The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to develop an extensive E-business Capability (EBC) model for better examining how e-business technology creates business value, this paper draws on the resource-based view of the firm, the IT process-oriented perspective, the net-enabled business innovation theory, and complementarity of resource, to review previous literature on EBC research and design an extensive framework. The research...
The Internet has change traditional firms' operation management and business model, which makes Porter's traditional value chain need to be improved. In this paper, we consider virtual value chain to be a new tool for analyzing and creating competitive advantages in the context of e-commerce. In this study, the shortages of traditional physical value chain (PVC) based on marketplace were discussed,...
Recent attention to carbon dioxide emissions is turning to an individual's contribution, which we name as “personal carbon footprint.” One step towards solving this issue is to have smart software/calculator that can figure out individual carbon footprint. Such calculators have become more widespread on the internet. However even with similar inputs these calculators can generate varying results,...
In today's web-based environment, strategic actors collaborate and compete to further its interests and opportunities. In this paper, we propose optimizing the requirements elicitation process through the combined use of the i* modeling framework with the quantitative risk analysis model of Bayesian Network (BN), so that strategic actors can estimate the potential opportunities and risks of concerned...
Security analysis is a knowledge intensive process, in which the attackers and the system owners are competing with their knowledge about how the system is built, what are the weakest points of the system, and how to exploit or to protect them. In other words, it is a race of knowledge. In this paper, we present a service security modeling approach based on the agent-oriented requirement modeling...
The Internet Protocol Television (IPTV) service provides rich multimedia services over IP networks and is considered as a potential killer application over the Internet. The intellectual property management protocol (IPMP) system becomes important in developing this network media applications. In this paper, security function, media streaming service system and the user terminal that adopted IPMP...
With the limitations of funds and strength, most of small and medium enterprises (SMEs) often choose the model of logistics outsourcing to reduce costs, and improve logistics efficiency. However, while the logistics cost of the production or commercial enterprises keeps a higher level, the third-party logistics enterprises take a fewer profits or even losses. This paper analyses the contradictory...
The rapid development of network has promoted the great innovation of education, and network learning has become one of the hot points in educational technology field. Network learning is a kind of highly autonomous independent learning. Learners should have intense sense of learning responsibility and self-monitoring ability, these are key factors of effecting learning effects. Therefore, cultivating...
Data integrity of Web resources is becoming more and more important with the increasing development of Internet. In the context of active intermediaries, current solution for data integrity such as inline method can't provide integrity protection for Web resource without text-based content structure (e.g. HTML forms). In addition, the current solution can't help the server to validate the integrity...
In this paper, we would like to perform detail analysis on the consistency situation of current Web content. Both data and the associated attributes of Web objects on replica/CDN (content delivery network) are monitored over the Internet and the correctness and appropriateness of various headers are discussed. It is found that there are lots of discrepancies in data object and attributes found by...
In this paper, we would like to address the consistency problem for Web content presentation through explicit ownership schemes. Our previous paper (Chua and Chi, 2005) showed that for most content service networks, consistency problem arises because of the mismatching of objects' attributes and pervasive contents. Our solution covers both protocols and supports for most of the necessary functions...
In this paper, we formalize the concept of a delegation network for Web intermediaries and present formal semantics for the responsibility of these actors. Key properties of the network are proven and method to judge an actor's responsibility is given. This work is important because it determines the accuracy of task execution and the feasibility of content reuse in the network
As the Web client devices become more and more heterogeneous, the Web content providers should cater for multi-presentation services. Transcoding is seen as an alternative to deliver such services. When deployed offline, transcoding is space-consuming, inflexible, and difficult to maintain. On-demand transcoding, on the other hand, is CPU-consuming and time-delaying. Inspired by new multimedia standards...
This paper proposes an approach for supporting the automatic retrieval of Web services. Different from the available approaches, this approach uses a context ontology as the basis of the capability descriptions of Web services. When the capability descriptions of both Web services and the Web requests are grounded onto the same ontology, a matchmaking method has been given for judging the equivalency...
In this paper, we would like to quantify factors that contribute to the cacheability decision of Web objects. Our study is based on a comprehensive study of object attributes that are related to the HTTP protocol transfer, proxy preference, content availability, freshness revalidation as well as the inter-relationship and dependency among them. Furthermore, the relative importance of these factors...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.