共查询到20条相似文献,搜索用时 0 毫秒
1.
The proliferation of powerful smartphone devices provides a great opportunity for context-aware mobile applications becoming mainstream. However, we argue that conventional software development techniques suffer because of the added complexity required for collecting and managing context information. This paper presents a component-based middleware architecture which facilitates the development and deployment of context-aware applications via reusable components. The main contribution of this approach is the combination of a development methodology with the middleware architecture, which together bring significant value to developers of context-aware applications. Further contributions include the following: The methodology utilizes separation of concerns, thus decreasing the developmental cost and improving the productivity. The design and implementation of context-aware applications are also eased via the use of reusable components, called context plug-ins. Finally, the middleware architecture facilitates the deployment and management of the context plug-ins in a resource-aware manner. The proposed methodology and middleware architecture are evaluated both quantitatively and qualitatively. 相似文献
2.
3.
As RFID chips and smart cards become pervasive, the need for strong security measures will increase. At the Sakamura Laboratory, we have developed an architecture that seeks to provide a type of lock-and-key protection to distributed systems. This architecture securely stores information used in a commercial transaction and exchanges information via the digital information infrastructure. A tamper-resistant chip is at the core of this architecture, called eTRON (Entity TRON). The authors outline the eTRON research project 相似文献
4.
5.
6.
The communication process is very easy today due to the rapid growth of information technology. In addition, the development of cloud computing technology makes it easier than earlier days by facilitating the large volume of data exchange anytime and from anywhere in the world. E-businesses are successfully running today due to the development of cloud computing technology. Specifically in cloud computing, cloud services are providing enormous support to share the resources and data in an efficient way with less cost expenses for businessmen. However, security is an essential issue for cloud users and services. For this purpose, many security policies have been introduced by various researchers for enhancing the security in e-commerce applications. However, the available security policies are also failing to provide the secured services in the society and e-commerce applications. To overcome this disadvantage, we propose a new policy-oriented secured service model for providing the security of the services in the cloud. The proposed model is the combination of a trust aware policy scheduling algorithm and an effective and intelligent re-encryption scheme. Here, the dynamic trust aware policy-oriented service for allocating the cloud user’s request by the cloud service provider and an effective and re-encryption scheme is used that uses intelligent agent for storing the data in the cloud database securely. The proposed model assures the scalability, reliability, and security for the stored e-commerce data and service access. 相似文献
7.
8.
随着各种智能手机的普及使用,传统的电话呼叫中心结合分布众多的营业厅模式已经无法满足3G移动手机用户多样化的服务需求。3G移动互联网客户服务平台将建立一个基于3G移动互联网的客户服务体系,通过3G移动互联网的方式向用户提供贴心服务,以文字、图片、演示视频、对讲、在线视频等服务方式远程指导、解答、协助解决用户在使用产品过程中遇到的实际困难和问题。 相似文献
9.
A software architecture for open service gateways 总被引:1,自引:0,他引:1
《Internet Computing, IEEE》2001,5(1):64-70
Two industrial trends are changing our day-to-day lives. One is the introduction of broadband service to the home, where it promises to deliver complex new services. The other is the increasing resourcefulness, connectedness, and intelligence of home appliances. A residential gateway is a networking device that creates a bridge between the broadband network and the in-home network, and between different networking technologies within the home. The article gives an overview of this emerging marketplace, and introduces the work ongoing at the Open Service Gateway initiative. OSG1 is defining a set of open-standard software application interfaces (APIs) for building open-service gateways, including residential gateways 相似文献
10.
11.
12.
中小企业电子商务平台建设研究 总被引:1,自引:0,他引:1
本文对中小企业电子商务系统进行详细的、系统的分析,集成SOA技术、流程引擎技术、CA安全技术研发中小企业电子商务平台,并通过SaaS模式为本地区中小企业提供B2B和B2C电子商务服务,采用RatlOnal统一过程(RUP)为软件开发方法,以统一建模语言(UML)为分析设计描述语言,以JZEE为技术平台,完成了系统的架构设计和详细设计,并最终设计出了一个跨区域、跨平台的,包含信息展示、后台管理、商务中心三个子系统的面向中小企业的电子商务系统. 相似文献
13.
This paper presents an interdisciplinary systems approach to service modeling, design and deployment. The study is based on a longitudinal case study of the development process of a complex logistic service system based on an advanced logistics model. The case examines the development of a Virtual Enterprise Architecture (VEA) for an automatic high-speed transport and sorting system applied in airports for baggage handling. The study traces the evolution of the system from the early conceptual phases to a successful commercial service deployed at Changi, Singapore Airport. The study is conducted using a retrospective analysis of the case using a design science research approach. The paper evaluates and discusses the issues of creating and designing a new complex logistics service, distinct from the physical product, based on an advanced discrete event-based simulation model. The paper concludes by presenting a generalized and validated conceptual framework for a VEA based on an advanced simulation model. The paper thus contributes to the field of service systems and service management by identifying a novel approach to effective design of a new service. 相似文献
14.
由于分布式电子商务的特殊性,现有的对等网搜索机制无法有效地被应用。因此提出了一种面向电子商务的服务发现系统,这个系统可以是一个两层的结构,上层由许多的电子商务域组成一个基于DHT的结构,而下层则是每个商务域中的相关节点组成的非结构化拓扑,采用成熟节点搜索算法。同时,还提出了一个两层之间的连接节点结构。最后,描述了实验并分析了实验数据。 相似文献
15.
Mail order systems offer a convenient purchase service, in which buyers need not visit the store physically and instead choose what they want via a table of contents. Without a third party to play the roles of verifier and recorder, however, buyers face a potential problem of being cheated by a malicious seller. Thus, we aim to develop a mail order system over the Internet that can guarantee user anonymity and secrecy during the transaction process. The low computation of the mutual authentication between the parties involved contributes to the practicality of this new system, while the correctness of this process can be confirmed by the BAN logic model. 相似文献
16.
Valeria De Antonellis Michele Melchiori Luca De Santis Massimo Mecella Enrico Mussi Barbara Pernici Pierluigi Plebani 《Software》2006,36(2):191-223
Web service composition is emerging as an interesting approach to integrate business applications and create intra‐organizational business processes. Single Web services are combined to create a complex Web service that will realize the process business logic. Once the process is created, it is executed by an orchestration engine that invokes individual Web services in the correct order. However, Web services composing the workflow sometimes become unavailable during the run‐time phase, blocking process execution. This paper describes an architecture that allows the flexible orchestration of business processes. With this approach, Web services composing the process can be automatically substituted with other compatible Web services during process execution. A methodology is defined to evaluate Web service compatibility based on interface matching, in order to select substitutable Web services. Copyright © 2005 John Wiley & Sons, Ltd. 相似文献
17.
Luciano Baresi Matteo Miraz Pierluigi Plebani 《Service Oriented Computing and Applications》2016,10(1):1-17
Although the definition of service-oriented architecture (SOA) included the presence of a service registry from the beginning, the first implementations (e.g., UDDI) did not really succeed mainly because of security and governance issues. This article tackles the problem by introducing DREAM (Distributed Registry by ExAMple): a publish/subscribe-based solution to integrate existing, different registries, along with a match-making approach to ease the publication and retrieval of services. DREAM fosters the interoperability among registry technologies and supports UDDI, ebXML Registry, and other registries. The publish/subscribe paradigm allows service providers to decide the services they want to publish, and requestors to be informed of the services that satisfy their interests. As for the match-making, DREAM supports different ways to evaluate the matching between published and required services. Besides presenting the architecture of DREAM and the different match-making opportunities, the article also describes the experiments conducted to evaluate proposed solutions. 相似文献
18.
Victor W. Chu Raymond K. Wong Chi-Hung Chi Wei Zhou Ivan Ho 《Information Systems Frontiers》2017,19(6):1283-1299
Devices embedded with position tracking facilities are now widely available, such as smartphones, smartwatches, vehicle location trackers, etc. However, data mining and advanced analytics are rarely bundled with these devices that limits their utility. In this paper, we present the design of a generic, programmable position tracking platform, namely CQtracker. In particular, this platform is incorporated with a cloud-based engine of advanced analytics. CQtracker is constructed based on a concept of system-of-systems service architecture to deliver data-system-as-a-service. It is designed for the consumption by a variety of spatio-temporal applications. Spatio-temporal data exhibit strong heterogeneous patterns, data sparseness and distribution skewness. Hence, they are difficult to analyze. CQtracker reveals relationships and structures from these data by self-regularized time-varying dynamic Bayesian networks. In addition, a Bayesian parameter estimation approach is applied to an epidemic model for outbreak predictions. Sample applications are presented in this paper, in which CQtracker successfully reveals the evolution of time-varying structures from traffic trajectories. 相似文献