JOURNAL OF SOFTWARE (JSW)
ISSN : 1796-217X
Volume : 4 Issue : 4 Date : June 2009
Special Issue: Recent Advances in Electronic Commerce and Security & Web Information
Systems and Applications - Track on Software
Guest Editors: Jie-Xian Zeng, Fei Yu, Limin Sun, Mingwen Wang, and Guangxue Yue
Jie-Xian Zeng, Fei Yu, Limin Sun, Mingwen Wang, and Guangxue Yue
Full Text: PDF (419 KB)
This special issue comprises of fourteen selected papers from the International Symposium on
Electronic Commerce Security (ISECS 2009), Nanchang, China, 22-24 May 2009. The conference
received 1050 paper submissions from 19 countries and regions, of which 487 were selected for
presentation after a rigorous review process. From these 487 research papers, through two rounds
of reviewing, the guest editors selected twelve as the best papers on the Computers track of the
Conference. The candidates of the Special Issue are all the authors, whose papers have been
accepted and presented at the ISECS 2009 and WISA 2009, with the contents not been published
The ISECS 2009 and WISA 2009 are sponsored by Nanchang HangKong University, China,
Peoples' Friendship University of Russia, Nanchang University (China), Jiangxi Normal University
(China), Wuhan University (China), National Chung Hsing University (Taiwan), Institute of Software,
Chinese Academy of Sciences, Sichuan University (China), and Jiaxing University (China).
Technical Co-Sponsors of the conference are IEEE, IEEE Computer Society, and IEEE Computer
Society Technical Committee on E-Commerce.
“Lossless Compression Schemes of Vector Quantization Indices Using State Codebook”, by Chin-
Chen Chang, Guei-Mei Chen, Chia-Chen Lin, proposes two novel schemes to further compress the
VQ index table of images based on the SOC scheme without losing any image quality by the
original VQ encoding. Simulation results indicate that the proposed schemes achieve significant
reduction of bit rate without losing any image quality by the original VQ encoding.
“Assuring Structural Parallel Programs based on Scoped Permissions”, by Yang Zhao, Ligong Yu,
Gongxuan Zhang, proposes a "scoped permission" system for a simple object-oriented language
with sharedmemory and structural parallelism. The permission is abstracted as a linear value
associated with some piece of state in a program and it is normally adopted in program analysis
“Empirical Study on the Influence of Social Capital to Informal Knowledge Transfer among
Individuals”, by Zhihong Li, Tao Zhu. Based on theories of knowledge transfer, the hypotheses of
influence of social capital to informal knowledge transfer among individuals were proposed. By
empirical study, this paper verified and revised the model, and revealed that three dimensions of
social capital not only have a direct significant effect on informal knowledge transfer performance
among individuals, but also have an indirect effect on the informal knowledge transfer performance
among individuals by impacting on knowledge transfer opportunities, motives and ability
“An Improved Ant Colony Optimization Cluster Algorithm Based on Swarm Intelligence”, by Weihui
Dai, Shouji Liu and Shuyi Liang, proposes an improved ant colony optimization cluster algorithm
based on a classics algorithm - LF algorithm. By the introduction of a new formula and the
probability of similarity metric conversion function, as well as the new formula of distance, this
algorithm can deal with the category data easily. This algorithm can handle large category dataset
more rapidly, accurately and effectively, and keep the good scalability at the same time.
“Information-oriented Online Shopping Behavior in Electronic Commerce Environment”, by Chun-An
Chen, proposes a modified model of the consumer online purchase decision making process, in
the proposed model, online shoppers tend to place more focus on different marketing mix
elements in each phase.
“Flexible Business Process Integration for Clusters of Small-Medium Sized Enterprises in
Heterogenous Environment”, by Bo Jiang,Yun Ling, proposes present an on-demand information
service platform for small-medium enterprise clusters and propose loosely-coupled service-
oriented business process integration scheme for this platform. The platform and the related
techniques have been applied in realistic textile industrial clusters.
“A Quantitative Method for Pulse Strength Classification Based on Decision Tree”, by Huiyan Wang,
Peiyong Zhang, proposes a novel method based on decision tree (DT), the proposed method can
classify PS accurately and provide an effective means for the analysis of pulse signal.
“Multiplication Operation on Fuzzy Numbers” by Shang Gao and Zaiyue Zhang, proposes based on
extension principle, nonlinear programming method, analytical method, computer drawing method
and computer simulation method are used for solving multiplication operation of two fuzzy numbers.
“ZFlow: Workflow for Cooperative Editing System”, by Fei Zhu,Xiaoxu Zhu, Qiang Lv, Yiyong Shi,
Yang Yang and Qiaoming Zhu, proposes workflow description language, which is based on activity,
manages users and resource, considers constraints in editing, controls activity execution, and
provides interfaces for cooperation concurrency and consistency.
“Improved Adaptive and Multi-group Parallel Genetic Algorithm Based on Good-point Set”, by
Ruijiang Wang, Yihong Ru and Qi Long, proposes an adaptive genetic algorithm to solve the multi-
group homogenization in the solution space. The stimulation shows that this algorithm can
effectively prevent the early convergence, and to a large extent improve the accuracy of solution,
which is suitable for large-scale, high-precision optimization problems.
“Event-B based Verification of Interaction Properties In Multi-Agent Systems”, by Leila Jemni Ben
Ayed, Fatma Siala, proposes a specification and verification technique of multi agent interaction
protocols using AUML and Event B. and focus on the translation of messages with response delay,
complex messages and protocol’s states.
“Narrowcast Pricebook-Driven Persuasion: Engagement at Point of Influence, Purchase and
Consumption in Distributed Retail Environments”, by Martha G. Russell, proposes the effectiveness
in retail locations of a narrowcast price book-driven video messaging system documents the impact
of the marketing messages in influencing consumer attention, perception and behavior.
“Method of Non-optimum Analysis on Risk Control System”, by Zengtang Qu, Ping He, proposes the
syndrome and empirical analysis based on the non-optimum category of the risk. Based on non-
optimum analysis, it puts out the academic idea of extension risk analysis.
“RCHIG: An Effective Clustering Algorithm with Ranking”, by Jianwen TAO, proposes a novel
clustering framework called RCHIG to integrate clustering with ranking, which generates conditional
ranking relative to clusters to improve ranking quality, and uses conditional ranking to generate new
measure attributes to improve clustering.
We are particularly grateful to Guangnan Ni, Chin-Chen Chang, Jen-Yao Chung, Ben M. Chen, and
Dongfen Yuan for accepting our invitation to deliver invited talks at this year’s conference. We wish
to thank the Nanchang HangKong University, China for providing the venue to host the conference.
In particular, we would like to acknowledge School of Computing, Nanchang HangKong University,
China, who has worked throughout the year in preparation for this conference. We would like to take
this opportunity to thank the authors for the efforts they put in the preparation of the manuscripts and
for their valuable contributions. We wish to express our deepest gratitude to the program committee
members for their help in selecting papers for this issue and especially the referees of the
extended versions of the selected papers for their thorough reviews under a tight time schedule.
Last, but not least, our thanks go to the Editorial Board of the Journal of Software for the exceptional
effort they did throughout this process.
In closing, we sincerely hope that you will enjoy reading this special issue.
Special Issue, Electronic Commerce, Security, Web Information Systems