The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper carried on the analysis to the development present situation of SNS, summarized the current problems in the SNS, then based on the analysis of online word of mouth value, explored building new profit pattern about online word of mouth marketing, and proposed corresponding strategies.
Individuals from different regions normally bear different cultural norms and values, and these variations would in turn affect their behavior and attitude with the computing system. However, though the cross-cultural study has been performed in other areas (e.g., e-commerce websites), few have identified its influence on users' behavior in social network sites (SNS). With the increasing popularity...
In China, the prosperous development of e-commerce, travel reservations and other industries drives the rapid growth of online payment. The business scale of China's third-party payment reached 1.0105 trillion RMB in 2010. But in order to survive, many enterprises of third-party payment adopt the strategy of low-cost, which leads to a long-term status of loss. In the market of third-party payment...
Peer-to-peer file sharing techniques are efficient and popular ways to distribute network media contents. Aiming to improve the accessibility of media contents from mobile devices, we introduce peer-to-peer file sharing technique into delay tolerant networks (DTNs), which are formed solely by highly mobile devices and which distribute files utilizing the mobility of humans and vehicles. We first investigate...
In this paper we aim to resolve the recommendation problem by using the virtual ratings in online environments when user rating information is not available. As a matter of fact, in most of current websites especially the Chinese video-sharing ones, the traditional pure rating based collaborative filtering recommender methods are not fully qualified due to the sparsity of rating data. Motivated by...
The paper proposes an improvement of e-cash payment protocol. One improvement is to divide the "agreement" and "use" of the session key into two stages, which ensures its key confidentiality. The second improvement is that the identities of the merchants are proved by their electronic certificates, which realizes its non-repudiation. The third improvement is that the payment receipts...
Researches on preserving private data in the application of web data mining possess practical value. Through introducing basic concepts of web log mining and private data protection, this paper analyzes the status quo of privacy preservation in web log mining, and then it puts forward privacy preserving mining model based on evolutionary algorithm of cloud model, combining with evolutionary algorithm...
Aimed to the defects of traditional hospital management system, this paper develops a new intelligent management system based on cloud computing. The characteristics of cloud computing are listed by introducing the definition, framework and basic capabilities. It can closely link the various medical departments and coordinate among medical institutions in the business. With achieving a strong information...
By discussion on the project administration system of e-commerce is the concrete realization of the system for internal business mode of construction enterprise electronic commerce model, and analysis of enterprise re-engineering of system integration and EC-oriented are the two cornerstones for e-commerce model research. From the enterprise business model for point view of the entire integrated environment...
The era of electronic commerce makes the development of electronic business be the focus of informazation of construction industry. The identification of the concept of electronic business focusing on reality practice is utilized in construction enterprises for reinforcing management theories and application foundation of electronic business models. According to multi-aspect requirement analyses of...
According to the current application and maintenance situation of numerical control equipment (NCE), a novel remote fault diagnosis expert system is designed to prevent fault occurrence and quicken the recovering process by online real-time monitoring the working state of NCEs. The article addresses the overall framework and relevant application technology of fault diagnosis system (FDS) and emphasizes...
The topic correlation judgment algorithm based on weight and threshold is proposed as for the problem that Web pages which are closely related to the given topic may be neglected due to not all keywords given by the users in the pages when users retrieve the topic they desire on the Internet. The algorithm retrieves the topic on the Web sites in depth by the hierarchical key structure on the basis...
From the angle of natural language processing, this paper analyses the architecture and core technologies of personalized digital library. It introduces matching strategy of document content representation and topic search. This matching strategy is a expansion model of vector space model. It uses word relating matrix base on tradition VSM. The WRM is computed by co-occurrence and mutual information...
Blog has become the commonest network product. There were usually over one hundred templates for one blog product. The main aim of this paper is to find what make user select one blog template instead of the others. To this end, 11 variables were defined to describe every blog template. Findings from a sample of 30 active NetEase blog users suggest that Internet-lifestyle is influential to blog template...
Optimal design of auction is one of hot research topics in the auction theory. During recent years, shill bidding has increased substantially with the explosion in the number of online auctions. This paper designs the optimal online auction with shill bidding and open reserve price. Many optimal auction models have assumed that the number of potential bidders is constant and known. And in these optimal...
Optimal design of auction is one of hot research topics in the auction theory. In this paper, we design this online auction mechanism, by considering simultaneously the bidders' stochastic arrival process, entry fee, which is proportional to the reserve price seller, commission rates, which is proportional to the ultimate winning price from the seller if the item is auctioned off successfully, buy-in...
Authentication protocol is a very important kind of protocol in network environment, and formal analysis is the key method to guarantee its security properties. Needham-Schroeder Shared-Key (NSSK) protocol is considered as one of the earliest and very important authentication protocol. The paper proposed a new improved version of NSSK protocol by modifying message format and decreasing message flows,...
The transformation from platform independent models to platform specific models is a key technology in OMG's MDA. The mapping relations between different models are the foundation and basis for the transformation. By abstractly analyzing the characteristic of syntax and semantics of modeling languages, a semantic-features-calculation based model mapping approach for the development of Web information...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.