Schedule of ICEBE2012 & CEC2012 Zhejiang Braim Sept. 8 17:00-20:00 Registration Internationl Hotel Zhejiang Braim 06:45-07:45 Registration Internationl Hotel 07:45 Shuttle Bus: Hotel --> Conference Venue Jen-Yao Chung 08:45-08:52 Chairman of ICEBE 2012, IBM T. J. Watson Research Center, USA Opening remarks Kwei-Jay Lin 08:52-09:00 Host: TBD Chairman of CEC 2012, University of California, Irvine 09:00-09:07 Chunxiao Liang, VP of Alibaba Group 09:07-09:15 Zhaohui Wu, Vice President of Zhejiang University Keynote I: The Future of E-commerce 09:15-10:00 Speaker: Ming Zeng, Chief Strategy Officer, Alibaba Group 10:00-10:40 Group photo Keynote II: Business Informatics: Research that matters! 10:40-11:20 Speaker: Christian Huemer, TU Vienna Keynote III: E-Gold? An Overview of Technology used at London 2012 11:20-12:00 Speaker: Anne James, Coventry University, UK 12:00-13:30 Lunch #1 13:30-14:30 "Small is Beautiful, the Power of Netrepreneurs" Top 10 Global Netrepreneurs of 2012

The People's 14:30-15:30 "Exploring the Path of E-commerce" E-commerce service providers Sept. 9 Hall of Host: Zhejiang Thomas FRIEDMAN Province Pulitzer prize-winning journalist, author of "The World is Flat" Panel Guests: FRANK LAVIN Export Now 15:30-16:30 "The Establishment and Growth of Brands" Global CEO of Export Now and former US Under Secretary of Commerce Mike ELLIS President and Managing Director, Asia-Pacific, MPAA Jack CHANG Chairman, Quality Brands Protection Committee (QBPC) & Senior Intellectual Property Counsel for General Electric Asia Internation brand representative Chinese brand representative Savio KWAN 16:30-17:15 "The Business Ecosystem of the Internet Age" Independent Non-executive Director, Alibaba Group Jack MA 17:15-17:45 Closing Remarks Chairman and CEO, Alibaba Group 17:45-18:45 Conference Venue --> Hotel 19:00-21:00 Welcome Dinner Session EBE01: Data and Session EBE13: Service-Oriented Session EBE05: Integration and Session CEC-01: Business Industrial Track 1: Business Knowledge Management for e- Session EBE09: Cloud Computing Knowledge Management and Industrial Applications Informatics Architecture Business I Business Intelligence (SOKMBI) No.1 Parallel Session No.2 Parallel Session No.3 Parallel Session No.4 Parallel Session No.5 Parallel Session No.6 Parallel Session Session Chair: Ping Wang Session Chair: Shin-Jer Yang Session Chair: Ci-Wei Lan Session Chair: Dickson K.W. Chiu Session Chair: Kwei-Jay Lin Session Chair: Erik Proper Do We Have Tools for Developing Approximate Keyword-based Mining Contextual Knowledge for Probabilistic Top-k Dominating Green Applications? - IDE Tool REA-DSL: Business Model Driven Search over Encrypted Cloud Context-Aware Recommender Business value of enterprise Composite Service Selection with Power Management Data-Engineering 08:30-08:50 Data Systems architecture Author: Chaogang Tang, Qing Li, Computation Plugin Author: Dieter Mayrhofer and Author: Ayad Ibrahim, Hai Jin, Ali Author: Wenping Zhang, Author: Raymond Slot Yan Xiong, Shiting Wen, An Liu Author: Tina Ho, Rebecca Chen, Christian Huemer A. Yassin, and Deqing Zou Raymond Lau, Xiaohui Tao Jerry Chang Personalized Recommendation From Encoded EDIFACT A Transformation Process Model An Advanced Rapid Alert System On the use of GEA at the Dutch Based on Reviews and Ratings Iaas Cloud Selection using MCDM Messages to Business Concepts for Chinese Enterprises to the for Food Safety Ministry of Social Affairs and Alleviating the Sparsity Problem Methods Using Semantic Annotations 08:50-09:10 Platform-Based B2B e-commerce Author: Whisker T.Y. Law, Employment of Collaborative Filtering Author: Zia ur Rehman, Omar K. Author: Robert Engel, Christian Author: Zongyao Zhu, Fu Cuixiao, Dickson K.W. Chiu, Haiyang Hu, Author: Roel Wagter, Erik Proper Author: Xu, Xiaolin Hussain, Farookh K. Hussain Pichler, Marco Zapletal, Worarat Meng haihua Yi Zhuang, Hua Hu and Dirk Witte Zheng, Weifeng Ding Krathu and Hannes Werthner VMFDF: A Virtualization-based k*NNCA: A Location Privacy Dynamic Selection of Services Multi-level Fault Detection Differences in Efficiency between Preserving Method for Semi- The Business Model Ontology for under Temporal Constraints in Business Architecture for Banking Framework for High Availability B2Bs and B2Cs in the Japanese 09:10-09:30 honest Mobile Users Web 2.0 Websites Cloud Computing - as described by four scenarios Computing IT Services Industry Author: Xiao Pan, Lei Wu, Author: Yun Liu Author: Yanhua Du, Xiaofei Author: Jorge Sanz Author: Zhang Jianhua, Zhang Author: Hiroshi Sasaki Chunhui Piao Wang, Lifeng Ai, Xitong Li Wenbo, Wu Heng and Huang Tao Research on Trust Evaluation Linear Modelling and Optimization A Fault Detection Method for Serendipitous Exploration of Model for Mobile Commerce to Evaluate Customer Satisfaction Wireless Sensor Networks Based Large-scale Product Catalogs Based on Structural Equation 09:30-09:50 and Loyalty on Credible Sensor Nodes Set Author: Marc von Wyl, Birgit Modeling Author: Alireza Faed, Mehdi Faed, Author: Zhaoxing Wang, Qiaoyan Hofreiter and Stephane Author: Chunhui Piao, Shuzhen Zahra Saberi Wen, Teng Wang, Xiaodong Zhao Marchand-Maillet Wang 09:50-10:20 Coffee break #1 Session EBE02: Data and Session EBE06: Security, Privacy Session EBE10: Cloud Computing Session CEC-02: Reputation and Industrial Track 2: Information Knowledge Management for e- and Open Source and Services Trust Architecture Business II No.1 Parallel Session No.2 Parallel Session No.3 Parallel Session No.5 Parallel Session No.6 Parallel Session Session Chair: Raymond Lau Session Chair: Nikolaus Huber Session Chair: Jingzhi Guo Session Chair: Birgit Hofreiter Session Chair: Guang-Jie Ren HB-MAP Protocol: A New Secure Design Dynamic Data Allocation Behavioral Analysis of Registered The Impact of Online Channel on Bidirectional Light-Wight Scheduler to Improve MapReduce Web Site Visitors with Help of the Performance of 's Listed Business process and data Authentication Protocol of HB Performance in Heterogeneous Mouse Tracking 10:20-10:40 Retailers interoperability Author: Fangtian Hou, Cheng Clouds Author: Clemens Schefels, Sven Author: Shao Bing-jia, Ning Bei- Author: Georg Grossman Yang, Jianbo Liu, Yichun Zhang, Author: Shin-Jer Yang, Yi-Ru Eschenberg and Christian Schö bei Jiayin Tian, Yakun Zhang Chen, Yung-Ming Hsieh neberger Combinatorial Mutation Approach An Empirical Study of Customer to Web Service Vulnerability Bootstrapping Trust and Identifying Information Assets for Loyalty to Internet Banking in Testing Based on SOAP Message Resource Oriented Composite Reputation for Web Services Open Data 10:40-11:00 China Mutations Transactions Author: Hien Trang Nguyen, Jian Author: Guang-Jie Ren and Author: Yongbing Jiao, Jian Yang, Author: Qing Li, Jinfu Chen, Author: Rui Liu, Xin Sheng Mao Yang and Weiliang Zhao Susanne Glissmann Zhanfeng Zhu Yongzhao Zhan, Chengying Mao, Huanhuan Wang A Policy-Based Architecture for Gossip-based Hybrid Multi- The Moderating Effect of A New Selective Clustering Web Services Security attribute Overlay for Resource Legitimacy and Reputation on 11:00-11:20 Ensemble Algorithm Processing Discovery in Federated Clouds SMEs in a B2B Environment Author: Liu limin, Fan Xiaoping Author: Hao Zeng, Dianfu Ma, Author: Guan Le, Ke Xu and Author: Guangyin Jia, Yigang Li, Zhuqing Li, Yongwang Zhao Junde Song Kai Wang, Jianhua Sun and Kai Li Automation System for Validation Unified Threat Management Context Aware Reputation A Parameter Model of Genetic of Configuration and Security System Approach for Securing Management for Service Algorithm Regulating Ant Colony Compliance in Managed Cloud 11:20-11:40 SME’s Network Infrastructure Composition and Reconfiguration Algorithm Services Author: Saqib Ali, Maitham H. Al Author: Jinhwan Lee, Jing Zhang, Author: Wu Liu-ai, Fan Wen-qing Author: Trieu C. Chieu, Mahesh Lawati Zhenqiu Huang and Kwei-Jay Lin Viswanathan, Ashu Gupta A QoS Evaluation Model for Test- An Interval Fuzzy Ontology Based Bed in the Cloud Computing Peer Review Assignment Method Environment 11:40-12:00 Author: Na Xue, Jin-Xing Hao, Author: Jundian Song, Shaohua Suling Jia, Qiang Wang Zhang, Yanxue Gong and Bingrong Dai 12:00-14:00 Lunch #2 Sesison EBE11: e-Marketplace Session EBE03: Software Session EBE07: Security and Integration and Interoperability Session CEC-03: BI Architecture Session CEC-05: SEMP 2012 Engineering for e-Business Business Analytics (EM2I) Zhejiang Braim Sept. 10 No.1 Parallel Session No.2 Parallel Session No.3 Parallel Session No.5 Parallel Session No.6 Parallel Session Internationl Hotel Session Chair: Anne James Session Chair: Yinsheng Li Session Chair: Rebecca Chen Session Chair: Christian Huemer Session Chair: Prof. Akihiko Nagai A Highly Concurrent Process Methodology and Tool Design for Context-Aware Proactive Process Mobile Commerce Trust Model A Survey of P2P Virtual World Virtual Machine Based on Event- Building Return on Investment Reconfiguration in Service- and Its Application for Third Party Infrastructure 14:00-14:20 driven Process Execution Model Models for IT transformations Oriented Architecture Trust Service Platform Author: Bingqing Shen, Jingzhi Author: Dongyao Wu, Jun Wei, Author: Chang-shing Perng, Rong Author: Jing Zhang, Jinhwan Lee Author: Chunhui Piao, Shuzhen Guo, Philip Chen Chushu Gao, Wenshen Dou Chang and Kwei-Jay Lin Wang and Jie Wen S/T/A: Meta-modeling Run-time Transport Hub-and-spoke Network Adaptation in Component-Based Value-Added Analysis of Bi- Optimization Model Construction A Generic Architecture for User- Analyzing Effect of System Architectures Lateral e-Business Services of Pharmaceuticals Cold-Chain Centric Portlet Integration OpenStreetMap for Crisis 14:20-14:40 Author: Nikolaus Huber, Andr´e Author: Zhongjie Wang, Qian Wu, Logistics Author: Oliver Gmelch and Gü Author: Yuma Imi, Tomomichi van Hoorn, Anne Koziolek, Fabian Xiaofei Xu Author: Dongjiu Li, Hao Li, nther Pernul Hayakawa and Takayuki Ito Brosig and Samuel Kounev Qingnian Zhang A Core Broking Model for E- User-Controlled Dynamic Access Computing Resources Market in Enterprise Architecture: A An Analysis on the Quality of Data Markets Credential Enrichment for Run- Grid and Cloud Based on Contract strategic specialism in OpenStreetMap 14:40-15:00 Author: Pen-Choug Sun, Michael time Service Selection Management Author: Roel Wagter, Erik Proper Author: Tomomichi Hayakawa, Odetayo, Rahat Iqbal, Anne Author: Christoph Fritsch, Günther Author: Yinghua Sun, Zhehui Wu, and Dirk Witte Yuma Imi and Takayuki Ito James Pernul Guanfeng Liu, Zhenkuan Pan Semantic Consistency The Effects of ICT Innovation and The Research of a Multi-Factor Proposal of Business Network Maintenance in Editing Cross- A Scalable and Elastic Business Industry Regulation on Chinese Dynamic Authorization Model Structure Visualization Tool 15:00-15:20 Context Common Vocabulary Event Processing System Travel Website's Marketing Logic Author: Jing Liu, Chao Liu, Author: Akihiko Nagai and Author: Jingzhi Guo, Iok Ham Author: Ming Li, Liangzhao Zeng Author: Yi Zhang and Li-Mei Dongliang Jiao, Jiaopeng Chen Takayuki Ito Lam Dacan Zhang A Teaching Method based on SecEPM: A Security Engineering Learning Network Process Model for Electronic 15:20-15:40 Author: Shun Okuhara, Takanobu Business Processes Otsuka, Takuya Yoshimura, Raiye Author: Jörn Eichler Hail and Takayuki Ito 15:40-16:00 Coffee break #2 Session EBE12: Service-Oriented Session EBE04: Service Session EBE08: Mobile Applications, Integration and Session CEC-04: User Networks Session CEC-06: UCIA 2012 Engineering Commerce Collaboration (SOAIC) No.1 Parallel Session No.2 Parallel Session No.3 Parallel Session No.5 Parallel Session No.6 Parallel Session Session Chair: Chang-Shing Session Chair: Prof. Yung-Cheol Session Chair: San-Yih Hwang Session Chair: Fu Ming Huang Session Chair: Weiran Nie Perng Byun A Rule-based Parallel Processing Building an Optimal Service Equilibrium Selection under A User-Centered Cloud Browser A RFID-Based Kindergarten to Speed Up an Application Environment for ASBS based on Limited Control - An Experiment for Cloud Services Intelligence Security System Author: Jo Ryan Basco, Bobby D. 16:00-16:20 Pareto Dominance on Network Hawk Dove Games Author: Yinsheng Li, Jiao Li, Feng Author: Zhiyuan Fang, Li Wei, Gerardo, Cyreneo Dofitas Jr., Author: Jun Na, Bin Zhang, Jun Author: Siegfried Berninghaus, Zhou, Yong Fang Wei Chen, Yangjun He Yung-Cheol Byun, Bartolome Guo, Zhi-liang Zhu Stephan Schosser and Bodo Vogt Tanguilig III Cyber-Physical System A Ubiquitous Clinic Data Components Composition Social network characteristics of An Optimization of FMM under Managing Service Reputation with Accessing Method Based on Analysis and Formal Verification online shopping interpersonal CPU+GPU Heterogeneous 16:20-16:40 Vague Sets Resource Model Based on Service-Oriented relationship in real and virtual Architecture Author: Ping Wang Author: Lihong Jiang, Boyi Xu, Lu Architecture communities Author: Yonghua Zhu Fang, Hongming Cai Author: Peng Wang, Yang Xiang Author: Chong Zhang and Shaohua Zhang STIIS 2012 An Empirical Study of User No.5 Parallel Session Personalized Travel Service Modeling and Simulation for Data Providing Web Service Behavioral intention to accept of Session Chair: Kiyota Hashimoto Discovery and Usage in Cloud Dynamic Services Compositon of Selection Using Bayesian Network Mobile TV:An integration of TAM Discovery and Usage in Cloud Dynamic Services Compositon of Selection Using Bayesian Network Mobile TV:An integration of TAM Micro-film Marketing of Chinese 16:40-17:00 Environment LBS Based on TCPN Author: San-Yih Hwang, Yi-Hsuan with Entertainment Tourism Destinations via Social Author: Feng Zhou, Yong Fang, Author: Weimin Li, Xiaohua Zhao, Hsieh, Chien-Hsiang Lee Author: Chuncai Lin, Hailan Media:The Case of Shaoxing Hao Chen Mingjun Xin Gu,Yanpeng He Author: Jun Shao, Xiong Li, Zhao Li Studying Applications and An Empirical Study on Meta- Efficient Usage of Network Extraction of Hints and Advices Evaluation on the Next Heuristic Search-Based Web Bandwidth in the Cloud for Improvement of Small Hotels An Unified Logical Device Model Generation Services of 17:00-17:20 Service Composition Architecture Management from Hotel Reviews for Devices Integration Broadband Communication Author: Chengying Mao, Jifu Author: Rick C.S. Chen, Chung- Author: Sachio Hirokawa, Makoto Author: Xiaoli Zhi, Weiqin Tong Author: Widong Fang, Guoqing Chen, Xinxin Yu Ting Kao, Hui-Kuang Chung Okada, Kiyota Hashimoto Jia, Jingyan Mo PLASH: An ESB-based Platform Design and Implement of SOA- for Developing and Deploying based Bridge Monitoring System Location Aware Services with 17:20-17:40 Data Layer SOC Concepts Author: Wendi Gao, Meina song, Author: Yi-Chun Teng, Fu-Ming Ke Xu Huang, Yu-Hsiang Huang and Meng-Chang Chen 18:00-20:30 Banquet Headquarter of Sept.11 09:00-11:30 Visiting Alibaba and Discussion Alibaba Group