|
September 13, 2004 |
|
Time |
Session |
Paper |
Authors |
9:00 - 10:00 |
Invited
Session Keynote
Session Chair: Kwei-Jay Lin |
|
Prof. Jane Liu |
10:00 - 10:30 |
Coffee Break |
|
|
10:30-12:00 |
Invited Session 21: Peer to Peer Computing |
Maze: a Social Peer-to-Peer Network |
Hua Chen, Mao Yang,
Jinqiang Han,
Xiaoming Li |
|
Session
Chair: Zheng Zhang |
Granary: Architecture of Object Oriented Internet Storage
Service |
Jinfeng
Hu |
|
|
A New Layered Peer-to-Peer Architecture with Efficient Resource
Location Strategy |
Hai Jin |
|
Inivted Session 24: Business Transformation Solution |
The rise of the model-driven enterprise: a review of early
success stories and open research issues |
David Cohn, Markus Stolze |
|
Session
Chair:
Hong Cai |
Business Components Realized by IT |
David Flaxer |
|
|
Business Process Simulation with IT Depth |
Akio Koide |
|
Inivted Session 27: Intellectual Property |
Jurisdiction of e-business contract dissension, |
Qing Yang |
|
Session
Chair:
Jun Deng |
Intellectual Property Protection for e-Business Methods |
Yahong Li |
|
|
E-Government in China: Current Status, Strategies and Practice |
Zhiguang Shan |
|
|
The value of a university-based content provider: a case study
of SunnyNet |
Feng-Jyh Lin |
12:00 - 1:30 |
Lunch |
|
|
1:30-3:00 |
Invited Session 22: Peer to Peer Computing |
Trust Based Incentive in P2P Network |
Yangbin Tang |
|
Session
Chair:
Hai
Jin |
An Interest Group Model for Content Location in Peer-to-Peer
Systems |
xue
guang
tao |
|
|
P2P Research and Reality: Some Preliminary Thoughts |
Zheng Zhang |
|
Inivted Session 25: Business Transformation Solution |
A Sense-and-Response Approach to Business Transformation" |
Paul Huang |
|
Session
Chair:
Markus Stolze |
Real-Time Business Process Performance Management" |
Yushun Fan |
|
|
"Pricing strategies for information products: A review and
future directions" |
KanLiang Wang |
|
Invited Session 28: Grid Computing |
Security in Grid |
Xiulan Yu |
|
Session
Chair:
Ying Chen |
ShanghaiGrid: Services to the People |
Minglu Li |
|
|
An Efficient Web Services Based Approach to Computing Grid |
Weimin
Zheng |
3:00 - 3:30 |
Coffee Break |
|
|
3:30-4:30 |
Invited Session 23: Peer to Peer Computing |
Efficient Peer-to-Peer Overlay Construction |
Mingxuan Ni |
|
Session
Chair: Lionel Ni |
PeerView:Query Processing based on Views over Self-Organizing
Collaborative Peers |
Aoying Zhou |
|
Inivted Session 26: Business Transformation Solution |
An Open Framework of Business Design to Speed Up Business
Transformation |
Hong Cai, Ying Huang,
Lihua Tang |
|
Session
Chair: David Flaxer |
Demand Flow Network of Business Design to Speed Up Business
Transformation |
LinYan Sun |
|
|
|
|
September 14, 2004 |
|
Time |
Session |
Paper |
Authors |
8:50 - 9 |
CEC-East
Confernece Opening |
|
Chairs |
9:00 - 10:00 |
Conference Keynote
Session Chair: Thomas Li |
Science and Technology Challenges toward
Business On Demand |
Dr. James Yeh |
10:00 - 10:30 |
AM Coffee Break |
|
|
10:30-12:00 |
1: Service Oriented Technology |
A System Dynamics Framework for Sense-and-Respond Systems |
Lianjun An,J.J.Jeng,Markus Ettl,Jen-Yao Chung |
|
Session
Chair:
Jia
Zhang |
Towards Architecture Model Based Deployment for Dynamic Grid
Services |
Huang Gang,Wang Meng,Ma Liya,Mei Hong |
|
|
Efficient Interval Indexing for Content-Based Subscription
E-commerce and E-service |
Kun-lung Wu,Shyh-Kwei Chen,Philip S.Yu Mark
Mei |
|
2: Business Process and Modeling |
A Semantic Publish/Subscribe System |
Liangzhuo Zeng,Hui Lei |
|
Session
Chair:
Stephan Yang |
EAML- Architecture Modeling Language for Enterprise Applications |
Santonu Sarkar,Srinivas Thonse |
|
|
Adaptive Fuzzy Approach to Estimate Supplier's Competitiveness
in Open e-Bidding |
Trung T.Pham, Simone
K.Fuchter |
12:00 - 1:30 |
Lunch |
|
|
1:30-3:00 |
3: E-Commerce Experiences |
The Business Model and Risk Control of Warehouse Financing in
China |
Feng Gengzhong/Yu Yang/Zhao Wenyan/Wang Simiao |
|
Session
Chair: Lianjun An |
Measuring Globalization of ICT Industries:Empirical Evidence
across Six Economies of East Asia and over time |
YiMin Chen ,Fengjyh Lin |
|
|
Mining Web Transaction Patterns in Electronic Commerce |
Lee Yueshi,Yen Shou-jane,
Tu Ghihua,Hsieh Minchi |
|
4: Trust Issues for Services |
An Approach to Help Select Trustworthy Web Services Components |
Jia Zhang, Liang-Jie Zhang,Jen-Yao Chung |
|
Session
Chair: Liangzhuo Zeng |
Visiblity and Measurability for Trust Management in Cooperative
Business Operations |
Malu Castellanos,Fabio Casati,Ming-Chien Shan,Umeshwar Dayal, |
|
|
An Extended RBAC Model for Web Services in Business Process |
Liu Peng, Chen Zhong |
3:00 - 3:30 |
PM Coffee Break |
|
|
3:30-5:30 |
5: E-Commerce Lessons |
China-styled Certain Industry Circle Integration with
Manufacturing Grid |
Zhou Jian,Li Qing,Xu Dafeng |
|
Session
Chair:
Hui
Lei |
A Study of the self-organization Modeling of Distributed
Manufacturing Network Based |
Li Gang, Sunj Linyan, Sun
Xinyu |
|
|
Articulating Autonomously Distributed Electronic Product
Catalogues for Constructing Dynamic Conex Net |
Jingzhi Guo,
Chengzheng Sun and David Chen |
|
|
Support system of Advertising distribution contract for
Media-Mix strategy |
Shinya Takami,Atsushi Yamada,Hiroshi Hoshino,Takashi Oseto |
|
|
A new Idea of E-learning:Establishing Video Library in
University Network League |
Cai Lin,Yang Yafei,Yang Yixian |
|
6: Web-based Technology |
Design and Implementation of a Directory Based Wireless Network
Operation Management System |
Huang Chaoqi,Chen Ing-Yi
chen,Yue-Lin
Jiang |
|
Session
Chair:
Ming Chien
Shan |
Applying Personalized Annotation Mechanism to e-Documentation |
Stephen J.H.Yang,Vincent M.Z.Du,Norman W.Y.Shao |
|
|
A Delay Based Backoff Scheme to Support M-commerce Over Wireless
Local Area Network |
Xiaohui Li,Weidong Kou,Nai'an Liu,Xiang Sun |
|
|
A New Architecture for Dynamic E-Business Database
Interoperability |
Omar Hussain and Ben
Soh |
|
|
Dynamic Web Service Invocation Based on UDDI |
Yu Jianjun, Zhou Gang |
|
|
Client-Side Deep Web Data Extraction |
Manuel Álvarez, Alberto Pan, Juan
Raposo, Angel
Viña |
6:00 - 8:00 |
Banquet & Keynote:
Attacks and Countermeasures in System Security
Session
Chair: Jen-Yao Chung |
Prof. Jeffery Tsai |
|
|
|
|
September 15, 2004 |
|
Time |
Session |
Paper |
Authors |
9:00 - 10:00 |
Invited Keynote |
E-Government in China: Current Status, Strategies and
Practice
Session
Chair: Weidong Kou |
Prof. Ning Jia Jun |
10:00 - 10:30 |
AM Coffee Break |
|
|
10:30-12 |
7: Supply Chain Issues |
An Approach to Security and Privacy of Rfid System for Supply
Chain |
Gao Xingxin,Xiang Zhe,Wang Hao,Shen Jun,Huang Jian,Song Song |
|
Session
Chair: Jin Dong |
Using Temporal Logics for Modeling and Analysis of Workflows |
Wang Yuan, Fan Yushun |
|
|
The Simulation of Service Supply Chain Formation Based on Mobile
Agent's Searching |
Yang Zhe,Zhang Dalu |
|
8: Formal models and verification |
Toward formal verification of
UML diagrams |
Yu Zhao et al. |
|
Session
Chair: Alice Liu |
XML Constraints Preservation in Relational Schema |
Liu Yunsheng,Zhong Hao,Wang Yi |
|
|
An Approach to XML-Based Knowledge Representation and Its
Application in dynamic e-business |
Hua Zhu Jun-Hua Xu Xiao-Feng Ji |
12:00 - 1:30 |
Lunch |
|
|
1:30-3 |
9: Security Issues |
An micro-payment scheme for multiple-vendor in m-commerce |
Jianming Zhu Ninghong Wang Jianfeng Ma |
|
Session
Chair: Lei Ye |
The HMM-Based Model for Evaluating Recommender's Reputation |
Weihua Song, Vir V. Phoha, and Xin Xu |
|
|
ZERO-KNOWLEDGE PROOFS OF IDENTITY BASED ON ELGAMAL ON CONIC |
Dalu Zhang,Min Liu |
|
10: Web Service Integration |
Quality Evaluation of Web Service |
Feng-Jyh Lin,Kunhuang Huang,Yi-Min Chen,Shu-Ming Lin |
|
Session
Chair: Fangyan Rao |
Composing Web Services Dynamically and Semantically |
Jiamao Liu,Juntao Cui,Ning Gu |
|
|
SLA Representation and Applications in the NGI Service
Management |
Zhang Ruoying ,Qiu Xuesong,Meng Luoming |
3:00 - 3:30 |
PM Coffee Break |
|
|
3:30-5:30 |
11: Security Issues: II |
Work-flow Based Multi-Domain Certificate in e-Commerence |
Fang Zhiyi |
|
Session
Chair: Weidong Kou |
Design of Single Sign-on |
Zhao Gang,Zheng Dong,Chen Kefei |
|
|
A Proxy Signature Scheme with Proxy Signer's Privacy Anonymity |
Fu Xiaotong,Kou Weidong,Xiao Guozhen |
|
|
An improved mutual authentication scheme for smart card secure
messaging |
Lanjun Dang, Weidong Kou, Yuxia Xiao |
|
12: Semantic Web and Services |
Resource Association Discovery in Semantic Web |
Liang Bangyong,Tang Jie,Li Juanzi,Wang Kehong |
|
Session
Chair: Ying Li |
An Ontology Modeling Method in Semantic
Compostion of Web
services |
Juntao Cui |
|
|
Heterogeneity Resolution based on Ontology in Web Services
Composition |
Shen Derong,Yu Ge, Yin Nan |
|
|
Knowledge Sharing and Web-based Knowledge-sharing Platform |
An Fengjie,
Qiao Fei |
|
|
A New Method in Multi-issue Negotiation |
Zhang Ning, Zhang
Song,Wang Lei |