首页 > 最新文献

2011 10th IEEE/ACIS International Conference on Computer and Information Science最新文献

英文 中文
Model Checking WS-BPEL with Universal Modal Sequence Diagrams 使用通用模态序列图检查WS-BPEL的模型
Wenrui Li, Zhongxue Yang, Pengcheng Zhang, Zhijian Wang
Analyzing the composite service by manual is rather difficult and time-consuming. In the paper, we propose an approach to automatically verify the correctness of composite services by model checking based on a novel property specification universal Modal Sequence Diagrams(uMSDs). Because uMSDs can find a well-balance between simplicity of use and expressive power, the temporal properties of the composite service can be specified by uMSDs in an easy and intuitive way. Based on the formal syntax and semantics of uMSDs, a novel model checking approach is proposed to verify whether the model of WS-BPEL specification satisfies the properties represented by uMSDs. Finally, a series of experiments show the approach can effectively detect the logical errors in an On-the-Job Assistant case study.
手工分析组合服务相当困难且耗时。本文提出了一种基于通用模态序列图(umsd)的新型属性规范,通过模型检查自动验证组合服务正确性的方法。由于umsd能够很好地平衡使用的简单性和表达能力,因此可以通过umsd以简单直观的方式指定组合服务的时间属性。基于uml的形式化语法和语义,提出了一种新的模型检查方法来验证WS-BPEL规范的模型是否满足uml所表示的属性。最后,一系列的实验表明,该方法可以有效地检测出在职助理案例研究中的逻辑错误。
{"title":"Model Checking WS-BPEL with Universal Modal Sequence Diagrams","authors":"Wenrui Li, Zhongxue Yang, Pengcheng Zhang, Zhijian Wang","doi":"10.1109/ICIS.2011.58","DOIUrl":"https://doi.org/10.1109/ICIS.2011.58","url":null,"abstract":"Analyzing the composite service by manual is rather difficult and time-consuming. In the paper, we propose an approach to automatically verify the correctness of composite services by model checking based on a novel property specification universal Modal Sequence Diagrams(uMSDs). Because uMSDs can find a well-balance between simplicity of use and expressive power, the temporal properties of the composite service can be specified by uMSDs in an easy and intuitive way. Based on the formal syntax and semantics of uMSDs, a novel model checking approach is proposed to verify whether the model of WS-BPEL specification satisfies the properties represented by uMSDs. Finally, a series of experiments show the approach can effectively detect the logical errors in an On-the-Job Assistant case study.","PeriodicalId":256762,"journal":{"name":"2011 10th IEEE/ACIS International Conference on Computer and Information Science","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122095567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Achieve Load Balancing with a Re-routable LB-BvN Switching Scheme 利用可重路由LB-BvN交换方案实现负载均衡
Hongchang Chen, Hong-chao Hu, P. Yi, Shuqiao Chen
Multipath based routing and switching can achieve network-wide load balancing and reduce the port contentions of switching devices. From this point of view, in this paper, after analyzing the feasibility of implementing multinext-hop in core switching networks comprehensively, it comes up with a switching scheme called MXRS (Multi-next-hop Rerouting Switch) which supports multi-next-hop dynamical rerouting. The MXRS scheme implements dynamical re-routing internal the switches according to congestion status to achieve real-time load balancing, and it can provide various traffic with different routing paths based on their QoS requirements. Theoretical analysis and simulation results show that switches equipped with MXRS can provide both good delay and throughput performance, and can reduce port contentions significantly.
基于多路径的路由交换可以实现全网负载均衡,减少交换设备之间的端口争用。从这个角度出发,本文在全面分析了在核心交换网络中实现多下一跳的可行性后,提出了一种支持多下一跳动态重路由的交换方案MXRS (Multi-next-hop rerrouting Switch)。MXRS方案在交换机内部根据拥塞状态动态重路由,实现实时负载均衡,并可根据各种流量的QoS要求为其提供不同的路由路径。理论分析和仿真结果表明,配置MXRS的交换机可以提供良好的延迟和吞吐量性能,并能显著减少端口争用。
{"title":"Achieve Load Balancing with a Re-routable LB-BvN Switching Scheme","authors":"Hongchang Chen, Hong-chao Hu, P. Yi, Shuqiao Chen","doi":"10.1109/ICIS.2011.14","DOIUrl":"https://doi.org/10.1109/ICIS.2011.14","url":null,"abstract":"Multipath based routing and switching can achieve network-wide load balancing and reduce the port contentions of switching devices. From this point of view, in this paper, after analyzing the feasibility of implementing multinext-hop in core switching networks comprehensively, it comes up with a switching scheme called MXRS (Multi-next-hop Rerouting Switch) which supports multi-next-hop dynamical rerouting. The MXRS scheme implements dynamical re-routing internal the switches according to congestion status to achieve real-time load balancing, and it can provide various traffic with different routing paths based on their QoS requirements. Theoretical analysis and simulation results show that switches equipped with MXRS can provide both good delay and throughput performance, and can reduce port contentions significantly.","PeriodicalId":256762,"journal":{"name":"2011 10th IEEE/ACIS International Conference on Computer and Information Science","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129041615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Embracement of E-Tourism in Ecotourism: A Case Study of Tourism Websites for Galapagos 生态旅游中电子旅游的拥抱:加拉帕戈斯群岛旅游网站的案例研究
Meng Zhang, Wei Yu, Jun Yuan
Ecotourism and e-tourism are both perceived as the overwhelming trend for today¡¦s tourism industry, and share some common features on both demand and supply sides, which lays the foundation for the feasibility of the application of e-tourism to ecotourism. The objective of this paper is to identify the critical issues of integration between them two through the empirical analysis of Ecuadorian Galapagos, which is generally accepted as an exemplary demonstration for ecotourism initiatives in the world. A total number of eighty-six websites concerning tourism in Galapagos are found and categorized into three types in terms of their hosts or affiliations, namely, tourism companies, governments and non-governmental organizations and professional tourism websites. As the focus of this study, the seventy-two websites belonging to tourism companies are examined in great depth, from aspects of inclusion of travel information, customer relationship management, online transaction and advocacy of ecotourism. As the findings show, these website have made good use of the sound environment and unique resources of Galapagos to boost their business, and have done well in information provision and customer relationship management, but still have considerable room for improvement in advocating ecotourism or responsible travel through online environmental education and visitor management. Finally, a few recommendations are proposed accordingly.
生态旅游和电子旅游都被认为是当今旅游业的大势所趋,它们在需求端和供给端都有一些共同的特点,这为电子旅游在生态旅游中的应用奠定了可行性基础。本文的目的是通过对厄瓜多尔加拉帕戈斯群岛的实证分析,确定两者之间整合的关键问题,厄瓜多尔加拉帕戈斯群岛被普遍认为是世界上生态旅游倡议的典范示范。我们一共发现了86个关于加拉帕戈斯群岛旅游的网站,并根据网站的主人或隶属关系将其分为三类,即旅游公司、政府和非政府组织以及专业旅游网站。本研究以旅游企业所属的72家网站为研究重点,从旅游资讯收录、客户关系管理、线上交易、生态旅游宣传等方面进行深入研究。调查结果表明,这些网站很好地利用了加拉帕戈斯群岛良好的环境和独特的资源来促进他们的业务,并在信息提供和客户关系管理方面做得很好,但在通过在线环境教育和游客管理倡导生态旅游或负责任的旅行方面仍有相当大的改进空间。最后,提出了几点建议。
{"title":"Embracement of E-Tourism in Ecotourism: A Case Study of Tourism Websites for Galapagos","authors":"Meng Zhang, Wei Yu, Jun Yuan","doi":"10.1109/ICIS.2011.33","DOIUrl":"https://doi.org/10.1109/ICIS.2011.33","url":null,"abstract":"Ecotourism and e-tourism are both perceived as the overwhelming trend for today¡¦s tourism industry, and share some common features on both demand and supply sides, which lays the foundation for the feasibility of the application of e-tourism to ecotourism. The objective of this paper is to identify the critical issues of integration between them two through the empirical analysis of Ecuadorian Galapagos, which is generally accepted as an exemplary demonstration for ecotourism initiatives in the world. A total number of eighty-six websites concerning tourism in Galapagos are found and categorized into three types in terms of their hosts or affiliations, namely, tourism companies, governments and non-governmental organizations and professional tourism websites. As the focus of this study, the seventy-two websites belonging to tourism companies are examined in great depth, from aspects of inclusion of travel information, customer relationship management, online transaction and advocacy of ecotourism. As the findings show, these website have made good use of the sound environment and unique resources of Galapagos to boost their business, and have done well in information provision and customer relationship management, but still have considerable room for improvement in advocating ecotourism or responsible travel through online environmental education and visitor management. Finally, a few recommendations are proposed accordingly.","PeriodicalId":256762,"journal":{"name":"2011 10th IEEE/ACIS International Conference on Computer and Information Science","volume":"173 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131544830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Automatic Detection Model of Malware Signature for Anti-virus Cloud Computing 面向防病毒云计算的恶意软件签名自动检测模型
Lihua Wu, Yu Zhang
Security vendors are facing a serious problem of defeating the complexity of malwares. With the popularity and the variety of malware over the Internet, generating their signatures for detecting via anti-virus (AV) scan engines becomes an important reactive security function. However, AV security products consume much of the PC memory and resources due to their large signature files. AV cloud computing becomes a popular solution for this problem. In this paper, a novel automatic malware signature discovery system for AV cloud (AMSDS) is proposed to generate malware signatures from both static and dynamic aspects. Our experiment on millions-scale samples indicates that AMSDS outperforms most automatic signature generation techniques of both industry and academia. The detection model of malware signature can provides research thinking for anti-virus technology to improve and enhance, especially on detecting and preventing unknown viruses or malware signature.
安全供应商正面临着战胜恶意软件复杂性的严重问题。随着互联网上恶意软件的流行和种类的增多,生成恶意软件的签名以供反病毒扫描引擎检测成为一项重要的响应式安全功能。但是,由于反病毒安全产品的签名文件比较大,会消耗大量的PC机内存和资源。AV云计算成为解决这一问题的流行解决方案。本文提出了一种新的反病毒云恶意软件签名自动发现系统(AMSDS),从静态和动态两个方面生成恶意软件签名。我们在百万级样本上的实验表明,AMSDS优于工业界和学术界的大多数自动签名生成技术。恶意软件签名的检测模型可以为反病毒技术的改进和增强提供研究思路,特别是在检测和预防未知病毒或恶意软件签名方面。
{"title":"Automatic Detection Model of Malware Signature for Anti-virus Cloud Computing","authors":"Lihua Wu, Yu Zhang","doi":"10.1109/ICIS.2011.73","DOIUrl":"https://doi.org/10.1109/ICIS.2011.73","url":null,"abstract":"Security vendors are facing a serious problem of defeating the complexity of malwares. With the popularity and the variety of malware over the Internet, generating their signatures for detecting via anti-virus (AV) scan engines becomes an important reactive security function. However, AV security products consume much of the PC memory and resources due to their large signature files. AV cloud computing becomes a popular solution for this problem. In this paper, a novel automatic malware signature discovery system for AV cloud (AMSDS) is proposed to generate malware signatures from both static and dynamic aspects. Our experiment on millions-scale samples indicates that AMSDS outperforms most automatic signature generation techniques of both industry and academia. The detection model of malware signature can provides research thinking for anti-virus technology to improve and enhance, especially on detecting and preventing unknown viruses or malware signature.","PeriodicalId":256762,"journal":{"name":"2011 10th IEEE/ACIS International Conference on Computer and Information Science","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124552162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Scaling Behavior of Time Series and an Empirical Indication to Financial Prediction 时间序列的标度行为及其对金融预测的实证指示
Erbo Zhao, Shijie Jiang, Dan Luo, Yun Bao, Zhangang Han
Scaling exponent is used widely to measure the long-rang correlation of time series. The most typical original methods are Re-scale Range Analysis (R/S) and Detrended Fluctuation Analysis (DFA), both of which aim to calculate an effective exponent to characterize the given time series, but the latter is more effective to non-stationary series. In this paper, we firstly compare some typical series and find that when Hurst exponents are greater than 0.9, DFA is a better method to distinguish the two series with exponents of small difference in that range where non-stationary most likely exists. This is useful in solving the important open problem of telling whether the real financial data are Brownian motions. Furthermore, we reset the empirical series from stock market according to different time interval and employ the Binary Logistic Regression to estimate the prediction degree of the reset series with different exponents. Results prove that the model's predicting accuracy is significant when scaling exponent is beyond ± 0.1 deviation from 0.5, especially far less than 0.4 with non-stationary trait in raw series, showing the condition when predicting models should be introduced.
尺度指数被广泛用于度量时间序列的长程相关性。最典型的原始方法是重标度极差分析(Re-scale Range Analysis, R/S)和去趋势波动分析(Detrended Fluctuation Analysis, DFA),它们的目的都是计算一个有效指数来表征给定的时间序列,但后者对非平稳序列更有效。在本文中,我们首先比较了一些典型的序列,发现当Hurst指数大于0.9时,在最可能存在非平稳的范围内,DFA是区分指数差较小的两个序列的较好方法。这有助于解决一个重要的公开问题,即判断真实的金融数据是否属于布朗运动。此外,我们根据不同的时间间隔对股票市场的经验序列进行重置,并利用二元Logistic回归估计不同指数的重置序列的预测程度。结果表明,当尺度指数与0.5的偏差大于±0.1时,模型的预测精度是显著的,特别是在原始序列中具有非平稳特征的情况下,模型的预测精度远小于0.4,表明了应该引入预测模型的条件。
{"title":"Scaling Behavior of Time Series and an Empirical Indication to Financial Prediction","authors":"Erbo Zhao, Shijie Jiang, Dan Luo, Yun Bao, Zhangang Han","doi":"10.1109/ICIS.2011.28","DOIUrl":"https://doi.org/10.1109/ICIS.2011.28","url":null,"abstract":"Scaling exponent is used widely to measure the long-rang correlation of time series. The most typical original methods are Re-scale Range Analysis (R/S) and Detrended Fluctuation Analysis (DFA), both of which aim to calculate an effective exponent to characterize the given time series, but the latter is more effective to non-stationary series. In this paper, we firstly compare some typical series and find that when Hurst exponents are greater than 0.9, DFA is a better method to distinguish the two series with exponents of small difference in that range where non-stationary most likely exists. This is useful in solving the important open problem of telling whether the real financial data are Brownian motions. Furthermore, we reset the empirical series from stock market according to different time interval and employ the Binary Logistic Regression to estimate the prediction degree of the reset series with different exponents. Results prove that the model's predicting accuracy is significant when scaling exponent is beyond ± 0.1 deviation from 0.5, especially far less than 0.4 with non-stationary trait in raw series, showing the condition when predicting models should be introduced.","PeriodicalId":256762,"journal":{"name":"2011 10th IEEE/ACIS International Conference on Computer and Information Science","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114847159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
German Speech Recognition: A Solution for the Analysis and Processing of Lecture Recordings 德语语音识别:演讲录音分析与处理的解决方案
Haojin Yang, Christoph Oehlke, C. Meinel
Since recording technology has become more robust and easier to use, more and more universities are taking the opportunity to record their lectures and put them on the Web in order to make them accessable by students. The automatic speech recognition (ASR) techniques provide a valueable source for indexing and retrieval of lecture video materials. In this paper, we evaluate the state-of-the-art speech recognition software to find a solution for the automatic transcription of German lecture videos. Our experimental results show that the word error rates (WERs) was reduced by 12.8% when the speech training corpus of a lecturer is increased by 1.6 hours.
由于录音技术变得更加强大和容易使用,越来越多的大学正在利用这个机会录制他们的讲座,并把它们放在网上,以便学生可以访问。自动语音识别(ASR)技术为讲座视频资料的索引和检索提供了一个有价值的资源。在本文中,我们评估了最先进的语音识别软件,以寻找自动转录德语讲座视频的解决方案。实验结果表明,当讲师的语音训练语料库增加1.6小时时,单词错误率(wer)降低了12.8%。
{"title":"German Speech Recognition: A Solution for the Analysis and Processing of Lecture Recordings","authors":"Haojin Yang, Christoph Oehlke, C. Meinel","doi":"10.1109/ICIS.2011.38","DOIUrl":"https://doi.org/10.1109/ICIS.2011.38","url":null,"abstract":"Since recording technology has become more robust and easier to use, more and more universities are taking the opportunity to record their lectures and put them on the Web in order to make them accessable by students. The automatic speech recognition (ASR) techniques provide a valueable source for indexing and retrieval of lecture video materials. In this paper, we evaluate the state-of-the-art speech recognition software to find a solution for the automatic transcription of German lecture videos. Our experimental results show that the word error rates (WERs) was reduced by 12.8% when the speech training corpus of a lecturer is increased by 1.6 hours.","PeriodicalId":256762,"journal":{"name":"2011 10th IEEE/ACIS International Conference on Computer and Information Science","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122882787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Detection of Regular Predicates in a Whole Space in Distributed Computation 分布式计算中全空间规则谓词的检测
Hongtao Huang
Given a distributed computation and a predicate, detection of the predicate in textit{Definitely} modality means checking whether in every path from the least state to the greatest state in the state space generated from the computation, which is a distributive lattice, there exists a state satisfying the predicate. The regular predicate is a class of predicates. All the states satisfying the predicate form a sub lattice of state space. Detection of a regular predicate in textit{Definitely} modality is proved to be coNP-complete. In this paper, we study a special kind of state spaces, the whole space, in which all states of the computation are consistent. We propose two polynomial algorithms for detection of regular predicates in textit{Definitely} modality in a whole space.
给定一个分布式计算和一个谓词,textit{确定}模态中谓词的检测是指在计算生成的状态空间中,从最小状态到最大状态的每条路径(即分布格)中是否存在满足该谓词的状态。规则谓词是一类谓词。所有满足谓词的状态构成状态空间的一个子格。证明了textit{确定}模态中正则谓词的检测是conp完全的。本文研究了一种特殊的状态空间——整体空间,其中所有的计算状态都是一致的。我们提出了两种多项式算法来检测整个空间中textit{确定}模态的规则谓词。
{"title":"Detection of Regular Predicates in a Whole Space in Distributed Computation","authors":"Hongtao Huang","doi":"10.1109/ICIS.2011.30","DOIUrl":"https://doi.org/10.1109/ICIS.2011.30","url":null,"abstract":"Given a distributed computation and a predicate, detection of the predicate in textit{Definitely} modality means checking whether in every path from the least state to the greatest state in the state space generated from the computation, which is a distributive lattice, there exists a state satisfying the predicate. The regular predicate is a class of predicates. All the states satisfying the predicate form a sub lattice of state space. Detection of a regular predicate in textit{Definitely} modality is proved to be coNP-complete. In this paper, we study a special kind of state spaces, the whole space, in which all states of the computation are consistent. We propose two polynomial algorithms for detection of regular predicates in textit{Definitely} modality in a whole space.","PeriodicalId":256762,"journal":{"name":"2011 10th IEEE/ACIS International Conference on Computer and Information Science","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129486186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information and Communication Technologies in Destination Management and Marketing: The China Scene 目的地管理和市场营销中的信息和通信技术:中国场景
Wencai Du, Qinling Xin, Shaochun Xu, Hui Zhou
Effective destination management and marketing is fundamental to the creation of a successful tourism destination. Tourism destination industry can be seen as one of the first business sectors where business functions are almost exclusively using information and Communications Technologies (ICTs). The method of promoting regions through the development of provincial or regional tourist destination websites or portals using Internet technologies is increasingly being adopted both in China and around the world. In this work, we conducted a literature review on information and communication technologies (ICTs) used in destination management and marketing in China and found that ICT applications are mainly used at low-medium levels and there is lacking of an integrated application suite for this industry, similar to the situation existing in other developing countries. The survey also demonstrated a trend toward Chinese tourism destination which might extend beyond the tourism industry scene in the mainland China and facilitate the robust ICTs base needed for competing in the global tourism economy.
有效的目的地管理和营销是创建一个成功的旅游目的地的基础。旅游目的地行业可以被视为业务功能几乎完全使用信息和通信技术(ict)的首批业务部门之一。利用互联网技术,通过开发省级或区域性旅游目的地网站或门户网站来推广区域的方法,在中国和世界各地越来越多地被采用。在这项工作中,我们对中国在目的地管理和营销中使用的信息通信技术(ICT)进行了文献综述,发现ICT应用主要用于中低水平,并且缺乏针对该行业的集成应用套件,这与其他发展中国家的情况类似。调查还显示了一种向中国旅游目的地发展的趋势,这种趋势可能会扩展到中国大陆的旅游业领域之外,并促进在全球旅游经济中竞争所需的强大的信息通信技术基础。
{"title":"Information and Communication Technologies in Destination Management and Marketing: The China Scene","authors":"Wencai Du, Qinling Xin, Shaochun Xu, Hui Zhou","doi":"10.1109/ICIS.2011.66","DOIUrl":"https://doi.org/10.1109/ICIS.2011.66","url":null,"abstract":"Effective destination management and marketing is fundamental to the creation of a successful tourism destination. Tourism destination industry can be seen as one of the first business sectors where business functions are almost exclusively using information and Communications Technologies (ICTs). The method of promoting regions through the development of provincial or regional tourist destination websites or portals using Internet technologies is increasingly being adopted both in China and around the world. In this work, we conducted a literature review on information and communication technologies (ICTs) used in destination management and marketing in China and found that ICT applications are mainly used at low-medium levels and there is lacking of an integrated application suite for this industry, similar to the situation existing in other developing countries. The survey also demonstrated a trend toward Chinese tourism destination which might extend beyond the tourism industry scene in the mainland China and facilitate the robust ICTs base needed for competing in the global tourism economy.","PeriodicalId":256762,"journal":{"name":"2011 10th IEEE/ACIS International Conference on Computer and Information Science","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130254310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Geospatially-Aware Access Control for Distributed Spatial Database Based on View Mechanism 基于视图机制的分布式空间数据库地理空间感知访问控制
L. Shu, Jiayuan Lin, Jiliu Zhou
With the growing need of integration and sharing of spatial data located in different places on the network, distributed spatial database technology has become a hot research field. Meanwhile, spatial information security, especially access control, has attracted more and more attention in practice. Access control for distributed spatial databases has two challenges: realization of fine-grained and spatially aware access control, check access requests against authorization information and make access decision. The general methods to meet these challenges are fairly complicated and difficult to accomplish. Therefore, we propose using views to implement access control functionality for distributed spatial database, whose P2P architecture is firstly described. Then we discuss the definition and authorization of distributed views and their management. Finally, we put forward the reference framework and explain the control procedure.
随着人们对分布在网络上不同位置的空间数据的集成和共享的需求日益增长,分布式空间数据库技术已成为一个研究热点。与此同时,空间信息安全,特别是访问控制,在实践中越来越受到重视。分布式空间数据库的访问控制面临两个挑战:实现细粒度和空间感知的访问控制、根据授权信息检查访问请求和做出访问决策。应对这些挑战的一般方法相当复杂,难以实现。因此,我们提出使用视图来实现分布式空间数据库的访问控制功能,并首先描述了分布式空间数据库的P2P架构。然后讨论了分布式视图的定义、授权及其管理。最后,提出了参考框架,说明了控制步骤。
{"title":"Geospatially-Aware Access Control for Distributed Spatial Database Based on View Mechanism","authors":"L. Shu, Jiayuan Lin, Jiliu Zhou","doi":"10.1109/ICIS.2011.11","DOIUrl":"https://doi.org/10.1109/ICIS.2011.11","url":null,"abstract":"With the growing need of integration and sharing of spatial data located in different places on the network, distributed spatial database technology has become a hot research field. Meanwhile, spatial information security, especially access control, has attracted more and more attention in practice. Access control for distributed spatial databases has two challenges: realization of fine-grained and spatially aware access control, check access requests against authorization information and make access decision. The general methods to meet these challenges are fairly complicated and difficult to accomplish. Therefore, we propose using views to implement access control functionality for distributed spatial database, whose P2P architecture is firstly described. Then we discuss the definition and authorization of distributed views and their management. Finally, we put forward the reference framework and explain the control procedure.","PeriodicalId":256762,"journal":{"name":"2011 10th IEEE/ACIS International Conference on Computer and Information Science","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128869651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Preliminary Study on the Use of the ICTs in the Tourism Industry in China 中国旅游业信息通信技术应用的初步研究
Wencai Du, Qinling Xin, Shaochun Xu, Hui Zhou, Jingjing Guo
This paper examines the development of Information and Communication Technologies (ICTs) in the tourism industry, focusing mainly on their impact on the sectors of hospitality, travel agent, electronic travel intermediary, tourism destination organizations, and airlines. The key question raised by this study is how the ICTs are affecting the business running and management in these sectors. This article analyzes trends in internet-based sales of a range of different travel and tourism services in the past five years in the mainland China. The study result demonstrates that the internet-based travel and tourism services market in the mainland China has been increasing dramatically during last a few years. The Internet-based Intermediaries have increased their share of online sales as well.
本文考察了信息和通信技术(ict)在旅游业中的发展,主要关注它们对酒店、旅行社、电子旅游中介、旅游目的地组织和航空公司等部门的影响。本研究提出的关键问题是信息通信技术如何影响这些行业的业务运营和管理。本文分析了过去五年中国大陆一系列不同旅游服务的互联网销售趋势。研究结果显示,在过去几年中,中国大陆的互联网旅游和旅游服务市场急剧增长。以互联网为基础的中间商也增加了他们在网上销售中的份额。
{"title":"A Preliminary Study on the Use of the ICTs in the Tourism Industry in China","authors":"Wencai Du, Qinling Xin, Shaochun Xu, Hui Zhou, Jingjing Guo","doi":"10.1109/ICIS.2011.65","DOIUrl":"https://doi.org/10.1109/ICIS.2011.65","url":null,"abstract":"This paper examines the development of Information and Communication Technologies (ICTs) in the tourism industry, focusing mainly on their impact on the sectors of hospitality, travel agent, electronic travel intermediary, tourism destination organizations, and airlines. The key question raised by this study is how the ICTs are affecting the business running and management in these sectors. This article analyzes trends in internet-based sales of a range of different travel and tourism services in the past five years in the mainland China. The study result demonstrates that the internet-based travel and tourism services market in the mainland China has been increasing dramatically during last a few years. The Internet-based Intermediaries have increased their share of online sales as well.","PeriodicalId":256762,"journal":{"name":"2011 10th IEEE/ACIS International Conference on Computer and Information Science","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128121353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2011 10th IEEE/ACIS International Conference on Computer and Information Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1