2009 IEEE Conference on Commerce and Enterprise Computing最新文献

筛选
英文 中文
A Business Model for Mobile Ad-Hoc Communities 移动Ad-Hoc社区的商业模式
2009 IEEE Conference on Commerce and Enterprise Computing Pub Date : 2009-07-20 DOI: 10.1109/CEC.2009.73
Stefan Stieglitz, Christoph Fuchß, Christoph Lattemann
{"title":"A Business Model for Mobile Ad-Hoc Communities","authors":"Stefan Stieglitz, Christoph Fuchß, Christoph Lattemann","doi":"10.1109/CEC.2009.73","DOIUrl":"https://doi.org/10.1109/CEC.2009.73","url":null,"abstract":"Portable devices with Bluetooth interfaces, such as mobile phones and PDAs, are enabled for near field communication (","PeriodicalId":384060,"journal":{"name":"2009 IEEE Conference on Commerce and Enterprise Computing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124001189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A QoS-Driven Approach for Semantic Service Composition 语义服务组合的qos驱动方法
2009 IEEE Conference on Commerce and Enterprise Computing Pub Date : 2009-07-20 DOI: 10.1109/CEC.2009.44
Yixin Yan, Bin Xu, Zhifeng Gu, Sen Luo
{"title":"A QoS-Driven Approach for Semantic Service Composition","authors":"Yixin Yan, Bin Xu, Zhifeng Gu, Sen Luo","doi":"10.1109/CEC.2009.44","DOIUrl":"https://doi.org/10.1109/CEC.2009.44","url":null,"abstract":"Semantic information, which is well-regulated and easy to be retrieved, has greatly enriched the expressive ability of the Web. These advantages can be applied in Web Services to meet the increasing complexity of Web applications. In this paper, we propose a service composition approach. It combines the large-scaled Web Services and semantic information which is described in WSC’09. Besides, QoS has become a critical issue to evaluate the performance of Web applications. Being different from improving the QoS of single services, our approach focuses on the overall QoS of the service composition. The algorithm shows that the semantic information based and QoS driven approach improves the efficiency and QoS performance of service composition.","PeriodicalId":384060,"journal":{"name":"2009 IEEE Conference on Commerce and Enterprise Computing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115658692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Privacy Application Infrastructure: Confidential Data Masking 隐私应用程序基础结构:机密数据屏蔽
2009 IEEE Conference on Commerce and Enterprise Computing Pub Date : 2009-07-20 DOI: 10.1109/CEC.2009.43
B. Liver, K. Tice
{"title":"Privacy Application Infrastructure: Confidential Data Masking","authors":"B. Liver, K. Tice","doi":"10.1109/CEC.2009.43","DOIUrl":"https://doi.org/10.1109/CEC.2009.43","url":null,"abstract":"Handling of confidential and sensitive data is an important issue facing any professional service provider that wishes to use services from a third party company. This paper describes an infrastructure, the Privacy Infrastructure Appliance that was designed to protect confidential information when outsourcing service fulfillment. A comparison is made with an embedded solution that does not use an infrastructure.There are two use cases to consider, one use case is the outsourcing of back-end service fulfillment, such as executing foreign exchange trade orders and the second use case is the outsourcing of back-office activities, such as non-core competence office work. In considering back-end service delivery, we look at the use of computer systems and processes, which are not privy to confidential information. In considering back-office clerical activities, we look at the human component of service fulfillment, the clerical office worker. The clerical office worker that is outsourced, will still use the applications of the outsourcing company, but he is no longer privy to confidential information. This paper describes and contrasts two solutions. An infrastructure that was built to meet confidential information requirements for doing outsourcing of solution delivery systems and an application approach to mask confidential information from outsourced back office workers.","PeriodicalId":384060,"journal":{"name":"2009 IEEE Conference on Commerce and Enterprise Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128699705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Structural Aspects of Business Process Diagram Abstraction 业务流程图抽象的结构方面
2009 IEEE Conference on Commerce and Enterprise Computing Pub Date : 2009-07-20 DOI: 10.1109/CEC.2009.18
S. Smirnov
{"title":"Structural Aspects of Business Process Diagram Abstraction","authors":"S. Smirnov","doi":"10.1109/CEC.2009.18","DOIUrl":"https://doi.org/10.1109/CEC.2009.18","url":null,"abstract":"As companies more and more often turn todocumenting their business processes in models, the task ofmanaging large model collections becomes essential. Thereis a number of techniques simplifying this task, e.g., constructionof customized process views and business processmodel abstraction. The latter aims at deriving abstract processrepresentations from existing low-level models omitting detailsirrelevant for the current task. A number of papers on processmodel abstraction conceptualized the abstraction problem andproposed algorithms handling simplistic models. To the bestof our knowledge there is no work discussing abstraction ofmodels in BPMN. In this paper we present an abstractionapproach, addressing specific features of BPMN 1.2. Theabstraction approach is order-preserving and is capable ofhandling graph-structured process models.","PeriodicalId":384060,"journal":{"name":"2009 IEEE Conference on Commerce and Enterprise Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125316111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Nash Bargaining Based Ad Networks for Sponsored Search Auctions 基于纳什议价的赞助搜索拍卖广告网络
2009 IEEE Conference on Commerce and Enterprise Computing Pub Date : 2009-07-20 DOI: 10.1109/CEC.2009.46
R. Kannan, Dinesh Garg, Karthik Subbian, Y. Narahari
{"title":"Nash Bargaining Based Ad Networks for Sponsored Search Auctions","authors":"R. Kannan, Dinesh Garg, Karthik Subbian, Y. Narahari","doi":"10.1109/CEC.2009.46","DOIUrl":"https://doi.org/10.1109/CEC.2009.46","url":null,"abstract":"In this paper, we consider an emerging scenario in sponsored web search auctions where ad networks would be involved as intermediaries between a search engine and its advertisers. In this context, we address the problem of the ad network identifying a bid profile that makes the sponsored search auction attractive to the registered bidders. Given (1) the valuation of the advertisers competing for sponsored slots corresponding to a keyword, and (2) relevant click-through rates, the proposed algorithm generates a bid profile that can be input to a standard generalized second price based sponsored search auction mechanism. The bid profile is derived using a two person Nash bargaining model which ensures a fair share of utility between the search engine and the advertisers. In the proposed model, the auctioneer (search engine) is one player and a virtual aggregated bidder representing all the $n$ advertisers is the other player. We show that the feasible set for the Nash bargaining formulation is a convex hull with three points that can be computed in $O(nlogn)$ time. We derive the Nash bargaining solution and show that it can be mapped to a bid profile of the bidders in $O(n)$ time.","PeriodicalId":384060,"journal":{"name":"2009 IEEE Conference on Commerce and Enterprise Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125360860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Business Intelligence Methodology for E-government Reverse Auctions 电子政务逆向拍卖的商业智能方法
2009 IEEE Conference on Commerce and Enterprise Computing Pub Date : 2009-07-20 DOI: 10.1109/CEC.2009.37
Rafael Souza, A. Pereira
{"title":"A Business Intelligence Methodology for E-government Reverse Auctions","authors":"Rafael Souza, A. Pereira","doi":"10.1109/CEC.2009.37","DOIUrl":"https://doi.org/10.1109/CEC.2009.37","url":null,"abstract":"In the first quarter of year 2008, electronic reverseauctions (e-RAs) allowed the Brazilian Government tosave up to US$ 270 million, which account for 87% ofits acquisitions in the period, against 1% in the sameperiod 6 years earlier – according to the Ministry ofPlanning, Budget and Management. A tool of suchimportance is subjected to fraud or even anomalousbehaviors, which are difficult to detect with simpleanalysis over the current system. In this paper we lookforward into identifying suspicious behaviors in egovernmentprocurement systems, through the use ofbusiness intelligence techniques. The results confirmthat our methodology can help discovering interestingaspects that can be used to help market players indecision support and auctioneer’s management.","PeriodicalId":384060,"journal":{"name":"2009 IEEE Conference on Commerce and Enterprise Computing","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121311152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Guaranteeing Soundness of Configurable Process Variants in Provop 保证Provop中可配置过程变量的正确性
2009 IEEE Conference on Commerce and Enterprise Computing Pub Date : 2009-07-20 DOI: 10.1109/CEC.2009.62
Alena Hallerbach, T. Bauer, M. Reichert
{"title":"Guaranteeing Soundness of Configurable Process Variants in Provop","authors":"Alena Hallerbach, T. Bauer, M. Reichert","doi":"10.1109/CEC.2009.62","DOIUrl":"https://doi.org/10.1109/CEC.2009.62","url":null,"abstract":"Usually, for a particular business process a multitude of variants exist. Each of them constitutes an adjustment of a reference process model to specific requirements building the process context. While some progress has been achieved regarding the configuration of process variants, there exists only little work on how to accomplish this in a sound and efficient manner, especially when considering the large number of process variants that exist in practice as well as the many syntactical and semantical constraints they have to obey. In this paper we discuss advanced concepts for the context- and constraint-based configuration of process variants, and show how they can be utilized to ensure soundness of the configured process variants. Enhancing process-aware information systems with the capability to easily configure sound process models, belonging to the same process family and fitting to the given application context, will enable a new quality in engineering process-aware information systems.","PeriodicalId":384060,"journal":{"name":"2009 IEEE Conference on Commerce and Enterprise Computing","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125660525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 86
A Heuristic Approach for Capacity Control in Clouds 云中容量控制的一种启发式方法
2009 IEEE Conference on Commerce and Enterprise Computing Pub Date : 2009-07-20 DOI: 10.1109/CEC.2009.20
Arun Anandasivam, Stefan Buschek, R. Buyya
{"title":"A Heuristic Approach for Capacity Control in Clouds","authors":"Arun Anandasivam, Stefan Buschek, R. Buyya","doi":"10.1109/CEC.2009.20","DOIUrl":"https://doi.org/10.1109/CEC.2009.20","url":null,"abstract":"Cloud resource providers in a market face dynamic and unpredictable consumer behavior. The way, how prices are set in a dynamic environment, can influence the demand behavior of price sensitive customers. A Cloud resource provider has to decide on how to allocate his scarce resources in order to maximize his profit. The application of bid price control for evaluating incoming service requests is a common approach for capacity control in network revenue management. In this paper we introduce a customized version of the concept of selfadjusting bid prices and apply it to the area of Cloud Computing. Furthermore, we perform a simulation in order to test the efficiency of the proposed model.","PeriodicalId":384060,"journal":{"name":"2009 IEEE Conference on Commerce and Enterprise Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125638592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Key Issues in EA-Implementation: Case Study of Two Finnish Government Agencies 环境评估执行中的关键问题:两个芬兰政府机构的案例研究
2009 IEEE Conference on Commerce and Enterprise Computing Pub Date : 2009-07-20 DOI: 10.1109/CEC.2009.70
Ville Seppänen, J. Heikkilä, Katja Liimatainen
{"title":"Key Issues in EA-Implementation: Case Study of Two Finnish Government Agencies","authors":"Ville Seppänen, J. Heikkilä, Katja Liimatainen","doi":"10.1109/CEC.2009.70","DOIUrl":"https://doi.org/10.1109/CEC.2009.70","url":null,"abstract":"Enterprise Architecture (EA) is getting more common also in public sector as a means to ensure ‘business’ and IT alignment. This study reports a follow-up and theme interviews of the key actors/informants in two EA projects in public administration offices during and half year after the projects were completed. The early experience shows that the process of establishing a government EA is a tedious and complicated process and this study considers the root causes. Three set of factors are found hindering EA’s potential to operate as a strategic alignment tool: lack of establishing proper EA governance, insufficient support for the development, and inadequate resources to do the former two.","PeriodicalId":384060,"journal":{"name":"2009 IEEE Conference on Commerce and Enterprise Computing","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133700575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 71
Stability and Efficiency of Social Networks with Strategic, Resource Constrained Nodes 具有战略性资源约束节点的社会网络的稳定性和效率
2009 IEEE Conference on Commerce and Enterprise Computing Pub Date : 2009-07-20 DOI: 10.1109/CEC.2009.59
Ramasuri Narayanam, Y. Narahari
{"title":"Stability and Efficiency of Social Networks with Strategic, Resource Constrained Nodes","authors":"Ramasuri Narayanam, Y. Narahari","doi":"10.1109/CEC.2009.59","DOIUrl":"https://doi.org/10.1109/CEC.2009.59","url":null,"abstract":"Recently, the topic of social network formation has received significant attention since the structure of thenetworks has a profound impact on the economic outcomes inmany real world applications such as large exchange markets, sponsored search auctions, and viral marketing. Stability and efficiency are two important properties which are sought in such networks. These two properties are both desirable but not always compatible. This paper investigates the tradeoff between stability and efficiency in a noncooperative game model of social network formation. In our model, we consider network formation in which each node can form at most k links due toscarcity of the resources. We formulate the network formation process as a strategic form game.We view the notion of stability as obtaining a Nash equilibrium outcome and efficiency as maximizing the value of the network. In this setting, we show that all efficient networks are stable in both the cases: (i) k = 1 and (ii) k = 2.","PeriodicalId":384060,"journal":{"name":"2009 IEEE Conference on Commerce and Enterprise Computing","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133134196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信