The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper investigates the impact of the database layer on the scaling actions of the business layer of a 3-tier web service system in cloud resource provisioning. The research question is "What is the impact of the database layer on the business layer auto-scaling decisions?" In this work two hypotheses are tested: 1) "Database tier capacity has no effect on the business tier scaling...
Trust plays an important role in helping social network user make appropriate decision from abundant social information about products. A variety of social review information (e.g. ratings, voting and tags) emerge with the huge number of products on the Web. How they are utilized for searching and finding appropriate item is investigated. In this paper we propose a user credibility calculation method,...
We discuss our experience in use of models and model-driven techniques for developing large business applications. Benefits accrued and limitations observed are highlighted. We describe possible means of overcoming some of the limitations and experience thereof. A case for shift in focus of model driven engineering (MDE) community in the context of large enterprises is argued. Though emerging from...
Online Analytics Processing (OLAP) is utilised to develop multidimensional operations enabling queries and visualisation for Business Intelligence (BI). Most of the OLAP systems come with a tightly integrated user interface for querying and visualisation of data without the core OLAP operations exposed as an API. Advanced BI applications can be developed and composed to create complex workflows if...
Marketing research is the core business process for every enterprise. With the dramatic development of Internet technology, online marketing research is a relatively new and a more efficient approach to detect marketing changes. This paper focuses on the topic of online marketing research, by utilizing both social choice theory and cloud computing techniques, we designed an algorithm to assist the...
Business process patterns, or generalised reusable process models, have the potential to reduce the effort and costs of developing new business processes or re-engineering existing ones. Identifying new patterns, however, requires an analysis of existing business data to uncover commonalities of processes within and across organisations. In previous work we developed a method to extract linguistic...
Numerous service models have been proposed in the form of “as a Service” or “aaS” in the past. This is especially eminent in the era of the Cloud under the term of anything as a service or everything as a service(XaaS). An unified view of XaaS can aid efficient classification of services for service registration, discovery, and composition. In view of that there lacks such an unified view which is...
Web based computing technology and services has proliferated exponentially and seen mammoth growth in the way people interact with systems across the globe since last decade. Nowadays user community has turned into contributor community and interactive social web platforms have made them empowered for global content creation and consumption. This content exploding is continued and ever increasing...
An important omission in current development practice for business process (or workflow) management systems is modeling of data & access for a business process, including relationship of the process data and the persistent data in the underlying enterprise database(s). This paper develops and studies a new approach to modeling data for business processes: representing data used by a process as...
A new model of hybrid cloud computing architecture based on cloud bus is proposed. The system is based on local private cloud, combined with one or more type(s) of public cloud(s). The internal structures of private cloud and public cloud are the same, including infrastructure and virtualization layer, cloud platforms layer, cloud bus layer, cloud application layer, the management center and storage...
Multi-tenant applications are usually cloud based software services which can serve different users at the same time. This is done using single instance of applications by sharing hardware, infrastructure, data storage and virtualization. To achieve multi tenancy different approaches are there at every layer (Application, Data, hardware). Software-as-as-Service (SaaS) is a new approach for developing...
Cloud computing moves the application software, platform and infrastructure into the large data centers which are maintained at the centralized location. The Cloud Service User (CSU) requests the resources from the cloud for their current requirements without investing the money. It is a pay-as-you-go-basis which means that the CSU pay what they actually consumed. If the Cloud Service Provider (CSP)...
This article introduce the advantages of Multi-tier architecture indicate the Multi-tier architecture will be the tendency of the future software architecture. And indicate the overall functional structure of the multilayer architecture and ERP. Finally, discuss the specific method of ERP.
This article, which based on the analysis to the multi-Agent electronic commerce recommendation system's present researches' situation, proposes one kind of new multi-Agent-based electronic commerce recommendation system. Firstly, the article establishes the multi-Agent technology electronic commerce personalization recommendation system model. Secondly, it carries on the design to the model's principle...
Software as a Service is becoming a popular research field in software development for its feature of low costing entry, easy implementation and zero infrastructure. SaaS is a multi tenant model which is different from traditional software in user data security, software development and deployment. This paper firstly analyses SaaS architecture, secondly introduces key technology of SaaS system from...
Cloud infrastructure should accommodate changing demands for different types of transactions with heterogeneous requests workload and response time constraints. The multi-layer nature of service computing results in the difficulty of designing an optimal cloud infrastructure. The objective of the paper focuses on enabling clouds infrastructure to provide guaranteed performance in minimum cost. The...
At micro enterprises and private entrepreneurs it is very crucial to direct the business in a relatively simple way. An integrated computer program is very helpful. In this paper we present such a program in details from the business model through database and information system till marketing and security of a micro enterprise in the field of beauty business.
Authorization constraint is a very important part in the role-based access control model. In the RBAC model complex relationship between the user and authorization will be resolved by introducing the role. The RBAC model has been widely used recently. In this paper we focus on solve the authorization with the time constraint. We have extended the model and proposed solutions to authority of the time...
Unified Modeling Language is a kind of language which can be applied to describing, visualizing, framing software system and to business modeling. It contains analysis, design and realization of object-oriented technology, providing abundant, precise expression with strong extension ability for object oriented system development, software automation tools and environment. The paper introduces the...
In 2010, China's domestic value-added tax revenue is 2.109195 trillion yuan, accounting for 29% of the total income tax revenue, is one of China's current major taxes. Therefore, based on the data in the CTAIS to analyse the tax burden, and constructs the VAT tax burden warming system, is the effective measures to keep the rapid growth of VAT. meanwhile, through drawing up the value added table, can...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.