default search action
CEC 2010: Shanghai, China
- Kuo-Ming Chao, Christian Huemer, Birgit Hofreiter, Yinsheng Li, Nazaraf Shah:
12th IEEE Conference on Commerce and Enterprise Computing, CEC 2010, Shanghai, China, November 10-12, 2010. IEEE Computer Society 2010, ISBN 978-1-4244-8433-1 - Weiran Nie, Mark Panahi, Kwei-Jay Lin:
A Flexible Schedule Reservation Scheme for Real-Time Service-Oriented Architecture. 1-8 - Arne Tauber, Thomas Rössler:
A Scalable Interoperability Architecture for Certified Mail Systems. 9-16 - Till Haselmann, Gunnar Thies, Gottfried Vossen:
Looking into a REST-Based Universal API for Database-as-a-Service Systems. 17-24 - Shantanu Biswas, Yadati Narahari:
Tâtonnement Mechanisms for Combinatorial Exchanges. 25-31 - Huiye Ma, Wenyan Hu, Ho-fung Leung:
Enhancing Continuous Double Auction for Handling Homogeneous Goods in Online Auctions. 32-39 - Shaohua Liu, Yinglong Ma, Tianlu Mao, Junsheng Yu, Siyu Liu, Xiaodong Chen:
A Manageable Small World for Collaborative Enterprises Social Network. 40-47 - Florian Niedermann, Sylvia Radeschütz, Bernhard Mitschang:
Design-Time Process Optimization through Optimization Patterns and Process Model Matching. 48-55 - Stefanie Rinderle-Ma, Manfred Reichert:
Advanced Migration Strategies for Adaptive Process Management Systems. 56-63 - Andreas Schönberger, Guido Wirtz:
Towards Executing ebBP-Reg B2Bi Choreographies. 64-71 - Michael Strommer, Christian Pichler, Philipp Liegl:
A Document Model Management Framework Based on Core Components. 72-79 - Carlos Peña, Jorge Villalobos:
An MDE Approach to Design Enterprise Architecture Viewpoints. 80-87 - Abubkr Abdelsadiq, Carlos Molina-Jiménez, Santosh K. Shrivastava:
On Model Checker Based Testing of Electronic Contracting Systems. 88-95 - Christoph Lofi, Christian Nieke, Wolf-Tilo Balke:
Mobile Product Browsing Using Bayesian Retrieval. 96-103 - Christian Hütter, Jing Zhi Yue, Christian von der Weth, Klemens Böhm:
Strategic Provider Selection in a Policy-Based Helping Scenario. 104-111 - Erich Christian Teppan, Gerhard Friedrich, Alexander Felfernig:
Impacts of Decoy Effects on the Decision Making Ability. 112-119 - Thorben Burghardt, Erik Buchmann, Klemens Böhm, Jürgen Kühling, S. Bohnen, Anastasios Sivridis:
Tackling Compliance Deficits of Data-Protection Law with User Collaboration - A Feasibility Demonstration with Human Participants. 120-127 - Stefanie Rinderle-Ma, Maria Leitner:
On Evolving Organizational Models without Losing Control on Authorization Constraints in Web Service Orchestrations. 128-135 - Debmalya Biswas, Stephan Haller, Florian Kerschbaum:
Privacy-Preserving Outsourced Profiling. 136-143 - Arun Anandasivam, Philipp Best, Simon See:
Customers' Preferences for Infrastructure Cloud Services. 144-149 - Thomas Meinl, Arun Anandasivam, Michiaki Tatsubori:
Enabling Cloud Service Reservation with Derivatives and Yield Management. 150-155 - Koki Murakata, Tokuro Matsuo:
Effects of Evaluation Information Disclosure in E-Commerce Systems. 156-161 - Clemens van Dinther, Rico Knapper, Benjamin Blau, Tobias Conte, Arun Anandasivam:
Managing the Quality of Modular Services - A Process-Oriented Aggregation of Expected Service Levels Based on Probability Distributions. 162-167 - Baoning Niu, Yayan Xue, Patrick Martin, Wendy Powley:
Managing Workload Importance in Enterprise DBMSs. 168-173 - Seog-Chan Oh, Xiang Zhao, Stephan R. Biller, Kisup Lee, Ho-Im Jung, Mye M. Sohn, Heesang Lee:
Ontology-Enabled Knowledge Management in Environmental Regulations and Incentive Policies: The ERIPAD System. 174-179 - Yu-Hsuan Chan, Kimberly Keeton, Kwan-Liu Ma:
Interactive Visual Analysis of Hierarchical Enterprise Data. 180-187 - Jingzhi Guo:
Sign-Based Semantics-Enriched Social Computing. 188-195 - Himanshu Pagey, Kien A. Hua:
TagPay: A Payment Atomic RFID Ownership Transfer Protocol. 196-203 - Beat Liver, Roberto Di Paolo, Keith Tice:
Privacy in Service Oriented Architectures: SOA Boundary Identity Masking for Enterprises. 204-211 - Daniel Schall, Florian Skopik:
Mining and Composition of Emergent Collectives in Mixed Service-Oriented Systems. 212-219
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.