首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 437 毫秒
1.
移动商务与基于位置服务的发展,使得移动网络中用户之间进行服务拍卖成为可能.交易双方之间的信任评估对移动网络中的服务选择起重要作用.面向移动服务拍卖的信任管理是一种基于信誉模型,通过度量反馈偏移度均值作为反馈可靠度,进行交易反馈的加权.而与在线商品拍卖相比,移动服务交易信任评估更依赖于交易环境,所以模型中融入包括交易时间、地点、交易额度的环境上下文因素,实现了一种不同上下文动态信任映射机制.仿真结果表明,与传统基于信誉的信任计算方法相比,该模型能降低对恶意节点、诚信节点,以及全局信任评估的误差值,并能有效抵抗节点利用低风险交易进行信任欺诈.  相似文献   

2.
移动商务的好处移动商务是通过移动通信网络进行数据传输并利用移动通信终端开展商务活动的电子商务模式.随着通信技术和手持终端的快速发展,移动商务正在逐渐进入人们的生活.不少用户已经开始利用手机下载条码识读程序,用手机摄像头拍下商品条码,然后程序可以立刻搜索并显示商品价格信息.用户还可以通过移动商务创建和存储购物列表,扫描产品条码进行产品信息比对,获取优惠券和促销信息等.对于消费者来说,移动商务可以使生活更轻松.  相似文献   

3.
移动支付是移动电子商务的重要组成部分,而安全性成为移动支付的发展瓶颈,因此电子商务协议的安全性成为此问题的核心。为了解决上述问题,使用串空间模型的测试理论,对SET协议中用户和商家、商家和支付网关之间的认证性进行形式化分析,分析结果表明商家与支付网关之间的认证是安全的;用户和商家的认证性不满足安全需求,在支付交易流程中双方易受到攻击。  相似文献   

4.
随着移动网络的快速发展,移动商务成为21世纪最热门的话题之一;社会对移动商务人才需求量十分巨大,但高校在移动商务人才培养中并不能很好地满足社会与移动商务行业的需求。本文分析了目前社会对移动商务人才需求的迫切性,研究了移动互联网络环境下的电子商务专业课程与实践环境的构建方法。  相似文献   

5.
在网上交易中,针对传统的信用度评估方法不能有效地描述商家信用度的时效性和风险性等特征的问题,提出基于多属性正态云的信任评估方法.首先生成包含5个等级的信任基云;然后引入时间衰减因子,分别从平均水平和变化率两个角度描述商家信用度历史信息,生成对应的声誉云和风险云;最后,由声誉云和风险云合成综合信任云,并计算其信任等级及信任分值.实验结果表明,该评估模型具有可行性和有效性,可为用户提供直观、有效的信任决策依据.  相似文献   

6.
《数码世界》2004,3(9):51-52
随着笔记本电脑市场规模以及用户群体的扩大,笔记本电脑在商务应用中越来越广泛.笔记本电脑之所以能够成为许多商务人士移动办公的宠儿,其便携性特征功不可没.不过,笔记本电脑技术的发展和用户应用需求的提升,便携的笔记本不足以说明笔记本带给商务人士的帮助.  相似文献   

7.
移动商务是无线通信网络与信息交流、商务互动相结合的新兴业务领域。主要介绍了北京联通在移动商务应用大众用户市场以及企业用户市场的发展情况。  相似文献   

8.
作为移动通信和互联网结合的产物,移动互联网发展十分迅速,移动互联网的应用也呈现出多元化发展的态势。在对使用情景理论等相关文献进行梳理后,通过使用CATI电话调查系统和SPASS统计软件,分析研究了情景对移动互联网应用选择的影响。研究发现:移动互联网的普及率仍不高;移动互联的用户有着显著的人口结构特征;即时通信类应用的使用率远远高于其他应用,商务类应用的使用率相对较低;家庭是移动互联网用户最主要的使用情景。  相似文献   

9.
信任基石PKI     
电子商务成了计算机、商务时代宣言的时候,我们却几近遇到了一个两难的问题:一般人担心信用卡被盗用,不信任网络也不完全信任商家;商家则担心网络欺诈行为,也不能完全信任客户。PKI(Public Key Infrastructure)公共密钥基础设施这一标准便是电子商务安全蓝图的基础,成为彼此信任的基石。  相似文献   

10.
随着电子商务技术的逐渐成熟,实施移动化成为企业考虑的重点和未来发展的趋势.在移动商务中使用Web服务,是目前较新较可行的方式,提出了一个.NET环境下的基于Web服务的B2E(企业对员工)移动商务平台的设计架构,此平台功能包括任务管理、个人事务管理、客户资料管理、订单查询等功能,采用三层结构进行设计,用户可以使用手机、PDA或桌上型浏览器,使用本平台提供的服务,以达到移动商务的目的.  相似文献   

11.
Abstract This paper describes an approach to the design of interactive multimedia materials being developed in a European Community project. The developmental process is seen as a dialogue between technologists and teachers. This dialogue is often problematic because of the differences in training, experience and culture between them. Conditions needed for fruitful dialogue are described and the generic model for learning design used in the project is explained.  相似文献   

12.
European Community policy and the market   总被引:1,自引:0,他引:1  
Abstract This paper starts with some reflections on the policy considerations and priorities which are shaping European Commission (EC) research programmes. Then it attempts to position the current projects which seek to capitalise on information and communications technologies for learning in relation to these priorities and the apparent realities of the marketplace. It concludes that while there are grounds to be optimistic about the contribution EC programmes can make to the efficiency and standard of education and training, they are still too technology driven.  相似文献   

13.
融合集成方法已经广泛应用在模式识别领域,然而一些基分类器实时性能稳定性较差,导致多分类器融合性能差,针对上述问题本文提出了一种新的基于多分类器的子融合集成分类器系统。该方法考虑在度量层融合层次之上通过对各类基多分类器进行动态选择,票数最多的类别作为融合系统中对特征向量识别的类别,构成一种新的自适应子融合集成分类器方法。实验表明,该方法比传统的分类器以及分类融合方法识别准确率明显更高,具有更好的鲁棒性。  相似文献   

14.
Development of software intensive systems (systems) in practice involves a series of self-contained phases for the lifecycle of a system. Semantic and temporal gaps, which occur among phases and among developer disciplines within and across phases, hinder the ongoing development of a system because of the interdependencies among phases and among disciplines. Such gaps are magnified among systems that are developed at different times by different development teams, which may limit reuse of artifacts of systems development and interoperability among the systems. This article discusses such gaps and a systems development process for avoiding them.  相似文献   

15.
This paper presents control charts models and the necessary simulation software for the location of economic values of the control parameters. The simulation program is written in FORTRAN, requires only 10K of main storage, and can run on most mini and micro computers. Two models are presented - one describes the process when it is operating at full capacity and the other when the process is operating under capacity. The models allow the product quality to deteriorate to a further level before an existing out-of-control state is detected, and they can also be used in situations where no prior knowledge exists of the out-of-control causes and the resulting proportion defectives.  相似文献   

16.
Going through a few examples of robot artists who are recognized worldwide, we try to analyze the deepest meaning of what is called “robot art” and the related art field definition. We also try to highlight its well-marked borders, such as kinetic sculptures, kinetic art, cyber art, and cyberpunk. A brief excursion into the importance of the context, the message, and its semiotics is also provided, case by case, together with a few hints on the history of this discipline in the light of an artistic perspective. Therefore, the aim of this article is to try to summarize the main characteristics that might classify robot art as a unique and innovative discipline, and to track down some of the principles by which a robotic artifact can or cannot be considered an art piece in terms of social, cultural, and strictly artistic interest. This work was presented in part at the 13th International Symposium on Artificial Life and Robotics, Oita, Japan, January 31–February 2, 2008  相似文献   

17.
Although there are many arguments that logic is an appropriate tool for artificial intelligence, there has been a perceived problem with the monotonicity of classical logic. This paper elaborates on the idea that reasoning should be viewed as theory formation where logic tells us the consequences of our assumptions. The two activities of predicting what is expected to be true and explaining observations are considered in a simple theory formation framework. Properties of each activity are discussed, along with a number of proposals as to what should be predicted or accepted as reasonable explanations. An architecture is proposed to combine explanation and prediction into one coherent framework. Algorithms used to implement the system as well as examples from a running implementation are given.  相似文献   

18.
This paper provides the author's personal views and perspectives on software process improvement. Starting with his first work on technology assessment in IBM over 20 years ago, Watts Humphrey describes the process improvement work he has been directly involved in. This includes the development of the early process assessment methods, the original design of the CMM, and the introduction of the Personal Software Process (PSP)SM and Team Software Process (TSP){SM}. In addition to describing the original motivation for this work, the author also reviews many of the problems he and his associates encountered and why they solved them the way they did. He also comments on the outstanding issues and likely directions for future work. Finally, this work has built on the experiences and contributions of many people. Mr. Humphrey only describes work that he was personally involved in and he names many of the key contributors. However, so many people have been involved in this work that a full list of the important participants would be impractical.  相似文献   

19.
基于复小波噪声方差显著修正的SAR图像去噪   总被引:4,自引:1,他引:3  
提出了一种基于复小波域统计建模与噪声方差估计显著性修正相结合的合成孔径雷达(Synthetic Aperture Radar,SAR)图像斑点噪声滤波方法。该方法首先通过对数变换将乘性噪声模型转化为加性噪声模型,然后对变换后的图像进行双树复小波变换(Dualtree Complex Wavelet Transform,DCWT),并对复数小波系数的统计分布进行建模。在此先验分布的基础上,通过运用贝叶斯估计方法从含噪系数中恢复原始系数,达到滤除噪声的目的。实验结果表明该方法在去除噪声的同时保留了图像的细节信息,取得了很好的降噪效果。  相似文献   

20.
Abstract  This paper considers some results of a study designed to investigate the kinds of mathematical activity undertaken by children (aged between 8 and 11) as they learned to program in LOGO. A model of learning modes is proposed, which attempts to describe the ways in which children used and acquired understanding of the programming/mathematical concepts involved. The remainder of the paper is concerned with discussing the validity and limitations of the model, and its implications for further research and curriculum development.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号