Academic literature on the topic 'Timed business protocols'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Timed business protocols.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Timed business protocols"

1

MOKHTARI-ASLAOUI, KARIMA, SALIMA BENBERNOU, SOROR SAHRI, VASILIOS ANDRIKOPOULOS, FRANK LEYMANN, and MOHAND-SAID HACID. "TIMED PRIVACY-AWARE BUSINESS PROTOCOLS." International Journal of Cooperative Information Systems 21, no. 02 (June 2012): 85–109. http://dx.doi.org/10.1142/s0218843012500013.

Full text
Abstract:
Web services privacy issues have been attracting more and more attention in the past years. Since the number of Web services-based business applications is increasing, the demands for privacy enhancing technologies for Web services will also be increasing in the future. In this paper, we investigate an extension of business protocols, i.e. the specification of which message exchange sequences are supported by the web service, in order to accommodate privacy aspects and time-related properties. For this purpose we introduce the notion of Timed Privacy-aware Business Protocols (TPBPs). We also discuss TPBP properties can be checked and we describe their verification process.
APA, Harvard, Vancouver, ISO, and other styles
2

Elabd, Emad, Emmanuel Coquery, and Mohand-Said Hacid. "From Implicit to Explicit Transitions in Business Protocols." International Journal of Web Services Research 9, no. 4 (October 2012): 69–95. http://dx.doi.org/10.4018/jwsr.2012100104.

Full text
Abstract:
Modeling Web services is a major step towards their automated analysis. One of the important parameters in this modeling, for the majority of Web services, is the time. A Web service can be presented by its behavior which can be described by a business protocol representing the possible sequences of message exchanges. To the best of the authors’ knowledge, automated analysis of timed Web services (e.g., compatibility and replaceability checking) is very difficult and in some cases it is not possible with the presence of implicit transitions (internal transitions) based on time constraints. The semantics of the implicit transitions is the source of this difficulty because most of well-known modeling tools do not express this semantics (e.g., epsilon transition on the timed automata has a different semantics). This paper presents an approach for converting any protocol containing implicit transitions to an equivalent one without implicit transitions before performing analysis.
APA, Harvard, Vancouver, ISO, and other styles
3

AlMahmoud, Abdelrahman, Maurizio Colombo, Chan Yeob Yeun, and Hassan Al Muhairi. "Secure communication protocol for real-time business process monitoring." International Journal of Internet Technology and Secured Transactions 5, no. 3 (2014): 223. http://dx.doi.org/10.1504/ijitst.2014.065183.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Biornstad, Biorn, Cesare Pautasso, and Gustavo Alonso. "Enforcing web services business protocols at run-time: a process-driven approach." International Journal of Web Engineering and Technology 2, no. 4 (2006): 396. http://dx.doi.org/10.1504/ijwet.2006.010422.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rao, N. H. "Electronic Commerce and Opportunities for Agribusiness in India." Outlook on Agriculture 32, no. 1 (March 2003): 29–33. http://dx.doi.org/10.5367/000000003101294235.

Full text
Abstract:
Electronic commerce (or e-commerce) using Internet technologies helps businesses to cut costs and cycle times, raise efficiency and provide more information, choice and value to consumers. Agribusinesses in India will need to deploy Internet technologies to gain competitive advantage and avoid isolation from mainstream businesses. Some challenges to becoming e-commerce-enabled are technical (limited infrastructure for Internet access), some are government policy-related (bandwidth, free movement of goods across states, market and trade policies), and some are legal. Many of these challenges are being addressed through both public and private initiatives. Some are specific to agribusiness: for example, relating to scope, regional specificity, the multidisciplinary nature of agricultural services, and trade restrictions on agro-products. Low levels of computer literacy and innumerable local languages compound these challenges. A two-stage strategy is suggested for agribusiness, one for improving operational efficiencies within businesses by using Internet technologies in back office business operations, and the other for delivering both knowledge and products to farmers. The first requires deploying new, generic and cost-effective Internet technologies with open standards and protocols. The second requires using Internet technologies for strategic positioning of products and services to gain long-term competitive advantage. The latter would mean persisting with conventional business strategy while using the Internet as an effective front end.
APA, Harvard, Vancouver, ISO, and other styles
6

UBERMORGEN, /. "Everything is always (the liquid protocol)." Finance and Society 2, no. 2 (December 19, 2016): 175–79. http://dx.doi.org/10.2218/finsoc.v2i2.1731.

Full text
Abstract:
UBERMORGEN are lizvlx (AT, 1973) and Hans Bernhard (CH/USA, 1971), European artists and net.art pioneers. They tenaciously convert code & language and concept & aesthetics into digital objects, software art, net.art, installation, new painting, videos, press releases and actions. CNN described them as ‘maverick Austrian business people’ and the New York Times called Google Will Eat Itself ‘simply brilliant’. Their main influences are Rammstein, Samantha Fox, Guns N’ Roses & Duran Duran, Olanzapine, LSD & Kentucky Fried Chicken’s Coconut Shrimps Deluxe. Visit their website at http://ubermorgen.com
APA, Harvard, Vancouver, ISO, and other styles
7

Sayeed, Sarwar, and Hector Marco-Gisbert. "Proof of Adjourn (PoAj): A Novel Approach to Mitigate Blockchain Attacks." Applied Sciences 10, no. 18 (September 22, 2020): 6607. http://dx.doi.org/10.3390/app10186607.

Full text
Abstract:
The blockchain is a distributed ledger technology that is growing in importance since inception. Besides cryptocurrencies, it has also crossed its boundary inspiring various organizations, enterprises, or business establishments to adopt this technology benefiting from the most innovative security features. The decentralized and immutable aspects have been the key points that endorse blockchain as one of the most secure technologies at the present time. However, in recent times such features seemed to be faded due to new attacking techniques. One of the biggest challenges remains within the consensus protocol itself, which is an essential component to bring all network participants to an agreed state. Cryptocurrencies adopt suitable consensus protocols based on their mining requirement, and Proof of Work (PoW) is the consensus protocol that is being predominated in major cryptocurrencies. Recent consensus protocol-based attacks, such as the 51% attack, Selfish Mining, Miner Bribe Attack, Zero Confirmation Attack, and One Confirmation Attack have been demonstrated feasible. To overcome these attacks, we propose Proof of Adjourn (PoAj), a novel consensus protocol that provides strong protection regardless of attackers hashing capability. After analyzing the 5 major attacks, and current protection techniques indicating the causes of their failure, we compared the PoAj against the most widely used PoW, showing that PoAj is not only able to mitigate the 5 attacks but also attacks relying on having a large amount of hashing power. In addition, the proposed PoAj showed to be an effective approach to mitigate the processing time issue of large-sized transactions. PoAj is not tailored to any particular attack; therefore, it is effective against malicious powerful players. The proposed approach provides a strong barrier not only to current and known attacks but also to future unknown attacks based on different strategies that rely on controlling the majority of the hashing power.
APA, Harvard, Vancouver, ISO, and other styles
8

Herschel, Richard T., and Nicolle Clements. "The Importance of Storytelling in Business Intelligence." International Journal of Business Intelligence Research 8, no. 1 (January 2017): 26–39. http://dx.doi.org/10.4018/ijbir.2017010102.

Full text
Abstract:
This paper examines the relevance and importance of storytelling to business intelligence. Business intelligence provides analytics to inform a decision-making process. However, there are often times issues with understanding the analytics presented and contextualizing the analytics to the overall decision-making process. This paper examines these issues and then assesses the value of storytelling in conveying BI findings. The SOAP protocol used for physician/patient clinical encounters is presented to illustrate the benefit of providing structure to a decision-making process. The importance of structure to storytelling is then further examined and shown to help facilitate the communication of data insights. Media richness is also examined to reveal the impact that it has on BI storytelling, helping to explain why visualizations have become so important to BI. An example of BI storytelling with a high level of media richness is then presented. The paper concludes that storytelling is inextricably linked to BI success.
APA, Harvard, Vancouver, ISO, and other styles
9

Rigin, Anton Mikhailovich, and Sergey Andreevich Shershakov. "Method of Performance Analysis of Time-Critical Applications Using DB-Nets." Proceedings of the Institute for System Programming of the RAS 33, no. 3 (2021): 109–22. http://dx.doi.org/10.15514/ispras-2021-33(3)-9.

Full text
Abstract:
These days, most of time-critical business processes are performed using computer technologies. As an example, one can consider financial processes including trading on stock exchanges powered by electronic communication protocols such as the Financial Information eXchange (FIX) Protocol. One of the main challenges emerging with such processes concerns maintaining the best possible performance since any unspecified delay may cause a large financial loss or other damage. Therefore, performance analysis of time-critical systems and applications is required. In the current work, we develop a novel method for a performance analysis of time-critical applications based on the db-net formalism, which combines the ability of colored Petri nets to model a system control flow with the ability to model relational database states. This method allows to conduct a performance analysis for time-critical applications that work as transactional systems and have log messages which can be represented in the form of table records in a relational database. One of such applications is a FIX protocol-based trading communication system. This system is used in the work to demonstrate applicability of the proposed method for time-critical systems performance analysis. However, there are plenty of similar systems existing for different domains, and the method can also be applied for a performance analysis of these systems. The software prototype is developed for testing and demonstrating abilities of the method. This software prototype is based on an extension of Renew software tool, which is a reference net simulator. The testing input for the software prototype includes a test log with FIX messages, provided by a software developer of testing solutions for one of the global stock exchanges. An application of the method for quantitative analysis of maximum acceptable delay violations is presented. The developed method allows to conduct a performance analysis as a part of conformance checking of a considered system. The method can be used in further research in this domain as well as in testing the performance of real time-critical software systems.
APA, Harvard, Vancouver, ISO, and other styles
10

Jain, Tarun, and Bijendra Nath Jain. "Infection Testing at Scale: An Examination of Pooled Testing Diagnostics." Vikalpa: The Journal for Decision Makers 46, no. 1 (March 2021): 13–26. http://dx.doi.org/10.1177/02560909211018906.

Full text
Abstract:
Executive Summary In pandemics or epidemics, public health authorities need to rapidly test a large number of individuals without adequate testing kits. We propose a testing protocol to accelerate infection diagnostics by combining multiple samples, and in case of positive results, re-test individual samples. The key insight is that a negative result in the first stage implies negative infection for all individuals. Thus, a single test could rule out infection in multiple individuals. Using simulations, we show that this protocol reduces the required number of testing kits, especially when the infection rate is low, alleviating a key bottleneck for public health authorities in times of pandemics and epidemics such as COVID-19. Our proposed protocol is expected to be more effective when the infection rate is low, which suggests that it is better suited for early stage and large-scale, population-wide testing. However, the managerial trade-off is that the protocol has costs in additional time for returning test results and an increased number of false negatives. We discuss applications of pooled testing in understanding population-wide testing to understand infection prevalence, to diagnose infections in high-risk groups of individuals, and to identify disease cold spots.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Timed business protocols"

1

Ponge, Julien Nicolas Computer Science &amp Engineering Faculty of Engineering UNSW. "Model based analysis of time-aware web services interactions." Publisher:University of New South Wales. Computer Science & Engineering, 2009. http://handle.unsw.edu.au/1959.4/43525.

Full text
Abstract:
Web services are increasingly gaining acceptance as a framework for facilitating application-to-application interactions within and across enterprises. It is commonly accepted that a service description should include not only the interface, but also the business protocol supported by the service. The present work focuses on the formalization of the important category of protocols that include time-related constraints (called timed protocols), and the impact of time on compatibility and replaceability analysis. We formalized the following timing constraints: CInvoke constraints define time windows of availability while MInvoke constraints define expirations deadlines. We extended techniques for compatibility and replaceability analysis between timed protocols by using a semantic-preserving mapping between timed protocols and timed automata, leading to the novel class of protocol timed automata (PTA). Specifically, PTA exhibit silent transitions that cannot be removed in general, yet they are closed under complementation, making every type of compatibility or replaceability analysis decidable. Finally, we implemented our approach in the context of a larger project called ServiceMosaic, a model-driven framework for web service life-cycle management.
APA, Harvard, Vancouver, ISO, and other styles
2

Elabd, Emad. "Compliance of Web services over a high level specification." Thesis, Lyon 1, 2011. http://www.theses.fr/2011LYO10122/document.

Full text
Abstract:
Actuellement, la technologie des services Web évolue rapidement, en étant soutenue par les grands acteurs du domaine des systèmes d'information. Les applications basés sur services Web sont faiblement couplées et utilisables de façon automatique via l'utilisation d'un ensemble de normes basées sur XML. Hormis la description syntaxique des messages, il est nécessaire d’avoir une description sémantique du comportement des services. En effet, lors de la conception d'un service ou lors d'une composition de services, il est important de vérifier la conformité avec un cahier des charges. L’enrichissement des descriptions des services par l’inclusion de leurs comportements est de plus en plus important. Ce comportement peut être décrit par des protocoles métier représentant les séquences possibles d'échanges de messages. Les services Web utilisent des politiques de contrôle d'accès (ACP) pour restreindre l'accès à des consommateurs autorisés. Ces politiques doivent faire partie de la description du service. Dans cette thèse, l'analyse d'interopérabilité en termes de contrôle d’accès après la formalisation des services Web annotés avec les politiques de contrôle d’accès est réalisée. Nous présentons une approche pour intégrer les outils de vérification dans l'architecture de contrôle d’accès de façon à garantir une interaction sans erreurs. Les politiques et les crédits sont présentés comme une ontologie afin de bénéficier de la flexibilité offerte par subsomption sur des concepts. La chorégraphie des services Web est utilisée dans la phase de conception d’applications pair à pair complexes dans lesquelles chaque pair peut être implémenté par un service Web. Par conséquent, la sélection des services Web pour l’implémentation de chorégraphie en utilisant l’approche de vérification de compatibilité avec contrôle d'accès est l'un des objectifs de notre recherche. Dans ce travail, les modèles de protocole métier du service Web sont étendus en ajoutant des informations au message sur chaque transition du service dans lequel ce message sera envoyé ou reçu. Nous définissons et vérifions la compatibilité des services Web afin de voir si (et comment) plusieurs services peuvent avoir des interactions en fonction de leurs protocoles. Cette approche aidera les concepteurs à choisir des services Web de manière simple et à vérifier s’ils peuvent mettre en œuvre la chorégraphie nécessaire en vérifiant la compatibilité avec notre approche
Currently, Web services technology is rapidly move forward supported by major players in the field of information systems. Web services applications are loosely coupled and usable in an automatic way via the use of a set of standards based on XML. Beside the syntactic description of messages, there is a need for the semantic description of the behavior of services. Indeed, whether in the design of a service or composition of services, it is important to check compliance with a set of specifications. Enriching services descriptions by including their behaviors is becoming more and more important. This behavior can be described by business protocols representing the possible sequences of message exchanges. Web services use access control policies (ACP) to restrict the access to authorized consumer. These policies should be a part of the service description. In this thesis, the interoperability analysis in terms of AC after the formalization of the Web services annotated with the access control (AC) is performed. In addition, we present an approach for embedding the checking tools in the AC enforcement architecture to guarantee the errors free interaction. The ACP and the credentials are presented as ontology in order to benefit from the flexibility offered by subsumption on concepts. Web services choreography is used in the design phase of complex peer-to-peer applications in which each peer can be implemented by a Web service. Therefore, selecting Web services for choreography implementation using the compatibility checking approach with access control is one of the objectives of our research. In this work, the business protocol models of the Web service are extended by adding information to the message on each transition about the service in which this message will sent to or received from. We define and verify Web service compatibility in order to see if (and how) several services can have interactions based on their protocols. This approach will help the designers to select Web services in an easy way and verify if they can implement the required choreography or not by checking the compatibly using our approach
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Timed business protocols"

1

Ovodenko, Alexander. Producers, Trade Groups, and the Design of Global Environmental Regimes. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190677725.003.0006.

Full text
Abstract:
The chapter provides a macro-level analysis of the legalization, standardization, and integration of global environmental rules. The statistical tests rely on two new datasets on global treaty regimes and business stakeholders in those regimes. The results demonstrate that treaty regimes that regulate oligopolistic industries tend to become integrated over time with protocols, amendments, and similar agreements that add new rules or institutions to the international regime. They also consist of legally binding agreements, not soft law commitments by parties, and standardized rules applicable to all member states or categories of member states. By contrast, treaty regimes that regulate competitive markets tend to become more disintegrated (or unintegrated) over time. These international regimes are also legal hybrids because they consist of hard and soft law, and often give countries the responsibility to make nationally specific commitments. Producer-level concentrations significantly constrain the design of global environmental treaty regimes.
APA, Harvard, Vancouver, ISO, and other styles
2

Calloway, Colin G. Treaties and Treaty Making. Edited by Frederick E. Hoxie. Oxford University Press, 2016. http://dx.doi.org/10.1093/oxfordhb/9780199858897.013.34.

Full text
Abstract:
This chapter surveys how treaty making involving American Indians developed and changed over time. Early colonial treaties involved a hybrid diplomacy of Native rituals and European protocols, and business was conducted with wampum and oratory as much as with pen and paper. Increasingly, treaties involved land cessions. The United States adopted many of the forms of colonial treaties but employed them primarily as instruments of dispossession and removal. In the nineteenth century, the expanding nation-state made treaties that confined Indian peoples to reservations and that also included measures to “civilize” the tribes. Although Congress ended treaty making in 1871, “agreements” continued to be signed and treaties continued to have the force of law. Treaties were contracts between sovereigns, and tribes have invoked treaties to reassert their rights in modern America.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Timed business protocols"

1

Copei, Sebastian, Manuel Wickert, and Albert Zündorf. "Certification as a Service." In Agile Processes in Software Engineering and Extreme Programming – Workshops, 203–10. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58858-8_21.

Full text
Abstract:
Abstract The development of industry 4.0 and smart energy IT-Components relies on highly standardized communication protocols to reach vendor-independent interoperability. In innovative and fast-changing environments, the support of standard protocols increases the time to market significantly. In the energy domain, the business models and the regulatory frameworks will be updated more often than the protocols. Thus agile development and supporting standardized protocols at the same time seems to be an issue. Here we will present a new proposal for standardization and certification processes as well as an architecture for a certification platform. Both will improve the support of agile development in the industry and energy domain.
APA, Harvard, Vancouver, ISO, and other styles
2

Engel, Markus, Christopher Kramer, Tobias Braun, Dennis Christmann, and Reinhard Gotzhein. "BiPS – A Real-Time-Capable Protocol Framework for Wireless Networked Control Systems and Its Application." In E-Business and Telecommunications, 313–36. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-11039-0_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Norville, Richard S., Kamesh Namuduri, and Ravi Pendse. "Node Authentication in Networks Using Zero-Knowledge Proofs." In Web Services Security and E-Business, 142–64. IGI Global, 2007. http://dx.doi.org/10.4018/978-1-59904-168-1.ch008.

Full text
Abstract:
Zero-knowledge proof (ZKP) based authentication protocols provide a smart way to prove an identity of a node without giving away any information about the secret of that identity. There are many advantages as well as disadvantages to using this protocol over other authentication schemes, and challenges to overcome in order to make it practical for general use. This chapter examines the viability of ZKPs for use in authentication protocols in networks. It is concluded that nodes in a network can achieve a desired level of security by trading off key size, interactivity, and other parameters of the authentication protocol. This chapter also provides data analysis that can be useful in determining expected authentication times based on device capabilities. Pseudocode is provided for implementing a graph-based ZKP on small or limited processing devices.
APA, Harvard, Vancouver, ISO, and other styles
4

Rabadi, Yousef E., and Joan Lu. "Building a Secured XML Real-Time Interactive Data Exchange Architecture." In Ontologies and Big Data Considerations for Effective Intelligence, 327–412. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-2058-0.ch008.

Full text
Abstract:
TCP and UDP communication protocols are the most widely used transport methods for carrying out XML data messages between different services. XML data security is always a big concern especially when using internet cloud. Common XML encryption techniques encrypt part of private sections of the XML file as an entire block of text and apply these techniques directly on them. Man-in-the-Middle and Cryptanalysts can generate statistical information, tap, sniff, hack, inject and abuse XML data messages. The purpose of this study is to introduce architecture of new approach of exchanging XML data files between different Services in order to minimize the risk of any alteration, data loss, data abuse, data misuse of XML critical business data information during transmission; by implementing a vertical partitioning on XML files. Another aim is to create a virtual environment within internet cloud prior to data transmission in order to utilise the communication method and rise up the transmission performance along with resources utilisation and spreads the partitioned XML file (shredded) through several paths within multi agents that form a multipath virtual network. Virtualisation in cloud network infrastructure to take advantage of its scalability, operational efficiency, and control of data flow are considered in this architecture. A customized UDP Protocol in addition to a pack of modules in RIDX adds a reliable (Lossless) and Multicast data transmission to all nodes in a virtual cloud network. A comparative study has been made to measure the performance of the Real-time Interactive Data Exchange system (RIDX) using RIDX UDP protocol against standard TCP protocol. Starting from 4 nodes up to 10 nodes in the domain, the results showed an enhanced performance using RIDX architecture over the standard TCP protocol.
APA, Harvard, Vancouver, ISO, and other styles
5

Rabadi, Yousef E., and Joan Lu. "Building a Secured XML Real-Time Interactive Data Exchange Architecture." In Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing, 270–357. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5339-8.ch013.

Full text
Abstract:
TCP and UDP communication protocols are the most widely used transport methods for carrying out XML data messages between different services. XML data security is always a big concern especially when using internet cloud. Common XML encryption techniques encrypt part of private sections of the XML file as an entire block of text and apply these techniques directly on them. Man-in-the-Middle and Cryptanalysts can generate statistical information, tap, sniff, hack, inject and abuse XML data messages. The purpose of this study is to introduce architecture of new approach of exchanging XML data files between different Services in order to minimize the risk of any alteration, data loss, data abuse, data misuse of XML critical business data information during transmission; by implementing a vertical partitioning on XML files. Another aim is to create a virtual environment within internet cloud prior to data transmission in order to utilise the communication method and rise up the transmission performance along with resources utilisation and spreads the partitioned XML file (shredded) through several paths within multi agents that form a multipath virtual network. Virtualisation in cloud network infrastructure to take advantage of its scalability, operational efficiency, and control of data flow are considered in this architecture. A customized UDP Protocol in addition to a pack of modules in RIDX adds a reliable (Lossless) and Multicast data transmission to all nodes in a virtual cloud network. A comparative study has been made to measure the performance of the Real-time Interactive Data Exchange system (RIDX) using RIDX UDP protocol against standard TCP protocol. Starting from 4 nodes up to 10 nodes in the domain, the results showed an enhanced performance using RIDX architecture over the standard TCP protocol.
APA, Harvard, Vancouver, ISO, and other styles
6

Vukovic, Maja, and Claudio Bartolini. "Towards Crowd-Driven Business Processes." In Handbook of Research on E-Business Standards and Protocols, 412–29. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0146-8.ch019.

Full text
Abstract:
Web 2.0 is shifting work to online, virtual environments. At the same time social networking technologies are accelerating the discovery of experts, increasing the effectiveness of online knowledge acquisition and collaborative efforts. Nowadays it is possible to harness potentially unknown (large) groups of networked specialists for their abilities to amass large-scale collections of data and to solve complex business and technical problems, in the process known as crowdsourcing. Large global enterprises and entrepreneurs are increasingly adopting crowdsourcing because of its promise to give simple, low cost, access to a scalable workforce online. Enterprise crowdsourcing examples abound, taking many different shapes and forms, from mass data collection to enabling end-user driven customer support. This chapter identifies requirements for common protocols and reusable service components, extracting from existing crowdsourcing applications, in order to enable standardized interfaces supporting crowdsourcing capabilities.
APA, Harvard, Vancouver, ISO, and other styles
7

Poon, Simpson. "Future of Small Business E-Commerce." In Encyclopedia of Information Science and Technology, First Edition, 1253–56. IGI Global, 2005. http://dx.doi.org/10.4018/978-1-59140-553-5.ch221.

Full text
Abstract:
The use of the Internet for business purposes among small businesses started quite early in the e-commerce evolution. In the beginning, innovative and entrepreneurial owners of small businesses attempted to use rudimentary Internet tools such as electronic mail (e-mail) and file transfer protocol (FTP) to exchange messages and documents. While primitive, it fulfilled much of the business needs at the time. Even to date, e-mail and document exchange, according to some of the latest research findings, are still the most commonly used tools despite the fact that tools themselves have become more sophisticated.
APA, Harvard, Vancouver, ISO, and other styles
8

Lee, Byung Kwan, Seung Hae Yang, and Tai-Chi Lee. "A SEEP Protocol Design Using 3BC, ECC(F2m) and HECC Algorithm." In Business Data Communications and Networking, 328–45. IGI Global, 2007. http://dx.doi.org/10.4018/978-1-59904-274-9.ch013.

Full text
Abstract:
Unlike SET (secure electronic transaction) protocol. This chapter proposes a SEEP (highly secure electronic payment) protocol, which uses ECC (elliptic curve cryptosystem with F2 mnot Fp) (Koblitz, 1987; Miller, 1986; Harper, Menezes, & Vanstone, 1993), SHA (secure hash algorithm) and 3BC (block byte bit cipher) instead of RSA and DES. To improve the strength of encryption and the speed of processing, the public key and the private key of ECC and HECC (Hyper Elliptic Curve Cryptosystem) are used in 3BC (Cho, Shin, Lee, & Lee, 2002; Cho & Lee, 2002) algorithm, which generates session keys for the data encryption. In particular, when ECC and HECC are combined with 3BC, the strength of security is improved significantly. As the process of the digital envelope used in the existing SET protocol is removed by the 3BC algorithm in this chapter, the processing time is substantially reduced. In addition, the use of multiple signatures has some advantages of reducing the size of transmission data as an intermediate payment agent and avoiding the danger of eavesdropping of private keys.
APA, Harvard, Vancouver, ISO, and other styles
9

Vuković, Maja, and Claudio Bartolini. "Towards Crowd-Driven Business Processes." In Crowdsourcing, 173–92. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8362-2.ch009.

Full text
Abstract:
Web 2.0 is shifting work to online, virtual environments. At the same time social networking technologies are accelerating the discovery of experts, increasing the effectiveness of online knowledge acquisition and collaborative efforts. Nowadays it is possible to harness potentially unknown (large) groups of networked specialists for their abilities to amass large-scale collections of data and to solve complex business and technical problems, in the process known as crowdsourcing. Large global enterprises and entrepreneurs are increasingly adopting crowdsourcing because of its promise to give simple, low cost, access to a scalable workforce online. Enterprise crowdsourcing examples abound, taking many different shapes and forms, from mass data collection to enabling end-user driven customer support. This chapter identifies requirements for common protocols and reusable service components, extracting from existing crowdsourcing applications, in order to enable standardized interfaces supporting crowdsourcing capabilities.
APA, Harvard, Vancouver, ISO, and other styles
10

Lin, Koong, Chad Lin, and Huei Leu. "Decision Analysis for Business to Adopt RFID." In Ubiquitous and Pervasive Computing, 1219–27. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-60566-960-1.ch076.

Full text
Abstract:
The need for more and more flexibility (in terms of time and location) in business operations, context-based services, decentralization of business processes, and information processing and innovative services has introduced new ubiquitous environments, sensing technologies, and pervasive devices. This new category of devices, sensors, and ubiquitous environments, has the capabilities to observe the users all the time using sensors; provide timely information to service providers using communication channels; and offer accurate services to users anywhere and anytime through tiny mobile terminals. This chapter provides the users of the pervasive business technologies an overview of the basic infrastructure and protocols used to form these ubiquitous wireless environments and provide context-based comfort, while taking care of confidentiality, secrecy, integrity, and authenticity. Along with an introduction to the markup languages, protocols, and security threats, the chapter concludes with the discussion of a range of common biometric, cryptographic, and routing solutions. The spending for RFID (radio frequency identification) has been increasing rapidly in recent years. According to Gartner, global spending on RFID is likely to reach US$3 billion by 2010 (CNET, 2005). In addition, interests continue to grow for the adoption of this mobile computing and commerce device in many different types of applications (ABI, 2006). In 2005, Wal-Mart asked its top 100 suppliers to use RFID tags, and this had a profound effect on the projected growth of RFID technology as well as potential applications in the industrial, defense, and retails sectors (Albertsons, 2004). However, very few studies have examined and evaluated the adoption of RFID options by the organizations. Organizations face various risks and uncertainties when assessing the adopted mobile technologies. Different organizations are likely to encounter different challenges and problems. This research aims to develop a mechanism that can help organizations to specify their risks and choose a suitable adoption alternative. This research has adopted the AHP (analytic hierarchy process) methodology to analyze the data, as it is useful for analyzing different RFID adoption alternatives and can assist organizations in predicting the possible issues and challenges when adopting RFID. The objectives of this article are to: (1) describe basic components of a mobile computing and commerce device, RFID; and (2) explore the current practices, issues, and applications in this mobile technology.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Timed business protocols"

1

Mokhtari, Karima, Salima Benbernou, Mohsen Rouached, Frank Leyman, and Mohand-Said Hacid. "Privacy Time-Related Analysis in Business Protocols." In 2009 IEEE International Conference on Web Services (ICWS). IEEE, 2009. http://dx.doi.org/10.1109/icws.2009.87.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Xiang, Mantian, Lihua Sun, and Lihong Li. "Time-diffusion synchronization protocols in wireless sensor networks." In 2011 International Conference on E-Business and E-Government (ICEE). IEEE, 2011. http://dx.doi.org/10.1109/icebeg.2011.5882272.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

"TOWARDS RUN-TIME PROTOCOL ANOMALY DETECTION AND VERIFICATION." In 1st International Conference on E-business and Telecommunication Networks. SciTePress - Science and and Technology Publications, 2004. http://dx.doi.org/10.5220/0001395802990304.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Alexieva, Sonya. "COMMUNICATIONS IN TOURISM IN TIMES OF PANDEMIC: FROM CONVENTIONAL TO DIGITAL CONNECTIVITY." In TOURISM AND CONNECTIVITY 2020. University publishing house "Science and Economics", University of Economics - Varna, 2020. http://dx.doi.org/10.36997/tc2020.655.

Full text
Abstract:
Being one of the industries that have been the hardest hit by the coronavirus pandemic, tourism is actively using all communication channels, from conventional to digital connectivity in choosing messages. Trustworthy information is in the focus of finding an outcome from deadlock and stress in the context of gradual recovery of tourism services through adequate health and safety protocols. The synergy of conventional and digital communication in the COVID-19 era (digital technology and data, mobile applications, artificial intelligence etc.) effectively adapts the measures to a situation characterized by paralysis of business activity and restrictions on travel and tourism. This paper offers a brief analysis of key messages in the unprecedented situation caused by the COVID-19 pandemic, in the context of the blow dealt to European tourism.
APA, Harvard, Vancouver, ISO, and other styles
5

Mekid, Samir, and Usman Akbar. "Configuration and Business Protocol of International Load Sharing of Manufacturing and its Challenges Under I4.0 and IIoT." In ASME 2019 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2019. http://dx.doi.org/10.1115/imece2019-10158.

Full text
Abstract:
Abstract The paper discusses the opportunities and challenges in a decentralized global manufacturing network infrastructure for international load sharing (ILS) envisaged for customized manufacturing. This is proposed to leverage Industry 4.0 factories to improve manufacturing throughput for worldwide orders. Smart manufactures are identified within IIoT worldwide subject to key specifications and performance. A business protocol is proposed to connect all manufacturing centers worldwide assuming their fitness to paradigm of industry 4.0 and utilizing technologies e.g. cloud computing, big-data management, condition and in-process based monitoring. The business protocol will support the ILS and manage the international orders for manufacturing products under specific requirements as a new concept compared to manual specific one. This not only allows customers to access worldwide facilities under cost, but also allows them to monitor the progress of production and related quality in real time because of IIoT. This proposed trend will lead to new investment opportunities for executives, as they will be able to sell manufacturing as a service while being connected to network from anywhere. Purchasing with online bidding, progress tracking, quick delivery and efficient routing will improve customer satisfaction.
APA, Harvard, Vancouver, ISO, and other styles
6

Ma, Haiying, and Ning Cai. "Swarm Stability of Compartmental Networks with Linear Time-Invariant High-Order Dynamical Protocol." In 2011 International Conference on Business Computing and Global Informatization (BCGIn). IEEE, 2011. http://dx.doi.org/10.1109/bcgin.2011.138.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Resner, Davi, and Antonio Augusto Frohlich. "TSTP MAC: A Foundation for the Trustful Space-Time Protocol." In 2016 19th IEEE Intl Conference on Computational Science and Engineering (CSE), IEEE 14th Intl Conference on Embedded and Ubiquitous Computing (EUC), and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES). IEEE, 2016. http://dx.doi.org/10.1109/cse-euc-dcabes.2016.159.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lo Iacono Ferreira, Vanesa G., and Juan Ignacio Torregrosa López. "Life Cycle Sustainability Analysis for Circular Economy." In CARPE Conference 2019: Horizon Europe and beyond. Valencia: Universitat Politècnica València, 2019. http://dx.doi.org/10.4995/carpe2019.2019.10490.

Full text
Abstract:
A Life Cycle Sustainability Analysis is a complex assessment that requires time, expertise and quality data. Decision-making boards of industries required live data to manage their business. Although planned changes can be made pursuing innovation and sustainability within a wide timeframe, daily decisions are often driven just by economic indicators. However, many industries are already implementing systems, simple or complex, that allows them to obtain some environmental or social information related to their activities aware that not only economic value foster ther circular economy that our planet needs. Key performance indicators are excellent information suppliers that can be define either in the economic, social or environmental area of a sustainable analysis. Willing to develop a methodology easy to apply in existing decision-making panels that incorporates social and environmental indicators to fill the gap of a sustianibility analisys, this research group is exploring new protocols and procedures to define customized key performance indicators. The inclusion of key performance indicators based in Life Cycle Assessment in existing management panels will serve as a tool to make the commitment of our European industries with circular economy come true.
APA, Harvard, Vancouver, ISO, and other styles
9

Porumb, Andra-Teodora, Adina Săcara-Oniţa, and Cristian Porumb. "THE DENTAL MEDICINE SECTOR IN THE AGE OF THE COVID-19 PANDEMIC – RECOVERY BETWEEN RISKS AND CHALLENGES." In Sixth International Scientific-Business Conference LIMEN Leadership, Innovation, Management and Economics: Integrated Politics of Research. Association of Economists and Managers of the Balkans, Belgrade, Serbia, 2020. http://dx.doi.org/10.31410/limen.2020.101.

Full text
Abstract:
In this paper we will show how the COVID-19 pandemic has affected one of the sectors that have undergone a booming development in recent years, namely the sector of dental medicine. This is an industry that includes numerous and diversified activities: treatments and surgical interventions in dental practices and clinics, dental aesthetics interventions in luxury clinics, the organization of specialization courses, conferences and congresses, the development of extremely innovative procedures and materials. Dental tourism has also had a spectacular trend, especially in Eastern European countries. Within a very short period of time, this highly profitable field, but which presents a huge risk of transmitting potential viruses, has recorded significant financial losses. In March 2020, in some European countries a lockdown was imposed by governmental decree or ordinance, all private practices having ceased their activity, whereas in other countries a significant number of clinics closed on their own initiative, and those remaining open recorded a staggering decrease in the number of patients. Courses, conferences, and congresses have been cancelled one after another throughout Europe. As a result of the cancellation of many flights, the activity in the branch of dental tourism has ceased almost entirely. For two months, an extremely small number of medical units, especially hospitals, were reorganized to provide care in dental emergencies, according to a very strict protocol to limit the risk of contamination. In view of resuming their activity as of May, professionals in the sector had to meet several severe protection conditions, regulated by institutional documents by the National Orders/Colleges of Dentists. In October, in the face of the second wave of the pandemic, the governments of European countries took less restrictive measures in an attempt to avoid a new lockdown and the decrease in the supply of goods and services to the population to such a great extent, so this time, governments have not closed private practices, despite the fact that in some countries the beginning of November has brought about a new isolation – albeit a partial one – and a renewed closedown of some businesses. We will analyze, in the context of the ongoing pandemic, the situation of this sector in several European countries. Given that the demand for dental services has only decreased very little, professionals in the sector have tried in various ways to continue their work so as not to sacrifice the dental health of the population. The risk/benefit ratio is very hard to manage in this field, so precautions, prevention, and protection measures in dental practices remain of the utmost importance. If the branch of organization of courses, conferences, congresses can compensate to a certain extent the sharp decline in revenues during the lockdown period by moving the activity on online platforms, the branch of dental tourism is still suffering massively, and the possibilities of recovery are greatly reduced. Dentists remain the most exposed to risks. They are facing medical and financial concerns and have to make final treatment decisions amidst an uncertain and dangerous situation
APA, Harvard, Vancouver, ISO, and other styles
10

Rajan, Vaidyanath, Badri Narayanan, Michael Barrett, and Kevin Beardsley. "Stainless Steel Pipe Welding With No Backing Gas." In ASME 2020 Pressure Vessels & Piping Conference. American Society of Mechanical Engineers, 2020. http://dx.doi.org/10.1115/pvp2020-21799.

Full text
Abstract:
Abstract For pipe fabrication shops, stainless steel pipe welding typically represents 15%–20% of their business. The pipe materials fabricated in these shops are primarily austenitic stainless 304L and 316L pipe. The quality requirements in stainless pipe fabrication shops are determined by performance requirements for service applications in low temperature, high temperature or corrosive environments. To enable the performance required in these applications, codes, standards and recommended practices for welding are frequently written from a conventional GTAW or SMAW welding paradigm. In addition, for the root pass and the first fill pass made with GTAW, an inert backing gas is always recommended to minimize or eliminate the discoloration or oxidation on the ID surface of the pipe near the root pass. The use of GTAW with inert backing gas adds significant time, complexity and cost to the welding of stainless pipe. In stainless pipe shop fabrication, very few welding practices recognize or encourage the use of GMAW welding solutions for these applications, even though it is known to be a more productive and economical welding process. Moreover, the absence of a consistent and proven GMAW welding solution in terms of either no backing gas GMAW, alternative options for expensive shielding gases, implementing unique welding waveforms etc., proves to be a hindrance in the adoption of GMAW solutions for the welding of stainless pipe. In this paper, we discuss advances that have been made in producing acceptable stainless pipe welds with a 1G GMAW welding solution using an STT® waveform for the root pass and a unique “Rapid X™” waveform for fill passes with no use of backing gas. One goal of this project was to also find a shielding gas mixture to provide acceptable welds from root to cap that takes into account both welding process performance as well as fabrication of defect free welds. Six different shielding gas mixtures with varying amounts of Ar, He, CO2 and N2 were evaluated. Results indicate that STT/RAPID X™ welds made with 97%Ar/2%CO2/1%H2 provide very promising results in terms of weld appearance and other conventional metrics such as radiography, bends and tensile properties. However, assessment of the corrosion performance in comparison to welds made with conventional GTAW requires development of a better test protocol than the ASTM G48 Method A test for it to be relevant and meaningful.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography