• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 7
  • 4
  • 1
  • Tagged with
  • 13
  • 13
  • 13
  • 13
  • 8
  • 7
  • 6
  • 6
  • 5
  • 5
  • 4
  • 4
  • 4
  • 4
  • 4
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Using an intelligent self-service solution to support telecommunication service provisioning

Barlow, Sherwin Riaan January 2012 (has links)
The increasing competition between telecommunication service providers (TSPs) and the large amounts of human resource costs incurred to provision telecommunication services to small, medium and micro enterprises (SMMEs), highlight the need for effective self-service provisioning methods to reduce costs. Existing service provisioning methods do not effectively support SMMEs in the service provisioning process. The current methods used are manual and Web-based. The manual service provisioning method is labour and time-intensive. TSPs are being forced to cut human resource costs as the profit margins for provisioning services are narrow due to competition. The current web-based systems do not allow SMMEs to effectively purchase services as they provide long textual lists to consult and limited information about services. The objective of this research was to develop an intelligent web-based self-service system to support SMMEs in telecommunication service provisioning, using a Design Science Research methodology. A constraint-based, knowledge-based recommender system was selected as the most appropriate intelligent system to support telecommunication service provisioning. A prototype called SelPro was developed as a solution to address the shortcomings of the current ineffective service provisioning methods available for SMMEs. SelPro incorporates an interactive wizard-style user interface with dynamic recommendations to support novice users as well as an expert interface which provides less user support. An expert review and a user study were conducted to determine if SelPro was usable, useful and effective. SelPro was perceived as being usable for SMMEs wishing to purchase telecommunication services. Expert participants were satisfied with the usability of SelPro and perceived it as being useful, easy to use and easy to learn. SelPro was considered effective because of the high task success ratings provided by the participants using the two interfaces. The research determined that intelligent web-based self-service provisioning can be used to effectively support SMMEs in telecommunication service provisioning. General design recommendations for similar systems were proposed and future work will involve using intelligent systems to support large enterprises in telecommunication service provisioning.
2

Evaluating Microsoft .NET technology: Implementation online store

Dou, Jie 01 January 2006 (has links)
The purpose of this project is to design, develop and implement an e-commerce shopping cart system based on Microsoft.NET technology and to evaluate ASP.NET technology by developing a shopping cart system.
3

Coordinated collaboration for e-commerce based on the multiagent paradigm.

January 2000 (has links)
Lee Ting-on. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2000. / Includes bibliographical references (leaves 116-121). / Abstracts in English and Chinese. / Acknowledgments --- p.i / Abstract --- p.ii / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Roadmap to the Thesis --- p.5 / Chapter 2 --- Software Agents and Agent Frameworks --- p.7 / Chapter 2.1 --- Software Agent --- p.7 / Chapter 2.1.1 --- Advantages of Agent --- p.10 / Chapter 2.1.2 --- Roles of Agent --- p.11 / Chapter 2.2 --- Agent Frameworks --- p.13 / Chapter 2.3 --- Communication Services and Concepts --- p.15 / Chapter 2.3.1 --- Message Channel --- p.15 / Chapter 2.3.2 --- Remote Procedure Call --- p.16 / Chapter 2.3.3 --- Event Channel --- p.17 / Chapter 2.4 --- Component --- p.18 / Chapter 3 --- Related Work --- p.20 / Chapter 3.1 --- Collaboration Behaviors --- p.20 / Chapter 3.2 --- Direct Coordination --- p.22 / Chapter 3.3 --- Meeting-oriented Coordination --- p.23 / Chapter 3.4 --- Blackboard-based Coordination --- p.24 / Chapter 3.5 --- Linda-like Coordination --- p.25 / Chapter 3.6 --- Reactive Tuple Spaces --- p.26 / Chapter 4 --- Background and Foundations --- p.27 / Chapter 4.1 --- Choice of Technologies --- p.27 / Chapter 4.2 --- Jini Technology --- p.28 / Chapter 4.2.1 --- The Lookup Service --- p.29 / Chapter 4.2.2 --- Proxy --- p.31 / Chapter 4.3 --- JavaSpaces --- p.32 / Chapter 4.4 --- Grasshopper Architecture --- p.33 / Chapter 5 --- The CoDAC Framework --- p.36 / Chapter 5.1 --- Requirements for Enabling Collaboration --- p.37 / Chapter 5.1.1 --- Consistent Group Membership --- p.37 / Chapter 5.1.2 --- Atomic Commitment --- p.39 / Chapter 5.1.3 --- Uniform Reliable Multicast --- p.40 / Chapter 5.1.4 --- Fault Tolerance --- p.40 / Chapter 5.2 --- System Components --- p.41 / Chapter 5.2.1 --- Distributed Agent Adapter --- p.42 / Chapter 5.2.2 --- CollaborationCore --- p.44 / Chapter 5.3 --- System Infrastructure --- p.45 / Chapter 5.3.1 --- Agent --- p.45 / Chapter 5.3.2 --- Distributed Agent Manager --- p.46 / Chapter 5.3.3 --- Collaboration Manager --- p.46 / Chapter 5.3.4 --- Kernel --- p.46 / Chapter 5.4 --- Collaboration --- p.47 / Chapter 5.5.1 --- Global Collaboration --- p.48 / Chapter 5.5.2 --- Local Collaboration --- p.48 / Chapter 6 --- Collaboration Life Cycle --- p.50 / Chapter 6.1 --- Initialization --- p.50 / Chapter 6.2 --- Resouces Gathering --- p.53 / Chapter 6.3 --- Results Delivery --- p.54 / Chapter 7 --- Protocol Suite --- p.55 / Chapter 7.1 --- The Group Membership Protocol --- p.56 / Chapter 7.1.1 --- Join Protocol --- p.56 / Chapter 7.1.2 --- Leave Protocol --- p.57 / Chapter 7.1.3 --- Recovery Protocol --- p.59 / Chapter 7.1.4 --- Proof --- p.61 / Chapter 7.2 --- Atomic Commitment Protocol --- p.62 / Chapter 7.3 --- Uniform Reliable Multicast --- p.63 / Chapter Chapter 8 --- Implementation --- p.66 / Chapter 8.1 --- Interfaces and Classes --- p.66 / Chapter 8.1.1 --- The CoDACAdapterInterface --- p.66 / Chapter 8.1.2 --- The CoDACEventListener --- p.69 / Chapter 8.1.3 --- The DAAdapter --- p.71 / Chapter 8.1.4 --- The DAManager --- p.75 / Chapter 8.1.5 --- The CoDACInternalEventListener --- p.77 / Chapter 8.1.6 --- The CollaborationManager --- p.77 / Chapter 8.1.7 --- The CollaborationCore --- p.78 / Chapter 8.2 --- Messaging Mechanism --- p.79 / Chapter 8.3 --- Nested Transaction --- p.84 / Chapter 8.4 --- Fault Detection --- p.85 / Chapter 8.5 --- Atomic Commitment Protocol --- p.88 / Chapter 8.5.1 --- Message Flow --- p.89 / Chapter 8.5.2 --- Timeout Actions --- p.91 / Chapter Chapter 9 --- Example --- p.93 / Chapter 9.1 --- System Model --- p.93 / Chapter 9.2 --- Auction Lifecycle --- p.94 / Chapter 9.2.1 --- Initialization --- p.94 / Chapter 9.2.2 --- Resource Gathering --- p.98 / Chapter 9.2.3 --- Results Delivery --- p.100 / Chapter Chapter 10 --- Discussions --- p.104 / Chapter 10.1 --- Compatibility --- p.104 / Chapter 10.2 --- Hierarchical Group Infrastructure --- p.106 / Chapter 10.3 --- Flexibility --- p.107 / Chapter 10.4 --- Atomicity --- p.108 / Chapter 10.5 --- Fault Tolerance --- p.109 / Chapter Chapter 11 --- Conclusion and Future Work --- p.111 / Chapter 11.1 --- Conclusion --- p.111 / Chapter 11.2 --- Future Work --- p.112 / Chapter 11.2.1 --- Electronic Commerce --- p.112 / Chapter 11.2.2 --- Workflow Management --- p.114 / Bibliography --- p.116 / Publication List --- p.121
4

Progress towards push button verification for business process execution language artifacts

Unknown Date (has links)
Web Service Business Process Execution Language (BPEL) has become a standard language in the world of Service Oriented Architecture (SOA) for specifying interactions between internet services. This standard frees developers from low-level concerns involving platform, implementation, and versioning. These freedoms risk development of less robust artifacts that may even become part of a mission-critical system. Model checking a BPEL artifact for correctness with respect to temporal logic properties is computationally complex, since it requires enumerating all communication and synchronization amongst various services with itself. This entails modeling BPEL features such as concurrency, hierarchy, interleaving, and non-deterministic choice. The thesis will provide rules and procedures for translating these features to a veriable model written in Promela. We will use these rules to build a program which automates the translation process, bringing us one step closer to push button verification. Finally, two BPEL artifacts will be translated, manually edited, verified, and analyzed. / by Augusto Varas. / Thesis (M.S.C.S.)--Florida Atlantic University, 2009. / Includes bibliography. / Electronic reproduction. Boca Raton, Fla., 2009. Mode of access: World Wide Web.
5

Patterns for web services standards

Unknown Date (has links)
Web services intend to provide an application integration technology that can be successfully used over the Internet in a secure, interoperable and trusted manner. Policies are high-level guidelines defining the way an institution conducts its activities. The WS-Policy standard describes how to apply policies of security definition, enforcement of access control, authentication and logging. WS-Trust defines a security token service and a trust engine which are used by web services to authenticate other web services. Using the functions defined in WS-Trust, applications can engage in secure communication after establishing trust. BPEL is a language for web service composition that intends to provide convenient and effective means for application integration over the Internet. We address security considerations in BPEL and how to enforce them, as well as its interactions with other web services standards such as WS-Security and WS-Policy. / by Ola Ajaj. / Thesis (M.S.C.S.)--Florida Atlantic University, 2010. / Includes bibliography. / Electronic reproduction. Boca Raton, Fla., 2010. Mode of access: World Wide Web.
6

Collaborative semantic editing of heterogeneous hierarchical concepts

Lam, Iok Ham January 2010 (has links)
University of Macau / Faculty of Science and Technology / Department of Computer and Information Science
7

Chinese Restaurant Online System

Chen, Yaming 01 January 2005 (has links)
Chinese Restaurant Online System was designed to allow customers to view information about the restaurant over the Web and order some dishes online. It allows employees to login to do their work, depending on their sponsored rights.
8

A framework for promoting interoperability in a global electronic market-space

Pather, Maree 30 June 2005 (has links)
The primary contributions to the area of electronic business integration, propounded by this thesis, are (in no particular order):  A novel examination of global Business-to-Business (B2B) interoperability in terms of a "multiplicity paradox" and of a "global electronic market-space" from a Complex Systems Science perspective.  A framework for an, integrated, global electronic market-space, which is based on a hierarchical, incremental, minimalist-business-pattern approach. A Web Services-SOA forms the basis of application-to-application integration within the framework. The framework is founded in a comprehensive study of existing technologies, standards and models for secure interoperability and the SOA paradigm. The Complex Systems Science concepts of "predictable structure" and "structural complexity" are used consistently throughout the progressive formulation of the framework.  A model for a global message handler (including a standards-based message-format) which obviates the common problems implicit in standard SOAP-RPC. It is formulated around the "standardized, common, abstract application interface" critical success factor, deduced from examining existing models. The model can be used in any collaboration context.  An open standards-based security model for the global message handler. Conceptually, the framework comprises the following:  An interoperable standardized message format: a standardized SOAP-envelope with standardized attachments (8-bit binary MIME-serialized XOP packages).  An interoperable standardized message-delivery infrastructure encompassing an RPC-invoked message-handler - a Web service, operating in synchronous and/or asynchronous mode, which relays attachments to service endpoints.  A business information processing infrastructure comprised of: a standardized generic minimalist-business-pattern (simple buying/selling), comprising global pre-specifications for business processes (for example, placing an order), standardized specific atomic business activities (e.g. completing an order-form), a standardized document-set (including, e.g. an order-form) based on standardized metadata (common nomenclature and common semantics used in XSD's, e.g. the order-form), the standardized corresponding choreography for atomic activities (e.g. acknowledgement of receipt of order-form) and service endpoints (based on standardized programming interfaces and virtual methods with customized implementations). / Theoretical Computing / PHD (INFORMATION SYSTEMS)
9

A framework for promoting interoperability in a global electronic market-space

Pather, Maree 30 June 2005 (has links)
The primary contributions to the area of electronic business integration, propounded by this thesis, are (in no particular order):  A novel examination of global Business-to-Business (B2B) interoperability in terms of a "multiplicity paradox" and of a "global electronic market-space" from a Complex Systems Science perspective.  A framework for an, integrated, global electronic market-space, which is based on a hierarchical, incremental, minimalist-business-pattern approach. A Web Services-SOA forms the basis of application-to-application integration within the framework. The framework is founded in a comprehensive study of existing technologies, standards and models for secure interoperability and the SOA paradigm. The Complex Systems Science concepts of "predictable structure" and "structural complexity" are used consistently throughout the progressive formulation of the framework.  A model for a global message handler (including a standards-based message-format) which obviates the common problems implicit in standard SOAP-RPC. It is formulated around the "standardized, common, abstract application interface" critical success factor, deduced from examining existing models. The model can be used in any collaboration context.  An open standards-based security model for the global message handler. Conceptually, the framework comprises the following:  An interoperable standardized message format: a standardized SOAP-envelope with standardized attachments (8-bit binary MIME-serialized XOP packages).  An interoperable standardized message-delivery infrastructure encompassing an RPC-invoked message-handler - a Web service, operating in synchronous and/or asynchronous mode, which relays attachments to service endpoints.  A business information processing infrastructure comprised of: a standardized generic minimalist-business-pattern (simple buying/selling), comprising global pre-specifications for business processes (for example, placing an order), standardized specific atomic business activities (e.g. completing an order-form), a standardized document-set (including, e.g. an order-form) based on standardized metadata (common nomenclature and common semantics used in XSD's, e.g. the order-form), the standardized corresponding choreography for atomic activities (e.g. acknowledgement of receipt of order-form) and service endpoints (based on standardized programming interfaces and virtual methods with customized implementations). / Theoretical Computing / PHD (INFORMATION SYSTEMS)
10

A secure mobile agent e-commerce protocol

Yu, Min-Chieh 09 December 2015 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / There are many advantages of mobile agent such as delegation of tasks, asynchronous processing, adaptable service in interfaces, and code shipping. Mobile agents can be utilized in many areas such as electronic commerce, information retrieval, network management, etc. The main problem with mobile agents is security. The three basic security design goals of a system are confidentiality, integrity, and availability. The goal of this thesis concerns the property of secure purchasing by mobile agents. First present Jalal's anonymous authentication protocol. Next, we construct our single mobile agent protocol based on Jalal's authentication technique. Also, we add some addition cryptography techniques to make the data more secure during its migration. Lastly, we build a multiple mobile agent protocol based on the single mobile agent protocol. Here, the multiple mobile agents are capable to make the decision and purchase the item for user.

Page generated in 0.1168 seconds