The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The following topics are dealt with: enterprise computing; e-commerce privacy and security; e-service; resource management; media management; business collaboration and semantic Web service composition.
While grid market schedulers have recently received a lot of attention and have been accepted not only in economic but also in purely computer science areas as well, technical grid schedulers are being modified to support advance reservation of resources, too. This prompts questions on how to model grid markets and how to handle grid resource reservation in a reasonable economic fashion. This paper...
Grid technology denotes a computing paradigm in which computing resources are shared across geographical and administrative boundaries. Market-based mechanisms are deemed promising to provide a better fit to grids' strategic and dynamic nature than classic technical schedulers. In this paper, we present a deterministic heuristic that achieves the distinct trade-off between scalability by approximation...
Today's development and provision of commercially used Web services has shifted from providing static and predefined functionality to highly configurable services that can be dynamically combined by customers. This new form of composed services called service mashups integrate functionality of multiple sub-services from decentralized providers. Consequently this leads to a high configuration complexity...
RFID systems compliant to the widely-used standard EPC class 1 generation 2 lack effective security mechanisms. We show that passwords used to protect critical functionality can be obtained by attackers with only moderate effort. Since more capable systems are not likely to replace the current standard in the medium term, it is crucial to embed the deployment of RFID technology into IT-ecosystems...
A main challenge in mobile commerce is to make it possible for users to manage their transaction histories from both online e-commerce transactions and in-person transactions. Such histories are typically useful to build credit or to establish trust based on past transactions. In this paper we propose an approach to manage electronic receipts on cellular devices by assuring their secure and privacy-preserving...
Electronic commerce has provided retailers with effective instruments to deploy one-to-one marketing over the internet. While the increasing use of sensors, RFID tags and other technologies enables the deployment of one-to-one marketing also in stationary retail stores, ini-tial experiments in realizing personalization in this setting have shown that customers' acceptance is low, as services require...
Prediction markets are a promising approach for predicting uncertain future events and developments. These markets will work well if they are efficient and in efficient markets, one does not expect arbitrage opportunities to be persistent. This paper therefore studies whether pure arbitrage opportunities existed in a sports prediction market. Moreover, market liquidity can become an issue in prediction...
Online buyer coalition formation problem is an application of e-commerce and distributed agent technology. So far, most works in this topic are social utility based approaches, which assume the agents' utilities to be transferable and publicly known. However, such assumptions are not valid in many software agents applications where agents beliefs are private, and stability is often a more important...
Reverse pricing as a special form of dynamic pricing has become a growing interest in e-commerce. It gives buyers an active role: The price of a transaction is not given by the supplier, but is mainly determined by the buyer's bid. This paper extends the coverage of current reverse pricing models to sourcing. The reason is that sourcing strategies, such as global, local, and multiple sourcing, greatly...
Various approaches to automate the observance of compliance requirements have recently been proposed. Since there is no all-round solution available within the foreseeable future, we propose a classification scheme for existing approaches that address different aspects of automating compliance. A layer model is used for linking laws and regulations with a company's IT system. The "policy layer"...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.