Photo
IEEE Conference on e-Commerce Technology for Dynamic E-Business
CEC-EAST 2004

CEC-EAST 2004 Advance Program

 

September 13, 2004

September 14, 2004

September 15, 2004

      9 - 10

Invited Keynote: Jane Liu

Conference Keynote: James Yeh

Invited Keynote: Zhiguang Shan

 

10AM-10:30AM Break

       10:30

   -12

Peer to Peer Computing

Business Transformation Solution

Intellectual Property Protection

1. Service Oriented Technology

2. Business Process and Modeling

7. Supply Chain Issues

8. Formal Models and Verification

 

12Noon-1:30PM Lunch

        1:30

      -3:00

Peer to Peer Computing

Business Transformation Solution

Grid Computing

3. Experience on E-Commerce

4. Trust Issues

9. Security Issues

10. Service Integration

 

3PM-3:30PM  Break

      3:30

     -5:30

Peer to Peer Computing

Business Transformation Solution

 

5. E-Commerce Lessons

6.  Web Based Technology

11. Security Issues II

12. Semantics Web and Services

     6- 8

 

Banquet Keynote: Jeffery Tsai

 


 
September 13, 2004  
Time Session Paper Authors
9:00 - 10:00

 Invited Session  Keynote

Session Chair: Kwei-Jay Lin

  Prof. Jane Liu
10:00 - 10:30 Coffee Break    
10:30-12:00 Invited Session 21: Peer to Peer Computing Maze: a Social Peer-to-Peer Network Hua Chen, Mao Yang, Jinqiang Han, Xiaoming Li
  Session Chair: Zheng Zhang Granary: Architecture of Object Oriented Internet Storage Service Jinfeng Hu
    A New Layered Peer-to-Peer Architecture with Efficient Resource Location Strategy Hai Jin
  Inivted Session 24: Business Transformation Solution The rise of the model-driven enterprise: a review of early success stories and open research issues David Cohn,  Markus Stolze
  Session Chair: Hong Cai Business Components Realized by IT  David Flaxer
     Business Process Simulation with IT Depth Akio Koide
  Inivted Session 27: Intellectual Property Jurisdiction of e-business contract dissension, Qing Yang
  Session Chair:  Jun Deng Intellectual Property Protection for e-Business Methods   Yahong Li
    E-Government in China: Current Status, Strategies and Practice Zhiguang Shan
    The value of a university-based content provider: a case study of SunnyNet Feng-Jyh Lin
12:00 - 1:30 Lunch    
1:30-3:00 Invited Session 22: Peer to Peer Computing Trust Based Incentive in P2P Network  Yangbin Tang
  Session Chair:   Hai Jin An Interest Group Model for Content Location in Peer-to-Peer Systems xue guang tao
    P2P Research and Reality: Some Preliminary Thoughts Zheng Zhang
  Inivted Session 25: Business Transformation Solution  A Sense-and-Response Approach to Business Transformation"  Paul Huang
  Session Chair: Markus Stolze Real-Time Business Process Performance Management" Yushun Fan
    "Pricing strategies for information products: A review and future directions" KanLiang Wang 
  Invited Session 28: Grid Computing Security in Grid Xiulan Yu
  Session Chair: Ying Chen ShanghaiGrid: Services to the People Minglu Li
    An Efficient Web Services Based Approach to Computing Grid  Weimin Zheng
3:00 - 3:30 Coffee Break    
3:30-4:30 Invited Session 23: Peer to Peer Computing Efficient Peer-to-Peer Overlay Construction  Mingxuan Ni
  Session Chair: Lionel Ni PeerView:Query Processing based on Views over Self-Organizing Collaborative Peers Aoying Zhou
  Inivted Session 26: Business Transformation Solution An Open Framework of Business Design to Speed Up Business Transformation Hong Cai, Ying Huang, Lihua Tang
  Session Chair: David Flaxer Demand Flow Network of Business Design to Speed Up Business Transformation LinYan Sun
     
September 14, 2004  
Time Session Paper Authors
8:50 - 9 CEC-East Confernece Opening   Chairs
9:00 - 10:00 Conference Keynote

Session Chair:  Thomas Li

Science and Technology Challenges toward Business On Demand Dr. James Yeh
10:00 - 10:30 AM Coffee Break    
10:30-12:00 1: Service Oriented Technology A System Dynamics Framework for Sense-and-Respond Systems Lianjun An,J.J.Jeng,Markus Ettl,Jen-Yao Chung
  Session Chair:   Jia Zhang Towards Architecture Model Based Deployment for Dynamic Grid Services Huang Gang,Wang Meng,Ma Liya,Mei Hong
    Efficient Interval Indexing for Content-Based Subscription E-commerce and E-service Kun-lung Wu,Shyh-Kwei Chen,Philip S.Yu Mark Mei
  2: Business Process and Modeling A Semantic Publish/Subscribe System Liangzhuo Zeng,Hui Lei
  Session Chair: Stephan Yang EAML- Architecture Modeling Language for Enterprise Applications Santonu Sarkar,Srinivas Thonse
    Adaptive Fuzzy Approach to Estimate Supplier's Competitiveness in Open e-Bidding Trung T.Pham, Simone K.Fuchter
12:00 - 1:30 Lunch    
1:30-3:00 3: E-Commerce Experiences The Business Model and Risk Control of Warehouse Financing in China Feng Gengzhong/Yu Yang/Zhao Wenyan/Wang Simiao
  Session Chair: Lianjun An Measuring Globalization of ICT Industries:Empirical Evidence across Six Economies of East Asia and over time YiMin Chen ,Fengjyh Lin
    Mining Web Transaction Patterns in Electronic Commerce Lee Yueshi,Yen Shou-jane, Tu Ghihua,Hsieh Minchi
  4: Trust Issues for Services An Approach to Help Select Trustworthy Web Services Components Jia Zhang, Liang-Jie Zhang,Jen-Yao Chung
  Session Chair: Liangzhuo Zeng Visiblity and Measurability for Trust Management in Cooperative Business Operations Malu Castellanos,Fabio Casati,Ming-Chien Shan,Umeshwar Dayal,
    An Extended RBAC Model for Web Services in Business Process Liu Peng, Chen Zhong
3:00 - 3:30 PM Coffee Break    
3:30-5:30 5: E-Commerce Lessons China-styled Certain Industry Circle Integration with Manufacturing Grid Zhou Jian,Li Qing,Xu Dafeng
  Session Chair:   Hui Lei A Study of the self-organization Modeling of Distributed Manufacturing Network Based Li Gang, Sunj Linyan, Sun Xinyu
    Articulating Autonomously Distributed Electronic Product Catalogues for Constructing Dynamic Conex Net Jingzhi Guo, Chengzheng Sun and David Chen
    Support system of Advertising distribution contract for Media-Mix strategy Shinya Takami,Atsushi Yamada,Hiroshi Hoshino,Takashi Oseto
    A new Idea of E-learning:Establishing Video Library in University Network League Cai Lin,Yang Yafei,Yang Yixian
  6: Web-based Technology Design and Implementation of a Directory Based Wireless Network Operation Management System Huang Chaoqi,Chen Ing-Yi chen,Yue-Lin Jiang
  Session Chair: Ming Chien Shan Applying Personalized Annotation Mechanism to e-Documentation Stephen J.H.Yang,Vincent M.Z.Du,Norman W.Y.Shao
    A Delay Based Backoff Scheme to Support M-commerce Over Wireless Local Area Network Xiaohui Li,Weidong Kou,Nai'an Liu,Xiang Sun
    A New Architecture for Dynamic E-Business Database Interoperability Omar Hussain and Ben Soh
    Dynamic Web Service Invocation Based on UDDI Yu Jianjun, Zhou Gang
    Client-Side Deep Web Data Extraction Manuel Álvarez, Alberto Pan, Juan Raposo, Angel Viña
6:00 - 8:00 Banquet & Keynote: Attacks and Countermeasures in System Security

Session Chair: Jen-Yao Chung

Prof. Jeffery Tsai
       
September 15, 2004  
Time Session Paper Authors
9:00 - 10:00 Invited Keynote E-Government in China: Current Status, Strategies and Practice

       Session Chair:         Weidong Kou

Prof. Ning Jia Jun
10:00 - 10:30 AM Coffee Break    
10:30-12 7: Supply Chain Issues An Approach to Security and Privacy of Rfid System for Supply Chain Gao Xingxin,Xiang Zhe,Wang Hao,Shen Jun,Huang Jian,Song Song
  Session Chair:   Jin Dong Using Temporal Logics for Modeling and Analysis of Workflows Wang Yuan, Fan Yushun
    The Simulation of Service Supply Chain Formation Based on Mobile Agent's Searching Yang Zhe,Zhang Dalu
  8: Formal models and verification Toward formal verification of UML diagrams Yu Zhao et al.
  Session Chair: Alice Liu XML Constraints Preservation in Relational Schema Liu Yunsheng,Zhong Hao,Wang Yi
    An Approach to XML-Based Knowledge Representation and Its Application in dynamic e-business Hua Zhu     Jun-Hua Xu    Xiao-Feng Ji
12:00 - 1:30 Lunch    
1:30-3 9: Security Issues An micro-payment scheme for multiple-vendor in m-commerce Jianming Zhu  Ninghong Wang  Jianfeng Ma
  Session Chair:   Lei Ye The HMM-Based Model for Evaluating Recommender's Reputation Weihua Song, Vir V. Phoha, and Xin Xu
    ZERO-KNOWLEDGE PROOFS OF IDENTITY BASED ON ELGAMAL ON CONIC Dalu Zhang,Min Liu
  10: Web Service Integration Quality Evaluation of Web Service Feng-Jyh Lin,Kunhuang Huang,Yi-Min Chen,Shu-Ming Lin
  Session Chair: Fangyan Rao Composing Web Services Dynamically and Semantically Jiamao Liu,Juntao Cui,Ning Gu
    SLA Representation and Applications in the NGI Service Management Zhang Ruoying ,Qiu Xuesong,Meng Luoming
3:00 - 3:30 PM Coffee Break    
3:30-5:30 11: Security Issues: II Work-flow Based Multi-Domain Certificate in e-Commerence Fang Zhiyi
  Session Chair: Weidong Kou Design of Single Sign-on Zhao Gang,Zheng Dong,Chen Kefei
    A Proxy Signature Scheme with Proxy Signer's Privacy Anonymity Fu Xiaotong,Kou Weidong,Xiao Guozhen
    An improved mutual authentication scheme for smart card secure messaging Lanjun Dang, Weidong Kou, Yuxia Xiao
  12: Semantic Web and Services Resource Association Discovery in Semantic Web Liang Bangyong,Tang Jie,Li Juanzi,Wang Kehong
  Session Chair: Ying Li An Ontology Modeling Method in Semantic Compostion of Web services Juntao Cui
    Heterogeneity Resolution based on Ontology in Web Services Composition Shen Derong,Yu Ge, Yin Nan
    Knowledge Sharing and Web-based Knowledge-sharing Platform An Fengjie, Qiao Fei
    A New Method in Multi-issue Negotiation Zhang Ning, Zhang Song,Wang Lei

 

 

Special invited tracks:

 

Business Transformation Services
Chairs: Hong Cai, Markus Stolze

Today there're a lot of undergoing business transformation happening in western and eastern world. E.g. BTO/BPO (Business Transformation Outsourcing/Business Process Outsourcing), IPO issues, transformation of enterprises to be compliant with legal requirement, business process optimization to improve quality of customer services, etc. There're also a lot of debate around "IT Doesn't matter?".  All these issues require advanced technologies that could provide end to end solutions for the industry. Here "end to end" means methodologies that could cover the range from On Demand response to customer requirements, more efficient business components analysis, enterprise project portfolio management, to solution building, down to the vendor package selection, legacy transformation etc.  In this special track, following topics will be discussed.
- Model Driven Business Transformation Services
- Component Business Modeling
- Web Services
- Model Driven Architecture
- Business Process Modeling, Analysis and Management
- Sense and Response for a Resilient Enterprise
- Pricing for IT Products
- Case Study for Business Transformation

 

Peer-to-Peer Computing
Chair: Li Xiaoming

One of objectives of this workshop is to have a collection of presentations that reflect the state of the art in peer-to-peer computing activities in China. As a result, we have carefully selected 8 papers from Peking University, Tsinghua University, Fudan University, University of Science and Technology in Hong Kong, Huazhong University of Science and Technology, Shanghai Jiaotong University, National University of Defense Technology, and Microsoft Research Asia, respectively. This set of papers covers a broad spectrum in peer-to-peer computing, from system construction to various technical issues.

 

Grid Computing in e-Business
Chair: Ying Chen

Besides the traditional applications in computing intensive areas, grid computing is playing a key role in enterprise computing to support e-business application efficiently and effectively. The OGSA (Open Grid Service Architecture) and WSRF (Web Services Resource Framework) significantly promote the adoption of grid computing in e-business by leveraging web services technology. This workshop will address several key issues in applying grid computing in e-business, security in grid, the interaction between user and grid environment through web services, services management in grid. The workshop also discuss important topics, such as what's the role of WSRF in grid computing, what is the implication for J2EE application server in grid computing.

 

Intellectual Property Protection in Networking Environments
Chair: Jun Deng

With advances of Internet, wireless networks, and various of other networks, people can easily access information. How to protect intellectual property in networking environments becomes a crucial issue. This workshop will address this key issue through experts presentations and panel discussions. The topics to be covered include but not limited to "Jurisdiction of e-business contract dissension," "Intellectual Property Protection for e-Business Methods," "E-Government in China: Current Status, Strategies and Practice," and "The value of a university-based content provider: a case study of SunnyNet."