Proceedings Fourth IEEE International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems (WECWIS 2002)

Size: px
Start display at page:

Download "Proceedings Fourth IEEE International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems (WECWIS 2002)"

Transcription

1 Proceedings Fourth IEEE International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems (WECWIS 2002)

2 Proceedings Fourth IEEE International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems (WECWIS 2002) June 2002 Newport Beach, California Sponsored by The IEEE Task Force on Electronic Commerce With support of Chutney Technologies, Hewlett-Packard Company, IBM, Oracle Corporation Los Alamitos, California Washington Brussels Tokyo

3 Copyright 2002 by The Institute of Electrical and Electronics Engineers, Inc. All rights reserved Copyright and Reprint Permissions: Abstracting is permitted with credit to the source. Libraries may photocopy beyond the limits of US copyright law, for private use of patrons, those articles in this volume that carry a code at the bottom of the first page, provided that the per-copy fee indicated in the code is paid through the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA Other copying, reprint, or republication requests should be addressed to: IEEE Copyrights Manager, IEEE Service Center, 445 Hoes Lane, P.O. Box 133, Piscataway, NJ The papers in this book comprise the proceedings of the meeting mentioned on the cover and title page. They reflect the authors opinions and, in the interests of timely dissemination, are published as presented and without change. Their inclusion in this publication does not necessarily constitute endorsement by the editors, the IEEE Computer Society, or the Institute of Electrical and Electronics Engineers, Inc. IEEE Computer Society Order Number PR01567 ISBN ISBN (bookbroker) ISBN X (microfiche) ISSN Additional copies may be ordered from: IEEE Computer Society IEEE Service Center IEEE Computer Society Customer Service Center 445 Hoes Lane Asia/Pacific Office Los Vaqueros Circle P.O. Box 1331 Watanabe Bldg., P.O. Box 3014 Piscataway, NJ Minami-Aoyama Los Alamitos, CA Tel: Minato-ku, Tokyo Tel: Fax: JAPAN Fax: Tel: customer-service@ieee.org Fax: csbooks@computer.org tokyo.ofc@computer.org Editorial production by Stephanie Kawada Cover art production by Alex Torres Printed in the United States of America by The Printing House

4 Table of Contents Fourth IEEE International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems (WECWIS 2002) Chairs Message...ix Organizing Committee...x Program and Steering Committees...xi KEYNOTE ADDRESSES Web Services and XML Good News: The Difficult Issues Are Still Open...3 M. Devin Web Services: Enabling Business Integration and Collaboration...4 J. Sayah E-nabling the E-conomy...5 A. H. Karp Session I. WebServices and XML-Based Protocols XML-Based Advanced UDDI Search Mechanism for B2B Integration...9 L.-J. Zhang, H. Li, H. Chang, and T. Chao MQML-Message Queuing Markup Language...17 M.-H. Shi, D.-R. Chen, L.-J. Zhang, and R.-G. Wang A Service Level Agreement Language for Dynamic Electronic Services...25 H. Ludwig, A. Keller, A. Dan, and R. King Automatic Generation and Integration of RosettaNet Based on Generic Templates and Components...33 S. S. Y. Shim, Z. Zeng, and J. Gao

5 Session II. Business Processes and Workflow Technology Flexible Inter-Enterprise Workflow Management using E-Services...43 J. Meng, R. Krithivasan, S. Y. W. Su, and S. Helal Integration of Web Services into Workflows through a Multi-Level Schema Architecture...51 G. Preuner and M. Schrefl Converting Business Documents: A Classification of Problems and Solutions using XML/XSLT...61 E. Wüstner, T. Hotzel, and P. Buxmann Separating Business Process from User Interaction Utilizing Process-Aware XSLT Style-Sheets...69 K. Aberer, A. Datta, and Z. Despotovic Session III. E-Markets: Pricing, Negotiations and Trust On the Sensitivity of Incremental Algorithms for Combinatorial Auctions...81 R. Kastner, C. Hsieh, M. Potkonjak, and M. Sarrafzadeh Pricing Bundled Information Goods...89 K. Altinkemer and J. Jaisingh Negotiated Revealing of Traders Credentials in e-marketplaces: Dealing with Trust and Privacy Issues...97 M. C. Mont and M. Yearworth A New Category of Business Negotiation Primitives for Bilateral Negotiation Agents and Associated Algorithm to Find Pareto Optimal Solutions H. Li Session IV. Internet Infrastructure I-DG: A Secure Protocol for Disseminating Data to Subscribers via IP Multicast A. Celik, J. Holliday, and B. Ramavarjula Key Management and Access Control for Large Dynamic Multicast Group J. Liu and M. Zhou QoS Management in Web-Based Real-Time Data Services S. H. Son and K.-D. Kang

6 Characterization of E-Commerce Traffic U. Vallamsetty, K. Kant, and P. Mohapatra Session V. Industrial Session B2B Integration Technology Architecture C. Bussler Dynamic Netvalue Analyzer A Pricing Plan Modeling Tool for ISPs Using Actual Network Usage Data J. Altmann and L. Rhodes A Proxy-Based Approach for Dynamic Content Acceleration on the A. Datta, K. Dutta, H. Thomas, D. VanderMeer, K. Ramamritham, and Suresha Clustering Web Accelerators J. Feenan, P. Fry, and M. Lei WebMon: A Performance Profiler for Web Transactions T. Gschwind, K. Eshghi, P. K. Garg, and K. Wurster Session VI. Wireless Infrastructure and the Web Dynamic Refinement of Table Summarization for M-Commerce K.-L. Wu, S.-K. Chen, and P. S. Yu SmartClick: An Enabler for Human-Centered Wireless Web Service S. Kang, H. P. In, and W. Zhao An Integrated Visual Framework for the Human-Web Interface K. Zhang, M. L. Huang, and K.-C. Li Session VII. E-Commerce Applications: Personalization and Recommendation Mining Client-Side Activity for Personalization K. D. Fenstermacher and M. Ginsburg Modular Content Personalization Service Architecture for E-Commerce Applications S. Boll

7 Recommendation of Web Pages Based on Concept Association M. Lu, Q. Zhou, F. Li, Y. Lu, and L. Zhou Mediator Systems in E-Commerce Applications A. Pan, P. Montoto, A. Molano, M. Álvarez, J. Raposo, V. Orjales, and Á. Viña Session VIII. Work in Progress BPML: A Process Modeling Language for Dynamic Business Models R. K. Thiagarajan, A. K. Srivastava, A. K. Pujari, and V. K. Bulusu Modeling and Exchange of Product Classification Systems using XML J. Leukel, V. Schmitz, and F.-D. Dorloff DisCSPs: Tools for Generic and Efficient Multi-Agents Negotiations Y. Hamadi Towards a Platform for Supporting the Buyer in Trading in Heterogeneous Marketplaces B. Mahleko, J. Klingemann, P. Fankhauser, and A. Wombacher Author Index...253

Proceedings. Second IEEE International Workshop on Source Code Analysis and Manipulation

Proceedings. Second IEEE International Workshop on Source Code Analysis and Manipulation Proceedings Second IEEE International Workshop on Source Code Analysis and Manipulation Proceedings Second IEEE International Workshop on Source Code Analysis and Manipulation 1 October 2002 Montreal,

More information

IEEE International Workshop on Analysis and Modeling of Faces and Gestures AMFG 2003

IEEE International Workshop on Analysis and Modeling of Faces and Gestures AMFG 2003 IEEE International Workshop on Analysis and Modeling of Faces and Gestures AMFG 2003 17 October 2003 Nice, France Los Alamitos, California Washington Brussels Tokyo Copyright 2003 by The Institute of Electrical

More information

COMPUTER PROCEEDINGS OF SOCIETY. THE 2nd INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS ENGINEERING Volume 1 (Main Program)

COMPUTER PROCEEDINGS OF SOCIETY. THE 2nd INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS ENGINEERING Volume 1 (Main Program) PROCEEDINGS OF THE 2nd INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS ENGINEERING Volume 1 (Main Program) 3-6 December 2001, Kyoto, Japan Organized by WISE Society Kyoto University, Japan EDITORS

More information

Sixth IEEE International Symposium on High Assurance Systems Engineering

Sixth IEEE International Symposium on High Assurance Systems Engineering Sixth IEEE International Symposium on High Assurance Systems Engineering Special Topic: Impact of Networking 22-24 October 2001 Boca Raton, Florida, USA Sponsored by the IEEE Computer Society Technical

More information

Future Trends of Distributed Computing Systems

Future Trends of Distributed Computing Systems Proceedings The Eighth IEEE Workshop on Future Trends of Distributed Computing Systems FTDCS 2001 31 October 2 November 2001 Bologna, Italy Sponsored by IEEE Computer Society Los Alamitos, California Washington

More information

Proceedings. 14 th IEEE International Workshop on. Rapid Systems Prototyping RSP 2003

Proceedings. 14 th IEEE International Workshop on. Rapid Systems Prototyping RSP 2003 Proceedings 14 th IEEE International Workshop on Rapid Systems Prototyping RSP 2003 Proceedings 14 th IEEE International Workshop on Rapid Systems Prototyping San Diego, California, USA June 9 11, 2003

More information

Software Reliability Engineering

Software Reliability Engineering Proceedings lzth International Symposium on Software Reliability Engineering ISSRE 2001 Proceedings lzfh International Symposium on Software Reliability Engineering ISSRE 2001 27-30 November Hong Kong,

More information

Proceedings. Ninth International Conference on. Network Protocols ICNP 2001

Proceedings. Ninth International Conference on. Network Protocols ICNP 2001 Proceedings Ninth International Conference on Network Protocols ICNP 2001 Proceedings Ninth International Conference on Network Protocols ICNP 2001 11-14 November 2001 Riverside, California, USA Sponsored

More information

Future Trends of Distributed Computing Systems

Future Trends of Distributed Computing Systems Proceedings The Ninth IEEE Workshop on Future Trends of Distributed Computing Systems FTDCS 2003 28-30 May 2003 San Juan, Puerto Rico Sponsored by IEEE Computer Society Los Alamitos, California Washington

More information

Proceedings Pacific Rim International Symposium on Dependable Computing PRDC 2002

Proceedings Pacific Rim International Symposium on Dependable Computing PRDC 2002 Proceedings 2002 Pacific Rim International Symposium on Dependable Computing PRDC 2002 i [blank page] ii Proceedings 2002 Pacific Rim International Symposium on Dependable Computing PRDC 2002 16-18 December

More information

th International Conference on Telecommunications (ICT 2017)

th International Conference on Telecommunications (ICT 2017) 2017 24th International Conference on Telecommunications (ICT 2017) Limassol, Cyprus 3-5 May 2017 IEEE Catalog Number: ISBN: CFP17530-POD 978-1-5386-0644-5 Copyright 2017 by the Institute of Electrical

More information

WIRELESS SENSOR NETWORKS A Networking Perspective Edited by Jun Zheng Abbas Jamalipour A JOHN WILEY & SONS, INC., PUBLICATION WIRELESS SENSOR NETWORKS IEEE Press 445 Hoes Lane Piscataway, NJ 08854 IEEE

More information

Proceedings. Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing

Proceedings. Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing Proceedings Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing ISORC 2003 Proceedings Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing

More information

Proceedings of The Second International Conference on Web Information Systems Engineering

Proceedings of The Second International Conference on Web Information Systems Engineering Proceedings of The Second International Conference on Web Information Systems Engineering Volume 1 (Main Program) 3-6 December 2001 Kyoto, Japan Editors Tamer Ozsu Hans-Jorg Schek Katsumi Tanaka Yanchun

More information

Proceedings December 2001 New Orleans, Louisiana. Sponsored by. Applied Computer Security Associates. Los Alamitos, California

Proceedings December 2001 New Orleans, Louisiana. Sponsored by. Applied Computer Security Associates. Los Alamitos, California Proceedings 17th Annual Computer Security Applications Conference 10 14 December 2001 New Orleans, Louisiana Sponsored by Applied Computer Security Associates Los Alamitos, California Washington Brussels

More information

2017 International Conference on Communication Technologies (ComTech 2017)

2017 International Conference on Communication Technologies (ComTech 2017) 2017 International Conference on Communication Technologies (ComTech 2017) Rawalpindi, Pakistan 19 21 April 2017 IEEE Catalog Number: ISBN: CFP17CMR-POD 978-1-5090-5985-0 Copyright 2017 by the Institute

More information

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS

More information

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS

More information

2015 Twelfth International Conference on Wireless and Optical Communications Networks (WOCN 2015)

2015 Twelfth International Conference on Wireless and Optical Communications Networks (WOCN 2015) 2015 Twelfth International Conference on Wireless and Optical Communications Networks (WOCN 2015) Bangalore, India 9-11 September 2015 IEEE Catalog Number: ISBN: CFP15604-POD 978-1-4673-9278-5 Copyright

More information

Practical Database Programming with Visual Basic.NET

Practical Database Programming with Visual Basic.NET Practical Database Programming with Visual Basic.NET IEEE Press 445 Hoes Lane Piscataway, NJ 08854 IEEE Press Editorial Board Lajos Hanzo, Editor in Chief R. Abari M. El-Hawary S. Nahavandi J. Anderson

More information

Motivation and Intro. Vadim Ermolayev. MIT2: Agent Technologies on the Semantic Web

Motivation and Intro. Vadim Ermolayev. MIT2: Agent Technologies on the Semantic Web MIT2: Agent Technologies on the Semantic Web Motivation and Intro Vadim Ermolayev Dept. of IT Zaporozhye National Univ. Ukraine http://eva.zsu.zp.ua/ http://kit.zsu.zp.ua/ http://www.zsu.edu.ua/ http://www.ukraine.org/

More information

Beginning Transact-SQL with SQL Server 2000 and Paul Turley with Dan Wood

Beginning Transact-SQL with SQL Server 2000 and Paul Turley with Dan Wood Beginning Transact-SQL with SQL Server 2000 and 2005 Paul Turley with Dan Wood Beginning Transact-SQL with SQL Server 2000 and 2005 Beginning Transact-SQL with SQL Server 2000 and 2005 Paul Turley with

More information

Keywords Data alignment, Data annotation, Web database, Search Result Record

Keywords Data alignment, Data annotation, Web database, Search Result Record Volume 5, Issue 8, August 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Annotating Web

More information

COMPONENT-ORIENTED PROGRAMMING

COMPONENT-ORIENTED PROGRAMMING COMPONENT-ORIENTED PROGRAMMING COMPONENT-ORIENTED PROGRAMMING ANDY JU AN WANG KAI QIAN Southern Polytechnic State University Marietta, Georgia A JOHN WILEY & SONS, INC., PUBLICATION Copyright 2005 by John

More information

Real-Time Optimization by Extremum-Seeking Control

Real-Time Optimization by Extremum-Seeking Control Real-Time Optimization by Extremum-Seeking Control Real-Time Optimization by Extremum-Seeking Control KARTIK B. ARIYUR MIROSLAV KRSTIĆ A JOHN WILEY & SONS, INC., PUBLICATION Copyright 2003 by John Wiley

More information

THE ARCHITECTURE OF COMPUTER HARDWARE, SYSTEM SOFTWARE, AND NETWORKING

THE ARCHITECTURE OF COMPUTER HARDWARE, SYSTEM SOFTWARE, AND NETWORKING FOURTH EDITION THE ARCHITECTURE OF COMPUTER HARDWARE, SYSTEM SOFTWARE, AND NETWORKING AN INFORMATION TECHNOLOGY APPROACH Irv Englander Bentley University John Wiley & Sons, Inc. Vice President & Executive

More information

IBM Research Report. A Negotiation Protocol Framework for WS-Agreement

IBM Research Report. A Negotiation Protocol Framework for WS-Agreement RC24094 (W0610-165) October 31, 2006 Computer Science IBM Research Report A Negotiation Protocol Framework for WS-Agreement Sebastian Hudert Department of Information Systems University of Bayreuth 95440

More information

VPN Connection. VPN Gateway. 17 December 2002

VPN Connection. VPN Gateway. 17 December 2002 VPN Connection to ZyXEL ZyWALL VPN Gateway 17 December 2002 This document explains how to configure a virtual private network connection over an open network from a remote host running SSH Sentinel to

More information

Information Retrieval System Based on Context-aware in Internet of Things. Ma Junhong 1, a *

Information Retrieval System Based on Context-aware in Internet of Things. Ma Junhong 1, a * Information Retrieval System Based on Context-aware in Internet of Things Ma Junhong 1, a * 1 Xi an International University, Shaanxi, China, 710000 a sufeiya913@qq.com Keywords: Context-aware computing,

More information

TASK SCHEDULING FOR PARALLEL SYSTEMS

TASK SCHEDULING FOR PARALLEL SYSTEMS TASK SCHEDULING FOR PARALLEL SYSTEMS Oliver Sinnen Department of Electrical and Computer Engineering The University of Aukland New Zealand TASK SCHEDULING FOR PARALLEL SYSTEMS TASK SCHEDULING FOR PARALLEL

More information

A Case Study Webinar: How Wiley-Blackwell Accelerated Digital Production by 75% webinar. aptaracorp.com

A Case Study Webinar: How Wiley-Blackwell Accelerated Digital Production by 75% webinar. aptaracorp.com webinar Q&A A Case Study Webinar: How Wiley-Blackwell Accelerated Digital Production by 75% How would you characterize the capabilities of Wiley's solution...were they primarily due to (a) out-of-the-box

More information

Use of Mobile Agents for IPR Management and Negotiation

Use of Mobile Agents for IPR Management and Negotiation Use of Mobile Agents for Management and Negotiation Isabel Gallego 1, 2, Jaime Delgado 1, Roberto García 1 1 Universitat Pompeu Fabra (UPF), Departament de Tecnologia, La Rambla 30-32, E-08002 Barcelona,

More information

E-Commerce Networking

E-Commerce Networking NW2000 1 E- ing Session 2 E-Business Solution Suppliers/ Manufacturers Supply Chain Management Business Partners E- Customers Customer Care Resellers Employees Your Company E- Learning 3 1999 E- Data During

More information

XML Applications. Introduction Jaana Holvikivi 1

XML Applications. Introduction Jaana Holvikivi 1 XML Applications Introduction 1.4.2009 Jaana Holvikivi 1 Outline XML standards Application areas 1.4.2009 Jaana Holvikivi 2 Basic XML standards XML a meta language for the creation of languages to define

More information

Home Inspection 2014

Home Inspection 2014 Home Inspection 2014 Home Inspection A fifteen hour continuing education course approved by the California Bureau of Real Estate (CalBRE) to meet the requirements of the Business and Professions Code Section

More information

ISA 767, Secure Electronic Commerce Xinwen Zhang, George Mason University

ISA 767, Secure Electronic Commerce Xinwen Zhang, George Mason University Identity Management and Federated ID (Liberty Alliance) ISA 767, Secure Electronic Commerce Xinwen Zhang, xzhang6@gmu.edu George Mason University Identity Identity is the fundamental concept of uniquely

More information

Proceedings Pacific Rim International Symposium on Dependable Computing PRDC 2001

Proceedings Pacific Rim International Symposium on Dependable Computing PRDC 2001 Proceedings 2001 Pacific Rim International Symposium on Dependable Computing PRDC 2001 ~~ ~~~~~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ Proceedings 2001 Pacific Rim International Symposium on Dependable Computing 17-1 9 December

More information

COSO Enterprise Risk Management

COSO Enterprise Risk Management COSO Enterprise Risk Management COSO Enterprise Risk Management Establishing Effective Governance, Risk, and Compliance Processes Second Edition ROBERT R. MOELLER John Wiley & Sons, Inc. Copyright # 2007,

More information

Oracle BI Publisher 11g R1: Fundamentals

Oracle BI Publisher 11g R1: Fundamentals Oracle BI Publisher 11g R1: Fundamentals Volume I Student Guide D68420GC10 Edition 1.0 June 2011 D73304 Authors Lea Shaw Sindhu Rao Technical Contributors and Reviewers Timothy McGlue Nikos Psomas Pradeep

More information

XML DATA MODELING CONCEPTS IN B2B CATALOG STANDARDS

XML DATA MODELING CONCEPTS IN B2B CATALOG STANDARDS In: Proceedings of IADIS International Conference e-society 2003 (ES 2003), June 3-6, 2003, Lisbon, Portugal, pp. 227-234. XML DATA MODELING CONCEPTS IN B2B CATALOG STANDARDS Volker Schmitz, Joerg Leukel,

More information

Multi-Core Programming

Multi-Core Programming Multi-Core Programming Increasing Performance through Software Multi-threading Shameem Akhter Jason Roberts Intel PRESS Copyright 2006 Intel Corporation. All rights reserved. ISBN 0-9764832-4-6 No part

More information

Agile Database Techniques Effective Strategies for the Agile Software Developer. Scott W. Ambler

Agile Database Techniques Effective Strategies for the Agile Software Developer. Scott W. Ambler Agile Database Techniques Effective Strategies for the Agile Software Developer Scott W. Ambler Agile Database Techniques Effective Strategies for the Agile Software Developer Agile Database Techniques

More information

Panel 1 Service Platform and Network Infrastructure for Ubiquitous Services

Panel 1 Service Platform and Network Infrastructure for Ubiquitous Services Panel 1 Platform and Network Infrastructure for Ubiquitous s Wolfgang Kellerer DoCoMo Euro-Labs Munich, Germany WWRF WG2 ( Architecture) Vice Chair DoCoMo Communications Landsberger Str. 312 80687 Munich

More information

A Secure Data Transmission Scheme in Wireless Sensor Networks

A Secure Data Transmission Scheme in Wireless Sensor Networks Sensors & Transducers 203 by IFSA http://www.sensorsportal.com A Secure Data Transmission Scheme in Wireless Sensor Networks,2 Mingxin YANG, 3 Jingsha HE, 4 Ruohong LIU College of Computer Science and

More information

A Review On SLA And Various Approaches For Efficient Cloud Service Provider Selection Shreyas G. Patel Student of M.E, CSE Department, PIET Limda

A Review On SLA And Various Approaches For Efficient Cloud Service Provider Selection Shreyas G. Patel Student of M.E, CSE Department, PIET Limda A Review On SLA And Various Approaches For Efficient Cloud Service Provider Selection Shreyas G. Patel Student of M.E, CSE Department, PIET Limda Prof. Gordhan B. Jethava Head & Assistant Professor, Information

More information

IBM BladeCenter Chassis Management Pack for Microsoft System Center Operations Manager 2007 Release Notes

IBM BladeCenter Chassis Management Pack for Microsoft System Center Operations Manager 2007 Release Notes IBM System x IBM BladeCenter Chassis Management Pack for Microsoft System Center Operations Manager 2007 Release Notes Version 1.0.3 IBM System x IBM BladeCenter Chassis Management Pack for Microsoft

More information

(ASE 2001) Proceedings. Conference on. 16th Annual International CGIPUTER. Los Alamitos, California Washington Brussels Tokyo November 2001

(ASE 2001) Proceedings. Conference on. 16th Annual International CGIPUTER. Los Alamitos, California Washington Brussels Tokyo November 2001 Proceedings 16th Annual International Conference on n Automated Software Engineering (ASE 2001) 26-29 November 2001 Loew s Coronado Bay Resort Coronado Island San Diego, California Sponsored by IEEE Computer

More information

Key Technology of Distributed E-commerce System Architecture

Key Technology of Distributed E-commerce System Architecture TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.5, May 2014, pp. 3987 ~ 3993 DOI: http://dx.doi.org/10.11591/telkomnika.v12i5.4346 3987 Key Technology of Distributed E-commerce System

More information

Beginning Web Programming with HTML, XHTML, and CSS. Second Edition. Jon Duckett

Beginning Web Programming with HTML, XHTML, and CSS. Second Edition. Jon Duckett Beginning Web Programming with HTML, XHTML, and CSS Second Edition Jon Duckett Beginning Web Programming with HTML, XHTML, and CSS Introduction............................................... xxiii Chapter

More information

Implementing Security and Tokens: Current Standards, Tools, and Practices

Implementing  Security and Tokens: Current Standards, Tools, and Practices Implementing Email Security and Tokens: Current Standards, Tools, and Practices Sean Turner Russ Housley Wiley Publishing, Inc. Implementing Email Security and Tokens: Current Standards, Tools, and Practices

More information

HASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING

HASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING HASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING Alan G. Konheim JOHN WILEY & SONS, INC., PUBLICATION HASHING IN COMPUTER SCIENCE HASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING

More information

Join the p2p.wrox.com. Wrox Programmer to Programmer. Beginning PHP 5.3. Matt Doyle

Join the p2p.wrox.com. Wrox Programmer to Programmer. Beginning PHP 5.3. Matt Doyle Join the discussion @ p2p.wrox.com Wrox Programmer to Programmer Beginning PHP 5.3 Matt Doyle Programmer to Programmer Get more out of WROX.com Interact Take an active role online by participating in our

More information

Oracle BI Publisher 10g R3: Fundamentals

Oracle BI Publisher 10g R3: Fundamentals Oracle BI Publisher 10g R3: Fundamentals Student Guide D53147GC10 Edition 1.0 February 2008 D54122 Authors Padmaja Mitravinda Brian Pottle Technical Contributors and Reviewers Leta Davis Tim Dexter Mike

More information

7 Windows Tweaks. A Comprehensive Guide to Customizing, Increasing Performance, and Securing Microsoft Windows 7. Steve Sinchak

7 Windows Tweaks. A Comprehensive Guide to Customizing, Increasing Performance, and Securing Microsoft Windows 7. Steve Sinchak Take control of Windows 7 Unlock hidden settings Rev up your network Disable features you hate, for good Fine-tune User Account control Turbocharge online speed Master the taskbar and start button Customize

More information

International Journal of Software and Web Sciences (IJSWS)

International Journal of Software and Web Sciences (IJSWS) International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International

More information

Electronic Commerce: A Killer (Application) for the Semantic Web?

Electronic Commerce: A Killer (Application) for the Semantic Web? Electronic Commerce: A Killer (Application) for the Semantic Web? Dieter Fensel Vrije Universiteit Amsterdam http://www.cs.vu.nl/~dieter, dieter@cs.vu.nl. Slide 1 Contents 1. Semantic Web Technology 2.

More information

and compliments the capabilities of IBM Sterling B2B Integrator. IBM B2BAC key capabilities includes

and compliments the capabilities of IBM Sterling B2B Integrator. IBM B2BAC key capabilities includes Enablement of B2Bi Resources in B2BAC Sunil Kumar V 1, Girish Rao Salanke N S 2 1 M.Tech CNE, Department of CSE, R.V College of Engineering, Bengaluru, Karnataka, 560040, India 2 Assistant Professor, Department

More information

Designing Security Architecture Solutions Jay Ramachandran Wiley Computer Publishing John Wiley & Sons, Inc. Designing Security Architecture Solutions Designing Security Architecture Solutions Jay Ramachandran

More information

A Communication Middleware with Unified Data Transmission Interface

A Communication Middleware with Unified Data Transmission Interface Communications and Network, 2013, 5, 34-38 doi:10.4236/cn.2013.51b009 Published Online February 2013 (http://www.scirp.org/journal/cn) A Communication Middleware with Unified Data Transmission Interface

More information

International Policy Division, Global Strategy Bureau

International Policy Division, Global Strategy Bureau MIC International Policy Division, Global Strategy Bureau Communications News Newsletter of the Ministry of Internal Affairs and Communications(MIC), Japan Please Feel free to use articles in this publication,

More information

Routing Lookup Algorithm for IPv6 using Hash Tables

Routing Lookup Algorithm for IPv6 using Hash Tables Routing Lookup Algorithm for IPv6 using Hash Tables Peter Korppoey, John Smith, Department of Electronics Engineering, New Mexico State University-Main Campus Abstract: After analyzing of existing routing

More information

Extending Enterprise Services Descriptive Metadata with Semantic Aspect Based on RDF

Extending Enterprise Services Descriptive Metadata with Semantic Aspect Based on RDF Extending Enterprise Services Descriptive Metadata with Semantic Aspect Based on RDF Lei Zhang, Yani Yan and Jianlin Wu Beijing Key Laboratory of Intelligent Communications Software and Multimedia, Beijing

More information

Open Access Research on the Prediction Model of Material Cost Based on Data Mining

Open Access Research on the Prediction Model of Material Cost Based on Data Mining Send Orders for Reprints to reprints@benthamscience.ae 1062 The Open Mechanical Engineering Journal, 2015, 9, 1062-1066 Open Access Research on the Prediction Model of Material Cost Based on Data Mining

More information

This document is a preview generated by EVS

This document is a preview generated by EVS TECHNICAL REPORT ISO/IEC TR 29166 First edition 2011-12-15 Information technology Document description and processing languages Guidelines for translation between ISO/IEC 26300 and ISO/IEC 29500 document

More information

(9A05803) WEB SERVICES (ELECTIVE - III)

(9A05803) WEB SERVICES (ELECTIVE - III) 1 UNIT III (9A05803) WEB SERVICES (ELECTIVE - III) Web services Architecture: web services architecture and its characteristics, core building blocks of web services, standards and technologies available

More information

Relational Database Index Design and the Optimizers

Relational Database Index Design and the Optimizers Relational Database Index Design and the Optimizers DB2, Oracle, SQL Server, et al. Tapio Lahdenmäki Michael Leach A JOHN WILEY & SONS, INC., PUBLICATION Relational Database Index Design and the Optimizers

More information

Integration of information security and network data mining technology in the era of big data

Integration of information security and network data mining technology in the era of big data Acta Technica 62 No. 1A/2017, 157 166 c 2017 Institute of Thermomechanics CAS, v.v.i. Integration of information security and network data mining technology in the era of big data Lu Li 1 Abstract. The

More information

Fundamentals of. Mobile Computing. Second Edition. Prasant Kumar Pattnaik Rajib Mall

Fundamentals of. Mobile Computing. Second Edition. Prasant Kumar Pattnaik Rajib Mall Fundamentals of Mobile Computing Second Edition Prasant Kumar Pattnaik Rajib Mall FUNDAMENTALS OF MOBILE COMPUTING SECOND EDITION PRASANT KUMAR PATTNAIK Professor School of Computer Engineering KIIT University

More information

Cloud Phone Systems. Andrew Moore. Making Everything Easier! Nextiva Special Edition. Learn:

Cloud Phone Systems. Andrew Moore. Making Everything Easier! Nextiva Special Edition. Learn: Making Everything Easier! Nextiva Special Edition Cloud Phone Systems Learn: What cloud phone systems are and how they can benefit your company About the many advantages a cloud phone system offers Features

More information

GUIDELINES FOR THE USE OF THE e-commerce WORKFLOW IN IMI

GUIDELINES FOR THE USE OF THE e-commerce WORKFLOW IN IMI GUIDELINES FOR THE USE OF THE e-commerce WORKFLOW IN IMI 2 Contents I. BACKGROUND... 3 II. e-commerce WORKFLOW... 3 1) CREATION of a request... 6 2) REPLY to a request... 10 3) CLOSURE of a request...

More information

NGN: Carriers and Vendors Must Take Security Seriously

NGN: Carriers and Vendors Must Take Security Seriously Research Brief NGN: Carriers and Vendors Must Take Security Seriously Abstract: The next-generation network will need to provide security on many levels. A comprehensive set of standards should be in place

More information

Payment Authorization A Journey to Continuous Availability A Gravic, Inc. Case Study

Payment Authorization A Journey to Continuous Availability A Gravic, Inc. Case Study Payment Authorization A Journey to Continuous Availability A Executive Summary A major provider of merchant services to over four million small to medium-sized businesses throughout the world provides

More information

DepCoS-RELCOMEX Los Alamitos, California. Washington Tokyo

DepCoS-RELCOMEX Los Alamitos, California. Washington Tokyo DepCoS-RELCOMEX 2006 Los Alamitos, California Washington Tokyo Copyright 2006 by The Institute of Electrical and Electronics Engineers, Inc. All rights reserved. Copyright and Reprint Permissions: Abstracting

More information

Location-Aware Web Service Recommendation Using Personalized Collaborative Filtering

Location-Aware Web Service Recommendation Using Personalized Collaborative Filtering ISSN 2395-1621 Location-Aware Web Service Recommendation Using Personalized Collaborative Filtering #1 Shweta A. Bhalerao, #2 Prof. R. N. Phursule 1 Shweta.bhalerao75@gmail.com 2 rphursule@gmail.com #12

More information

zapnote INTELLIGENCE WITH XML SPYS August, 2001 Analyst: Ronald Schmelzer

zapnote INTELLIGENCE WITH XML SPYS August, 2001 Analyst: Ronald Schmelzer zapthink zapnote ZAPTHINK ZAPNOTE Doc. ID: ZTZN-0111-1 Released: Dec. 21, 2001 ALTOVA XML DEVELOPER D INTELLIGENCE WITH XML SPYS XML D August, 2001 XML S Analyst: Ronald Schmelzer Abstract While previous

More information

The Identity Web An Overview of XNS and the OASIS XRI TC

The Identity Web An Overview of XNS and the OASIS XRI TC The Identity Web An Overview of XNS and the OASIS XRI TC XML WG December 17, 2002 Marc LeMaitre VP Technology Strategy OneName Corporation Goals of this presentation Introduce the idea of the Identity

More information

Electronic Business Extensible Markup Language (ebxml) Part 5: Core Components Specification (CCS)

Electronic Business Extensible Markup Language (ebxml) Part 5: Core Components Specification (CCS) INTERNATIONAL STANDARD ISO 15000-5 First edition 2014-04-15 Electronic Business Extensible Markup Language (ebxml) Part 5: Core Components Specification (CCS) Commerce électronique en langage de balisage

More information

A QoS Load Balancing Scheduling Algorithm in Cloud Environment

A QoS Load Balancing Scheduling Algorithm in Cloud Environment A QoS Load Balancing Scheduling Algorithm in Cloud Environment Sana J. Shaikh *1, Prof. S.B.Rathod #2 * Master in Computer Engineering, Computer Department, SAE, Pune University, Pune, India # Master in

More information

Maximo 7.5 System Administration Basics. A learning guide with discussion and exercises IBM Maximo 7.5 for Asset Management and IT

Maximo 7.5 System Administration Basics. A learning guide with discussion and exercises IBM Maximo 7.5 for Asset Management and IT Maximo 7.5 System Administration Basics A learning guide with discussion and exercises IBM Maximo 7.5 for Asset Management and IT Prepared by: 510 King Street, Suite 200 Alexandria, Virginia 22314 (703)

More information

Security Access in Wireless Local Area Networks

Security Access in Wireless Local Area Networks Jianfeng Ma Zhuo Ma Changguang Wang et al. Security Access in Wireless Local Area Networks From Architecture and Protocols to Realization Jianfeng Ma Zhuo Ma Changguang Wang et al. Security Access in Wireless

More information

International Policy Division, Global ICT Strategy Bureau

International Policy Division, Global ICT Strategy Bureau MIC International Policy Division, Global ICT Strategy Bureau Communications News Newsletter of the Ministry of Internal Affairs and Communications(MIC), Japan Please Feel free to use articles in this

More information

Historical Reliability Data for IEEE 3006 Standards: Power Systems Reliability

Historical Reliability Data for IEEE 3006 Standards: Power Systems Reliability IEEE 3006 STANDARDS: POWER SYSTEMS RELIABILITY http://www.booksfiles.org/33780-ieee-3006-5-2014.html Historical Reliability Data for IEEE 3006 Standards: Power Systems Reliability IEEE 3000 Standards

More information

A Privacy-Preserving QoS Prediction Framework for Web Service Recommendation

A Privacy-Preserving QoS Prediction Framework for Web Service Recommendation A Privacy-Preserving QoS Prediction Framework for Web Service Recommendation Pallavi P. Gupta 1, Sarika M. Chavan 2 1 Dept of CSE (Deogiri Institute of Engineering and Management Studies) Aurangabad. pallavi.gupta26_07@yahoo.co.in

More information

Internet Governance: Progress Since Geneva Adam Peake Center for Global Communications, International University of Japan

Internet Governance: Progress Since Geneva Adam Peake Center for Global Communications, International University of Japan Internet Governance: Progress Since Geneva Adam Peake Center for Global Communications, International University of Japan My task today: meetings during 2004 ITU Workshop on Internet Governance, February

More information

Mastering UNIX Shell Scripting

Mastering UNIX Shell Scripting Mastering UNIX Shell Scripting Bash, Bourne, and Korn Shell Scripting for Programmers, System Administrators, and UNIX Gurus Second Edition Randal K. Michael Wiley Publishing, Inc. Mastering UNIX Shell

More information

Security Assertions Markup Language (SAML)

Security Assertions Markup Language (SAML) Security Assertions Markup Language (SAML) The standard XML framework for secure information exchange Netegrity White Paper PUBLISHED: MAY 20, 2001 Copyright 2001 Netegrity, Inc. All Rights Reserved. Netegrity

More information

This document is a preview generated by EVS

This document is a preview generated by EVS INTERNATIONAL STANDARD ISO 19119 Second edition 2016-01-15 Geographic information Services Information géographique Services Reference number ISO 19119:2016(E) ISO 2016 ISO 19119:2016(E) COPYRIGHT PROTECTED

More information

Grid Security Infrastructure

Grid Security Infrastructure Grid Security Infrastructure On basis of works: An overview of the methods used to create a secure grid Mike Jones (The University of Manchester) Security Implications of Typical Grid Computing Usage Scenarios

More information

Copyright 1995 by the American Mathematical Society. All rights reserved. Printed in the United States of America.

Copyright 1995 by the American Mathematical Society. All rights reserved. Printed in the United States of America. Journal of the American Mathematical Society This journal is devoted to research articles of the highest quality in all areas of pure and applied mathematics. Subscription information. The Journal of the

More information

A MODEL FOR ADVANCED QUERY CAPABILITY DESCRIPTION IN MEDIATOR SYSTEMS

A MODEL FOR ADVANCED QUERY CAPABILITY DESCRIPTION IN MEDIATOR SYSTEMS A MODEL FOR ADVANCED QUERY CAPABILITY DESCRIPTION IN MEDIATOR SYSTEMS Alberto Pan, Paula Montoto and Anastasio Molano Denodo Technologies, Almirante Fco. Moreno 5 B, 28040 Madrid, Spain Email: apan@denodo.com,

More information

This document is a preview generated by EVS

This document is a preview generated by EVS TECHNICAL SPECIFICATION ISO/IEC TS 22237-5 First edition 2018-05 Information technology Data centre facilities and infrastructures Part 5: Telecommunications cabling infrastructure Technologie de l information

More information

Enabling Technologies for Wireless E-Business

Enabling Technologies for Wireless E-Business Enabling Technologies for Wireless E-Business Weidong Kou Yelena Yesha (Eds.) Enabling Technologies for Wireless E-Business With 141 Figures and 15 Tables ABC Editors Weidong Kou Chinese State Key Laboratory

More information

Interdomain Federation Guide for IM and Presence Service on Cisco Unified Communications Manager, Release 11.5(1)SU2

Interdomain Federation Guide for IM and Presence Service on Cisco Unified Communications Manager, Release 11.5(1)SU2 Interdomain Federation Guide for IM and Presence Service on Cisco Unified Communications Manager, Release 11.5(1)SU2 First Published: 2017-11-29 Last Modified: 2017-12-01 Americas Headquarters Cisco Systems,

More information

International Journal of Advance Research in Engineering, Science & Technology. Study & Analysis of SOA based E-Learning Academic System

International Journal of Advance Research in Engineering, Science & Technology. Study & Analysis of SOA based E-Learning Academic System Impact Factor (SJIF): 3.632 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 (Special Issue for ITECE 2016) Study & Analysis of SOA based

More information

Securing SCADA Systems. Ronald L. Krutz

Securing SCADA Systems. Ronald L. Krutz Securing SCADA Systems Ronald L. Krutz Securing SCADA Systems Securing SCADA Systems Ronald L. Krutz Securing SCADA Systems Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis,

More information

Quality of service issues for world-wide mobile telephony

Quality of service issues for world-wide mobile telephony Quality of service issues for world-wide mobile telephony Gregor v. Bochmann e-mail: bochmann@site.uottawa.ca School of Information Technology and Engineering (SITE) University of Ottawa This presentation

More information

Release Notes. IBM Tivoli Identity Manager Universal Provisioning Adapter. Version First Edition (June 14, 2010)

Release Notes. IBM Tivoli Identity Manager Universal Provisioning Adapter. Version First Edition (June 14, 2010) IBM Tivoli Identity Manager Version 5.1.2 First Edition (June 14, 2010) This edition applies to version 5.1 of Tivoli Identity Manager and to all subsequent releases and modifications until otherwise indicated

More information

KINGS COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY. (An NBA Accredited Programme) ACADEMIC YEAR / EVEN SEMESTER

KINGS COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY. (An NBA Accredited Programme) ACADEMIC YEAR / EVEN SEMESTER KINGS COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY (An NBA Accredited Programme) ACADEMIC YEAR 2012-2013 / EVEN SEMESTER YEAR / SEM : IV / VIII BATCH: 2009-2013 (2008 Regulation) SUB CODE

More information

Professional ASP.NET 2.0 Databases. Thiru Thangarathinam

Professional ASP.NET 2.0 Databases. Thiru Thangarathinam Professional ASP.NET 2.0 Databases Thiru Thangarathinam Professional ASP.NET 2.0 Databases Professional ASP.NET 2.0 Databases Thiru Thangarathinam Professional ASP.NET 2.0 Databases Published by Wiley

More information

SEGMENT STATURE HASH TABLE BASED COST EFFICIENT DATA SHARING IN CLOUD ENVIRONMENT

SEGMENT STATURE HASH TABLE BASED COST EFFICIENT DATA SHARING IN CLOUD ENVIRONMENT SEGMENT STATURE HASH TABLE BASED COST EFFICIENT DATA SHARING IN CLOUD ENVIRONMENT K. Karthika Lekshmi 1, Dr. M. Vigilsonprem 2 1 Assistant Professor, Department of Information Technology, Cape Institute

More information