首页 > 最新文献

2009 IEEE Conference on Commerce and Enterprise Computing最新文献

英文 中文
A Business Model for Mobile Ad-Hoc Communities 移动Ad-Hoc社区的商业模式
Pub Date : 2009-07-20 DOI: 10.1109/CEC.2009.73
Stefan Stieglitz, Christoph Fuchß, Christoph Lattemann
Portable devices with Bluetooth interfaces, such as mobile phones and PDAs, are enabled for near field communication (
具有蓝牙接口的便携设备,例如流动电话和掌上电脑,可进行近场通讯(
{"title":"A Business Model for Mobile Ad-Hoc Communities","authors":"Stefan Stieglitz, Christoph Fuchß, Christoph Lattemann","doi":"10.1109/CEC.2009.73","DOIUrl":"https://doi.org/10.1109/CEC.2009.73","url":null,"abstract":"Portable devices with Bluetooth interfaces, such as mobile phones and PDAs, are enabled for near field communication (","PeriodicalId":384060,"journal":{"name":"2009 IEEE Conference on Commerce and Enterprise Computing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124001189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A QoS-Driven Approach for Semantic Service Composition 语义服务组合的qos驱动方法
Pub Date : 2009-07-20 DOI: 10.1109/CEC.2009.44
Yixin Yan, Bin Xu, Zhifeng Gu, Sen Luo
Semantic information, which is well-regulated and easy to be retrieved, has greatly enriched the expressive ability of the Web. These advantages can be applied in Web Services to meet the increasing complexity of Web applications. In this paper, we propose a service composition approach. It combines the large-scaled Web Services and semantic information which is described in WSC’09. Besides, QoS has become a critical issue to evaluate the performance of Web applications. Being different from improving the QoS of single services, our approach focuses on the overall QoS of the service composition. The algorithm shows that the semantic information based and QoS driven approach improves the efficiency and QoS performance of service composition.
语义信息规范、易于检索,极大地丰富了Web的表达能力。可以在Web服务中应用这些优势,以满足Web应用程序日益增加的复杂性。在本文中,我们提出了一种服务组合方法。它结合了WSC ' 09中描述的大规模Web服务和语义信息。此外,QoS已成为评价Web应用程序性能的关键问题。与改进单个服务的QoS不同,我们的方法侧重于服务组合的整体QoS。该算法表明,基于语义信息和QoS驱动的方法提高了服务组合的效率和QoS性能。
{"title":"A QoS-Driven Approach for Semantic Service Composition","authors":"Yixin Yan, Bin Xu, Zhifeng Gu, Sen Luo","doi":"10.1109/CEC.2009.44","DOIUrl":"https://doi.org/10.1109/CEC.2009.44","url":null,"abstract":"Semantic information, which is well-regulated and easy to be retrieved, has greatly enriched the expressive ability of the Web. These advantages can be applied in Web Services to meet the increasing complexity of Web applications. In this paper, we propose a service composition approach. It combines the large-scaled Web Services and semantic information which is described in WSC’09. Besides, QoS has become a critical issue to evaluate the performance of Web applications. Being different from improving the QoS of single services, our approach focuses on the overall QoS of the service composition. The algorithm shows that the semantic information based and QoS driven approach improves the efficiency and QoS performance of service composition.","PeriodicalId":384060,"journal":{"name":"2009 IEEE Conference on Commerce and Enterprise Computing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115658692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Privacy Application Infrastructure: Confidential Data Masking 隐私应用程序基础结构:机密数据屏蔽
Pub Date : 2009-07-20 DOI: 10.1109/CEC.2009.43
B. Liver, K. Tice
Handling of confidential and sensitive data is an important issue facing any professional service provider that wishes to use services from a third party company. This paper describes an infrastructure, the Privacy Infrastructure Appliance that was designed to protect confidential information when outsourcing service fulfillment. A comparison is made with an embedded solution that does not use an infrastructure.There are two use cases to consider, one use case is the outsourcing of back-end service fulfillment, such as executing foreign exchange trade orders and the second use case is the outsourcing of back-office activities, such as non-core competence office work. In considering back-end service delivery, we look at the use of computer systems and processes, which are not privy to confidential information. In considering back-office clerical activities, we look at the human component of service fulfillment, the clerical office worker. The clerical office worker that is outsourced, will still use the applications of the outsourcing company, but he is no longer privy to confidential information. This paper describes and contrasts two solutions. An infrastructure that was built to meet confidential information requirements for doing outsourcing of solution delivery systems and an application approach to mask confidential information from outsourced back office workers.
处理机密和敏感数据是任何希望使用第三方公司服务的专业服务提供商面临的一个重要问题。本文描述了一个基础设施,即隐私基础设施设备,它被设计用于在外包服务实现时保护机密信息。与不使用基础设施的嵌入式解决方案进行比较。有两个用例需要考虑,一个用例是后端服务实现的外包,例如执行外汇交易订单,第二个用例是后台活动的外包,例如非核心竞争力办公室工作。在考虑后端服务交付时,我们会考虑使用不涉及机密信息的计算机系统和流程。在考虑后台办公室文书活动时,我们关注服务实现的人类组成部分,即办公室文书工作人员。被外包的文职人员仍然会使用外包公司的应用程序,但他不再了解机密信息。本文描述并对比了两种解决方案。为满足解决方案交付系统外包的机密信息需求而构建的基础设施,以及对外包后端办公室工作人员屏蔽机密信息的应用程序方法。
{"title":"Privacy Application Infrastructure: Confidential Data Masking","authors":"B. Liver, K. Tice","doi":"10.1109/CEC.2009.43","DOIUrl":"https://doi.org/10.1109/CEC.2009.43","url":null,"abstract":"Handling of confidential and sensitive data is an important issue facing any professional service provider that wishes to use services from a third party company. This paper describes an infrastructure, the Privacy Infrastructure Appliance that was designed to protect confidential information when outsourcing service fulfillment. A comparison is made with an embedded solution that does not use an infrastructure.There are two use cases to consider, one use case is the outsourcing of back-end service fulfillment, such as executing foreign exchange trade orders and the second use case is the outsourcing of back-office activities, such as non-core competence office work. In considering back-end service delivery, we look at the use of computer systems and processes, which are not privy to confidential information. In considering back-office clerical activities, we look at the human component of service fulfillment, the clerical office worker. The clerical office worker that is outsourced, will still use the applications of the outsourcing company, but he is no longer privy to confidential information. This paper describes and contrasts two solutions. An infrastructure that was built to meet confidential information requirements for doing outsourcing of solution delivery systems and an application approach to mask confidential information from outsourced back office workers.","PeriodicalId":384060,"journal":{"name":"2009 IEEE Conference on Commerce and Enterprise Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128699705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Structural Aspects of Business Process Diagram Abstraction 业务流程图抽象的结构方面
Pub Date : 2009-07-20 DOI: 10.1109/CEC.2009.18
S. Smirnov
As companies more and more often turn todocumenting their business processes in models, the task ofmanaging large model collections becomes essential. Thereis a number of techniques simplifying this task, e.g., constructionof customized process views and business processmodel abstraction. The latter aims at deriving abstract processrepresentations from existing low-level models omitting detailsirrelevant for the current task. A number of papers on processmodel abstraction conceptualized the abstraction problem andproposed algorithms handling simplistic models. To the bestof our knowledge there is no work discussing abstraction ofmodels in BPMN. In this paper we present an abstractionapproach, addressing specific features of BPMN 1.2. Theabstraction approach is order-preserving and is capable ofhandling graph-structured process models.
随着公司越来越多地转向在模型中记录他们的业务流程,管理大型模型集合的任务变得必不可少。有许多技术可以简化此任务,例如,自定义流程视图的构造和业务流程模型抽象。后者旨在从现有的低级模型中派生出抽象的过程表示,而忽略了与当前任务相关的细节。一些关于过程模型抽象的论文对抽象问题进行了概念化,并提出了处理简化模型的算法。据我们所知,在BPMN中没有讨论模型抽象的工作。在本文中,我们提出了一种抽象方法,解决了BPMN 1.2的特定特性。抽象方法是保持顺序的,能够处理图结构的过程模型。
{"title":"Structural Aspects of Business Process Diagram Abstraction","authors":"S. Smirnov","doi":"10.1109/CEC.2009.18","DOIUrl":"https://doi.org/10.1109/CEC.2009.18","url":null,"abstract":"As companies more and more often turn todocumenting their business processes in models, the task ofmanaging large model collections becomes essential. Thereis a number of techniques simplifying this task, e.g., constructionof customized process views and business processmodel abstraction. The latter aims at deriving abstract processrepresentations from existing low-level models omitting detailsirrelevant for the current task. A number of papers on processmodel abstraction conceptualized the abstraction problem andproposed algorithms handling simplistic models. To the bestof our knowledge there is no work discussing abstraction ofmodels in BPMN. In this paper we present an abstractionapproach, addressing specific features of BPMN 1.2. Theabstraction approach is order-preserving and is capable ofhandling graph-structured process models.","PeriodicalId":384060,"journal":{"name":"2009 IEEE Conference on Commerce and Enterprise Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125316111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Nash Bargaining Based Ad Networks for Sponsored Search Auctions 基于纳什议价的赞助搜索拍卖广告网络
Pub Date : 2009-07-20 DOI: 10.1109/CEC.2009.46
R. Kannan, Dinesh Garg, Karthik Subbian, Y. Narahari
In this paper, we consider an emerging scenario in sponsored web search auctions where ad networks would be involved as intermediaries between a search engine and its advertisers. In this context, we address the problem of the ad network identifying a bid profile that makes the sponsored search auction attractive to the registered bidders. Given (1) the valuation of the advertisers competing for sponsored slots corresponding to a keyword, and (2) relevant click-through rates, the proposed algorithm generates a bid profile that can be input to a standard generalized second price based sponsored search auction mechanism. The bid profile is derived using a two person Nash bargaining model which ensures a fair share of utility between the search engine and the advertisers. In the proposed model, the auctioneer (search engine) is one player and a virtual aggregated bidder representing all the $n$ advertisers is the other player. We show that the feasible set for the Nash bargaining formulation is a convex hull with three points that can be computed in $O(nlogn)$ time. We derive the Nash bargaining solution and show that it can be mapped to a bid profile of the bidders in $O(n)$ time.
在本文中,我们考虑了赞助网络搜索拍卖中的一个新兴场景,其中广告网络将作为搜索引擎与其广告商之间的中介参与其中。在这种情况下,我们解决了广告网络识别出价配置文件的问题,使赞助搜索拍卖对注册投标人具有吸引力。给定(1)竞争与关键字对应的赞助时段的广告商的估值,以及(2)相关的点击率,所提出的算法生成一个出价配置文件,该文件可以输入到标准的基于广义第二价格的赞助搜索拍卖机制中。竞价配置文件是使用两人纳什议价模型导出的,该模型确保了搜索引擎和广告商之间的公平效用份额。在提议的模型中,拍卖商(搜索引擎)是一个参与者,代表所有广告商的虚拟聚合竞标者是另一个参与者。我们证明了纳什议价公式的可行集是一个有三个点的凸包,可以在$O(nlogn)$时间内计算出来。我们导出了纳什议价解,并证明了它可以映射到竞标者在$O(n)$时间内的出价轮廓。
{"title":"Nash Bargaining Based Ad Networks for Sponsored Search Auctions","authors":"R. Kannan, Dinesh Garg, Karthik Subbian, Y. Narahari","doi":"10.1109/CEC.2009.46","DOIUrl":"https://doi.org/10.1109/CEC.2009.46","url":null,"abstract":"In this paper, we consider an emerging scenario in sponsored web search auctions where ad networks would be involved as intermediaries between a search engine and its advertisers. In this context, we address the problem of the ad network identifying a bid profile that makes the sponsored search auction attractive to the registered bidders. Given (1) the valuation of the advertisers competing for sponsored slots corresponding to a keyword, and (2) relevant click-through rates, the proposed algorithm generates a bid profile that can be input to a standard generalized second price based sponsored search auction mechanism. The bid profile is derived using a two person Nash bargaining model which ensures a fair share of utility between the search engine and the advertisers. In the proposed model, the auctioneer (search engine) is one player and a virtual aggregated bidder representing all the $n$ advertisers is the other player. We show that the feasible set for the Nash bargaining formulation is a convex hull with three points that can be computed in $O(nlogn)$ time. We derive the Nash bargaining solution and show that it can be mapped to a bid profile of the bidders in $O(n)$ time.","PeriodicalId":384060,"journal":{"name":"2009 IEEE Conference on Commerce and Enterprise Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125360860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Business Intelligence Methodology for E-government Reverse Auctions 电子政务逆向拍卖的商业智能方法
Pub Date : 2009-07-20 DOI: 10.1109/CEC.2009.37
Rafael Souza, A. Pereira
In the first quarter of year 2008, electronic reverseauctions (e-RAs) allowed the Brazilian Government tosave up to US$ 270 million, which account for 87% ofits acquisitions in the period, against 1% in the sameperiod 6 years earlier – according to the Ministry ofPlanning, Budget and Management. A tool of suchimportance is subjected to fraud or even anomalousbehaviors, which are difficult to detect with simpleanalysis over the current system. In this paper we lookforward into identifying suspicious behaviors in egovernmentprocurement systems, through the use ofbusiness intelligence techniques. The results confirmthat our methodology can help discovering interestingaspects that can be used to help market players indecision support and auctioneer’s management.
根据巴西计划、预算和管理部的数据,2008年第一季度,电子逆向拍卖(e-RAs)使巴西政府节省了高达2.7亿美元,占其在此期间收购的87%,而6年前同期为1%。如此重要的工具容易受到欺诈甚至异常行为的影响,而这些行为很难通过对当前系统的简单分析来检测。在本文中,我们期望通过使用商业智能技术来识别电子政府采购系统中的可疑行为。结果证实,我们的方法可以帮助发现有趣的方面,可以用来帮助市场参与者的优柔寡断的支持和拍卖商的管理。
{"title":"A Business Intelligence Methodology for E-government Reverse Auctions","authors":"Rafael Souza, A. Pereira","doi":"10.1109/CEC.2009.37","DOIUrl":"https://doi.org/10.1109/CEC.2009.37","url":null,"abstract":"In the first quarter of year 2008, electronic reverseauctions (e-RAs) allowed the Brazilian Government tosave up to US$ 270 million, which account for 87% ofits acquisitions in the period, against 1% in the sameperiod 6 years earlier – according to the Ministry ofPlanning, Budget and Management. A tool of suchimportance is subjected to fraud or even anomalousbehaviors, which are difficult to detect with simpleanalysis over the current system. In this paper we lookforward into identifying suspicious behaviors in egovernmentprocurement systems, through the use ofbusiness intelligence techniques. The results confirmthat our methodology can help discovering interestingaspects that can be used to help market players indecision support and auctioneer’s management.","PeriodicalId":384060,"journal":{"name":"2009 IEEE Conference on Commerce and Enterprise Computing","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121311152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Guaranteeing Soundness of Configurable Process Variants in Provop 保证Provop中可配置过程变量的正确性
Pub Date : 2009-07-20 DOI: 10.1109/CEC.2009.62
Alena Hallerbach, T. Bauer, M. Reichert
Usually, for a particular business process a multitude of variants exist. Each of them constitutes an adjustment of a reference process model to specific requirements building the process context. While some progress has been achieved regarding the configuration of process variants, there exists only little work on how to accomplish this in a sound and efficient manner, especially when considering the large number of process variants that exist in practice as well as the many syntactical and semantical constraints they have to obey. In this paper we discuss advanced concepts for the context- and constraint-based configuration of process variants, and show how they can be utilized to ensure soundness of the configured process variants. Enhancing process-aware information systems with the capability to easily configure sound process models, belonging to the same process family and fitting to the given application context, will enable a new quality in engineering process-aware information systems.
通常,对于一个特定的业务流程,存在大量的变体。它们中的每一个都构成了参考过程模型对构建过程上下文的特定需求的调整。虽然在流程变体的配置方面已经取得了一些进展,但是在如何以一种合理而有效的方式完成这一工作方面只存在很少的工作,特别是当考虑到实践中存在的大量流程变体以及它们必须遵守的许多语法和语义约束时。在本文中,我们讨论了基于上下文和约束的过程变量配置的高级概念,并展示了如何利用它们来确保配置的过程变量的可靠性。增强过程感知信息系统,使其能够轻松地配置属于同一过程族并适合给定应用环境的健全过程模型,将使工程过程感知信息系统具有新的质量。
{"title":"Guaranteeing Soundness of Configurable Process Variants in Provop","authors":"Alena Hallerbach, T. Bauer, M. Reichert","doi":"10.1109/CEC.2009.62","DOIUrl":"https://doi.org/10.1109/CEC.2009.62","url":null,"abstract":"Usually, for a particular business process a multitude of variants exist. Each of them constitutes an adjustment of a reference process model to specific requirements building the process context. While some progress has been achieved regarding the configuration of process variants, there exists only little work on how to accomplish this in a sound and efficient manner, especially when considering the large number of process variants that exist in practice as well as the many syntactical and semantical constraints they have to obey. In this paper we discuss advanced concepts for the context- and constraint-based configuration of process variants, and show how they can be utilized to ensure soundness of the configured process variants. Enhancing process-aware information systems with the capability to easily configure sound process models, belonging to the same process family and fitting to the given application context, will enable a new quality in engineering process-aware information systems.","PeriodicalId":384060,"journal":{"name":"2009 IEEE Conference on Commerce and Enterprise Computing","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125660525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 86
A Heuristic Approach for Capacity Control in Clouds 云中容量控制的一种启发式方法
Pub Date : 2009-07-20 DOI: 10.1109/CEC.2009.20
Arun Anandasivam, Stefan Buschek, R. Buyya
Cloud resource providers in a market face dynamic and unpredictable consumer behavior. The way, how prices are set in a dynamic environment, can influence the demand behavior of price sensitive customers. A Cloud resource provider has to decide on how to allocate his scarce resources in order to maximize his profit. The application of bid price control for evaluating incoming service requests is a common approach for capacity control in network revenue management. In this paper we introduce a customized version of the concept of selfadjusting bid prices and apply it to the area of Cloud Computing. Furthermore, we perform a simulation in order to test the efficiency of the proposed model.
云资源提供商在市场中面临着动态和不可预测的消费者行为。价格在动态环境中的设定方式会影响对价格敏感的顾客的需求行为。云资源提供商必须决定如何分配其稀缺资源以实现利润最大化。在网络收益管理中,利用投标价格控制对传入服务请求进行评估是一种常用的容量控制方法。本文介绍了自调整投标价格概念的定制版本,并将其应用于云计算领域。此外,为了验证该模型的有效性,我们进行了仿真。
{"title":"A Heuristic Approach for Capacity Control in Clouds","authors":"Arun Anandasivam, Stefan Buschek, R. Buyya","doi":"10.1109/CEC.2009.20","DOIUrl":"https://doi.org/10.1109/CEC.2009.20","url":null,"abstract":"Cloud resource providers in a market face dynamic and unpredictable consumer behavior. The way, how prices are set in a dynamic environment, can influence the demand behavior of price sensitive customers. A Cloud resource provider has to decide on how to allocate his scarce resources in order to maximize his profit. The application of bid price control for evaluating incoming service requests is a common approach for capacity control in network revenue management. In this paper we introduce a customized version of the concept of selfadjusting bid prices and apply it to the area of Cloud Computing. Furthermore, we perform a simulation in order to test the efficiency of the proposed model.","PeriodicalId":384060,"journal":{"name":"2009 IEEE Conference on Commerce and Enterprise Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125638592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Key Issues in EA-Implementation: Case Study of Two Finnish Government Agencies 环境评估执行中的关键问题:两个芬兰政府机构的案例研究
Pub Date : 2009-07-20 DOI: 10.1109/CEC.2009.70
Ville Seppänen, J. Heikkilä, Katja Liimatainen
Enterprise Architecture (EA) is getting more common also in public sector as a means to ensure ‘business’ and IT alignment. This study reports a follow-up and theme interviews of the key actors/informants in two EA projects in public administration offices during and half year after the projects were completed. The early experience shows that the process of establishing a government EA is a tedious and complicated process and this study considers the root causes. Three set of factors are found hindering EA’s potential to operate as a strategic alignment tool: lack of establishing proper EA governance, insufficient support for the development, and inadequate resources to do the former two.
企业架构(EA)作为确保“业务”和IT一致的一种手段,在公共部门也变得越来越普遍。本研究报告了在两个公共行政办公室的环境评估项目中,在项目完成后的半年内对关键行为者/线人进行的跟踪和主题访谈。前期的经验表明,政府EA的建立过程是一个繁琐而复杂的过程,本研究对其根源进行了思考。我们发现有三种因素阻碍EA作为战略协调工具的潜力:缺乏建立适当的EA治理,对开发的支持不足,以及用于前两者的资源不足。
{"title":"Key Issues in EA-Implementation: Case Study of Two Finnish Government Agencies","authors":"Ville Seppänen, J. Heikkilä, Katja Liimatainen","doi":"10.1109/CEC.2009.70","DOIUrl":"https://doi.org/10.1109/CEC.2009.70","url":null,"abstract":"Enterprise Architecture (EA) is getting more common also in public sector as a means to ensure ‘business’ and IT alignment. This study reports a follow-up and theme interviews of the key actors/informants in two EA projects in public administration offices during and half year after the projects were completed. The early experience shows that the process of establishing a government EA is a tedious and complicated process and this study considers the root causes. Three set of factors are found hindering EA’s potential to operate as a strategic alignment tool: lack of establishing proper EA governance, insufficient support for the development, and inadequate resources to do the former two.","PeriodicalId":384060,"journal":{"name":"2009 IEEE Conference on Commerce and Enterprise Computing","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133700575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 71
Stability and Efficiency of Social Networks with Strategic, Resource Constrained Nodes 具有战略性资源约束节点的社会网络的稳定性和效率
Pub Date : 2009-07-20 DOI: 10.1109/CEC.2009.59
Ramasuri Narayanam, Y. Narahari
Recently, the topic of social network formation has received significant attention since the structure of thenetworks has a profound impact on the economic outcomes inmany real world applications such as large exchange markets, sponsored search auctions, and viral marketing. Stability and efficiency are two important properties which are sought in such networks. These two properties are both desirable but not always compatible. This paper investigates the tradeoff between stability and efficiency in a noncooperative game model of social network formation. In our model, we consider network formation in which each node can form at most k links due toscarcity of the resources. We formulate the network formation process as a strategic form game.We view the notion of stability as obtaining a Nash equilibrium outcome and efficiency as maximizing the value of the network. In this setting, we show that all efficient networks are stable in both the cases: (i) k = 1 and (ii) k = 2.
最近,社会网络形成的话题受到了极大的关注,因为网络的结构对许多现实世界的应用(如大型交易市场、赞助搜索拍卖和病毒式营销)的经济结果产生了深远的影响。稳定性和效率是这类网络所追求的两个重要特性。这两种特性都是可取的,但并不总是兼容的。本文研究了社会网络形成的非合作博弈模型中稳定性与效率的权衡问题。在我们的模型中,由于资源的稀缺性,我们考虑每个节点最多只能形成k个链路的网络结构。我们将网络的形成过程表述为一种战略形式博弈。我们认为稳定性的概念是获得纳什均衡结果,效率的概念是最大化网络的价值。在这种情况下,我们证明了所有有效网络在(i) k = 1和(ii) k = 2两种情况下都是稳定的。
{"title":"Stability and Efficiency of Social Networks with Strategic, Resource Constrained Nodes","authors":"Ramasuri Narayanam, Y. Narahari","doi":"10.1109/CEC.2009.59","DOIUrl":"https://doi.org/10.1109/CEC.2009.59","url":null,"abstract":"Recently, the topic of social network formation has received significant attention since the structure of thenetworks has a profound impact on the economic outcomes inmany real world applications such as large exchange markets, sponsored search auctions, and viral marketing. Stability and efficiency are two important properties which are sought in such networks. These two properties are both desirable but not always compatible. This paper investigates the tradeoff between stability and efficiency in a noncooperative game model of social network formation. In our model, we consider network formation in which each node can form at most k links due toscarcity of the resources. We formulate the network formation process as a strategic form game.We view the notion of stability as obtaining a Nash equilibrium outcome and efficiency as maximizing the value of the network. In this setting, we show that all efficient networks are stable in both the cases: (i) k = 1 and (ii) k = 2.","PeriodicalId":384060,"journal":{"name":"2009 IEEE Conference on Commerce and Enterprise Computing","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133134196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2009 IEEE Conference on Commerce and Enterprise Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1