The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we report our experience in the implementation of a module for creating user profiles of Web visitors by using Zones, Weights and Actions. The module is part of Gugubarra 2.0, a tool for better understanding and management of communities of registered Web visitors, currently being developed by the database group at the Computer Science Institute of the Goethe University in Frankfurt...
Trust is a critical issue in e-commerce and e-service environments. Some applications (such as eBay) have introduced various trust management mechanisms to provide valuable information to buyers prior to placing orders and making payments. While trust has been actively studied in the research community, some malicious sellers and fraudulent transactions still widely exist. A typical attack is to entice...
Managing business collaboration is about coordinating the flow of information among organizations and linking their business processes into a cohesive whole. A consistent outcome is expected within and among involving organization. However, inadequate coordination onthe autonomous, heterogeneous, and long-lasting cross-organizational business processes can lead to inconsistent execution in loosely-coupled...
For companies acting on a global scale, the necessity to monitor and analyze news channels and consumer-generated media on the Web, such as weblogs and n news-groups, is steadily increasing. In particular the identification of novel trends and upcoming issues, as well as their dynamic evolution over time, is of utter importance to corporate communications and market analysts. Automated machine learning...
Reverse pricing as a special form of dynamic pricing has become a growing interest in e-commerce. It gives buyers an active role: The price of a transaction is not given by the supplier, but is mainly determined by the buyer's bid. This paper extends the coverage of current reverse pricing models to sourcing. The reason is that sourcing strategies, such as global, local, and multiple sourcing, greatly...
Online buyer coalition formation problem is an application of e-commerce and distributed agent technology. So far, most works in this topic are social utility based approaches, which assume the agents' utilities to be transferable and publicly known. However, such assumptions are not valid in many software agents applications where agents beliefs are private, and stability is often a more important...
Grid technology denotes a computing paradigm in which computing resources are shared across geographical and administrative boundaries. Market-based mechanisms are deemed promising to provide a better fit to grids' strategic and dynamic nature than classic technical schedulers. In this paper, we present a deterministic heuristic that achieves the distinct trade-off between scalability by approximation...
While grid market schedulers have recently received a lot of attention and have been accepted not only in economic but also in purely computer science areas as well, technical grid schedulers are being modified to support advance reservation of resources, too. This prompts questions on how to model grid markets and how to handle grid resource reservation in a reasonable economic fashion. This paper...
RFID systems compliant to the widely-used standard EPC class 1 generation 2 lack effective security mechanisms. We show that passwords used to protect critical functionality can be obtained by attackers with only moderate effort. Since more capable systems are not likely to replace the current standard in the medium term, it is crucial to embed the deployment of RFID technology into IT-ecosystems...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.