-24 [doi]
- A Framework for Computing the Outcome of Proxied Combinatorial AuctionsJie Zhong, Peter R. Wurman. 25-32 [doi]
- An Adaptive Bilateral Negotiation Model for E-Commerce SettingsVidya Narayanan, Nicholas R. Jennings. 34-41 [doi]
- Negotiation Support in Online Markets, with Competition and Co-OperationRema Ananthanarayanan, Manoj Kumar. 42-49 [doi]
- A Flexible Model for Tree-Structured Multi-commodity MarketsPer Carlsson, Arne Andersson. 50-57 [doi]
- Truthful Online Auctions for Pricing Peer-to-Peer ServicesPo-An Chen, Tyng-Ruey Chuang. 59-66 [doi]
- An Auction for Scheduling Delivery of Highly Demanded ProductsSameer Korrapati, Peter R. Wurman. 67-74 [doi]
- A Novel Auction Mechanism for Selling Time-Sensitive E-ServicesJuong-Sik Lee, Boleslaw K. Szymanski. 75-82 [doi]
- A Clickstream-Based Collaborative Filtering Recommendation Model for E-CommerceDong-Ho Kim, Il Im, Vijayalakshmi Atluri. 84-91 [doi]
- Koba4MS: Selling Complex Products and Services Using Knowledge-Based Recommender TechnologiesAlexander Felfernig. 92-100 [doi]
- A Recommender for Targeted Advertisement of Unsought Products in E-CommerceKoung-Lung Lin, Jane Yung-jen Hsu, Han-Shen Huang, Chun-Nan Hsu. 101-108 [doi]
- Cross Enterprise Business Modeling with AC Diagrams and Workflow PatternsShiow-yang Wu, Kuo-Chang Lin. 110-117 [doi]
- e-Business Standardisation in the Automotive Industry - Two Approaches towards the Integration of SMEsMartina H. Gerst, Kai Jakobs. 118-125 [doi]
- Towards Generic Low Payment Mechanisms for Decentralized Task Allocation: A Learning Based ApproachAmir Ronen, Rina Talisman. 126-133 [doi]
- Evaluating E-Commerce Cluster Architectures Using SimulationAndrew Boyer, Bernd Brügge, Daniel P. Siewiorek. 135-142 [doi]
- Query-by-Object Interface for Information Requirement Elicitation in M-CommerceShapiee Abd Rahman, Subhash Bhalla, Tetsuya Hashimoto. 143-150 [doi]
- Enabling DRM-Preserving Digital Content RedistributionSrijith Krishnan Nair, Bogdan C. Popescu, Chandana Gamage, Bruno Crispo, Andrew S. Tanenbaum. 151-158 [doi]
- Supporting eBusiness with a Dictionary Designed in a Vertical Standardisation PerspectivePiero De Sabbata, Nicola Gessa, Guido Cucchiara, Thomas Imolesi, Fabio Vitali. 160-167 [doi]
- Push Concepts to Control Interactions in E-CommerceSusanne Robra-Bissantz, Angela Zabel. 168-175 [doi]
- Collaborative Gift Registry in Multi-channel Retail CommerceYew-Huey Liu, Jih-Shyr Yih, Florian Pinel. 176-180 [doi]
- Pareto-Efficiency without Giving-In: A Two-Phased Protocol for Multiple-Attribute NegotiationsFlorian Lang, Constantin Brunn. 182-189 [doi]
- Electronic Trading in Order-Driven Markets: Efficient ExecutionYuriy Nevmyvaka, Michael S. Kearns, Amy Papandreou, Katia P. Sycara. 190-197 [doi]
- Catalog-Based Purchasing: Illustrating a Quantitative Approach to Electronic CommerceBoaz Golany, Oded Shmueli. 198-205 [doi]
- A Joint Link and Content Approach to Information Retrieval and DistillationY. Liu, M. Liang. 207-214 [doi]
- A Robust Business Resource Management Framework Based on a Peer-to-Peer InfrastructureThomas Friese, Jörg P. Müller, Matthew Smith, Bernd Freisleben. 215-222 [doi]
- An Integrated Feedback Control Approach for Proportional Slowdown Differentiation on Internet ServersJianbin Wei, Cheng-Zhong Xu, Xiaobo Zhou. 223-230 [doi]
- Trust Enhanced Security for Mobile AgentsChing Lin, Vijay Varadharajan, Yan Wang, Vineet Pruthi. 231-238 [doi]
- The Intelligent e-Store: Easy Interactive Product Selection and ComparisonGiovanni Maria Sacco. 240-248 [doi]
- Modeling Cooperative Business Processes and Transformation to a Service Oriented ArchitectureThomas Specht, Jens Drawehn, Maik Thränert, Stefan Kühne. 249-256 [doi]
- Using Singular Value Decomposition Approximation for Collaborative FilteringSheng Zhang, Weihong Wang, James Ford, Fillia Makedon, Justin D. Pearlman. 257-264 [doi]
- An Optimization Model for the Management of Security Risks in Banking CompaniesUlrich Faisst, Oliver Prokein. 266-273 [doi]
- TrustDavis: A Non-Exploitable Online Reputation SystemDimitri do B. DeFigueiredo, Earl T. Barr. 274-283 [doi]
- The Evolution of Cooperation under Cheap PseudonymsMichal Feldman, John Chuang. 284-291 [doi]
- Increasing User Privacy in Online Transactions with X.509 v3 Certificate Private Extensions and SmartcardsBlerim Rexha. 293-300 [doi]
- Enabling Persistent Service LinksLutz Lowis, Adolf Hohl. 301-306 [doi]
- Trustworthy E-mail Using Secure XML Web ServicesSteven Taylor, Paul Andrew Watters. 307-312 [doi]
- Supply Chain ProtocollingBaolin Wu, Mohammed Dewan, Li Li, Yun Yang. 314-321 [doi]
- Unicursal Supply Chain Management for Extending Traceability from Ordering to Distribution and SettlementKoichi Hayashi, Reki Murakami. 322-329 [doi]
- A Groves Mechanism Approach to Decentralized Design of Supply ChainsDinesh Garg, Yadati Narahari, Earnest Foster, Devadatta M. Kulkarni, Jeffrey D. Tew. 330-337 [doi]
- Creating Value with Interactive Pricing Mechanisms - A Web Service-Oriented ArchitectureMartin Bernhardt, Oliver Hinz. 339-346 [doi]
- A Semantic Web Based Architecture for Analytical ToolsDenilson Sell, Liliana Cabral, Enrico Motta, John Domingue, Farshad Hakimpour, Roberto Carlos dos Santos Pacheco. 347-354 [doi]
- Policy-Driven Exception-Management for Composite Web ServicesLiangzhao Zeng, Hui Lei, Jun-Jang Jeng, Jen-Yao Chung, Boualem Benatallah. 355-363 [doi]
- Multi-Attribute Double Auctions in Financial TradingHenner Gimpel, Juho Mäkiö, Christof Weinhardt. 366-369 [doi]
- Framework for the Negotiation of Electronic Contracts in E-Business on DemandWerner Streitberger. 370-373 [doi]
- Automated Contract Negotiation Using a Mediation ServiceHung-Wen Tung, Raymund J. Lin. 374-377 [doi]
- Managing Supply Chains of Software as a Service through Agent NegotiationsJung-Ching Chen, Nicolas E. Gold, Nikolay Mehandjiev, Paul J. Layzell. 378-381 [doi]
- Design and Development of an Anthropocentric Negotiation ModelMarisa Masvoula, George Kontolemakis, Panagiotis Kanellis, Drakoulis Martakos. 383-386 [doi]
- Implementing Privacy Negotiation Techniques in E-CommerceSören Preibusch. 387-390 [doi]
- Design of Combinatorial Auctions for Allocation and Procurement ProcessesMichael Schwind. 391-395 [doi]
- Electronic Contracts in Negotiation Support Systems: Challenges, Design and ImplementationAida Jertila, Mareike Schoop. 396-399 [doi]
- A Fuzzy Trust Model for E-CommerceSamia Nefti, Farid Meziane, Mohd Khairudin Kasiran. 401-404 [doi]
- SMART - A Semantic Matchmaking Portal for Electronic MarketsSudhir Agarwal, Steffen Lamparter. 405-408 [doi]
- Ranking-Based Business Information Processing: Applications to Business Solutions and e-Commerce SystemsMao Chen, Jakka Sairamesh. 409-412 [doi]
- An Innovative Decision Support System for Bidding in Simultaneous Ascending AuctionsManos Dramitinos, George D. Stamoulis, Costas Courcoubetis. 414-417 [doi]
- Context-Based Integration of Numerical InformationDalu Zhang, Liqiang Jing. 418-421 [doi]
- EXSMAL: EDI/XML Semi-Automatic Schema Matching ALgorithmUddam Chukmol, Rami Rifaieh, Aïcha-Nabila Benharkat. 422-425 [doi]
- Principles and Algorithms of EMMIL MarketplacesLivia Kacsukne Bruckner, Jozsef Cselenyi. 426-429 [doi]
- Privacy Enhanced Electronic Cheque SystemVijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang. 431-434 [doi]
- Security and Privacy Using One-Round Zero-Knowledge ProofsSultan Almuhammadi, Clifford Neuman. 435-438 [doi]
- Promotional and Commercial Content Distribution Based on a Legal and Trusted P2P FrameworkMartin Schmucker, Peter Ebinger. 439-442 [doi]
- Meta Model Based Integration of Role-Based and Discretionary Access Control Using Path ExpressionsKathrin Lehmann, Florian Matthes. 443-446 [doi]
- Anonymity and Security in Public Internet ForumsChangjie Wang, Dickson K. W. Chiu, Ho-Fung Leung. 448-451 [doi]
- Secure Efficient Proxy Blind Signature Schemes Based DLPShaobin Wang, Fan Hong, Guohua Cui. 452-455 [doi]
- HESSL (Highly Enhanced Security Socket Layer) ProtocolByung kwan Lee, Tai-Chi Lee, Seung Hae Yang. 456-460 [doi]
- Design and Evolution of e-Business ModelsMichael Weiss, Daniel Amyot. 462-466 [doi]
- Ambient iCare e-Services for Quality Aging : Framework and RoadmapWei-Lun Chang, Soe-Tsyr Yuan. 467-470 [doi]
- Integration of Business Processes with Autonomous Information Systems: A Case Study in Government ServicesJoão Eduardo Ferreira, Osvaldo Kotaro Takai, Calton Pu. 471-474 [doi]
- Business Rules Integration in BPEL - A Service-Oriented ApproachFlorian Rosenberg, Schahram Dustdar. 476-479 [doi]
- Towards an Integrated Privacy Framework for HIPAA-Compliant Web ServicesVivying S. Y. Cheng, Patrick C. K. Hung. 480-483 [doi]
- Semantic Web Service Composition in IRS-III: The Structured ApproachFarshad Hakimpour, Denilson Sell, Liliana Cabral, John Domingue, Enrico Motta. 484-487 [doi]
- Influence of Ubiquitous Computing on Organizational StructureMoritz Strasser. 489-492 [doi]
- Enhancing E-Business-Intelligence-Service: A Topic-Guided Text Summarization FrameworkShuhua Liu. 493-496 [doi]
- An Automatic Electronic Contract Document Signing System in a Secure EnvironmentThomas Kwok, Thao Nguyen. 497-502 [doi]
- Software Piracy Prevention through Digital Rights Management SystemsPetar Djekic, Claudia Löbbecke. 504-507 [doi]
- How Pay-TV Becomes E-CommerceUlrich Greveler. 508-511 [doi]
- The Access-Usage-Control-Matrix: A Heuristic Tool for Implementing a Selected Level of Technical Content ProtectionVural Unlu, Thomas Hess. 512-517 [doi]
- Profiles for Interoperability between MPEG-21 REL and OMA DRMJaime Delgado, Jose Prados, Eva Rodríguez. 518-521 [doi]
- Pervasive Content Access for Mobile CommerceStephen J. H. Yang, Norman W. Y. Shao, Addison Y. S. Sue, Jen-Yao Chung. 523-526 [doi]
- An Architecture for the Management of Smart Cards by Mobile Devices Using Java TechnologiesTheodore K. Apostolopoulos, Ilias S. Kapetanakis, George C. Oikonomou. 527-530 [doi]
- Smart Food: Mobile Guidance for Food-Allergic PeopleKatrin Gaßner, Guy Vollmer, Mirko Prehn, Martin Fiedler, Sebastian Ssmoller. 531-534 [doi]
- Ambient e-Service Embracing ModelYuanchu Hwang, Soe-Tsyr Yuan. 535-538 [doi]
- Contract-Based Cross-Organizational Automated ProcessesOdorico von Susani, Philippe Dugerdil. 540-543 [doi]
- Calculation of Delay Times for Workflows with Fixed-Date ConstraintsMartin Bierbaumer, Johann Eder, Horst Pichler. 544-547 [doi]
- Synchronization among Activities in a Workflow Using Extended Workflow Petri NetsYehia Thabet Kotb, Essameddin Badreddin. 548-551 [doi]
- Implementing a RosettaNet Business-to-Business Integration Platform Using J2EE and Web ServicesJuho Tikkala, Paavo Kotinurmi, Timo Soininen. 553-558 [doi]
- A Practical Implementation of Transparent Encryption and Separation of Duties in Enterprise Databases: Protection against External and Internal Attacks on DatabasesUlf T. Mattsson. 559-565 [doi]
- A Personalized Product Recommendation Algorithm Based on Preference and Intention LearningYutao Guo, Jörg P. Müller. 566-569 [doi]
- Developing Flexible Service PortalsBeat Liver, Jeannette Braun, Beatrix Rentsch, Peter Roth. 570-573 [doi]