派博傳思國際中心

標題: Titlebook: Electronic Commerce and Web Technologies; First International Kurt Bauknecht,Sanjay Kumar Madria,Günther Pernul Conference proceedings 200 [打印本頁]

作者: OBESE    時間: 2025-3-21 18:01
書目名稱Electronic Commerce and Web Technologies影響因子(影響力)




書目名稱Electronic Commerce and Web Technologies影響因子(影響力)學科排名




書目名稱Electronic Commerce and Web Technologies網絡公開度




書目名稱Electronic Commerce and Web Technologies網絡公開度學科排名




書目名稱Electronic Commerce and Web Technologies被引頻次




書目名稱Electronic Commerce and Web Technologies被引頻次學科排名




書目名稱Electronic Commerce and Web Technologies年度引用




書目名稱Electronic Commerce and Web Technologies年度引用學科排名




書目名稱Electronic Commerce and Web Technologies讀者反饋




書目名稱Electronic Commerce and Web Technologies讀者反饋學科排名





作者: Exploit    時間: 2025-3-21 22:30
Electronic Commerce and Web Technologies978-3-540-44463-3Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: Resistance    時間: 2025-3-22 00:23

作者: 攝取    時間: 2025-3-22 06:27
Nur S. Muhammad,Pierre Y. Julienons is like the engineering of Web applications in general not yet supported by a methodical approach and adequate process models. This article presents a process model for Web software engineering and an appropriate execution model for Web consultancy. The models have been used in the specification
作者: 神刊    時間: 2025-3-22 09:34
https://doi.org/10.1007/978-981-10-0500-8different systems are involved, security becomes a complicated issue. Therefore, the need for definition, structuring, and quantification of security arises. This paper proposes a structured approach to analyze security measures and to quantify the overall security of an electronic business applicat
作者: 拾落穗    時間: 2025-3-22 16:25

作者: 拾落穗    時間: 2025-3-22 20:47

作者: antecedence    時間: 2025-3-22 22:15
Water in Space: The Water World of ISOography (PKC). The proposed protocol considers post-installation security using an authentication agent and electronic license. It prevents software piracy and illegal copying. Even if software is copied illegally, a merchant can trace back to its original owner from the electronic license. The prop
作者: pacific    時間: 2025-3-23 03:23

作者: 違反    時間: 2025-3-23 06:37
RFID Privacy: Challenges and Progressution in case of unfair behavior by any party, (3) does not require the active involvement of a trusted third party, (4) allows the customer to verify that the product he is about to receive is the one he is paying for, and (5) can be used for the fair exchange of any two digital items.
作者: 向前變橢圓    時間: 2025-3-23 13:05

作者: 內向者    時間: 2025-3-23 17:15

作者: 呼吸    時間: 2025-3-23 21:53
Social Engineering hits Social Commercelliances to improve their own ability to accomplish customers’ requests. In particular, we consider the case of an alliance of printshops offering similar and/or complementary print competencies and capabilities, competing but also collaborating with each other to perform print jobs..We present a ty
作者: Mammal    時間: 2025-3-23 22:27
https://doi.org/10.1007/978-3-8348-9788-6nother organization. On receiving an order from another organization, a company wants to be sure that the sender is actually entitled to do so within his or her organization. The MIERA scheme can be used for both intra- and inter-enterprise authorization and bases the decisions on roles. We define a
作者: commensurate    時間: 2025-3-24 05:40
Timo Kasper,David Oswald,Christof Paarata of online stores contains information useful for understanding the effectiveness of marketing and merchandising efforts. In this paper, we present a visualization system that provides users with greater abilities to interpret and explore clickstream data of online stores. The system visualizes a
作者: 裂隙    時間: 2025-3-24 07:51

作者: 象形文字    時間: 2025-3-24 10:51
Claire Vishik,Frederick Sheldon,David Ottn techniques such as collaborative or contentbased filtering. These problems include lack of scalability, reliance on subjective user ratings or static profiles, and the inability to capture a richer set of semantic relationships among objects (in content-based systems). Yet, usage-based personaliza
作者: REIGN    時間: 2025-3-24 16:47
Francisco Jordan,Helena Pujol,David Ruanaand the Cross-Matching Method (CMM). TwinFinder profiles a customer’s interest based on his/her purchase history. Thus, it generates a vector of keywords from titles, authors, synopses, and categories of books purchased. OMM keeps this vector to each category the books belong to. Thus, OMM avoids re
作者: 開始發(fā)作    時間: 2025-3-24 21:40
,The EDPS Strategy – Leading by Example,ore articulated. The analysis is more firmly founded in commercial reality with the growing take-up of electronic commerce. The question gets broken down into many more issues of interest. This paper addresses some of these current issues related to ‘’global and local in electronic commerce’ such as
作者: Homocystinuria    時間: 2025-3-25 02:30
https://doi.org/10.1007/978-3-8348-9418-2interfaces. In this context, the paper introduces the presentation layer of OO-.Method, an extension of the OO-Method conceptual modeling approach that is devoted to the specification of this kind of interfaces. The OO-.Method presentation approach is based on the concept of templates. Each page tem
作者: SLAG    時間: 2025-3-25 03:42
Lucjan Stapp,Adam Roman,Micha?l Pilaetenronic catalogs, travel agencies, etc., the pages constitute documents which are composed of pieces of data whose overall structure can be easily recognized. Such pages are called data-rich and can be seen as collections of complex objects. In this paper, we show how such objects can be represented b
作者: 瘋狂    時間: 2025-3-25 09:31

作者: venous-leak    時間: 2025-3-25 15:17
Kurt Bauknecht,Sanjay Kumar Madria,Günther PernulIncludes supplementary material:
作者: 過濾    時間: 2025-3-25 16:12

作者: affluent    時間: 2025-3-25 21:04

作者: EWE    時間: 2025-3-26 02:18

作者: FOLD    時間: 2025-3-26 05:21

作者: Efflorescent    時間: 2025-3-26 10:34
Contracts for Cross-Organizational Workflow Managementourced workflow process on an abstract level. This information can be fed through an interface to the WFMSs of partners in a virtual enterprise to automate the co-operation between the partners completely.
作者: Amplify    時間: 2025-3-26 13:36

作者: POLYP    時間: 2025-3-26 20:37

作者: 推測    時間: 2025-3-26 23:14
Object-Oriented Conceptual Modeling of Web Application Interfaces: the OO-,Method Abstract Presentat generate a default APD. This skeleton template structure may be further refined and enriched with the aid of the OO-.Method Interface Pattern Catalog. As a result, a web application interface is generated in an automated way.
作者: malign    時間: 2025-3-27 01:11
0302-9743 delling of web applications, electronic commerce success factors, electronic markets, XML, web mining, electronic negotiation, integrity and performance, facilitating electronic commerce, and m978-3-540-67981-3978-3-540-44463-3Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: 情感    時間: 2025-3-27 05:31
Conference proceedings 2000ign, intellectual property rights, security and fairness, distributed organizations, web usage analysis, modelling of web applications, electronic commerce success factors, electronic markets, XML, web mining, electronic negotiation, integrity and performance, facilitating electronic commerce, and m
作者: Aerate    時間: 2025-3-27 13:15
https://doi.org/10.1007/978-3-642-01370-6e of a public-key infrastructure permits the secure exchange of secret keys between trusted devices. The unencrypted, private keys never leave the hardware, rendering them unrecoverable. If adopted, this allows for the establishment of a ubiquitous digital watermarking infrastructure to support and
作者: 未成熟    時間: 2025-3-27 16:06

作者: blight    時間: 2025-3-27 19:40

作者: constellation    時間: 2025-3-27 21:57

作者: DEMN    時間: 2025-3-28 04:36
https://doi.org/10.1007/978-3-8348-9418-2 generate a default APD. This skeleton template structure may be further refined and enriched with the aid of the OO-.Method Interface Pattern Catalog. As a result, a web application interface is generated in an automated way.
作者: Banquet    時間: 2025-3-28 10:08

作者: 高腳酒杯    時間: 2025-3-28 14:02
Francisco Jordan,Helena Pujol,David Ruanahe keywords generated from the purchased books in other categories. Thus, TwinFinder can generate rather useful and surprising recommendations by OMM and CMM. We have implemented and validated TwinFinder in the e-business system of a bookstore in Japan.
作者: 旋轉一周    時間: 2025-3-28 15:24
Secure PC-Franking for Everyonenking system. In contrast to existing PC-franking products that require no hardware postal security device, our solution works off-line. Customers are not required to be online while printing indicia. Our solution operates an existing offline e-cash scheme over certain elliptic curves rather than overfinite fields.
作者: 慷慨援助    時間: 2025-3-28 21:23
Extending Content-Based Recommendation by Order-Matching and Cross-Matching Methodshe keywords generated from the purchased books in other categories. Thus, TwinFinder can generate rather useful and surprising recommendations by OMM and CMM. We have implemented and validated TwinFinder in the e-business system of a bookstore in Japan.
作者: 燦爛    時間: 2025-3-29 00:11

作者: Mawkish    時間: 2025-3-29 03:54

作者: 冷漠    時間: 2025-3-29 09:30

作者: Pde5-Inhibitors    時間: 2025-3-29 15:14
https://doi.org/10.1007/978-981-10-0500-8 the locations, security objectives, and implemented security mechanisms of the application. The security quantifier can be used to analyze, design the application, and to compare it with other applications.
作者: etidronate    時間: 2025-3-29 15:45
Lucjan Stapp,Adam Roman,Micha?l Pilaeteninterest, only few examples are required to reveal the structure of the objects. To corroborate our assumption, we describe a data extraction tool that adopts this approach and present results of some experiments carried out with this tool.
作者: Myofibrils    時間: 2025-3-29 22:48

作者: craven    時間: 2025-3-30 01:25

作者: 范例    時間: 2025-3-30 05:27

作者: 灰心喪氣    時間: 2025-3-30 11:40
Representing Web Data as Complex Objectsinterest, only few examples are required to reveal the structure of the objects. To corroborate our assumption, we describe a data extraction tool that adopts this approach and present results of some experiments carried out with this tool.
作者: VERT    時間: 2025-3-30 13:44
A Secure Electronic Software Distribution (ESD) Protocol based on PKCiracy and illegal copying. Even if software is copied illegally, a merchant can trace back to its original owner from the electronic license. The proposed protocol provides consumers, merchants, and producers in the electronic marketplace with confidence, security, and efficiency.
作者: 向宇宙    時間: 2025-3-30 19:27
Global and Local in Electronic Commerceown into many more issues of interest. This paper addresses some of these current issues related to ‘’global and local in electronic commerce’ such as the types of global e-markets, barriers to globalization in electronic commerce, and successful global e-commerce business models.
作者: compose    時間: 2025-3-30 21:16

作者: 圣人    時間: 2025-3-31 03:37
ISO Standards for Geographic Information Stubblebine & Syverson auction scheme that is . equitably fair (it does not prevent bid withdrawals). Our scheme employs a Registrar and an Auctioneer for which no special trust assumptions are made.
作者: 談判    時間: 2025-3-31 05:05
https://doi.org/10.1007/978-3-8348-9788-6n authorization tree for a transaction type that determines which combination of roles can authorize such transactions. This tree allows the order-receiving organization to verify whether the order-sending employee was properly authorized.
作者: 空氣    時間: 2025-3-31 09:52

作者: 不如屎殼郎    時間: 2025-3-31 14:24

作者: 占線    時間: 2025-3-31 19:01

作者: 扔掉掐死你    時間: 2025-3-31 22:17
An Equitably Fair On-line Auction Scheme Stubblebine & Syverson auction scheme that is . equitably fair (it does not prevent bid withdrawals). Our scheme employs a Registrar and an Auctioneer for which no special trust assumptions are made.
作者: 典型    時間: 2025-4-1 05:07

作者: 狂熱語言    時間: 2025-4-1 09:20

作者: Abrupt    時間: 2025-4-1 13:39





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
汝南县| 南通市| 平安县| 靖边县| 灌南县| 信宜市| 页游| 启东市| 沈丘县| 富宁县| 忻城县| 工布江达县| 济宁市| 林芝县| 凉城县| 凤阳县| 来安县| 哈尔滨市| 定陶县| 巴东县| 枣阳市| 清流县| 友谊县| 东乌珠穆沁旗| 武穴市| 新乡市| 晋城| 青河县| 思南县| 新邵县| 白沙| 洛川县| 潢川县| 尚义县| 琼结县| 南丹县| 克拉玛依市| 板桥市| 巫溪县| 荃湾区| 武邑县|