The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recent emergence of diverse services have led to explosive traffic growth in cellular data networks. Understanding the service dynamics in large cellular networks is important for network design, trouble shooting, quality of service (QoE) support, and resource allocation. In this paper, we present our study to reveal the distributions and temporal patterns of different services in cellular data network...
In this paper we propose a conceptual semantic based tourism platform that enables users to consume mash up applications by using a multi agent system. We explore different mechanisms for discovery, publishing, composition and querying of services. In particular, we present a methodology for collecting, organizing and searching data distributed in different resources-RDF data sets- and - Application...
With the increasing complexity of IT outsourcing environments thousands of servers and their configurations are increasingly managed by globally distributed teams. This requires a flexible identity access management process in place to efficiently provision necessary access rights for a given system, only if users need it, when they need it and for only as long as they need it. In this paper we present...
The workshop is aimed at bringing together researchers from the areas of the service sector and data mining. We expect to encourage an exchange of ideas and perceptions through the workshop, which is focused on service and data mining.
As an important technique in modern sociology, social network analysis has gained a lot of attention from many disciplines, and been used as important complements to traditional statistics and data analysis. In order to make it affordable for analysts with massive and fast growing networks, we present X-RIME, a cloud-based library for large scale social network analysis. We propose an implementation-oriented...
This paper describes a service oriented programming platform for Internet-based virtual computing environment (iVCE), which is targetted for enabling collaboration among autonomous entities over Internet. This platform provides mechanisms and facilities to help iVCE programmers write and run applications in a relatively stable and trusted environment. In this platform, autonomous entities first voluntarily...
This paper proposes a new token structure for efficient handling of identity access management for online composite software services. With the requirement of ??Single Sign-On (SSO)?? for atomic services in a given composite service, this token structure binds service attributes, including workflow, providers, users, operator permission, and operation environment, together in its creation process...
In a number of scenarios, services generated using a model-driven development (MDD) approach could benefit from ??reflective?? access to the information in the models from which they have been generated. Examples are monitoring, auditing, reporting, and business intelligence scenarios. Some of the information contained in the models of a service can statically be generated into its source code. In...
The major weakness in modern detection methods in the snorts is that the power of snorts is restricted only to the network on which algorithms are applied. This paper presents a new method to solve issues considering locality. We place anomaly detection algorithms that used in snorts in form of services within verified servers. The major advantage of this method is that the former snort strategies...
This empirical study explores the structure of customer individual innovation behavior (CIIB) of Chinese service industry. According to the theory of individual innovation behavior(IIB) and the specific characteristics of customer involved in service innovation, we develop the CIIB scale. Exploratory factor analysis (EFA) of data from a sample of 242 customers shows that CIIB has there dimensions:...
Pervasive computing requires that devices must be context-aware in order to provide proactively adapted services to both user and applications according to the current context. Most of the proposed approaches of service adaptation in a pervasive computing system are either not context-aware or based on an inappropriate definition of context. In this paper we propose a context-aware dynamic service...
In the service collaboration field, there exists the need to combine two or more services together to fulfill a complex goal. Though service composition is an active research field, most of solutions are focused on Web services and lack of the consideration for business-level collaboration. In this paper we present a discovery architecture that supports business-level service composition. In our architecture,...
Multi-server queueing systems with complete and general renovation are revised. Such models are often encountered in computer science applications. Methods of analysis for the queues with general(recurrent) input flow and exponential service time with different combinations of service and general renovation disciplines are discussed. Explicit solutions (the steady-state probabilitiy distribution ,...
Status and effect of the service have been increasingly exposed under the drastic situation of marketing competition. Nowadays, the telecom corporations may win in the smoking competition by putting the differentiated service (DiffServ) into practice because the deviations of telecommunication products become narrower and narrower, the promotion less and less innovation, the demand of customers more...
First, we proposed a heterogeneous information integration framework for colliery based on ontology and SOA. Then, we discussed the three levels of colliery information integration, i.e. datasets' creation, the transparent access of datasets, services' creation and collaboration. The contents were transmitted to specified application through data translation, service process description and data routing...
Maintenance of critical emergency infrastructure is potentially lifesaving, but also expensive and tedious to document and track. In this paper we demonstrate a maintenance system based on Near Field Communication (NFC). NFC-enabled mobile phones and NFC tags are used to improve recurring maintenance processes: the maintenance task itself becomes more efficient; and the system facilitates real-time...
Online support centers are emerging as a cost-effective and innovative solution designed to enable end-users to resolve technical problems more effectively without relying on live support from contact center agents. However, the capacity limitation of corporate knowledge bases prevents online support centers from effectively resolving user problems. In addition, traditional textual search techniques...
In ambient intelligence (AmI) environments, some services provided by AmI devices are often not visible to users and to other devices. The existing approaches deal with services' composition and discovery as two independent parts. In this paper, we propose an alternative approach based on logical reasoning agent system. This system is supported by a communication protocol where agents discover automatically...
With the development of grid service technology, the grid service matching becomes a hot-spot. Service matching is one of the key technologies that can effectively improve the reuse of resources. After analyzing the reason of the lack of communication beforehand between the service requestors and the service providers, this paper proposes an approach to add semantic information into the service description...
Employing a software platform is an approach to achieve a higher degree of software reuse since multiple software products can share the platform-provided services. However, the platform development usually involves stakeholders from different application domains. Their application situations vary widely and thus Non-Functional Requirements (NFRs) for the software platforms must address a wider range...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.