


default search action
ICEBE 2014: Guangzhou, China
- Yinsheng Li, Xiang Fei, Kuo-Ming Chao, Jen-Yao Chung:

11th IEEE International Conference on e-Business Engineering, ICEBE 2014, Guangzhou, China, November 5-7, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-6563-2
Cloud and Mobile Applications
- Xue Xiao, Shufang Wang:

Computational Experiment of Service Policy in Collaborative Procurement. 1-6 - Ruiqi Sun, Jie Yang, Zhan Gao, Zhiqiang He:

A Visualized Framework of Automatic Orchestration Engine Supporting Hybrid Cloud Resources. 7-12 - Yiye Zhu, Jianping Shen, Yinsheng Li:

A Human-centric User Model for Intelligent Healthcare. 13-18
Business Analytics and Optimization
- Jianyi Wang, Lihong Jiang, Hongming Cai:

Scenario-Based Method for Business Process Analysis and Improvement in SOA. 19-25 - Lei Wang, Yong Zhang, Zhide Chen, Li Ning, Cheng Qiao:

Dominant Bidding Strategy in Mobile App Advertising Auction. 26-30 - Licong Zhu, Hongming Cai, Lihong Jiang:

Minson: A Business Process Self-Adaptive Framework for Smart Office Based on Multi-agent. 31-37 - Boyi Xu, Yan You, Huafeng Cheng, Yizhi Gu, Hongming Cai:

Personal Healthcare Record Integration Method Based on Linked Data Model. 38-43 - Danushka Jayasinghe, Konstantinos Markantonakis

, Keith Mayes:
Optimistic Fair-Exchange with Anonymity for Bitcoin Users. 44-51
E-Business Management Engineering
- Liang Jia, Minbo Li:

Value Evaluation of Enterprise Management Informatization Based on Comprehensive Method. 52-60 - Xia Hua, Wei Qi, Siyu Zhang:

Research on Undergraduates' Perception of Wechat Acceptance. 61-67 - Nakanya Chumsombat:

Factors Influencing User Satisfaction of E-Tax Filing: The Study of Small and Medium Enterprises (SMEs). 68-73 - Abderrahmane Leshob, Hafedh Mili, Anis Boubaker

:
REA-Based Business Process Adaptation. 74-82 - Morteza Saberi

, Omar Khadeer Hussain
, Naeem Khalid Janjua
, Elizabeth Chang
:
In-house Crowdsourcing-Based Entity Resolution: Dealing with Common Names. 83-88
Data and Knowledge Management
- Weifeng Ding, Xiaolin Zheng, Chaochao Chen

, Zukun Yu, Deren Chen:
Collaborative Topic Modeling for Text Tensors. 89-96 - Boonyarat Phadermrod, Richard M. Crowder, Gary B. Wills:

Developing SWOT Analysis from Customer Satisfaction Surveys. 97-104 - Zhuo Chen, Yong Feng, Heng Li:

A Novel Top-K Automobiles Probabilistic Recommendation Model Using User Preference and User Community. 105-111 - El Mehdi Rochd, Mohamed Quafafou:

A Top-N Recommender Model with Partially Predefined Structure. 112-119 - Zongzhan Kang, Yijian Pei, Hao Wu

:
RWR-Based Resources Recommendation on Weighted and Clustered Folksonomy Graph. 120-125 - Kraimon Maneesilp, Chutima Prasatkaew:

Price Pattern Detection Using Finite State Machine with Fuzzy Transitions. 126-130
Service Engineering
- Yanhua Du, Wending Zhang:

An Operating Guideline Based Approach to Analyzing Timed Compatibility of Service Composition. 131-138 - Guoqiang Li, Lejian Liao, Dandan Song, Zhenling Zhang:

Self-Adaptive Web Service Composition Based on Stochastic Context-Free Grammar. 139-144 - WenAn Tan, Le'er Li, Yong Sun:

Performance Prediction and Analysis of Quality of Services for Cross-Organizational Workflows. 145-150 - Zongwei Luo

:
Interactive Model Fitting for Human Robot Collaboration. 151-156 - Bingqing Shen, Jingzhi Guo

, C. L. Philip Chen
:
Towards Peer-to-Peer Based Service Hosting through Procurement Mechanism for Host Selection. 157-163
Security, Privacy, and Open Source
- Szu-Yin Lin, Ping-Hsien Chou:

A Semi-distributed Reputation Mechanism Based on Dynamic Data-Driven Application System. 164-169 - Jingyi Xie, Jiang Zhong, Pan Deng:

A Robust Trust Management Model for E-Commerce System. 170-176 - Chunhui Piao, Xiaoyan Li, Xiao Pan:

Research on the User Privacy Protection Method in Mobile Commerce. 177-184 - Ping Wang, Wun Jie Chao, Kuo-Ming Chao

, Chi-Chun Lo:
Using Taint Analysis for Threat Risk of Cloud Applications. 185-190 - Sara Capecchi

, Paola Pisano
:
Reputation by Design: Using VDML and Service ML for Reputation Systems Modeling. 191-198
Green Supply Chain, Business, and RFID
- Gihong Kim, Bonghee Hong:

An Object Transition Flow Model of Test Data Set for Simulation of RFID Applications. 199-206 - Ching-Lung Lin, Chu-Huan Shih, Ching-Feng Lin, Kai-Jung Chen:

Study of Constructions for the Photovoltaic System to Increase the Economic Efficiency of Energy Generation. 207-212 - Krishna Sapkota, William Byrne, Pathmeswaran Raju, Craig Chapman, Lynsey Melville

, Daniel Wright, James Scott:
Ontology-Based Pathways Generation for Biomass to Bioenergy Conversion. 213-219 - Dong Xie, Yongrui Qin

, Quan Z. Sheng
, Yong Xu:
Managing Uncertainties in RFID Applications - A Survey. 220-225 - Yahui Lu, Zhong Ming, Haofei Yu, Hui Wang, Li Zhang:

Formalizing Workflow with Location Constraints by Colored Petri Nets. 226-231
Big Data
- Li Bing, Keith C. C. Chan

, Carol Xiaojuan Ou:
Public Sentiment Analysis in Twitter Data for Prediction of a Company's Stock Price Movements. 232-239 - Yunqing Xia, Haizhou Lin, Raymond Y. K. Lau

, Yi Liu:
Leaning to Train: Linking Financial News Articles to Company Short Names. 240-245 - Dongping Huang, Shuyue Hu, Yi Cai, Huaqing Min:

Discovering Event Evolution Graphs Based on News Articles Relationships. 246-251 - Shenglong Mi, Yinsheng Li, Hao Chen, Yong Fang:

Extraction of Product Information Object for Trustworthiness. 252-257 - Qinghua Zheng, Huan He

, Tian Ma, Ni Xue, Bing Li, Bo Dong:
Big Log Analysis for E-Learning Ecosystem. 258-263 - Meiwen Guo, Liang Wu

, Jianping Peng:
Research on the Path Sorting Efficiency of TFTA Back-Tracing Algorithm Based on the Concept of Entropy. 264-267
Industrial Experiences and Applications
- Chao-Yi Hsueh, Kaung-Hwa Chen, Pei-Ming Chen:

The Exploratory Study of Constructing the Scale for Service Convenience in Mobile APP: The Case of Chain Hotel in Taiwan. 268-273 - Jianping Shen, Yinsheng Li, Mi Zhang, Weiwei Zhou:

A Comprehensive Service-Oriented Innovation Support System for E-Commerce Innovation Process. 274-279 - Shouxian Wei, Litao Xiao, Xiaolin Zheng, Deren Chen:

A Hybrid Movie Recommendation Approach via Social Tags. 280-285 - Mounira Msahli, Xiuzhen Chen, Ahmed Serhrouchni:

Towards a Fine-Grained Access Control for Cloud. 286-291 - Jung-Bin Li, Chien-Ho Wu, Yi-Han Chang:

Practice of Taipei Tour Planning System Based on Attribute Classification and Time Saver Algorithm. 292-297
SOAIC and ECE-l
- Chien-Ho Wu:

A Patient-Centered Self-Care Support System for Diabetics. 298-302 - Hongyu Mao, Keqin Wang, Rui Ma, Yifan Gao, Yuanzhi Li, Kun Chen

, Dejun Xie, Wei Zhu, Ting Wang, Huaiqing Wang:
An Automatic News Analysis and Opinion Sharing System for Exchange Rate Analysis. 303-307 - Olga A. Tsukanova, Kun Hou, Anastasiya Semenova, Svetlana V. Maltseva

:
An Evolutionary Model of a Textured State Space Environment for Monitoring of Mobile-Only Customer-centric Social Networks. 308-313
SOAIC and ECE-II
- Jenny S. Li, John V. Monaco

, Li-Chiou Chen, Charles C. Tappert:
Authorship Authentication Using Short Messages from Social Networking Sites. 314-319 - Jianxun Deng, Lihong Jiang, Hongming Cai:

Complement Service Composition through Domain Template and Requirement Context. 320-325 - Li-Qing Guo, Da-Yo Huang, Kuo-Hsun Hsu

:
A Study of Middleware for Pluggable UI in IoT-Enabled Environment. 326-330 - Zhou Fang, Jiajun Zhang, Zhiyuan Fang:

Study on P2P E-Finance Platform System: A Case in China. 331-337
SOAIC and ECE-III
- Hui Wang, Shixiong Liu, Haofei Yu, Yahui Lu:

A Method to Measure User Influence in Social Network Based on Process Log. 338-343 - Fudan Zheng:

A Web Service Recommendation Approach Based on Collaborative Filtering. 344-349 - Goutam Saha, Mina Desai, Arghya Ghosh, Niladri Saha:

Digital Signature Modeling in E-Business. 350-354 - Chen-Fang Tsai, Shin-Li Lu

:
An Intelligent Negotiation Model for Quality of Service Chain. 355-360

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














