2012 IEEE Ninth International Conference on e-Business Engineering最新文献

筛选
英文 中文
Do We Have Tools for Developing Green Applications? - IDE Tool with Power Management Computation Plugin 我们有开发绿色应用的工具吗?- IDE工具与电源管理计算插件
2012 IEEE Ninth International Conference on e-Business Engineering Pub Date : 2012-09-09 DOI: 10.1109/ICEBE.2012.29
Tina Ho, Rebecca Chen, Jerry Chang
{"title":"Do We Have Tools for Developing Green Applications? - IDE Tool with Power Management Computation Plugin","authors":"Tina Ho, Rebecca Chen, Jerry Chang","doi":"10.1109/ICEBE.2012.29","DOIUrl":"https://doi.org/10.1109/ICEBE.2012.29","url":null,"abstract":"Power resources on the mobile device are always valuable, meanwhile there are 4.6 billion mobile-phone subscribers worldwide. The total amount of energy consumed and the carbon footprint on those mobile devices is considerable which implies developing tools for green applications to become ever more critical. However, there is currently no effective way for application developers to know the power consumption of their applications, nor a development tool to disable unnecessary or optional functions when device power reaches to lower levels. In this paper, we propose an application development tool that provides the power consumption information in integrated development environment (IDE) tools. By using our tool, application developers can clearly evaluate power consumption of applications they develop, and decide whether to down grade or turn off minor functions or features to switch to power saving mode while power resource is limited.","PeriodicalId":166304,"journal":{"name":"2012 IEEE Ninth International Conference on e-Business Engineering","volume":"1990 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128226868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
User-Controlled Dynamic Access Credential Enrichment for Run-time Service Selection 用于运行时服务选择的用户控制的动态访问凭据充实
2012 IEEE Ninth International Conference on e-Business Engineering Pub Date : 2012-09-09 DOI: 10.1109/ICEBE.2012.39
Christoph Fritsch, G. Pernul
{"title":"User-Controlled Dynamic Access Credential Enrichment for Run-time Service Selection","authors":"Christoph Fritsch, G. Pernul","doi":"10.1109/ICEBE.2012.39","DOIUrl":"https://doi.org/10.1109/ICEBE.2012.39","url":null,"abstract":"Dynamic run-time selection and sourcing of service components provide considerable potential in todays changing business world. They provide means to counter agility, flexibility and the ability to integrate applications originating from systems of different security domains. While the advantages are obvious strong implications to security in general and authorization and access control in particular do exist. In this paper we present an infrastructure-based approach for en-route dynamic credential enrichment. It enables dynamic replacement of access-restricted service instances by implementing runtime supplementation of security tokens. If authorized, a security intermediary accesses user profiles and retrieves security tokens supplied by identity providers and needed for access control at dynamically selected access-restricted service instances.","PeriodicalId":166304,"journal":{"name":"2012 IEEE Ninth International Conference on e-Business Engineering","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115731695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey of P2P Virtual World Infrastructure P2P虚拟世界基础设施综述
2012 IEEE Ninth International Conference on e-Business Engineering Pub Date : 2012-09-09 DOI: 10.1109/ICEBE.2012.55
Bingqing Shen, J. Guo, Philip Chen
{"title":"A Survey of P2P Virtual World Infrastructure","authors":"Bingqing Shen, J. Guo, Philip Chen","doi":"10.1109/ICEBE.2012.55","DOIUrl":"https://doi.org/10.1109/ICEBE.2012.55","url":null,"abstract":"With the development of computer science and virtual reality technology, virtual world evolves along the way of computer game development, from arcade games, console system games, LAN games, Internet connectivity games, unstructured games, games with player generation of content, worlds with designer-provided objectives, games with social networks, and open virtual worlds [1]. Traditional server-client structure does not scale well at least in the following three aspects which are limited number of players in each server, single point of failure risk, and unbalanced computation resource. This survey investigates another alternative, peer-to-peer (P2P) virtual world software infrastructure, to address these traditional architectural issues.","PeriodicalId":166304,"journal":{"name":"2012 IEEE Ninth International Conference on e-Business Engineering","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128715647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
S/T/A: Meta-Modeling Run-Time Adaptation in Component-Based System Architectures S/T/A:基于组件的系统架构中的元建模运行时适应
2012 IEEE Ninth International Conference on e-Business Engineering Pub Date : 2012-09-09 DOI: 10.1109/ICEBE.2012.21
Nikolaus Huber, A. Hoorn, A. Koziolek, Fabian Brosig, Samuel Kounev
{"title":"S/T/A: Meta-Modeling Run-Time Adaptation in Component-Based System Architectures","authors":"Nikolaus Huber, A. Hoorn, A. Koziolek, Fabian Brosig, Samuel Kounev","doi":"10.1109/ICEBE.2012.21","DOIUrl":"https://doi.org/10.1109/ICEBE.2012.21","url":null,"abstract":"Modern virtualized system environments usually host diverse applications of different parties and aim at utilizing resources efficiently while ensuring that quality-of-service requirements are continuously satisfied. In such scenarios, complex adaptations to changes in the system environment are still largely performed manually by humans. Over the past decade, autonomic self-adaptation techniques aiming to minimize human intervention have become increasingly popular. However, given that adaptation processes are usually highly system specific, it is a challenge to abstract from system details enabling the reuse of adaptation strategies. In this paper, we propose a novel modeling language (meta-model) providing means to describe system adaptation processes at the system architecture level in a generic, human-understandable and reusable way. We apply our approach to three different realistic contexts (dynamic resource allocation, software architecture optimization, and run-time adaptation planning) showing how the gap between complex manual adaptations and their autonomous execution can be closed by using a holistic model-based approach.","PeriodicalId":166304,"journal":{"name":"2012 IEEE Ninth International Conference on e-Business Engineering","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124690174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
SecEPM: A Security Engineering Process Model for Electronic Business Processes SecEPM:电子业务流程的安全工程流程模型
2012 IEEE Ninth International Conference on e-Business Engineering Pub Date : 2012-09-09 DOI: 10.1109/ICEBE.2012.41
Jörn Eichler
{"title":"SecEPM: A Security Engineering Process Model for Electronic Business Processes","authors":"Jörn Eichler","doi":"10.1109/ICEBE.2012.41","DOIUrl":"https://doi.org/10.1109/ICEBE.2012.41","url":null,"abstract":"Business process management (BPM) and accompanying systems allow organizations to react faster both to environmental and market changes. Therefore, BPM is widely applied in industry. Although organizations depend on the secure enactment of electronic business processes, existing BPM languages and techniques provide only little support for security. Several approaches have been proposed to close the gap for security in the domain of BPM. Nevertheless, an approach to develop secure electronic business processes systematically is still missing. In this paper, we provide the design as well as key entities of our Security Engineering Process Model (SecEPM) for electronic business processes. SecEPM guides security, business process, and domain experts through the development of secure business processes from the identification of security goals to the selection and configuration of security controls. It integrates security in the development life cycle of electronic business processes in a flexible way, thus allowing for a secure, adaptable organization.","PeriodicalId":166304,"journal":{"name":"2012 IEEE Ninth International Conference on e-Business Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131234576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mining Contextual Knowledge for Context-Aware Recommender Systems 为上下文感知推荐系统挖掘上下文知识
2012 IEEE Ninth International Conference on e-Business Engineering Pub Date : 2012-09-09 DOI: 10.1109/ICEBE.2012.65
Wenping Zhang, Raymond Y. K. Lau, Xiaohui Tao
{"title":"Mining Contextual Knowledge for Context-Aware Recommender Systems","authors":"Wenping Zhang, Raymond Y. K. Lau, Xiaohui Tao","doi":"10.1109/ICEBE.2012.65","DOIUrl":"https://doi.org/10.1109/ICEBE.2012.65","url":null,"abstract":"With the rapid growth of the number of electronic transactions conducted over the Internet, recommender systems have been proposed to provide consumers with personalized product recommendations. A hybrid symbolic and quantitative approach for recommender agent systems is promising because it can improve the recommender agents' prediction effectiveness, learning autonomy, and explanatory power. However, recommender agents must be empowered with sufficient domain-specific knowledge so as to reason about specific recommendation contexts to improve their prediction accuracy. This paper illustrates a novel text mining method which is applied to automatically extract domain-specific knowledge for context-aware recommendations. According to our preliminary experiments, recommender agents empowered by the text mining mechanism outperform the agents without text mining capabilities. To our best knowledge, this is the first study of integrating text mining method into a symbolic logical framework for the development of recommender agents.","PeriodicalId":166304,"journal":{"name":"2012 IEEE Ninth International Conference on e-Business Engineering","volume":"1037 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116270043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Linear Modelling and Optimization to Evaluate Customer Satisfaction and Loyalty 顾客满意度和忠诚度评价的线性建模和优化
2012 IEEE Ninth International Conference on e-Business Engineering Pub Date : 2012-09-09 DOI: 10.1109/ICEBE.2012.32
Alireza Faed, O. Hussain, Mehdi Faed, Z. Saberi
{"title":"Linear Modelling and Optimization to Evaluate Customer Satisfaction and Loyalty","authors":"Alireza Faed, O. Hussain, Mehdi Faed, Z. Saberi","doi":"10.1109/ICEBE.2012.32","DOIUrl":"https://doi.org/10.1109/ICEBE.2012.32","url":null,"abstract":"In this study, a conceptual framework is postulated to mathematically evaluate and ascertain the hypothesised relationship that perceived value and interactivity has with customer dissatisfaction issues. Then, the relationship between customer satisfaction issues and loyalty and customer acquisition, will be tested to enhance customer satisfaction and loyalty. For the qualitative part of the research, an interview survey was conducted of 40 employees at the Fremantle port of Western Australia and the collected data was analysed using NVivo. In the second data collection phase, a survey questionnaire was distributed to 60 port customers. Using data envelopment analysis (DEA), the important and most important customers were selected from the sample. In the final stage, utilising linear modelling, a positive association between the variables was established. Our results illustrated that all of the antecedents and consequences of customer satisfaction issues positively affect the issues. All of the activities were conducted under i-CRM control.","PeriodicalId":166304,"journal":{"name":"2012 IEEE Ninth International Conference on e-Business Engineering","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122774454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Dynamic Selection of Services under Temporal Constraints in Cloud Computing 云计算中时间约束下的服务动态选择
2012 IEEE Ninth International Conference on e-Business Engineering Pub Date : 2012-09-09 DOI: 10.1109/ICEBE.2012.48
Yanhua Du, Xiaofei Wang, Lifeng Ai, Xitong Li
{"title":"Dynamic Selection of Services under Temporal Constraints in Cloud Computing","authors":"Yanhua Du, Xiaofei Wang, Lifeng Ai, Xitong Li","doi":"10.1109/ICEBE.2012.48","DOIUrl":"https://doi.org/10.1109/ICEBE.2012.48","url":null,"abstract":"To guarantee the successful execution of service based process, one important requirement is QoS-driven dynamic selection of candidate services. The existing methods fail to consider the temporal constraints in build-time, and dynamic re-planning of execution plans in run-time. In this paper, we propose a novel penalty-based genetic algorithm to dynamically select the services for service based process under temporal constraints. Our approach can efficiently select the appropriate services in practical business environment. Furthermore, if some temporal constraints are violated in run-time, we provide solutions to re-plan them so that the violations can be resolved. This approach is particularly applicable and efficient for large-scale and complex processes. Finally, a prototype system has been developed to support the automatically execution of our approach.","PeriodicalId":166304,"journal":{"name":"2012 IEEE Ninth International Conference on e-Business Engineering","volume":"26 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113978989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Iaas Cloud Selection using MCDM Methods 使用MCDM方法选择Iaas云
2012 IEEE Ninth International Conference on e-Business Engineering Pub Date : 2012-09-09 DOI: 10.1109/ICEBE.2012.47
Z. Rehman, O. Hussain, F. Hussain
{"title":"Iaas Cloud Selection using MCDM Methods","authors":"Z. Rehman, O. Hussain, F. Hussain","doi":"10.1109/ICEBE.2012.47","DOIUrl":"https://doi.org/10.1109/ICEBE.2012.47","url":null,"abstract":"The popularity of cloud computing and IaaS has spawned numerous cloud service providers which offer various cloud services, including IaaS, to cloud users. These services vary considerably in terms of their performance and cost and the selection of a suitable cloud service becomes a complex decision making issue for a cloud service user. Furthermore, the cloud services have several attributes all of which are the criteria that have to be taken into account when making a service selection decision. In the presence of these multiple criteria, a compromise has to be made because in most real-world situations, no single service exceeds all other services in all criteria but one service may be better in terms of some of the criteria while other services may outperform it if judged on the basis of the remaining criteria. Multi-criteria decision-making is a sub-field in operations research that deals with the techniques to solve such multi-criteria problems. There are several methods of multicriteria decision-making. In this paper, we use key multi-criteria decision-making methods for IaaS cloud service selection in a case study which contains five basic performance measurements of thirteen cloud services by a third party monitoring service. We demonstrate the use of these multi-criteria methods for cloud service selection and compare the results obtained by using each method to find out how the choice of a particular MCDM method affects the outcome of the decision-making process for IaaS cloud service selection.","PeriodicalId":166304,"journal":{"name":"2012 IEEE Ninth International Conference on e-Business Engineering","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132916038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 91
Automation System for Validation of Configuration and Security Compliance in Managed Cloud Services 管理云服务中配置和安全合规性验证的自动化系统
2012 IEEE Ninth International Conference on e-Business Engineering Pub Date : 2012-09-09 DOI: 10.1109/ICEBE.2012.53
T. Chieu, Manas Singh, Chunqiang Tang, M. Viswanathan, Ashu Gupta
{"title":"Automation System for Validation of Configuration and Security Compliance in Managed Cloud Services","authors":"T. Chieu, Manas Singh, Chunqiang Tang, M. Viswanathan, Ashu Gupta","doi":"10.1109/ICEBE.2012.53","DOIUrl":"https://doi.org/10.1109/ICEBE.2012.53","url":null,"abstract":"Validation of configuration and security compliance at the time of creating new service is an important part of service management process and governance in most IT delivery organizations. It is performed to ensure that security risks, governance controls and vulnerabilities are proactively managed through the lifecycle of the services, and to guarantee that all discovered problems and issues are addressed and remediated for quality assurance before the services are delivered to customers. The validation process is complex and is typically carried out by following a checklist with questions and answers through manual steps that are time consuming and error prone. This lengthy process is particularly troublesome when providing managed cloud services to enterprise customers with a pre-specified request fulfillment time in SLA. In order to improve the timeliness and quality of cloud services, we have introduced an automation system to orchestrate the validation process with executable scripts to be executed against the services. We will describe a novel policy mechanism to capture exception rules for eliminating possible interference in security configuration contained in the scripts. We will explain how our system is designed and implemented to fulfill the needs of large enterprises from both the service provider's and the service consumer's vantage points.","PeriodicalId":166304,"journal":{"name":"2012 IEEE Ninth International Conference on e-Business Engineering","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132130082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信