The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
During the development of component-based software systems, it is often impractical or even impossible to include all development information into the source code. Instead, specialized languages are used to describe components and systems on different levels of abstraction or from different viewpoints: Component-based architecture models and contracts, for example, can be used to describe the system...
The present way of doing business increasingly requires enterprises (and other organisations) to collaborate with each other, networked business allows enterprises to focus on their key competences and still capture market share with added-value, composed services jointly with trusted business partners. However, the present solutions for setting up new collaborations are based on ad hoc methods, or...
According to ITU database about telecommunication regulatory bodies, regulators were responsible to monitor the quality of services in about 84% countries across the world in 2005; furthermore, regulators assigned the quality borders in about 76% of countries. In this paper we use metamodeling strategy to analyze and model the required processes for QoS/SLA management system. This model is developed...
A Service supply chain occurs when a service provider outsources part of the service to a supplier. In service supply chains, as supplier offers service directly to final customers, it's hard for service provider to monitor or measure supplier's work. For this reason, the service provider has to offer an incentive mechanism to the supplier. This paper studies the optimal incentive mechanism in the...
The present trend of enterprise computing is towards networked business, and thus there is a high demand on a new layer of global infrastructure that facilitates inter-enterprise collaboration management and provides utilities for interoperability. This paper discusses the Pilarcos open ecosystem architecture, and especially, its reflective infrastructure that supports runtime establishment of collaborations,...
IT Service Management (ITSM) is the set of processes that allow planning, organizing, directing and controlling the provisioning of IT services. Among the concerns of ITSM, namely within the service level management process, are the requirements for services availability, performance, accuracy, capacity and security, which are specified in terms of service-level agreements (SLA). SLA definition and...
This article essentially thinks the western traditional principal-agent theory is a kind of corporate governance theory aimed at the companies with the main character of diversified equity. Obviously it is not fit for being used as the analysis framework of the governance problem of the companies with the main character of the relatively concentrated equity or highly concentrated equity. For that...
The Internet of Services (IoS) idea promotes collaborative service exchange and trading platforms. Activity in the IoS is determined by metrics such as the number of users, number of services with associated descriptions and contract templates, negotiated contracts, performed invocations and generated measurements. In order to develop scalable and high-quality IoS platforms, experiments with user...
In reality, when the manager influences the production of corporations in an inestimable way, the more self-disciplined he is, the more dependent his income is on the enterprise's production and the more unlikely he is directly monitored. However, the traditional confirmation model of surplus profit sharecropping neglects monitoring strength, monitoring cost and the manager's self-discipline. On the...
It is difficult to achieve cooperation in team production because there is an intrinsic free-riding problem. This paper incorporates inequity aversion, which has been ignored by the standard contract theory, but has also been proven by a series of game experiments, to systematically investigate how peer pressures stem from horizontal monitor and comparison, why peer sanction with cost still will be...
The dynamically changing nature of distributed service environments requires a computing model in which services modify their behavior in order to adapt to changes and fulfill new requirements in the environment. This paper describes design and implementation of the autonomic communication element (ACE) component model with main focus on service adaptability. Autonomic Communication Element (ACE)...
A study has been made for the internationalization of the franchising Iberian companies. Our aim was to analyze the most important variables for the internationalization. We studied it using several statistical methods applied to the answers given by companies to a questionnaire. We have concluded that are some relevant variables to be considered in the internationalization such as age, dimension,...
A critical infrastructure (CI) consists of those physical and information technology facilities, networks, services and assets which, if disrupted or destroyed, have a serious impact on the health, safety, security or economic well-being of citizens or the effective functioning of governments. Nowadays, the operation controls of these infrastructures have been computerized and have gradually become...
Dynamic background modeling is an essential task for numerous visual surveillance applications such as incident detection and traffic management. Adaptive mixture models and nonparametric models are two popular methods for background modeling at present. However, it is usually too costly to perform for the both methods in real time, since they are both memory and computationally inefficient. To overcome...
Requirements modeling has been recently introduced in the UML world with the form of a new profile called SysML. This paper explores the possibility to link concepts used to describe requirements with those of the enterprise language of RM-ODP. Some correspondence rules are proposed and illustrated on a case study.
Accelerated by the rapid deployment of distributed systems and the Internet, online collaboration and information sharing are pervasive in enterprise computing environment. With regard to the requirements of online collaboration and information sharing, authentication information needs flexible manipulation to facilitate federation across trust domains. To achieve identity federation for federated...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.