The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Based on fuzzy random theory and possibilistic theory, this paper deals with the portfolio selection problem with investors' attitudes under the assumption of weak-efficient market and limited rationality investors. A portfolio selection model with fuzzy random return rate and possibilistic standard deviation is proposed. And investors' risk-preferences, optimistic-pessimistic degree and rational-emotional...
This paper reviews relevant literature that sheds light on the issue surrounding book-tax difference (BTD). The paper includes four main parts of the literature: (1) the trade-off between financial income and taxable income; (2) the measurements of BTD; (3) the economic consequences of BTD, and (4) conclusion. In addition, We provide opinions regarding the interesting and important issues for future...
Multi-tenancy supporting becomes a basic characteristic of Software-as-a-Service (SaaS) operation. In multi-tenancy environment, tenant placement problem is critical for balance the database server workload. In this paper, we discuss how the cross-tenant data access affects the workload and how to optimize resource utilization in tenant placement process. This paper comes up with a SaaS tenant data...
Software as a Service (SaaS) is essentially about delivering a software application as a service over the Web with a usage-based charging plan. Existing Web service subscription models do not consider the complexity of the application and the business environment; for example, multiple service elements with mutual dependencies derived from one application, or various business partnership models for...
This paper establish a new model of financial distress prediction---the combination forecasting model based on support vector machines (CFSVM), with Chinese listed corporations as samples. After rectifying the model, it gets higher predicting precision. Comparing to other warning models, the CFSVM model for listed corporations in financial distress prediction really has bigger application foreground...
Business user oritented business process monitoring plays a key role for enterprises to improve business processes' visibility and responsiveness. Usually an end-to-end business process is implemented by heterogenous technologies and their combinations in a SOA enviroment, for instance: business process execution language (BPEL), J2EE and any other technologies which can leverage Web service as composition...
Architecture design is an essential phase in software engineering. To effectively re-use pre-verified knowledge is critical for design high-quality architecture. Among several different approaches, architectural patterns are widely investigated as they capture the fundamental structural and behavioral principles of architecture design. Although a lot of patterns have already been defined, the application...
Multi-tenancy is one of key characteristics of the service oriented computing especially for Software as a Service (SaaS) to leverage economy of scale to drive down total cost of ownership for both service consumer and provider. This paper aims to study the technologies to build a cost-effective, secure and scalable multi-tenant infrastructure, especially in data tier. We first explore all the key...
Software as a service (SaaS) provides software application vendors a Web based delivery model to serve big amount of clients with multi-tenancy based infrastructure and application sharing architecture so as to get great benefit from the economy of scale. Though SaaS application is usually developed with highly standardized software functionalities to serve as many clients as possible, many clients...
In seeking more profits, many business service providers have turned their attention to the technologies that can enable the delivery and operations of the network-delivered business services more efficiently and highly automated. To that end, many service providers have adopted the shared service model where the service offerings are shared across multiple customers to reduce the costs associated...
This paper analyzes information security in the E-commerce based on game theory, and this game analysis method is applied to information security for the first time. We set up the information security game model of the defender and the attacker, make the equilibrium analysis of this game model, and get the ideal strategy combination. Then we introduce the penalty parameter of the defender and the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.