ISSN : 1796-203X
Volume : 4    Issue : 6    Date : June 2009

Article Information

Special Issue: Recent Advances in Electronic Commerce and Security & Web Information
Systems and Applications - Track on Computers
Guest Editors: Li Ming, Mingwen Wang, Deng-Yi Zhang, Chin-Chen Chang, and Fei Yu

Li Ming, Mingwen Wang, Deng-Yi Zhang, Chin-Chen Chang, and Fei Yu
Page(s): 433-435
Abstract  |  Full Text: PDF (294 KB)


A Framework for an Ontology-based E-commerce Product Information Retrieval System
Liyi Zhang, Mingzhu Zhu, and Wei Huang
Page(s): 436-443
Abstract  |  Full Text: PDF (538 KB)

Provably Secure Certificate-based Proxy Signature Schemes
Jiguo Li, Lizhong Xu, and Yichen Zhang
Page(s): 444-452
Abstract  |  Full Text: PDF (410 KB)

Research of Intelligent Rule-base Based on Multilayer Intrusion Detection
Zhixin Sun and Lin Jiao
Page(s): 453-460
Abstract  |  Full Text: PDF (504 KB)

Analysis of Attack Actions for E-Commerce Based on Stochastic Game Nets Model
Yuanzhuo Wang, Chuang Lin, Kun Meng, and Junjie Lv
Page(s): 461-468
Abstract  |  Full Text: PDF (617 KB)

Axiomatic Systems for the Bisimilarity on Finite Fair Ambient Processes
Han Zhu
Page(s): 469-476
Abstract  |  Full Text: PDF (412 KB)

Parallel Processing of Sequential Media Algorithms on Heterogeneous Multi-Processor System-
Peng Zhao, Dawei Wang, Ming Yan, and Sikun Li
Page(s): 477-484
Abstract  |  Full Text: PDF (406 KB)

A Stochastic Approach to Predicting Performance of Web Service Composition
Yuxiang Dong, Yunni Xia, Qingsheng Zhu, and Ruilong Yang
Page(s): 485-493
Abstract  |  Full Text: PDF (789 KB)

Towards Compliance and Accountability: a Framework for Privacy Online
Huanchun Peng, Jun Gu, and Xiaojun Ye
Page(s): 494-501
Abstract  |  Full Text: PDF (900 KB)

Research on On-card Bytecode Verifier for Java Cards
Tongyang Wang, Pengfei Yu, Jun-jun Wu, and Xin-long Ma
Page(s): 502-509
Abstract  |  Full Text: PDF (371 KB)

A Time and Mutable Attribute-Based Access Control Model
Ran Yang, Chuang Lin, and Fujun Feng
Page(s): 510-518
Abstract  |  Full Text: PDF (485 KB)

Formal Model and Analysis of Sliding Window Protocol Based on NuSMV
Yefei Zhao, Zong-yuan Yang, Jinkui Xie, and Qiang Liu
Page(s): 519-526
Abstract  |  Full Text: PDF (680 KB)

China’s E-business Model Innovation Analysis
Qihai Zhou, Yujun Li, Zhuma Pudu, and Xun Lin
Page(s): 527-534
Abstract  |  Full Text: PDF (388 KB)


Comparative Study on the Application of Modern Heuristic Techniques to SVC Placement
Mehdi Eghbal, Naoto Yorino, and Yoshifumi Zoka
Page(s): 535-541
Abstract  |  Full Text: PDF (431 KB)

Design Heuristics for Mapping Floating-Point Scientific Computational Kernels onto High
Performance Reconfigurable Computers
Justin L. Rice, Khalid H. Abed, and Gerald R. Morris
Page(s): 542-553
Abstract  |  Full Text: PDF (916 KB)

The Effect of Wavelet Families on Watermarking
Evelyn Brannock, Michael Weeks, and Robert Harrison
Page(s): 554-566
Abstract  |  Full Text: PDF (806 KB)