標題: Titlebook: E-Commerce and Web Technologies; 9th International Co Giuseppe Psaila,Roland Wagner Conference proceedings 2008 Springer-Verlag Berlin Heid [打印本頁] 作者: 字里行間 時間: 2025-3-21 19:40
書目名稱E-Commerce and Web Technologies影響因子(影響力)
書目名稱E-Commerce and Web Technologies影響因子(影響力)學科排名
書目名稱E-Commerce and Web Technologies網(wǎng)絡公開度
書目名稱E-Commerce and Web Technologies網(wǎng)絡公開度學科排名
書目名稱E-Commerce and Web Technologies被引頻次
書目名稱E-Commerce and Web Technologies被引頻次學科排名
書目名稱E-Commerce and Web Technologies年度引用
書目名稱E-Commerce and Web Technologies年度引用學科排名
書目名稱E-Commerce and Web Technologies讀者反饋
書目名稱E-Commerce and Web Technologies讀者反饋學科排名
作者: 創(chuàng)新 時間: 2025-3-21 23:53 作者: Gene408 時間: 2025-3-22 01:34
0302-9743 eviewers, in order to select only the best quality papers. The program included five sessions: “Security in E-Commerce” (with two papers), “Social Aspects of E-978-3-540-85716-7978-3-540-85717-4Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 疲勞 時間: 2025-3-22 07:16
et, a contactless smartcard or an NFC enabled mobile phone, can be used as a secure token. With this implementation we are able to bridge the gap between electronic internet transactions and the physical world in a secure way. Also the validation of the ticket at the point-of-access is based on this作者: Atrium 時間: 2025-3-22 10:01
ne privacy and their interdependencies. By representing the concept of online privacy in the form of a model, areas where concern arises can be highlighted more easily and as a result measures can be taken to reduce such concern.作者: 留戀 時間: 2025-3-22 16:19 作者: 留戀 時間: 2025-3-22 19:29 作者: Heterodoxy 時間: 2025-3-23 00:59
Chinese Literature and Culture in the Worldcredit-card-based e-commerce payments. Whenever the solutions cannot rely on a secure extra communication channel between cardholder and issuer, the only possibility is to generate new numbers on the basis of some common scheme, starting from secret shared initial information. However, in order to m作者: HACK 時間: 2025-3-23 02:02
ty. However it is not clear from an extensive review of the literature that the complete set of online privacy concerns has yet been identified or whether the concerns that have been investigated, by way of surveys, have adequate theoretical foundations. This paper considers the work of two prominen作者: Arb853 時間: 2025-3-23 08:44 作者: Compatriot 時間: 2025-3-23 13:23 作者: 倫理學 時間: 2025-3-23 14:12 作者: headlong 時間: 2025-3-23 21:27 作者: osteopath 時間: 2025-3-24 00:47
ually involves solving a conflict of interests between the parties involved. In our previous work, we address the problem of automatic bilateral negotiation by using fuzzy constraints as a mean to express participant’s preferences, focusing in purchase negotiation scenarios. Other research works hav作者: Immunization 時間: 2025-3-24 04:37 作者: 大喘氣 時間: 2025-3-24 07:45
challenges have been already addressed, but mainly related to the structure and the process of the negotiation. However, research concerning bargaining power is still inadequate represented. Thus, in order to contribute to the state of the art of electronic negotiations, this paper shows a bilatera作者: –scent 時間: 2025-3-24 11:27 作者: 刪減 時間: 2025-3-24 16:57 作者: hankering 時間: 2025-3-24 21:11 作者: 褻瀆 時間: 2025-3-24 23:28
nts. User interactions are temporally segmented into elemental browsing units. The browsing segments permit identification of the essential navigational points as well as higher order abstractions. The profiles incorporate relevant metrics from three major domains: temporal, navigational, and abstra作者: 忍受 時間: 2025-3-25 05:20 作者: Mhc-Molecule 時間: 2025-3-25 11:23
E-Commerce and Web Technologies978-3-540-85717-4Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: VERT 時間: 2025-3-25 13:04
https://doi.org/10.1007/978-3-540-85717-4E-Commerce; Electronic Commerce; Recommender Systems; Web Marketing; business process; marketing; security作者: 作繭自縛 時間: 2025-3-25 17:46 作者: Tortuous 時間: 2025-3-25 22:21
Secure Communication between Web Browsers and NFC Targets by the Example of an e-Ticketing Systemg NFC technology for transactions like payment or ticketing in the real world brings a great benefit in terms of time savings, usability and process optimization. Therefore we propose an e-ticketing system making use of this proximity technology especially focusing on security aspects of the system 作者: 注意力集中 時間: 2025-3-26 03:02
A Light Number-Generation Scheme for Feasible and Secure Credit-Card-Payment Solutionscredit-card-based e-commerce payments. Whenever the solutions cannot rely on a secure extra communication channel between cardholder and issuer, the only possibility is to generate new numbers on the basis of some common scheme, starting from secret shared initial information. However, in order to m作者: 織物 時間: 2025-3-26 05:22
Online Privacy: Measuring Individuals’ Concernsty. However it is not clear from an extensive review of the literature that the complete set of online privacy concerns has yet been identified or whether the concerns that have been investigated, by way of surveys, have adequate theoretical foundations. This paper considers the work of two prominen作者: 范圍廣 時間: 2025-3-26 12:11 作者: 推崇 時間: 2025-3-26 14:34 作者: enterprise 時間: 2025-3-26 20:27
An Event-Based Model for the Management of Choreographed Servicesgic of a service from the message flow details reported in the choreography specification. This abstraction step is achieved by introducing an event-driven management of Web Services and by exploiting a rich coordination context which includes business data and synchronization information. By separa作者: 輕信 時間: 2025-3-27 00:06 作者: CHAR 時間: 2025-3-27 03:59
Using Expressive Dialogues and Gradient Information to Improve Trade-Offs in Bilateral Negotiationsually involves solving a conflict of interests between the parties involved. In our previous work, we address the problem of automatic bilateral negotiation by using fuzzy constraints as a mean to express participant’s preferences, focusing in purchase negotiation scenarios. Other research works hav作者: Urea508 時間: 2025-3-27 09:12
Towards an Interdisciplinary Framework for Automated Negotiationts from multiple relevant research areas to integrate different perspectives on negotiation. As a starting point for an interdisciplinary research effort, this paper presents a model that handles bilateral multi-issue negotiation, employs game-theoretic techniques to define equilibrium strategies fo作者: Constrain 時間: 2025-3-27 11:41 作者: Adenocarcinoma 時間: 2025-3-27 15:52 作者: surmount 時間: 2025-3-27 21:15
Effects of Cultural Background on Internet Buying Behaviour: Towards a Virtual Global Village?fferent angles: (1) The relative importance of the online experience factors in choosing an online vendor, (2) the actual effect of these factors on the vendor choice and (3) the influence of personal and behavioural characteristics on the virtual shopping behaviour. The results identify early sympt作者: 遵循的規(guī)范 時間: 2025-3-27 22:43
Evolutionary Prediction of Online Keywords Biddingll business to directly target their customers. In order to effectively manage each advertising campaign the manager needs to figure out smart strategy to bid. This paper successively developed two models (static and dynamic) with four crucial variants at keyword bidding (bid, rank, click through an作者: 凝視 時間: 2025-3-28 03:13
Web Behaviormetric User Profiling Conceptnts. User interactions are temporally segmented into elemental browsing units. The browsing segments permit identification of the essential navigational points as well as higher order abstractions. The profiles incorporate relevant metrics from three major domains: temporal, navigational, and abstra作者: 挖掘 時間: 2025-3-28 06:50
hat is the most important for the design of the websites. The results of the test, together with a review of the specialized literature, allowed us to offer some managerial implications and recommendations for designers in order to carry out a successful virtual store.作者: 碎石 時間: 2025-3-28 13:32
vatives of each agent’s valuation function to issue direction requests to narrow the solution search space of its counterpart, thus improving the effectiveness and efficiency of the negotiation over traditional positional approaches.作者: 拱墻 時間: 2025-3-28 16:46 作者: 人類 時間: 2025-3-28 22:09 作者: 一大群 時間: 2025-3-28 22:55 作者: coddle 時間: 2025-3-29 04:29 作者: Mere僅僅 時間: 2025-3-29 09:27 作者: vector 時間: 2025-3-29 11:40 作者: A簡潔的 時間: 2025-3-29 15:59
Conference proceedings 2008 electronic commerce and web technologies. These are the proceedings of the ninth conference in the series, which, like previous EC-Web conferences, was co-located with DEXA, the International Conference on Database and Expert Systems Applications, which, this year, took place in Turin, Italy. One k作者: 培養(yǎng) 時間: 2025-3-29 23:03
A Light Number-Generation Scheme for Feasible and Secure Credit-Card-Payment Solutionsake the approach feasible, the computational load both on issuer and customer side should be minimized, also to reduce the cost of user-side devices, keeping yet an adequate security level. In this paper we present a disposable-number credit card scheme meeting the above goals, going a step ahead w.r.t. the state of the art.作者: PLIC 時間: 2025-3-30 02:06 作者: 畸形 時間: 2025-3-30 06:03
riven management of Web Services and by exploiting a rich coordination context which includes business data and synchronization information. By separating activity management issues from communication details, our framework facilitates the management of interaction protocol mismatches between Web Services.作者: neutralize 時間: 2025-3-30 08:14
nture capital industry where entrepreneurs seeking financing search for investors who, in turn, scout entrepreneurs on the basis of specific investment criteria. The match-making engine ultimate goal is to allow users to save time and money in their reciprocal search activity by generating analytic information on project compatibility measures.作者: 收養(yǎng) 時間: 2025-3-30 13:04 作者: 四指套 時間: 2025-3-30 17:45
An Event-Based Model for the Management of Choreographed Servicesriven management of Web Services and by exploiting a rich coordination context which includes business data and synchronization information. By separating activity management issues from communication details, our framework facilitates the management of interaction protocol mismatches between Web Services.