The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Peer-to-peer (P2P) computing has been one of the hottest technologies today, which is popular in distributed file sharing. There are many famous download applications developed such as BitTorrent, Emule, etc. They have been widely studied in terms of network topology, performance and incentive algorithms. Through these kinds of research, many useful functions have been implemented like virtual...
With banking channels changing rapidly and multi-channeling becoming increasingly widespread, there is a need to understand consumers' choice of channel and the banking tasks for the channel. Using the example of banking services in urban Bangladesh, where multichanneling is expected to become a norm, this research reports on an initial study comparing young consumers' choice of banking channels....
New product diffusion is a form of technological diffusion. Nowadays, Software, as a virtual product, has its own characteristics and behaviors. Once, software has the same channels along with other real goods, but with the internet's development, software's diffusion channels have be changed, each person can download and buy them on internet. In this paper, we used a simulation way to study software...
This paper compares the effectiveness of Function Points and Web Object analysis to estimate the development effort of Web applications. The empirical study is performed on a set of industrial projects carried on in an Italian software company. Starting from original requirements and estimates, carried on using FP analysis, we compute the Web Objects analysis of the same requirements, and compare...
The environments of software development and software provision are shifting to Web-based platforms supported by Platform/Software as a Service (PaaS/SaaS) models. By elaborating on these concepts, their benefits and risks, mobile operators' experiments with these models are analysed and similarities are identified. This paper will argue that mobile operators' mobile Web services are shifting from...
The rapid development of e-commerce is now demanding a huge number of professional people to develop, manage and plan the e-commerce systems. It is very important and necessary for the e-commerce teachers to educate and train students to master more extensive knowledge and better practical skill. In this paper the problems of the current e-commerce teaching are analyzed, and then the innovative models...
The current industry driven trend of providing flexible e-services lays the ground for the new research area "service value networks'' (SVNs). We observe a rising number of industry oriented publications provided by research departments of large companies such as IBM or SAP as well as the fact that more and more IS conferences offer special tracks on that issue. However, when it comes to formalizing...
The success of social software depends on contributions made by two key entities; the infrastructure provider(s) and the content providers (users). Currently, social software providers do not possess a powerful and generic approach to measure the contributions of their users. The ability of measuring user contributions will allow social software providers to accurately identify, acknowledge and reward...
With the rapid development of the Internet, P2P technology has changed the traditional concept of Internet; this technology has become the dominant flow and greatly satisfied the needs of the users. At the same time, P2P worm has become one of the serious threats. This article include characteristics of P2P worms, classification, propagation model, detection and defense mechanism, also analyze some...
With the fast development of Internet, distributed isomer system increases in double-click. New access control method and universal access control module should be come up to reduce software cost and solve the problem of complexity system access control, which working flow and transaction are imported in system. For this purpose, the role, process and resource-based three-dimensional access control...
The sustainable development of energy, economy and environment (3E for short) is a hot topic in the present world, people pay more and more attention to the research on this topic. There are many achievements about 3E made by our researchers; however, because of geographical differences or the specification of study object, most of these studies can not play realistic roles either in promoting otherpsilas...
This paper synthesizes the existing superior teaching methods and combines the new facts in the Internet environment, summarizing the new teaching methods model of MIS under Internet environment for non-computer professionals, which is capable to overcome the insufficiency and non-systemic in the existing teaching methods of MIS, as well as enhancing the teaching and learning effects. The basic methods...
Computing is being transformed to a model consisting of services that are commoditised and delivered in a manner similar to utilities such as water, electricity, gas, and telephony. In such a model, users access services based on their requirements without regard to where the services are hosted. Several computing paradigms have promised to deliver this utility computing vision and they include Grid...
The statistical testing base on usage model is an application for cleanroom software test. This paper constitutes a usage model for the test of an embedded stream media product whose chipset is ARM926JES base on the Markov theory. And quantitative analysis for the Markov chain which is composed by states transition matrix and excitation matrix. Comparing the model's difference between usage chains...
Dispatcher Training Simulator (DTS) is a computer system of digital simulation to the power system by using computers.The design and realization of the interaction function of the DTS based on Web is a very important part of the DTS system. Because using the standard of J2EE in the interaction function of the DTS based on Web, it makes that the program has very good transplantability and extensibility.
CMDE has been successfully applied in several industrial projects, including telecommunication services, supply-chain management, bioinformatics, logistics, and healthcare. In all these cases, agility at the customer, user, and application level proved key to aligning and linking business and IT. We now expect an additional boost when integrating this approach into a processor project-management environment...
The common use and variety of social software services has rapidly increased over the past years. The big success of established services like Facebook, Twitter or YouTube accelerates the transformation of the whole Web. Next generation services are characterized by strong social interaction and collaboration tools. Significantly affected by this movement, conventional commerce platforms and online...
This paper discusses the manifest characteristics of online vulnerability black markets (VBM), insider actors, interactions and mechanisms, obtained from masked observation. Because VBM transactions are hidden from general view, we trace their precursors as secondary evidence of their development and activity. More general attributes of VBMs and the exploits they discuss are identified. Finally, we...
Government departments play an important role in the country's economic development and building, along with the continuous deepening of network application, some important contents such as the government services have gradually started on the Internet. Based on information security model, we designed and implemented a security system of e-government information. And introduced the various components...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.