SEO Pricing with Marketability Restriction - A Monte Carlo Method with Stochastic Return and Volatility (Englisch)
- Neue Suche nach: Zhaoyu, Xu
- Neue Suche nach: Shi, An
- Neue Suche nach: Zhaoyu, Xu
- Neue Suche nach: Shi, An
In:
2009 Second International Symposium on Electronic Commerce and Security
;
2
;
352-355
;
2009
-
ISBN:
- Aufsatz (Konferenz) / Elektronische Ressource
-
Titel:SEO Pricing with Marketability Restriction - A Monte Carlo Method with Stochastic Return and Volatility
-
Beteiligte:Zhaoyu, Xu ( Autor:in ) / Shi, An ( Autor:in )
-
Erschienen in:
-
Verlag:
- Neue Suche nach: IEEE
-
Erscheinungsdatum:01.05.2009
-
Format / Umfang:248165 byte
-
ISBN:
-
DOI:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Datenquelle:
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 3
-
Study of WAP Mobile E-Commerce Security on WPKITian, Feng / Han, Xiao-bing / Wei, Ying et al. | 2009
- 3
-
A P2P Network Authentication Method Based on CPKJiang, Zhuoming / Xu, Rongsheng et al. | 2009
- 7
-
A Robust Remote User Authentication Scheme Using Smart CardChen, Bae-Ling / Kuo, Wen-Chung / Wuu, Lih-Chyau et al. | 2009
- 7
-
An Empirical Study on Mobile Banking Adoption: The Role of TrustLiu, Zhenhua / Min, Qingfei / Ji, Shaobo et al. | 2009
- 12
-
A Trust Model for the SuperPeer-based P2P Files Sharing SystemGao, Lu / Li, Zhongmin et al. | 2009
- 14
-
A New Multiple-attribute Negotiation Model of Mobile E-CommerceLi, Pucong / Zhong, Yuansheng et al. | 2009
- 16
-
Analyzing Cryptographic Protocols Using AI Planning TechnologyWang, Yadi / Zhou, Zhiyong / Zhao, Yu / Han, Jihong et al. | 2009
- 21
-
Simple Power Analysis on Elliptic Curve Cryptosystems and Countermeasures: Practical WorkWu, Keke / Li, Huiyun / Chen, Tingding / Yu, Fengqi et al. | 2009
- 21
-
A Content-Based Layered Multiple Description Coding Scheme for Robust Video Transmission over Ad Hoc NetworksYang, Jun / Gong, Shengrong et al. | 2009
- 25
-
An Effective Video Shot Boundary Detection Method Based on the Local Color Features of Interest PointsFu, Xiang / Zeng, Jie-xian et al. | 2009
- 25
-
Generic Construction of Certificate-Based Encryption in the Standard ModelLu, Yang / Li, Jiguo et al. | 2009
- 29
-
Bag-of-Words Vector Quantization Based Face IdentificationLiu, Di / Sun, Dong-mei / Qiu, Zheng-ding et al. | 2009
- 30
-
An Extended ACL for Solving Authorization ConflictsLi, Chisong / Liao, Zhensong et al. | 2009
- 34
-
Fast Algorithms for Multi-stream Content DetectionHuang, Yuping / Chen, Sanfeng et al. | 2009
- 35
-
Automatic Approach of Provable Security and its Application for OAEP+Chun-Xiang, Gu / Yan, Guang / Nan, Chen / Yue-Fei, Zhu et al. | 2009
- 39
-
Modified Fast Fuzzy C-means Algorithm for Image SegmentationGuo, Rong-chuan / Ye, Shui-sheng / Quan, Min / Shi, Hai-xia et al. | 2009
- 40
-
Joining Case-Based Reasoning and Item-Based Collaborative Filtering in Recommender SystemsGong, SongJie et al. | 2009
- 43
-
Research and Realization of Trusted Computing Platform Based on EFIFang, Weiwei / Yang, Bingru / Peng, Zheng / Tang, ZhiGang et al. | 2009
- 44
-
Multimodal Biometric Identification Approach Based on Face and PalmprintLu, Cheng / Wang, Jisong / Qi, Miao et al. | 2009
- 47
-
A Uniform Method for Computing the Distance between EllipsoidsPing, Zhou Zhi / Ke, Gan Sheng et al. | 2009
- 48
-
Optical Image Encryption Scheme Based on Multiple-parameter Random Fractional Fourier TransformZhou, Nanrun / Dong, Taiji et al. | 2009
- 52
-
Research in Embroidery Stitch Contour Restoring AlgorithmDongqing, Wu / Fengjian, Yang / Chaolong, Zhang / Xiaojian, Hu et al. | 2009
- 55
-
A Virtual Enterprise Oriented Access Control MechanismGu, Chunhua / Zhang, Xueqin et al. | 2009
- 56
-
Similarity Retrieval of Video Database Based on 3D Z-stringYu, Ping / Hwang, Chein-Shung / Kuo, NaiWen et al. | 2009
- 60
-
Evaluating Critical Strategies for Enterprise Resource Planning Systems ImplementationXu, Yan / Yeh, Chung-Hsing et al. | 2009
- 60
-
A Camera Self-calibration Method Based on Hybrid Optimization AlgorithmQiShen, Li / LiCai, Lin / ZeTao, Jiang et al. | 2009
- 65
-
Integration of Gait and Side Face for Human Recognition in VideoLi, Qi-Shen / Lu, Zhi-Tian / Zhang, Dan-Dan et al. | 2009
- 66
-
Identifying the Dynamic Impact: A Regulatory Perspective on Electronic MoneyHao, Sun / Ting, Chai Yue / Yi, Liu et al. | 2009
- 70
-
3D Target Location Algorithm with One Single CameraWang, Kang et al. | 2009
- 71
-
Micro-payment Protocol Based on Multiple Hash ChainsWang, Hong / Ma, Jialin / Sun, Jing et al. | 2009
- 73
-
A Video-Based Traffic Congestion Monitoring System Using Adaptive Background SubtractionZhu, Fei et al. | 2009
- 75
-
Research of Tools Rapid Preparation Technology for Aerospace Manufacturing EnterpriseYadong, Fang / Laihong, Du / Hua, Chen et al. | 2009
- 78
-
An Adaptive Algorithm Based on Image SegmentationLiu, Lang / Liu, Yong / Lin, Ying et al. | 2009
- 79
-
Transaction Behavior and Volatility of Price Signals in Futures MarketZhao, Yu / Zhang, Yu / Qi, Chunjie et al. | 2009
- 81
-
Interactive Intelligent Media Player Based on Head Motion RecognitionRuihu, Wang / Hongwei, Bi / Jiachen, Liu / Lingguo, Wu / Bin, Fang et al. | 2009
- 84
-
WSVR-Based Supplier SelectionRen, Wuling / Lin, Changmao et al. | 2009
- 85
-
Motion Detection Based on Temporal Difference Method and Optical Flow fieldShuigen, Wei / Zhen, Chen / Hua, Dong et al. | 2009
- 88
-
A Case Study on the Supply-chain Reengineering Based on Information Integration of LogisticsBao, Liwei / Huang, Yuchi / Song, Jijiong / Yang, Yingguang et al. | 2009
- 89
-
Stereo Video Communication and Key TechniquesZhentang, Jia / Xiaotai, Niu et al. | 2009
- 92
-
The Measurement of Abrasive Wear Based on Computer VisionZhang, Xiaofeng / Wan, Bin / Zeng, Jiexian et al. | 2009
- 93
-
Automating Microsoft Office Word in Visual BasicGong, Hongqi / Li, Lihua / Sun, Guangyong / Zhao, Hongyu et al. | 2009
- 96
-
A Method of 3-D object Recognition Based on Digital HolographyHuang, Zhen / Liu, Guodong / Ren, Zhong / Zeng, Lvming et al. | 2009
- 98
-
Design of IAM Function in ERP SystemsZhu, Shi-sheng / Wang, Tao / Deng, Ya-jun / Xie, Xiao-zhu et al. | 2009
- 100
-
A Novel Image Compression Algorithm Using Ridgelet Transformation with Modified EBCOTShu, Zhenghua / Liu, Guodong / Wang, Shengqian / Deng, Chengzhi / Gan, Lixin / Zhan, Lin et al. | 2009
- 102
-
A Semantic Service Oriented Architecture for Enterprise Application IntegrationZhang, Liyi / Zhou, Si / Zhu, Mingzhu et al. | 2009
- 105
-
Content Based Image Hashing Robust to Geometric TransformationsHanling, Zhang / Caiqiong, Xiong / Guangzhi, Geng et al. | 2009
- 107
-
A Study on IOS Innovation, Interfirm Reengineering and Cooperation PerformanceLiu, Luchuan / Yin, Guopeng et al. | 2009
- 109
-
Image Steganography Using Pixel-Value DifferencingHanling, Zhang / Guangzhi, Geng / Caiqiong, Xiong et al. | 2009
- 112
-
Emipirical Research on Term Structure of Buy-Back Rates Based on EGARCH ModelNing, Li / Dong-ping, He et al. | 2009
- 113
-
Multimodal Biometrics Recognition by Dimensionality Reduction MethodLu, Cheng / Liu, Di / Wang, Jisong / Wang, Shuyan et al. | 2009
- 116
-
Evolutionary Game Analysis on the Accounting Information Distortion by Listed CompaniesLu, Fangyuan / Qiu, Bingxian / Fan, Yunfei et al. | 2009
- 117
-
A Supervised Method for Transliterated Person Name IdentificationLei, Guo / Mei-ling, Zhou / Jian-Min, Yao / Qiao-Ming, Zhu et al. | 2009
- 120
-
Flexible Application System Integration Based on Agent-Enabled SOA in the Industrial FieldDeng, Wu / Yang, Xinhua et al. | 2009
- 121
-
Elimination of Accumulated Error of 3D Target Location Based on Dual-View ReconstructionLiu, GuiHua / Wang, WenBin / Yuan, JianYin / Liu, XianYong / Feng, QuanYuan et al. | 2009
- 125
-
A Novel Camera Calibration Method of Variable Focal Length Based on Single-ViewLiu, GuiHua / Wang, WenBin / Yuan, JianYin / Liu, XianYong / Feng, QuanYuan et al. | 2009
- 125
-
Modeling and Forecast of Operating Capability of Chinese Logistics IndustryLi-ping, Wang et al. | 2009
- 129
-
Study of Face Detection Algorithm for Real-time Face Detection SystemLang, Liying / Gu, Weiwei et al. | 2009
- 129
-
Study on Information Integration Frame and Key Technique about ERP and E-commerceZaojie, Kong / Yunsheng, Liu et al. | 2009
- 133
-
The Analysis of Government Supervision on Third-party Payment Under Cost-utility ModelLi, Yiqun / Zhang, Xuezheng et al. | 2009
- 133
-
Multispectral Image Recognition Research Based on Biomimetic Pattern RecognitionCao, Wenming / Feng, Hao et al. | 2009
- 137
-
Study on Making Algorithm of Microlens Based on Surface-moldingMin, Chen / Ju, Xiao et al. | 2009
- 138
-
Research and Implementation on Vocational Career Ladder Plan of Staff in Small and Medium-sized Enterprise of ChinaGao, Baining et al. | 2009
- 142
-
An Electronic Commerce Security Model Based on SOAYu, Xin / Li, Ping et al. | 2009
- 145
-
A Fast Infrared Face Recognition System Using Curvelet TransformationXie, Zhihua / Liu, Guodon / Wu, Shiqian / Lu, Yu et al. | 2009
- 146
-
Research in Enterprise Applications of Dynamic Web Service Composition Methods and ModelsWang, Qing-Ming / Tang, Yong / Zhang, Zan-Bo et al. | 2009
- 150
-
A Method of FAM for Pedestrian Behaviour ClassificationZhang, Chunfang / Sun, Hui / Zhou, Hongxia / Li, Ruitai et al. | 2009
- 151
-
The Production System Optimizing Simulation in Petrochemical Industry Based on HLAZhiwu, Dou / Hongwei, Li et al. | 2009
- 155
-
Anonmity-Revocable Electronic Prosecution Report SystemQiu, Weidong / Guo, Jie / Gong, Zheng / Huang, Zheng et al. | 2009
- 155
-
A New Method for Extracting Multi-line Parameters Based on RHT and Block OperationZeng, Jie-xian / Li, Si-xin / Fu, Xiang et al. | 2009
- 159
-
An Improved Outlier Detection Method in High-dimension Based on Weighted HypergraphLi, YinZhao / Wu, Di / Ren, JiaDong / Hu, ChangZhen et al. | 2009
- 161
-
The Development of Inventory Management Information System Based on Workflow TechnologyXiaoping, Qiu / Weifeng, Du / Li, Tang / Zhenggang, He et al. | 2009
- 164
-
BIDE Algorithm Based on the Expansion of PositionHe, Haitao / Zhang, Jia / Ren, Jiadong et al. | 2009
- 169
-
A Comparison between Block-Based and Non Block-Based Watermarking Schemes Based on DWTAl-Qershi, Osamah M. / Ee, Khoo Bee et al. | 2009
- 169
-
Electromagnetic Flowmeter Measurement and Numerical Computation of Laminar Flow Transport Pipeline Flow QuantityYuming, Xia / Zhiqiang, Xu et al. | 2009
- 174
-
A Feature-Based Digital Image Watermarking Algorithm Resisting to Geometrical AttacksWenliang, Tang et al. | 2009
- 174
-
Modification of Theoretical Fixed-point LMS Algorithm for Implementation in HardwareHu, Zheng-wei / Xie, Zhi-yuan et al. | 2009
- 179
-
A Novel Differential Energy Video Watermarking Based on Watson Visual ModelSun, Tanfeng / Jiang, Xinghao / Shi, Shusen / Lin, Zhigao / Fu, Guanglei et al. | 2009
- 179
-
Sample Clustering for Fast Classification by Using the Mean Shift ProcedureLie-quan, Liang / Ying-hong, Liang et al. | 2009
- 184
-
Similar or Dissimilar Users? Or Both?Kaleli, Cihan / Polat, Huseyin et al. | 2009
- 184
-
A Novel Audio Watermarking Algorithm for Copyright Protection Based on DCT DomainYan, Yang / Rong, Huang / Mintao, Xu et al. | 2009
- 189
-
Hiding Information in Region-Based Wet ImagesChang, Chin-Chen / Chen, Kuo-Nan / Lee, Chin-Feng / Wang, Zhi-Hui et al. | 2009
- 190
-
Task Scheduling of Real-time Systems on Multi-Core ArchitecturesTan, Pengliu et al. | 2009
- 194
-
Time Series Classification Based on Attributes Weighted Sample Reducing KNNXu, Shaoqing / Luo, Qiangyi / Li, Huabo / Zhang, Lei et al. | 2009
- 195
-
Research and Implementation of DCT-Based Image Digital Watermarking AlgorithmZhu, Gengming / Zhang, Shaobo et al. | 2009
- 199
-
Automatic Video Pattern Recognition Based on Combination of MPEG-7 Descriptors and Second-Prediction StrategyJiang, Xinghao / Sun, Tanfeng / Chen, Bin / Li, Rongjie / Feng, Bing et al. | 2009
- 200
-
An Efficient Algorithm for Finding Frequent Items in a StreamTu, Li / Chen, Ling / Zhang, Shan et al. | 2009
- 203
-
Image Watermarking Based on Wavelet-Based Contourlet Packet Transform with Best TreeShu, Zhenghua / Liu, Guodong / Gan, Lixin / Zhan, Lin / Fang, Wenming et al. | 2009
- 205
-
An Algorithm of Predictions for Chaotic Time Series Based on Volterra FilterJirong, Gu / Xianwei, Chen / Jieming, Zhou et al. | 2009
- 208
-
Watermarking Algorithm Based on Curvelet Transform and Human Visual ModelShu, Zhenghua / Zhang, Xiaobao / Liu, Guodong / Gan, Lixin / Zhan, Lin et al. | 2009
- 209
-
Service Oriented Decentralized Access Control for Military Systems in Net-Centric EnvironmentRuo-Fei, Han / Hou-Xiang, Wang / Qian, Xiao / Xiao-Pei, Jing / Hui, Li et al. | 2009
- 213
-
A Blind Watermarking Algorithm Based on Block DCT for Dual Color ImagesYong, Zhang / Cai, Lin Li / Shen, Li Qi / Tao, Jiang Ze et al. | 2009
- 215
-
An Item-based Collaborative Filtering Recommendation Algorithm Using Slope One Scheme SmoothingZhang, DeJia et al. | 2009
- 218
-
A Blind Image Watermarking Scheme Based on Wavelet Tree QuantizationLiu, Peng / Ding, Zhizhong et al. | 2009
- 218
-
Automatic Analysis of Fair Exchange Protocols in TLALiu, Nan / Xu, Wei / Zhu, Yue-fei et al. | 2009
- 222
-
Evaluation of the Teacher Quality in University Based on the Unascertained Measurement ModelZhu, Jin / Xujie, Hu et al. | 2009
- 223
-
Watermarking Scheme Based on DCT and DHTZhou, Jianqin / He, Lingyun / Shangguan, Cheng et al. | 2009
- 226
-
Greek Letters of European Call Currency Option with Adaptive Fuzzy NumbersHu, Maolin / Xu, Weijun et al. | 2009
- 231
-
NaXi Pictographs Input Method Based on PrimitivesGuo, Hai / Zhao, Jingying et al. | 2009
- 231
-
A Network Anomaly Detection Method Based on Relative Entropy TheoryZhang, Ya-ling / Han, Zhao-guo / Ren, Jiao-xia et al. | 2009
- 235
-
Parameter Identification of Freeway Traffic Flow Model and Adaptive Ramp MeteringYan, Jingwen et al. | 2009
- 236
-
A Static Method for Detection of Information Theft MalwareLi, JiaJing / Mao, Jian / Wei, Tao / Zou, Wei et al. | 2009
- 239
-
Study on Solution Method for a Numerical Fuzzy Programming ProblemJin, Chenxia / Li, Fachao et al. | 2009
- 241
-
A Survey on the Privacy Preserving Algorithm of Association Rule MiningLuo, Yongcheng / Zhao, Yan / Le, Jiajin et al. | 2009
- 244
-
Test Case Generation from UML Subactivity and Activity DiagramFan, Xin / Shu, Jian / Liu, LinLan / Liang, QiJun et al. | 2009
- 246
-
Compatible and Usable Mandatory Access Control for Good-enough OS SecurityShan, Zhiyong et al. | 2009
- 249
-
The Simulation of the Dense Wavelength Division Multiplexing System Based on Hybrid AmplifierYan, Gao / Xiaorong, Cui / Weifeng, Du / Ruixia, Zhang et al. | 2009
- 251
-
Hierarchical Time-Stamp Protocol: Acquiring Reliable Time-stamp from Local Time Stamping ServerPan, Xian / Zheng, J.-L. et al. | 2009
- 252
-
Threshold Multi-Secret Sharing Scheme for Cheat-Proof among Weighted ParticipantsYan, Wu / Xiaoyan, Zhou / Weifeng, Du / Yan, Gao et al. | 2009
- 255
-
Privacy Compliance Engineering ProcessYe, Xiaojun / Zhu, Zhiwu et al. | 2009
- 256
-
Design of K-Means Clustering Algorithm Based on Distance ConcentrationLiu, Tao / Dai, Guiping / Zhang, Li / Wang, Zhijie et al. | 2009
- 260
-
Detecting and Defending against Worm Attacks Using Bot-honeynetYao, Yu / Lv, Jun-wei / Gao, Fu-xiang / Yu, Ge / Deng, Qing-xu et al. | 2009
- 260
-
A Study of Interorganizational Process Refactoring Based on Inheritance TechnologyYan, Zhijun / Wang, Tianmei et al. | 2009
- 265
-
Measuring Analysis of Sustainable Development of the City-group in Shandong PeninsularGuangyi, Zhang / Xiaohui, Li et al. | 2009
- 265
-
A Unified Network Security and Fine-Grained Database Access Control ModelPan, Leon et al. | 2009
- 269
-
The Design and Development of Outline Fonts of the Dai Characters Based on OpenTypeZhao, Jing-ying / Guo, Hai / Jiang, Nan et al. | 2009
- 270
-
Underdetermined Sparse Blind Source Separation by Clustering on HyperplanesTan, Beihai / Min, Zhao et al. | 2009
- 273
-
Threshold Determining Method for Feature SelectionLi, Yanling / Song, Li et al. | 2009
- 275
-
A Novel Approach for the Maximum Coverage Sets of WSN Based on Immune Clone Selection AlgorithmTian, WenJie / Liu, JiCheng et al. | 2009
- 278
-
An Efficient Mining Model for Global Frequent Closed ItemsetsLin, Jianming / Ju, Chunhua / Liu, Dongsheng et al. | 2009
- 280
-
A Trust Domain-Based Resource Selection Model for Multi-AgentTian, Junfeng / Li, Juan et al. | 2009
- 283
-
A Clock Fault Detection Circuit for Reliable High Speed System by Time-to-Voltage ConversionYu, Changhong et al. | 2009
- 287
-
Another Efficient Provably Secure Designated Verifier Signature Scheme in the Standard Security ModelZhang, Jianhong / Geng, Qin et al. | 2009
- 287
-
Low Cost Mechanism for QoS-Aware Re-Planning of Composite ServiceDai, Yu / Zhu, Zhiliang / Li, Dancheng / Wang, Hao / Chen, Ying / Zhang, Bin et al. | 2009
- 292
-
Research on the Hierarchical Architecture of MES Based on Component and Driven by OntologyWen, Long et al. | 2009
- 292
-
Design of a New Web Database Security ModelYangqing, Zhu / Hui, Yu / Hua, Li / Lianming, Zeng et al. | 2009
- 296
-
A Secure Model for Electronic Contract Enactment, Monitoring and ManagementYu, Xiao / Chai, Yueting / Liu, Yi et al. | 2009
- 297
-
Study on Test Databank Construction And Algorithm of Test Paper Generation SystemSun, Xiaoying et al. | 2009
- 301
-
Research on the Access Control Protocol of WiMAXCuilan, Luo et al. | 2009
- 303
-
The Research of Quality Cost Efficiency with Considering the Implicit Cost Based on Non-parametric AnalysisGu, Yao / Guo, Lan / Sun, Qingyu et al. | 2009
- 305
-
Characterisation of Liquid Properties by Electrical Capacitance Tomography Sensor for Security ApplicationsLi, Nan / Guo, Bao-long / Huang, Chuan et al. | 2009
- 307
-
An Empirical Analysis of Human Capital Effect on the Economic Growth of Eastern, Middle and Western ChinaWu, Yueliang et al. | 2009
- 309
-
Comparative Assessment of Fingerprint Sample Quality Measures Based on Minutiae-Based Matching PerformanceJin, Changlong / Kim, Hakil / Cui, Xuenan / Park, Eunsoo / Kim, Junchul / Hwang, Jinsoo / Elliott, Stephen et al. | 2009
- 312
-
s-AMM: A Service-oriented Asynchronous Messaging MiddlewareHu, Jianqiang / Zeng, Zhiyong / Zhao, Geke / Long, Chenfeng / Luo, FengE et al. | 2009
- 314
-
Palmprint Verification Based on Specific-userDu, Ning / Qi, Miao / Zhang, Yinan / Kong, Jun et al. | 2009
- 317
-
The Framework of City Informationization Based on Pervasive ComputingDan, Liu / Zhonghui, Zhang / Tingjie, Lv et al. | 2009
- 318
-
Security Protocol Analysis Based on Rewriting ApproximationLiu, Nan / Zhu, Wen-ye / Zhu, Yue-fei et al. | 2009
- 323
-
A Fast Method for Solving System of Nonlinear Equations in Fundamental Matrix EstimationYuanbin, Wang / Bin, Zhang / Tianshun, Yao et al. | 2009
- 323
-
Study on the Network Service Status's Detection and Recovery Strategy Based on Cloud ModelLin, Chen / Shi-bin, Zhang / Li, Li et al. | 2009
- 328
-
Subjective Trust Evaluation Model Based on Fuzzy ReasoningShibin, Zhang / Xiang, Sun / Zhi, Qin et al. | 2009
- 329
-
A Highway Express Passenger Transportation Company Evaluation System Based on the Evidential Reasoning ApproachZhou, Mi / Liu, Xin-Bao / Qu, Hao / Pei, Feng et al. | 2009
- 333
-
A Method Used for Quality Assessment of Construction Project Based on FCE and Group-decision AHPShi, Huawang et al. | 2009
- 333
-
Research on the Method of Destroying Classified Information CarriersLv, Yanmei / Wang, Gefang / Sun, Jiangsheng / Liu, Dongqing et al. | 2009
- 337
-
A Model of Evaluating Transportation System Efficiency Based on Data Envelopment Analysis ApproachJiang, Changbing et al. | 2009
- 338
-
Development of ISEE: An Information Security Engineering EnvironmentHorie, Daisuke / Goto, Yuichi / Cheng, Jingde et al. | 2009
- 343
-
A Novel Approach for Vehicle-logo Location Based on Edge Detection and Morphological FilterLi, Wenju / Li, Ling et al. | 2009
- 343
-
A Probability-Based Approach to Attack Graphs GenerationXie, Anming / Zhang, Li / Hu, Jianbin / Chen, Zhong et al. | 2009
- 346
-
E-Mail Address Privacy via PEA's (Proxy E-Mails Accounts)Mashwani, Syed Rahman / Khusro, Shah / Tjoa, A. Min et al. | 2009
- 348
-
Key Technologies of the Dual-mode Electronic CommerceKang, Shao / Manyi, Wu et al. | 2009
- 352
-
SEO Pricing with Marketability Restriction - A Monte Carlo Method with Stochastic Return and VolatilityZhaoyu, Xu / Shi, An et al. | 2009
- 355
-
An Approach to Integrating the User Credit Values on Multiple E-Commerce WebsitesWei, Xiao / Zhang, Shunxiang et al. | 2009
- 356
-
Study on Efficiency of Risk Management for Information Security Based on TransactionLu, Zhigang / Wang, Xiaozhen / Liu, Baoxu / Xu, Rongsheng et al. | 2009
- 360
-
An Exploratory Study on E-Commerce Strategy in Small and Medium Sized Enterprises: An Ecological Niches ViewChenglin, Shen / Xinxin, Zhang et al. | 2009
- 361
-
Interval-estimation for Measuring Customer EquityHuang, Manyu et al. | 2009
- 365
-
Application of Unascertained Neural Networks to Financial Early WarningShi, Huawang et al. | 2009
- 365
-
Camparation of Logistics Organization Models under the Circumstance of E-commerceHuang, Fang / Ju, Songdong et al. | 2009
- 369
-
Dynamic Supplying Desired Web Service for E-BusinessHuang, Xuejuan / Chen, Xinmeng / Xu, Jiazhen / Yang, Jie et al. | 2009
- 369
-
Interception of EM Leakage Arising from the CRT of ComputerZhang, Hongxin / Lu, Yinghua et al. | 2009
- 373
-
IT Organization Transformation in Enterprise eCommerceLiu, Luchuan / Yin, Guopeng et al. | 2009
- 374
-
E-Commerce in the Textile and Apparel Supply Chain Management: Framework and Case StudyJinfu, Wang / Aixiang, Zhang et al. | 2009
- 378
-
Study on Behavior Trust Forecast and Control Based Electronic Commerce SystemZhao, Jie / Sha-qing, Zhang / Jun-rui, Zhong et al. | 2009
- 379
-
Intermediating Effect of Knowledge Sharing between Virtual Community System Design and E-commerce Trust: An Empirical Study from ChinaZhou, Guilin et al. | 2009
- 382
-
Wavelet Kernel Function for Stock Index ForecastTang, Lingbing / Sheng, Huanye et al. | 2009
- 385
-
Research on Third-party B2B E-marketplaces Service Orientation from Global Production Networks Embeddedness of SMEs PerspectiveHu, Baoliang et al. | 2009
- 386
-
Analyzing NSPK with the Applied Pi CalculusCai, Xiaojuan / Wu, Xiaohong et al. | 2009
- 390
-
The Analysis of Knowledge Management's Functions in E- Commerce ImplementationMingqiang, Zhu / Zuxu, Zou et al. | 2009
- 391
-
Simulation Modeling and Analysis of Business ProcessHe, Yanxiang / Zhao, Liang / Wu, Zhao / Li, Fei et al. | 2009
- 394
-
The Research of Security Technology on E-commerce Based on the Second Generation Identity ID Card and FingerprintHe, Minwei et al. | 2009
- 396
-
A Novel Financial Risk Evaluation Model Based on Adaptive Genetic AlgorithmJiang, Junchen / Zhang, Ling / Liu, Zhibin et al. | 2009
- 398
-
Intelligence Computing Methods in Electronic Commerce and SecurityZhang, Jing et al. | 2009
- 400
-
A Two-stage Evaluation Model for IT Investment Based on Interval DEAZhang, Xiuzhi / Xia, Zhijie et al. | 2009
- 403
-
Application of Comprehensive Fuzzy Evaluation in Assessing Strategies of E-Commerce PlatformZhiming, Qu / Jinxian, Li et al. | 2009
- 405
-
Research on Evaluation of B to C E-commerce Website Based on AHP and Grey EvaluationCao, Xiuli / Shen, Bing / Liu, Yanhua / Wang, Min et al. | 2009
- 408
-
Application of GRID Computating and Workflow Technology in E-Commerce LearningZhiming, Qu / Jinxian, Li et al. | 2009
- 409
-
Fuzzy Evaluation on ERP System Implementing Risk Based on Membership Degree Transformation New Algorithm M(1,2,3)Jiang, Hua et al. | 2009
- 413
-
Application of PCFA in Assessing Security Technique in E-Commerce AffairsZhiming, Qu / Jinxian, Li et al. | 2009
- 417
-
Interference Temperature Estimation Based on the Detection and Estimation of Angles of Arrival of Multiple Wide-Band Sources in Cognitive Radio Sensor NetworksMa, Wei / Wu, Mu Qing / Li, Guan Nan / Zhang, Ning et al. | 2009
- 418
-
Examining the Effect of E-commerce Website Quality on User SatisfactionZhou, Tao / Zhang, Shuren et al. | 2009
- 422
-
The Application of XML Security Technology in E-commerce SystemSong, Yang et al. | 2009
- 423
-
A Modeling for Information Integration of Design Chain Using Ontology and Web ServicesWang, Youyuan et al. | 2009
- 426
-
A Value-Oriented Framework of Business Models InnovationChen, Qiuying et al. | 2009
- 427
-
A New Method for Web Service Selection Based on Hybrid QoS CriteriaHe, Yanxiang / Li, Fei / Wu, Zhao / Liang, Zhao et al. | 2009
- 431
-
The Research on Chinese Taxation Policies Based on E-commerce Model ClassificationXiang, Yiming / Ling, Yun et al. | 2009
- 432
-
Research and Practice of Web Server OptimizationWang, Mingfu / Qi, Zhiwen et al. | 2009
- 435
-
BCM Mechanism Based on Infinite-horizon Growth Model in E-commerceChen, Gang et al. | 2009
- 437
-
Research on a Virtual Data Integration on the WebChuanqing, Cheng / Xuexian, Cheng et al. | 2009
- 441
-
A Finite Element Mesh Generation Algorithm and Application to Human Head ModelingLiu, Jun / Zeng, Jiexian et al. | 2009
- 441
-
Synchronization Schedule and Date Sharing of Activity Multi-Instance Based on WorkflowLin-lan, Liu / Min, Ma / Jian, Shu / Fengyu, Yang / Wei, Zhong et al. | 2009
- 444
-
A New Adaptive Genetic Neural Network Based Active EvolutionYing-fu, Yan / Hui, Wen et al. | 2009
- 446
-
Web Document Clustering Research Based on Granular ComputingShangzhi, Zheng / Xiaolong, Zhao / Buqun, Zhang / Hualong, Bu et al. | 2009
- 448
-
A Reliability Measurement Method for Service in GridLi, Yunfa / Tan, Pengliu et al. | 2009
- 451
-
A Study on RFID Book Information Management System with an EDA/SOAJieming, Wu / Yu, Ding et al. | 2009
- 453
-
A Search Algorithm Based on Referral Trust in Unstructured P2P SystemsPing, Wang / Jing, Qiu / Hui, Qiu Yu et al. | 2009
- 456
-
CGT Code-Based XML Data Compression MethodZhang, Sheng / Chen, Sha / Liang, Yuping et al. | 2009
- 458
-
An Algorithm of Mining Exceptions in High Dimensional Data CubeDing, Youwei / Hu, Kongfa / Chen, Ling et al. | 2009
- 460
-
A Stochastic Approach to Predict Performance of Web Service CompositionDong, Yuxiang / Xia, Yunni / Zhu, Qingsheng / Huang, Yu et al. | 2009
- 462
-
An Improved Hybrid Genetic Algorithms Using Simulated AnnealingShi, Huawang et al. | 2009
- 465
-
Generating Test Case from Functional Requirement of Web ApplicationsZhu, Bin / Miao, Huaikou / Zeng, Hongwei / Chen, Shengbo et al. | 2009
- 466
-
An Improved ID-Based Multi-Proxy Multi-Signcryption SchemeXiaoyan, Zhou / Yan, Wu / Weifeng, Du / Yan, Gao et al. | 2009
- 469
-
Semi-automatic Web Service Composition Optimization with Global ConstraintXiangwei, Liu / Fang, Xianwen / Guo, Juan et al. | 2009
- 470
-
Application Entropy Theory to Detect New Peer-to-Peer Botnet with Multi-chart CUSUMKang, Jian / Zhang, Jun-Yao et al. | 2009
- 474
-
Research on Web2.0-Based Anti-Cheating Mechanism for Witkey e-CommercePiao, Chunhui / Han, Xufang / Jing, Xiangyang et al. | 2009
- 475
-
Evolving Artificial Neural Networks Using GA and MomentumShi, Huawang et al. | 2009
- 479
-
A Framework for Trustworthy Web Service ManagementZhao, Shenghui / Wu, Guoxin / Li, Yuemin / Yu, Kun et al. | 2009
- 479
-
Hierarchic Genetic Algorithm for Designated Multi-nodes RoutingXiao, Xiaoli / Huang, Min et al. | 2009
- 483
-
DB Facade: A Web Cache with Improved Data FreshnessQin, Xiongpai / Zhou, Xiaoyun et al. | 2009
- 484
-
Using Diversity as an Additional-objective in Dynamic Multi-objective Optimization AlgorithmsChen, Hao / Li, Ming / Chen, Xi et al. | 2009
- 488
-
Voronoi Based Area Coverage Optimization for Directional Sensor NetworksLi, Jing / Wang, Ru-chuan / Huang, Hai-ping / Sun, Li-juan et al. | 2009
- 488
-
Fuzzy Comprehensive Evaluation on Digital Libraries Based on Membership Degree Transformation New Algorithm-M(1,2,3)Jiang, Hua et al. | 2009
- 494
-
Cooperative Caching Routing Discovery Protocol in MANETs Based on Improvement of the Expanding Ring SearchTan, Jin / Fan, Chou / Zhou, HangXia et al. | 2009
- 495
-
A Majority Voting Scheme in Wireless Sensor Networks for Detecting Suspicious NodeFan, Chou / Tan, Jin et al. | 2009
- 499
-
A Novel Node Deployment and Clustering Scheme in Wireless Sensor NetworksCan, Gongben / Wang, Shaorong et al. | 2009
- 499
-
An Effective Target Tracking MethodShen, MeiLi et al. | 2009
- 503
-
A New Model of Rough-Fuzzy SetsLingxiao, Yang / Xiaoyan, Zhou / Weifeng, Du / Yan, Gao et al. | 2009
- 504
-
Data Fusion in Wireless Sensor NetworksChen, Yebin / Shu, Jian / Zhang, Sheng / Liu, Linlan / Sun, Limin et al. | 2009
- 506
-
The Application of Multi-thread-based Embedded System in the Fire MonitorLiu, Hong / Zheng, Jianxiang / Chen, Ying et al. | 2009
- 509
-
A Game-Theoretic Model for Analyzing Fair Exchange ProtocolsGu, Yonggen / Shen, Zhangguo / Xue, Deqian et al. | 2009
- 510
-
Research on Warning Mechanism of Link Quality for Event-driven Wireless Sensor NetworkLiu, Linlan / Li, Jun / Wu, Zhenghua / Shu, Jian et al. | 2009
- 514
-
Improved Genetic Algorithm for Designing DNA SequencesHongyan, Zhang / Xiyu, Liu et al. | 2009
- 516
-
Routing-Based Global Network Communication Quality Representation for Event-driven Wireless Sensor NetworkWu, Zhenhua / Shu, Jian et al. | 2009
- 519
-
Research on the AID Measurement Based on Improved SVM AlgorithmZhang, Ling / Jiang, Junchen / Liu, Zhibin et al. | 2009
- 521
-
A SPN-Based Performance Evaluation of Wireless Sensor NetworksZeng, Wu / Hong, Zhiguo et al. | 2009
- 523
-
Improvement of Chord Routing AlgorithmWang, Biqing et al. | 2009
- 525
-
Energy Efficient Clustering Algorithm in Wireless Sensor Networks Based on Geometric ProgrammingLi, Wei et al. | 2009
- 526
-
CHypercube: A Novel P2P Overlay NetworkXiao, Wenjun / Liu, Hao / Chen, Weidong et al. | 2009
- 528
-
Wireless Sensor Networks Topology Algorithm Based on Immune PrincipleLiu, Tao / Zhou, Yan / Chen, Jie / Wang, Zhijie et al. | 2009
- 532
-
Research on Efficient Coverage Problem of Node in Wireless Sensor NetworksWang, Xueqing / Zhang, Shuqin et al. | 2009
- 532
-
Research on the Application of Improved Hybrid Genetic Algorithm in Open Vehicle Routing ProblemChunyu, Ren / Shiwei, Li / Bing, Yue et al. | 2009
- 537
-
The Analysis of Breach Path Problem in Wireless Sensor Networks with Blind AreaCao, Wenming / He, Tiancheng et al. | 2009
- 539
-
Analysis on Market Characteristics and Competition Strategy of Online Games in ChinaYou, Xiaobo / Zou, Shan / Zhong, Junjie et al. | 2009
- 541
-
Author Index - Volume 2| 2009
- 544
-
Research on Logistics Industry Cluster Synergy Model Based on Decision-making Game TheoryGui, Shouping / Chen, Liang / Xiong, Weiwen et al. | 2009
- 546
-
Roster Page - Volume 2| 2009
- 548
-
Study on Genetic Algorithm Based on Schema Mutation and Its Performance AnalysisLi, Fachao / Zhang, Tingyu et al. | 2009
- 552
-
Optimization on Realization Time of Knowledge Demand in Innovation NetworksWu, Chuanrong / Zeng, Deming et al. | 2009
- 556
-
The Development of Robust Control to AGC Systems of Cold Rolling MillZi, Teng / Xin, Meng / GuangXue, Yue et al. | 2009
- 561
-
Research of Optimizing Device Description Technology Based on XML in EPAYuanzhong, Shu / Chenggong, Tao / Quan, Li / Xiaohong, Peng et al. | 2009
- 565
-
A New Time-domain Detection Approach with Blind Separation Based on Neural NetworkLi, Guan Nan / Zheng, Feng / Yang, Li / Zhang, Ning et al. | 2009
- 569
-
A Two-stage Approach for Estimating Jump-diffusion Model with Application to Daily Returns of USD/CNY Exchange RatesYang, Ruicheng / Zhou, Yingying et al. | 2009
- 573
-
An Energy Reporting Aggregation Method Based on EAFM and DTRM in WSNZhang, Sheng / Zhou, Ping / Shu, Jian et al. | 2009
- 578
-
Analysis on the Regional Differentiation of Technological Innovation of MLEs in Henan Province Based on Panel DataHuang, Yibin / Jiao, Keyan / Lu, Fangyuan et al. | 2009
- 582
-
Information System Evolution for Small BusinessZhou, Lixia et al. | 2009
- 585
-
Ontology-Based Knowledge Extraction for Relational Database SchemaZhang, Guoqiang / Jia, Suling et al. | 2009
- 590
-
Research on Agile Job-shop Scheduling Problem Based on Genetic AlgorithmLi, Ye / Tang, Da / Chen, Yan et al. | 2009
- 594
-
The Research of Detection System of Financial Service's Network Data BehaviorZhibin, Zhang / Bo, Gao / Weifeng, Du / Yan, Gao et al. | 2009
- 597
-
Empirical Research on Term Structure of Shibor Based on TARCH and PGARCH ModelNing, Li / Dong-ping, He et al. | 2009
- 601
-
Research of Enterprise Competitive Intelligence Collection System Based on Cross-Language Information RetrievalXiang-jun, Li / Hong-na, Si / Li-wen, Yao / xiao-kun, Yao et al. | 2009
- 605
-
Health Decision Support for Biomedical Signals Monitoring System over a WSNToh, Sing-Hui / Do, Kyeong-Hoon / Chung, Wan-Young / Lee, Seung-Chul et al. | 2009
- 609
-
The Application of Fuzzy C-Means Clustering in Macro-Economic ForecastJun, Li Xiang / Xin, Wu You / Guang, Qiu Ji / Hui, Wan Li et al. | 2009
- 612
-
Optimization Design Algorithm Based on Artificial Immune System for Mechanical SystemsLiu, Tao / Cao, FengWen / Zhou, Yan et al. | 2009
- 616
-
Face Recognition Based on NMF and SVMSun, Xia / Zhang, Qingzhou / Wang, Ziqiang et al. | 2009
- 620
-
Mutation Analysis for Testing Finite State MachinesLi, Jin-hua / Dai, Geng-xin / Li, Huan-huan et al. | 2009
- 625
-
The New Trend of Financial Process Reengineering: Financial Shared ServicesHe, Ying / Cao, Yuying et al. | 2009
- 630
-
The Research on the Simulation Application of Fuzzy Control in STATCOMHuihui, He / Youhui, Xie et al. | 2009
- 634
-
Hypothesis-margin Model Incorporating Structure Information for Feature SelectionYang, Ming / Yang, Ping et al. | 2009
- 640
-
Improving Documents Classification with Semantic FeaturesRujiang, Bai / Junhua, Liao et al. | 2009
- 644
-
Evaluating the Efficiency of Self Adaptive GA and Deterministic Dynamic Adaptation GA in Online Auctions EnvironmentSoon, Gan Kim / Anthony, Patricia / Teo, Jason / On, Chin Kim et al. | 2009
- 650
-
Author Index - Volume 1| 2009
- 656
-
Roster Page - Volume 1| 2009
- C1
-
Cover Art - Volume 1| 2009
- C1
-
Cover Art - Volume 2| 2009
- i
-
Title Page i - Volume 2| 2009
- i
-
Title Page i - Volume 1| 2009
- iii
-
Title Page iii - Volume 1| 2009
- iii
-
Title Page iii - Volume 2| 2009
- iv
-
Copyright Page - Volume 2| 2009
- iv
-
Copyright Page - Volume 1| 2009
- v
-
Table of Contents - Volume 2| 2009
- v
-
Table of Contents - Volume 1| 2009
- xiii
-
Conference Information - Volume 2| 2009
- xv
-
Conference Information - Volume 1| 2009