The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowadays, users' demands for tourism consumption continue to upgrade, more and more consumers complete the reservation of air tickets and hotels through online payment. Referring to previous researches, this paper established the users' online payment behavior intention model based on Unified Theory of Acceptance and Use of Technology (UTAUT) and put forward corresponding hypotheses. Then we adopt...
From the view of customers' perception, this paper analyzes the factors effecting online shopping, and combines with empirical analysis method for research. Gathering information by the questionnaire survey, we use statistical analysis, such as reliability analysis, validity analysis, regression analysis. These results show that questionnaire design is reasonable ,the reliability and validity are...
This paper developed a conceptual model through a survey of literature on e-service, and then it has a demonstration analysis of the world's largest online bookstore in China Dangdang.com. The study measured the impact of four dimensions on e-satisfaction and funds the relationship between e-satisfaction and e-loyalty. According to their relationship, it will give a hand to the online bookstore manager...
This paper investigates and simulates a coloured stochastic Petri nets model for depth evaluation intrusion detection. Network attack behaviors are very complexity sometimes, it is difficult to capture all of them. In this paper, we could realize what them happened with analyzing and simulating an intrusion. The experimental results demonstrated that the CSPN model approach was an efficient and helpful...
With the development of high rate data transmission technology via distribution line communication, the electric power, data, voice and video can be transferred in the same electric power distribution network, and the technology will be put in operation widely in the future. However the traditional technology of power line communication is not adaptable to the complex and harsh environment of distribution...
Active content transformation in Web is a hot topic in Internet content delivery research. In this paper, we proposed 3 different modes content transformation, which are whole-file buffering, byte-streaming, and chunk buffering. Based on the chunk dependence graph, we studied the performance for different modes and argued that the chunk streaming is the most appropriate transform model for Web intermediaries...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.