首页 > 最新文献

IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004最新文献

英文 中文
A personalized courseware recommendation system based on fuzzy item response theory 基于模糊项目反应理论的个性化课件推荐系统
Chih-Ming Chen, Ling-Jiun Duh, Chao-Yu Liu
With the rapid growth of computer and Internet technologies, e-learning has become a major trend in the computer assisted teaching and learning field currently. In past years, many researchers made efforts in developing e-learning systems with personalized learning mechanism to assist on-line learning. However, most of them focused on using learner's behaviors, interests, or habits to provide personalized e-learning services. These systems usually neglected to concern if learner's ability and the difficulty of courseware are matched each other. Generally, recommending an inappropriate courseware might result in learner's cognitive overhead or disorientation during a learning process. To promote learning efficiency and effectiveness, we present a personalized courseware recommendation system (PCRS) based on the proposed fuzzy item response theory (FIRT), which can recommend courseware with appropriate difficult level to learner through learner gives a fuzzy response of understanding percentage for the learned courseware. Experiment results show that applying the proposed fuzzy item response theory to Web-based learning can achieve personalized learning and help learners to learn more effectively and efficiently.
随着计算机和互联网技术的飞速发展,电子学习已成为当前计算机辅助教学领域的一大趋势。近年来,许多研究者致力于开发具有个性化学习机制的电子学习系统,以辅助在线学习。然而,它们大多侧重于利用学习者的行为、兴趣或习惯来提供个性化的电子学习服务。这些系统通常忽略了学习者的能力和课件的难度是否匹配。一般来说,推荐一个不合适的课件可能会导致学习者在学习过程中的认知负担或迷失方向。为了提高学习效率和效果,我们提出了一种基于模糊项目反应理论(first)的个性化课件推荐系统(PCRS),该系统可以通过学习者对学习的课件给出理解百分比的模糊反应,向学习者推荐适当难度的课件。实验结果表明,将所提出的模糊项目反应理论应用于基于网络的学习,可以实现个性化学习,帮助学习者更有效地学习。
{"title":"A personalized courseware recommendation system based on fuzzy item response theory","authors":"Chih-Ming Chen, Ling-Jiun Duh, Chao-Yu Liu","doi":"10.1109/EEE.2004.1287327","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287327","url":null,"abstract":"With the rapid growth of computer and Internet technologies, e-learning has become a major trend in the computer assisted teaching and learning field currently. In past years, many researchers made efforts in developing e-learning systems with personalized learning mechanism to assist on-line learning. However, most of them focused on using learner's behaviors, interests, or habits to provide personalized e-learning services. These systems usually neglected to concern if learner's ability and the difficulty of courseware are matched each other. Generally, recommending an inappropriate courseware might result in learner's cognitive overhead or disorientation during a learning process. To promote learning efficiency and effectiveness, we present a personalized courseware recommendation system (PCRS) based on the proposed fuzzy item response theory (FIRT), which can recommend courseware with appropriate difficult level to learner through learner gives a fuzzy response of understanding percentage for the learned courseware. Experiment results show that applying the proposed fuzzy item response theory to Web-based learning can achieve personalized learning and help learners to learn more effectively and efficiently.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126450437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
Music piracy on peer-to-peer networks 点对点网络的音乐盗版
M. Fetscherin, Sabrina Zaugg
Content providers from the music industry argue that peer-to-peer (P2P) networks such as KaZaA, Morpheus, iMesh, or Audiogalaxy are an enormous threat to their business. They furthermore blame these networks for their recent decline in sales figures. For this reason, an empirical investigation was conducted during a period of 6 weeks on one of the most popular files-sharing systems, in order to determine the quantity and quality of pirated music songs shared. We present empirical evidence as to what extent and in which quality music songs are being shared. A number of hypotheses are outlined and were tested. We studied, among other things, the number of users online and the number of flies accessible on such networks, the free riding problem, and the duration per search request. We further tested to see if there are any differences in the accessibility of songs based on the nationality of the artist, the language of the song, and the corresponding chart position. Finally, we outline the main hurdles users may face when downloading illegal music and the probability of obtaining high quality music tracks on such peer-to-peer networks.
音乐行业的内容提供商认为,KaZaA、Morpheus、iMesh或audioggalaxy等点对点(P2P)网络对他们的业务构成了巨大威胁。他们进一步指责这些网络造成了他们最近销售数据的下降。为此,我们对一个最流行的文件共享系统进行了为期6周的实证调查,以确定共享的盗版音乐歌曲的数量和质量。我们提出的经验证据,在多大程度上和在何种质量的音乐歌曲被共享。提出了一些假设并进行了验证。除其他事项外,我们还研究了在线用户数量、此类网络上可访问的苍蝇数量、搭便车问题以及每次搜索请求的持续时间。我们进一步测试了基于艺人的国籍、歌曲的语言以及相应的排行榜位置,歌曲的可访问性是否存在差异。最后,我们概述了用户在下载非法音乐时可能面临的主要障碍,以及在这种点对点网络上获得高质量音乐曲目的可能性。
{"title":"Music piracy on peer-to-peer networks","authors":"M. Fetscherin, Sabrina Zaugg","doi":"10.1109/EEE.2004.1287343","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287343","url":null,"abstract":"Content providers from the music industry argue that peer-to-peer (P2P) networks such as KaZaA, Morpheus, iMesh, or Audiogalaxy are an enormous threat to their business. They furthermore blame these networks for their recent decline in sales figures. For this reason, an empirical investigation was conducted during a period of 6 weeks on one of the most popular files-sharing systems, in order to determine the quantity and quality of pirated music songs shared. We present empirical evidence as to what extent and in which quality music songs are being shared. A number of hypotheses are outlined and were tested. We studied, among other things, the number of users online and the number of flies accessible on such networks, the free riding problem, and the duration per search request. We further tested to see if there are any differences in the accessibility of songs based on the nationality of the artist, the language of the song, and the corresponding chart position. Finally, we outline the main hurdles users may face when downloading illegal music and the probability of obtaining high quality music tracks on such peer-to-peer networks.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126554569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
A decision support system for multiple objective linear programming 多目标线性规划决策支持系统
F. Wu, Jie Lu, Guangquan Zhang
A new approximate algorithm has been developed by Wu et al. for solving fuzzy multiple objective linear programming (FMOLP) problems with fuzzy parameters in any form of membership function in both objective functions and constraints. Based on the approximate algorithm, a fuzzy multiple objective decision support system (FMODSS) is developed. We focus on the description of use for FMODSS in detail, and an example is presented for demonstrating how to solve a FMOLP problem by the FMODSS.
Wu等人提出了一种新的近似算法,用于求解模糊多目标线性规划(FMOLP)问题,该问题的模糊参数在目标函数和约束中均具有任意形式的隶属函数。基于近似算法,开发了模糊多目标决策支持系统(FMODSS)。重点介绍了FMODSS的使用方法,并通过实例说明了如何利用FMODSS解决FMOLP问题。
{"title":"A decision support system for multiple objective linear programming","authors":"F. Wu, Jie Lu, Guangquan Zhang","doi":"10.1109/EEE.2004.1287342","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287342","url":null,"abstract":"A new approximate algorithm has been developed by Wu et al. for solving fuzzy multiple objective linear programming (FMOLP) problems with fuzzy parameters in any form of membership function in both objective functions and constraints. Based on the approximate algorithm, a fuzzy multiple objective decision support system (FMODSS) is developed. We focus on the description of use for FMODSS in detail, and an example is presented for demonstrating how to solve a FMOLP problem by the FMODSS.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127929038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Web surveys for electronic commerce: a review of the literature 电子商务的网络调查:文献综述
Hsiu-Mei Huang, S. Liaw
E-commerce Websites often use animation, video, music and other multimedia effects to capture customers' attention. Thus, the design of a commercial Website plays an important role in attracting, sustaining and retaining the interest of a customer at a Web site. As we know, successful Web design gives high accessibility to anyone who visits the Website with Web browsers. With an increased percentage of the population using the Internet, Web surveys are particularly effective and useful to collect data for e-commerce. Whenever Web surveys are present and available, a potential threat to research exists due to the lack of sampling control. However, the use of access control might arouse potential suspicions about anonymity and confidentiality for respondents. To ensure validity and reliability, there is a need to view this dilemma along with its two accompanying issues: (1) sampling control, and (2) anonymous responses.
电子商务网站经常使用动画、视频、音乐等多媒体效果来吸引顾客的注意力。因此,商业网站的设计在吸引、维持和保持客户对网站的兴趣方面起着重要的作用。正如我们所知,成功的网页设计为任何使用网络浏览器访问网站的人提供了高度的可访问性。随着使用Internet的人口比例的增加,Web调查对于收集电子商务数据特别有效和有用。只要网络调查存在并且可用,由于缺乏抽样控制,对研究就存在潜在的威胁。然而,访问控制的使用可能会引起受访者对匿名性和保密性的潜在怀疑。为了确保有效性和可靠性,有必要考虑这种困境及其伴随的两个问题:(1)抽样控制,(2)匿名响应。
{"title":"Web surveys for electronic commerce: a review of the literature","authors":"Hsiu-Mei Huang, S. Liaw","doi":"10.1109/EEE.2004.1287292","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287292","url":null,"abstract":"E-commerce Websites often use animation, video, music and other multimedia effects to capture customers' attention. Thus, the design of a commercial Website plays an important role in attracting, sustaining and retaining the interest of a customer at a Web site. As we know, successful Web design gives high accessibility to anyone who visits the Website with Web browsers. With an increased percentage of the population using the Internet, Web surveys are particularly effective and useful to collect data for e-commerce. Whenever Web surveys are present and available, a potential threat to research exists due to the lack of sampling control. However, the use of access control might arouse potential suspicions about anonymity and confidentiality for respondents. To ensure validity and reliability, there is a need to view this dilemma along with its two accompanying issues: (1) sampling control, and (2) anonymous responses.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115208908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A conceptual analysis of the role of conversations in Web services composition 对Web服务组合中对话角色的概念分析
Z. Maamar, S. Mostéfaoui, Emad Bataineh
We discuss the role of conversations in the composition of Web services. A Web service is an accessible application that other applications and humans can discover and trigger to satisfy needs. While much of the work has focused on low-level standards for publishing, discovering, and invoking Web services, it is deemed appropriate to start leveraging the Web services to the level of active components. Such components would be able for example to engage conversations and make decisions.
我们将讨论对话在Web服务组合中的作用。Web服务是一种可访问的应用程序,其他应用程序和人员可以发现并触发它以满足需求。虽然大部分工作都集中在发布、发现和调用Web服务的低级标准上,但我们认为应该开始将Web服务利用到活动组件的级别。例如,这些组件将能够参与对话并做出决策。
{"title":"A conceptual analysis of the role of conversations in Web services composition","authors":"Z. Maamar, S. Mostéfaoui, Emad Bataineh","doi":"10.1109/EEE.2004.1287285","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287285","url":null,"abstract":"We discuss the role of conversations in the composition of Web services. A Web service is an accessible application that other applications and humans can discover and trigger to satisfy needs. While much of the work has focused on low-level standards for publishing, discovering, and invoking Web services, it is deemed appropriate to start leveraging the Web services to the level of active components. Such components would be able for example to engage conversations and make decisions.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126053213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An efficient approach for the maintenance of path traversal patterns 维护路径遍历模式的有效方法
Show-Jane Yen, Yue-Shi Lee, Chung-Wen Cho
Mining frequent traversal patterns is to discover the consecutive reference paths traversed by a sufficient number of users from Web logs. The previous approaches for mining frequent traversal patterns need to repeatedly scan the traversal paths and take a large amount of computation time to find frequent traversal patterns. However, the discovered frequent traversal patterns may become invalid or inappropriate when the databases are updated. We propose an incremental updating technique to maintain the discovered frequent traversal patterns when the user sequences are inserted into or the database. Our approach partitions the database into some segments and scans the database segment by segment. For each segment scan, the candidate traversal sequences that cannot be frequent traversal sequences can be pruned and the frequent traversal sequences can be found out earlier. Besides, the number of database scans can be significantly reduced because some information can be computed by our approach. The experimental results show that our algorithms are more efficient than other algorithms for the maintenance of mining frequent traversal patterns.
挖掘频繁遍历模式是为了从Web日志中发现足够数量的用户所遍历的连续引用路径。以往挖掘频繁遍历模式的方法需要重复扫描遍历路径,并且需要大量的计算时间来查找频繁遍历模式。但是,在更新数据库时,发现的频繁遍历模式可能变得无效或不合适。我们提出了一种增量更新技术,用于在用户序列插入到数据库中时维护发现的频繁遍历模式。我们的方法将数据库划分为若干段,并逐段扫描数据库。对于每一次片段扫描,可以对不可能是频繁遍历序列的候选遍历序列进行剪接,从而更早地发现频繁遍历序列。此外,由于我们的方法可以计算一些信息,因此可以显著减少数据库扫描的次数。实验结果表明,我们的算法在挖掘频繁遍历模式的维护方面比其他算法更有效。
{"title":"An efficient approach for the maintenance of path traversal patterns","authors":"Show-Jane Yen, Yue-Shi Lee, Chung-Wen Cho","doi":"10.1109/EEE.2004.1287311","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287311","url":null,"abstract":"Mining frequent traversal patterns is to discover the consecutive reference paths traversed by a sufficient number of users from Web logs. The previous approaches for mining frequent traversal patterns need to repeatedly scan the traversal paths and take a large amount of computation time to find frequent traversal patterns. However, the discovered frequent traversal patterns may become invalid or inappropriate when the databases are updated. We propose an incremental updating technique to maintain the discovered frequent traversal patterns when the user sequences are inserted into or the database. Our approach partitions the database into some segments and scans the database segment by segment. For each segment scan, the candidate traversal sequences that cannot be frequent traversal sequences can be pruned and the frequent traversal sequences can be found out earlier. Besides, the number of database scans can be significantly reduced because some information can be computed by our approach. The experimental results show that our algorithms are more efficient than other algorithms for the maintenance of mining frequent traversal patterns.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"2451 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130951234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Trust and privacy in electronic commerce 电子商务中的信任与隐私
J. Chen, Yangil Park
Trust and privacy have been widely recognized as important issues in the field of electronic commerce. We propose a research model with trust and privacy as two endogenous variables along with other exogenous variables like independent self-construal, interdependent self-construal, technological knowledge, and Web site quality, that are expected to effect Internet consumers' trust level and privacy concerns.
信任和隐私已成为电子商务领域公认的重要问题。我们提出了一个研究模型,将信任和隐私作为两个内生变量,以及独立自我解释、相互依赖自我解释、技术知识和网站质量等外生变量影响互联网消费者的信任水平和隐私关注。
{"title":"Trust and privacy in electronic commerce","authors":"J. Chen, Yangil Park","doi":"10.1109/EEE.2004.1287297","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287297","url":null,"abstract":"Trust and privacy have been widely recognized as important issues in the field of electronic commerce. We propose a research model with trust and privacy as two endogenous variables along with other exogenous variables like independent self-construal, interdependent self-construal, technological knowledge, and Web site quality, that are expected to effect Internet consumers' trust level and privacy concerns.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127238998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Development of a remote quick design system for woven fabrics 机织物远程快速设计系统的开发
Jeng-Jong Lin
The development of a remote quick design system is presented. The system can access through the Web, which can be used to quickly generate an optimized set of weaving parameters. The developed system is a client/server configuration where Web browsers were used as a generic client environment serving interface linking the client's parameter input to the search system located on the server side through the common gateway interface. The searching mechanism, developed in Turbo C programming environment and theory based on genetic algorithm, can find several desired solutions of the weaving parameters for the production of woven fabrics under controlled cost through access to the Web side. Moreover, the search mechanism was implemented by integrating the Internet information server 3.0 (IIS 3.0) Web server and a user interface was developed and underlying 2000 server platform. Through the assistance of this Web-based system the weaving mill can integrate the resource of different divisions (e.g. design division, production division and financial division) located at various areas on the earth to fulfill a perfect design of woven fabrics and enhance the enterprise's global competition power.
介绍了一个远程快速设计系统的开发。该系统可通过Web访问,可用于快速生成一组优化的织造参数。所开发的系统是客户机/服务器配置,其中使用Web浏览器作为通用客户机环境服务接口,通过公共网关接口将客户机的参数输入链接到位于服务器端的搜索系统。该搜索机制是在Turbo C编程环境下开发的,基于遗传算法的理论,通过访问Web端,可以在控制成本的情况下找到生产机织物所需的几个织造参数解。此外,通过集成Internet信息服务器3.0 (IIS 3.0) Web服务器,并在2000服务器平台上开发了用户界面,实现了搜索机制。通过该网络系统的辅助,织布厂可以整合位于全球不同地区的不同部门(如设计部门、生产部门和财务部门)的资源,完成完美的机织物设计,提高企业的全球竞争力。
{"title":"Development of a remote quick design system for woven fabrics","authors":"Jeng-Jong Lin","doi":"10.1109/EEE.2004.1287307","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287307","url":null,"abstract":"The development of a remote quick design system is presented. The system can access through the Web, which can be used to quickly generate an optimized set of weaving parameters. The developed system is a client/server configuration where Web browsers were used as a generic client environment serving interface linking the client's parameter input to the search system located on the server side through the common gateway interface. The searching mechanism, developed in Turbo C programming environment and theory based on genetic algorithm, can find several desired solutions of the weaving parameters for the production of woven fabrics under controlled cost through access to the Web side. Moreover, the search mechanism was implemented by integrating the Internet information server 3.0 (IIS 3.0) Web server and a user interface was developed and underlying 2000 server platform. Through the assistance of this Web-based system the weaving mill can integrate the resource of different divisions (e.g. design division, production division and financial division) located at various areas on the earth to fulfill a perfect design of woven fabrics and enhance the enterprise's global competition power.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133893588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart card-based irregular access patterns detection system 基于智能卡的不规则访问模式检测系统
A. Leong, S. Fong, Shirley W. I. Siu
This paper describes a smart-card based solution that further extends the concept of static access control list by performing real-time analysis over user's access patterns, thus allowing early detection of abnormal card usages. A list of irregular behaviors are identified and classified to formulate a logical model that quantifies abnormal usage behaviors. Based on this model, a real-time suspicious action detection prototype is developed, allowing rapid alert and reaction towards irregular behaviors. Finally, example scenarios on some applications on electronic commerce are discussed.
本文描述了一种基于智能卡的解决方案,通过对用户的访问模式进行实时分析,进一步扩展了静态访问控制列表的概念,从而允许早期检测异常的卡使用情况。通过识别和分类一系列异常行为,形成一个逻辑模型,量化异常使用行为。基于该模型,开发了实时可疑行为检测原型,实现了对异常行为的快速预警和反应。最后,讨论了电子商务应用的实例场景。
{"title":"Smart card-based irregular access patterns detection system","authors":"A. Leong, S. Fong, Shirley W. I. Siu","doi":"10.1109/EEE.2004.1287363","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287363","url":null,"abstract":"This paper describes a smart-card based solution that further extends the concept of static access control list by performing real-time analysis over user's access patterns, thus allowing early detection of abnormal card usages. A list of irregular behaviors are identified and classified to formulate a logical model that quantifies abnormal usage behaviors. Based on this model, a real-time suspicious action detection prototype is developed, allowing rapid alert and reaction towards irregular behaviors. Finally, example scenarios on some applications on electronic commerce are discussed.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123860588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An ASEP (advanced secure electronic payment) protocol design using 3BC and ECC(F/sub 2//sup m/) algorithm 采用3BC和ECC(F/sub 2//sup m/)算法设计高级安全电子支付协议ASEP
Byung kwan Lee, Tai-Chi Lee, S. Yang
Unlike SET (secure electronic transaction) protocol. We propose an ASEP (advanced secure electronic payment) protocol, which uses ECC (elliptic curve cryptosystem with F/sub 2/ not F/sub p/) [N. Koblitz, (1987), V. S Miler, (1986), G. Harper et al., (1993)], SHA (secure hash algorithm) and 3BC (block byte bit cipher) instead of RSA and DES. To improve the strength of encryption and the speed of processing, the public key and the private key of ECC are used in SBC [I. S. Cho (2002)] algorithm, which generates session keys for the data encryption. In particular, when ECC is combined with SBC, the strength of security is improved significantly. As the process of the digital envelope used in the existing SET protocol is removed by the SBC algorithm, the processing time is substantially reduced. In addition, the use of multiple signatures has some advantages of reducing the size of transmission data as an intermediate payment agent and avoiding the danger of eavesdropping of private keys.
不像SET(安全电子交易)协议。本文提出了一种采用ECC (F/sub 2/ not F/sub p/) [N]的高级安全电子支付(ASEP)协议。Koblitz, (1987), V. S miller, (1986), G. Harper et al., (1993)], SHA(安全哈希算法)和3BC(块字节位密码)代替RSA和DES。为了提高加密的强度和处理速度,在SBC中使用了ECC的公钥和私钥[I]。S. Cho(2002)]算法,该算法生成用于数据加密的会话密钥。特别是当ECC与SBC结合使用时,安全强度明显提高。由于SBC算法去掉了现有SET协议中使用的数字包络的处理过程,大大缩短了处理时间。此外,多重签名的使用还具有作为中间支付代理减少传输数据大小、避免私钥被窃听的危险等优点。
{"title":"An ASEP (advanced secure electronic payment) protocol design using 3BC and ECC(F/sub 2//sup m/) algorithm","authors":"Byung kwan Lee, Tai-Chi Lee, S. Yang","doi":"10.1109/EEE.2004.1287332","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287332","url":null,"abstract":"Unlike SET (secure electronic transaction) protocol. We propose an ASEP (advanced secure electronic payment) protocol, which uses ECC (elliptic curve cryptosystem with F/sub 2/ not F/sub p/) [N. Koblitz, (1987), V. S Miler, (1986), G. Harper et al., (1993)], SHA (secure hash algorithm) and 3BC (block byte bit cipher) instead of RSA and DES. To improve the strength of encryption and the speed of processing, the public key and the private key of ECC are used in SBC [I. S. Cho (2002)] algorithm, which generates session keys for the data encryption. In particular, when ECC is combined with SBC, the strength of security is improved significantly. As the process of the digital envelope used in the existing SET protocol is removed by the SBC algorithm, the processing time is substantially reduced. In addition, the use of multiple signatures has some advantages of reducing the size of transmission data as an intermediate payment agent and avoiding the danger of eavesdropping of private keys.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128579186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1