標題: Titlebook: Electronic Commerce and Web Technologies; First International Kurt Bauknecht,Sanjay Kumar Madria,Günther Pernul Conference proceedings 200 [打印本頁] 作者: OBESE 時間: 2025-3-21 18:01
書目名稱Electronic Commerce and Web Technologies影響因子(影響力)
書目名稱Electronic Commerce and Web Technologies影響因子(影響力)學科排名
書目名稱Electronic Commerce and Web Technologies網絡公開度
書目名稱Electronic Commerce and Web Technologies網絡公開度學科排名
書目名稱Electronic Commerce and Web Technologies被引頻次
書目名稱Electronic Commerce and Web Technologies被引頻次學科排名
書目名稱Electronic Commerce and Web Technologies年度引用
書目名稱Electronic Commerce and Web Technologies年度引用學科排名
書目名稱Electronic Commerce and Web Technologies讀者反饋
書目名稱Electronic Commerce and Web Technologies讀者反饋學科排名
作者: Exploit 時間: 2025-3-21 22:30
Electronic Commerce and Web Technologies978-3-540-44463-3Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: Resistance 時間: 2025-3-22 00:23 作者: 攝取 時間: 2025-3-22 06:27
Nur S. Muhammad,Pierre Y. Julienons is like the engineering of Web applications in general not yet supported by a methodical approach and adequate process models. This article presents a process model for Web software engineering and an appropriate execution model for Web consultancy. The models have been used in the specification作者: 神刊 時間: 2025-3-22 09:34
https://doi.org/10.1007/978-981-10-0500-8different systems are involved, security becomes a complicated issue. Therefore, the need for definition, structuring, and quantification of security arises. This paper proposes a structured approach to analyze security measures and to quantify the overall security of an electronic business applicat作者: 拾落穗 時間: 2025-3-22 16:25 作者: 拾落穗 時間: 2025-3-22 20:47 作者: antecedence 時間: 2025-3-22 22:15
Water in Space: The Water World of ISOography (PKC). The proposed protocol considers post-installation security using an authentication agent and electronic license. It prevents software piracy and illegal copying. Even if software is copied illegally, a merchant can trace back to its original owner from the electronic license. The prop作者: pacific 時間: 2025-3-23 03:23 作者: 違反 時間: 2025-3-23 06:37
RFID Privacy: Challenges and Progressution in case of unfair behavior by any party, (3) does not require the active involvement of a trusted third party, (4) allows the customer to verify that the product he is about to receive is the one he is paying for, and (5) can be used for the fair exchange of any two digital items.作者: 向前變橢圓 時間: 2025-3-23 13:05 作者: 內向者 時間: 2025-3-23 17:15 作者: 呼吸 時間: 2025-3-23 21:53
Social Engineering hits Social Commercelliances to improve their own ability to accomplish customers’ requests. In particular, we consider the case of an alliance of printshops offering similar and/or complementary print competencies and capabilities, competing but also collaborating with each other to perform print jobs..We present a ty作者: Mammal 時間: 2025-3-23 22:27
https://doi.org/10.1007/978-3-8348-9788-6nother organization. On receiving an order from another organization, a company wants to be sure that the sender is actually entitled to do so within his or her organization. The MIERA scheme can be used for both intra- and inter-enterprise authorization and bases the decisions on roles. We define a作者: commensurate 時間: 2025-3-24 05:40
Timo Kasper,David Oswald,Christof Paarata of online stores contains information useful for understanding the effectiveness of marketing and merchandising efforts. In this paper, we present a visualization system that provides users with greater abilities to interpret and explore clickstream data of online stores. The system visualizes a作者: 裂隙 時間: 2025-3-24 07:51 作者: 象形文字 時間: 2025-3-24 10:51
Claire Vishik,Frederick Sheldon,David Ottn techniques such as collaborative or contentbased filtering. These problems include lack of scalability, reliance on subjective user ratings or static profiles, and the inability to capture a richer set of semantic relationships among objects (in content-based systems). Yet, usage-based personaliza作者: REIGN 時間: 2025-3-24 16:47
Francisco Jordan,Helena Pujol,David Ruanaand the Cross-Matching Method (CMM). TwinFinder profiles a customer’s interest based on his/her purchase history. Thus, it generates a vector of keywords from titles, authors, synopses, and categories of books purchased. OMM keeps this vector to each category the books belong to. Thus, OMM avoids re作者: 開始發(fā)作 時間: 2025-3-24 21:40
,The EDPS Strategy – Leading by Example,ore articulated. The analysis is more firmly founded in commercial reality with the growing take-up of electronic commerce. The question gets broken down into many more issues of interest. This paper addresses some of these current issues related to ‘’global and local in electronic commerce’ such as作者: Homocystinuria 時間: 2025-3-25 02:30
https://doi.org/10.1007/978-3-8348-9418-2interfaces. In this context, the paper introduces the presentation layer of OO-.Method, an extension of the OO-Method conceptual modeling approach that is devoted to the specification of this kind of interfaces. The OO-.Method presentation approach is based on the concept of templates. Each page tem作者: SLAG 時間: 2025-3-25 03:42
Lucjan Stapp,Adam Roman,Micha?l Pilaetenronic catalogs, travel agencies, etc., the pages constitute documents which are composed of pieces of data whose overall structure can be easily recognized. Such pages are called data-rich and can be seen as collections of complex objects. In this paper, we show how such objects can be represented b作者: 瘋狂 時間: 2025-3-25 09:31 作者: venous-leak 時間: 2025-3-25 15:17
Kurt Bauknecht,Sanjay Kumar Madria,Günther PernulIncludes supplementary material: 作者: 過濾 時間: 2025-3-25 16:12 作者: affluent 時間: 2025-3-25 21:04 作者: EWE 時間: 2025-3-26 02:18 作者: FOLD 時間: 2025-3-26 05:21 作者: Efflorescent 時間: 2025-3-26 10:34
Contracts for Cross-Organizational Workflow Managementourced workflow process on an abstract level. This information can be fed through an interface to the WFMSs of partners in a virtual enterprise to automate the co-operation between the partners completely.作者: Amplify 時間: 2025-3-26 13:36 作者: POLYP 時間: 2025-3-26 20:37 作者: 推測 時間: 2025-3-26 23:14
Object-Oriented Conceptual Modeling of Web Application Interfaces: the OO-,Method Abstract Presentat generate a default APD. This skeleton template structure may be further refined and enriched with the aid of the OO-.Method Interface Pattern Catalog. As a result, a web application interface is generated in an automated way.作者: malign 時間: 2025-3-27 01:11
0302-9743 delling of web applications, electronic commerce success factors, electronic markets, XML, web mining, electronic negotiation, integrity and performance, facilitating electronic commerce, and m978-3-540-67981-3978-3-540-44463-3Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 情感 時間: 2025-3-27 05:31
Conference proceedings 2000ign, intellectual property rights, security and fairness, distributed organizations, web usage analysis, modelling of web applications, electronic commerce success factors, electronic markets, XML, web mining, electronic negotiation, integrity and performance, facilitating electronic commerce, and m作者: Aerate 時間: 2025-3-27 13:15
https://doi.org/10.1007/978-3-642-01370-6e of a public-key infrastructure permits the secure exchange of secret keys between trusted devices. The unencrypted, private keys never leave the hardware, rendering them unrecoverable. If adopted, this allows for the establishment of a ubiquitous digital watermarking infrastructure to support and 作者: 未成熟 時間: 2025-3-27 16:06 作者: blight 時間: 2025-3-27 19:40 作者: constellation 時間: 2025-3-27 21:57 作者: DEMN 時間: 2025-3-28 04:36
https://doi.org/10.1007/978-3-8348-9418-2 generate a default APD. This skeleton template structure may be further refined and enriched with the aid of the OO-.Method Interface Pattern Catalog. As a result, a web application interface is generated in an automated way.作者: Banquet 時間: 2025-3-28 10:08 作者: 高腳酒杯 時間: 2025-3-28 14:02
Francisco Jordan,Helena Pujol,David Ruanahe keywords generated from the purchased books in other categories. Thus, TwinFinder can generate rather useful and surprising recommendations by OMM and CMM. We have implemented and validated TwinFinder in the e-business system of a bookstore in Japan.作者: 旋轉一周 時間: 2025-3-28 15:24
Secure PC-Franking for Everyonenking system. In contrast to existing PC-franking products that require no hardware postal security device, our solution works off-line. Customers are not required to be online while printing indicia. Our solution operates an existing offline e-cash scheme over certain elliptic curves rather than overfinite fields.作者: 慷慨援助 時間: 2025-3-28 21:23
Extending Content-Based Recommendation by Order-Matching and Cross-Matching Methodshe keywords generated from the purchased books in other categories. Thus, TwinFinder can generate rather useful and surprising recommendations by OMM and CMM. We have implemented and validated TwinFinder in the e-business system of a bookstore in Japan.作者: 燦爛 時間: 2025-3-29 00:11 作者: Mawkish 時間: 2025-3-29 03:54 作者: 冷漠 時間: 2025-3-29 09:30 作者: Pde5-Inhibitors 時間: 2025-3-29 15:14
https://doi.org/10.1007/978-981-10-0500-8 the locations, security objectives, and implemented security mechanisms of the application. The security quantifier can be used to analyze, design the application, and to compare it with other applications.作者: etidronate 時間: 2025-3-29 15:45
Lucjan Stapp,Adam Roman,Micha?l Pilaeteninterest, only few examples are required to reveal the structure of the objects. To corroborate our assumption, we describe a data extraction tool that adopts this approach and present results of some experiments carried out with this tool.作者: Myofibrils 時間: 2025-3-29 22:48 作者: craven 時間: 2025-3-30 01:25 作者: 范例 時間: 2025-3-30 05:27 作者: 灰心喪氣 時間: 2025-3-30 11:40
Representing Web Data as Complex Objectsinterest, only few examples are required to reveal the structure of the objects. To corroborate our assumption, we describe a data extraction tool that adopts this approach and present results of some experiments carried out with this tool.作者: VERT 時間: 2025-3-30 13:44
A Secure Electronic Software Distribution (ESD) Protocol based on PKCiracy and illegal copying. Even if software is copied illegally, a merchant can trace back to its original owner from the electronic license. The proposed protocol provides consumers, merchants, and producers in the electronic marketplace with confidence, security, and efficiency.作者: 向宇宙 時間: 2025-3-30 19:27
Global and Local in Electronic Commerceown into many more issues of interest. This paper addresses some of these current issues related to ‘’global and local in electronic commerce’ such as the types of global e-markets, barriers to globalization in electronic commerce, and successful global e-commerce business models.作者: compose 時間: 2025-3-30 21:16 作者: 圣人 時間: 2025-3-31 03:37
ISO Standards for Geographic Information Stubblebine & Syverson auction scheme that is . equitably fair (it does not prevent bid withdrawals). Our scheme employs a Registrar and an Auctioneer for which no special trust assumptions are made.作者: 談判 時間: 2025-3-31 05:05
https://doi.org/10.1007/978-3-8348-9788-6n authorization tree for a transaction type that determines which combination of roles can authorize such transactions. This tree allows the order-receiving organization to verify whether the order-sending employee was properly authorized.作者: 空氣 時間: 2025-3-31 09:52 作者: 不如屎殼郎 時間: 2025-3-31 14:24 作者: 占線 時間: 2025-3-31 19:01 作者: 扔掉掐死你 時間: 2025-3-31 22:17
An Equitably Fair On-line Auction Scheme Stubblebine & Syverson auction scheme that is . equitably fair (it does not prevent bid withdrawals). Our scheme employs a Registrar and an Auctioneer for which no special trust assumptions are made.作者: 典型 時間: 2025-4-1 05:07 作者: 狂熱語言 時間: 2025-4-1 09:20 作者: Abrupt 時間: 2025-4-1 13:39