The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
There is still a gap between businesses and their supporting software. Even when an enterprise architecture is defined for a given business, its software is often not aligned to it. If it is reflected in the software at all, then its representation there is mostly in program code rather than models, which makes it difficult to adapt the software. While BPMN provides the possibility to specify business...
This paper on the. Net platform three layer architecture of online bookstore system design process were research and exploration, and the second layer architecture comparison of advantages and disadvantages. Three layer architecture thought take the strategy of "divide and conquer", the separation of system design key points of each to a separate layer implementation, and through mutual...
Ajax-based technology plays an important role in RIA (rich internet application). Meanwhile, Ajax-based three-tier architecture is a classic architecture in software development industry. Study shows that the data access layer and the business logic layer can be designed as universal modules and the presentation layer can be divided into specific module and universal module. As universal module is...
This paper describes the content of a tutorial on the development of mobile business applications. Key aspects adressed are the design of the mobile user interface and the integrated conception of a sound architecture. The design of the user interface follows a user-centered design approach considering key aspects of mobile app development. Based on architectural scenarios, the architecture is specified...
The design of class in the different layer is one of the most important works in software development based on three-tier architecture, however, the methods of component are the core of class and the characters of the function (component method) in different layer are different so to find out these characters and to form the design strategy of component method called function in this paper is very...
Model-View-Controller (MVC) pattern is very useful and popular design pattern that separates the modeling of the domain, the presentation, and the actions based on user input into three separate classes. The model acts as the domain that software is built around, the view as the visual representation of a model. It is usually the resulting markup that the framework renders to the browser and the controller...
SaaS applications support multi-tenancy and dedicated service environments by providing multiple tenants with user interface for customizing their own service. On the other hand, existing web-based applications do not support multi-tenancy and configurability. Therefore, transforming existing web applications into SaaS applications and serving them to multiple tenants is a great challenge. In this...
This paper discusses characteristics and merits of three-tiered architecture in the system application, points out the core idea of three-tiered architecture is the distribution of calculation and data. This Paper put forward a basic principle that the middle tier should be a buffer of other tiers and the balance point of all loads, and it should be expanded for future business requirements. Based...
Performance engineering for informational and transactional distributed systems must take into account both the development and runtime information about the target system and its environment. At development time, the architects have to choose from many architecture styles and consider all performance requirements across a multitude of workload. At runtime, an Autonomic Manager has to compensate for...
A Public data platform uses the experience of enterprise information integration for reference. It can provide data integration interfaces for existing business information systems. The interfaces are used for data conversion. Beijing University of Civil Engineering and Architecture has developed more than a dozen information systems for all teachers and students. Through research of requirement analysis,...
With rapid development of web 2.0 technology and e-business, bloggers play significant roles in the blogosphere as well as the external world. In particular, influential bloggers can bring great business values to modern enterprise. Despite that several systems for mining influential bloggers are available, they measure the influence of bloggers in general rather than domain specific, which is not...
Shared office information appliances such as copiers, scanners and meeting-room displays are increasingly being integrated into complex electronic document workflows. To support this new role these appliances are being designed with advanced features such as optical character recognition, networked storage, content-based routing and integration with back-end databases, yet availability of these features...
As the progress of information technology, some financial systems used for long time can no longer meet the requirement of customers in both user interface and business process, and need reengineering imminently. In order to save the human resource and financial effort, this article raises a reengineering approach by encapsulating the back-end data access code of legacy system and only refactoring...
This paper discusses the key techniques in the design and implementation of a fingerprint authentication system and provides a good solution to perform identity authentication for enterprises. In the design, ASP.NET is adopted to build an overall framework of the system. In the framework, ActiveX, SQL Server together with Java programming language are used to construct a complete fingerprint authentication...
A range of issues often appear in current on-line courses selection system, such as systems crowded, excessive workload and so on. The paper seeks to construct a highly reliable courses selection system based on mainframe to address these issues. This paper boldly tried to combine mainframe technology with Web technology, use mainframe??s high reliability, high stability, and high concurrency of CICS??s...
Culturalization of the software architecture started in the 1990s with the user interface. Culturalization of core issues was discussed by Kersten in 2001. However, advances in technology in recent years, increased demands to accommodate new cultures and languages, presented new challenges which require deeper understanding and richer perspective. There has been little discussion about the values...
The rapid evolutions of software environment and business requirements place a high demand on the adaptiveness of enterprise information systems (EIS). Over the last few years, more and more EIS adopted the distributed multi-tiered Web-based application architecture. Crosscutting concerns and clone codes make the web-based EIS difficult to evolve and maintain. The traditional model-view-controller...
In this paper a new proactive customer relationship management system (CRM), BlueCRM, is proposed. The proposed system employs Bluetooth as an automatic identification token in addition to its common use as a communication channel. The system offers a low-cost proactive CRM system which is the future trend of such systems. The implementation of the prototype system comprises two sides: a database...
Starting from the analysis of the three terms, enterprise integration, information integration and system integration, which are widely used in the integration research and practice, closely related but still distinguishable, this paper unifies enterprise integration, information integration to system integration, thus builds a system integration framework for the contemporary enterprise information...
This paper is a description of the European A-WARE project. For each user, a deployed instance of the A-WARE technology presents a facade over the underlying fabric of grid resources a bridge between users and resources. The primary target in grid fabric is the Web services based UNICORE 6 software. For the user, A-WARE provides a single point of entry to their distributed resources, and importantly...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.