Using KADS to Build Agents for E-Commerce
|
|
- Alicia Short
- 8 years ago
- Views:
Transcription
1 Using KADS to Build Agents for E-Commerce Darryl N. Davis and Laetitia Cailleteau Department of Computer Science, University of Hull, Kingston-upon-Hull, HU6 7RX, U.K. Fax: +44 (0) Abstract In this paper, we present a knowledge engineering perspective on a number of types of activities associated with building e-commerce systems. Through the use an appropriate methodology, a principled approach to designing a multiple agent framework results. Our analysis makes use of KADS to provide a number of levels of task definition. The task related models are mapped onto the IBM Aglets framework. The work addresses the activities associated with client, server and mobile agents. The agents communicate to each other using a well-defined agent communication language. The use of multi-attribute decision making enables the client agents to sort information according to the needs of the user. We suggest that such frameworks will play an important role in the development of e-commerce as the data available from the Internet continues to expand, while the time available to filter and sort it becomes more critical. Keywords: E-commerce, Agents, Methodologies. 1. Introduction Software agents can help with many e-commerce activities. A software agent is an autonomous, reactive, goal directed and social computational system. Agents are autonomous, operating without direct interaction of others entities they control their actions and their own state. An agent exists as part of a dynamic environment that they perceive and change; i.e. they are reactive. Agents not only react to their environment, but their decisions and actions are made in an attempt to satisfy their internal goals. Social agents communicate or interact in some other way with other agents [Ferber (1999)]. Different categories of agents can be devised according to the requirements of an application domain and the type of computational system needed. Now with Anderson Consulting, London. 1
2 Buyer agents work on the behalf of a procurer or consumer. Seller agents can personalise their service by taking in consideration the buying agent s preferences and try to establish a long-term relationship. Seller agents can advertise around the web, exchange information with buying agents and attract them to their sites. Client agents can independently retrieve information and sort it according to user s requirements. Agents can exchange information with other agents, enabling faster and more appropriate data access across the Internet. Agents can make comparisons and retrieve only the information needed. A mobile agent is not bound to the system on which it begins its execution; it can transport itself from one system to another in the network. This ability to travel allows agents to move to a system that contains services with which they want to interact with and then take advantage of being on the same host or network as that service. The use of mobile agents provides many advantages: Reduction of network load. A distributed system with static agents involves continuous traffic on the network. The use of mobile agents causes only an instantaneous load as the agent moves. Furthermore, as the computation of the information is done on the remote host, only the result of this computation needs to be transferred. They overcome network latency. Agents are dispatched to remote hosts to execute their jobs. Most network troubles of continuous interaction and latency can be avoided. They can reconnect with their home only when they have completed their task providing better control of a real-time system. They encapsulate protocols. As they execute asynchronously and autonomously, they do not need a permanent, expensive and sometimes unreliable connection with the home system. Tasks are embedded into the agent. Agents are therefore autonomous and independent of the creating process. They are naturally heterogeneous. Mobile agents, at least at a theoretical level, are computer and transport layer independent. They depend only on their execution environment. They therefore provide optimal conditions for seamless system integration. They are robust and fault tolerant. The ability of an agent to react dynamically to unfavourable situations and events make it easier to build robust and fault tolerant distributed systems. If an host is being shut down, all agents executing on that machine will be warned and given time to dispatch and continue their operation on another host on the network. There are a considerable number of agent based e-commerce frameworks ranging from research mock-ups to academic-collaborative and commercial projects. The main principle of Kasbah [Chavaz and Maes (1996)] is the use of static software agents to negotiate a sale. The agents goal is 2
3 to make an acceptable deal in terms of price and date of delivery. AuctionBot [Wurman et al (1998)] uses a distributive negotiation principle. Users have a set of parameters to define the way their agent has to act, to bid. Buyers and Sellers can then bid according to the multilateral distributive negotiation protocols of the created auction. BargainFinder [Williams (1996)] was the first intelligent agent system to provide comparison shopping on the Internet. It was developed to demonstrate the impact of e-commerce on the retail industry; it also revealed how Web-based agents could provide tremendous power to consumers. A more recent commercial system from the same source is Oneswoop [Anderson (1999)]. There are a number of e-commerce projects supported by the European Union, predominantly addressing issues related to the establishment of new e-commerce protocols and standards. ABROSE (Agent Based Brokerage Service in E- commerce) is a large-scale e-commerce project [Gleizes et al (2000)] that aims to create an agentbased brokerage service. The main features are dynamic knowledge capture using a multiple agent system. Agents are used to provide user support for requests and navigation, registration and propagation of information. They aim to demonstrate how agent technology helps to create customisable and adaptive applications in the information brokerage domain. In an attempt to overcome potential problems of interoperability between different e-commerce implementations the consortium is developing an object-oriented framework called Eco System. In order to ease interoperation between layers they are also developing a Common Business Language (CBL) with the aim that different application agents will be able to communicate with each other. Since many applications are being developed and few standards have dominance, it seems that application vendors in this area will achieve interoperability between systems through the agreement of metaprotocols. Essentially, systems will support multiple protocols and "negotiate" with each other to achieve interoperation. 2. Why Use KADS for Agents in E-commerce KADS is a methodology for knowledge-based systems [Schreiber et al (19990] which supports project management, organisational analysis, knowledge acquisition, conceptual modelling, user interaction, system integration, and design. This methodology describes systems development from two perspectives. From the result perspective, KADS provides the means for developing a set of models of different aspects of the system and its environment that are continuously improved during the life cycle. From a project management perspective, KADS provides a risk-driven generic spiral life-cycle model that can be configured into a process adapted to any particular project. 3
4 KADS is a cyclic methodology, requiring several encompassing passes of seven phases; each stage adding a degree of functionality or progress. The planning and organisational issues stage (phase 1) analyses the effects of the introduction of the system on the organisation and people. Subsequently, it defines the typical user profile and the way the system will change their traditional tasks. It brings an interesting human dimension to the system. The application analysis stage (phase 2) defines precisely the problem the system is going to solve. The task model (phase 3) consists of identifying and modelling the knowledge needed top build and run the system. It decomposes the application model into a series of tasks and sub-tasks. In phase 4 a model of co-operation is built. This relies on the task model to define how the user and the system will work together. The distribution of the tasks is defined and interfaces and interactions with the user are specified. The model of expertise (phase 5) also relies on the task model to specify the desired behaviour and the knowledge involved. The co-operation model and model of expertise can be designed in parallel. Together the model of expertise and the model of co-operation provide a conceptual model (phase 6) that specifies the behaviour of the artefact to be built. Conceptual models are abstract descriptions of the objects and operations of the system. The design model (phase 7) is the description of the computational and representational techniques that the artefact should use to realise the specified behaviour. In building a design model, the knowledge engineer addresses external requirements such as speed, hardware and software. The main principle is the evolutionary prototyping concept. The spiral life cycle allows greater flexibility with the management of the project. The main functions of the project can be developed at first, then improved in parallel as secondary requirements are addressed. Specifications are not static, and the system can be reviewed and improved over time, in response to the real and changing needs of the user. This feature is particularly powerful when developing systems in a new area. The Internet, its standards and e-commerce are changing so fast that a non-evolutionary life cycle is totally inadequate and can lead to a born-dead obsolete solution. It provides for shorter and more forgiving development. The evolutionary life cycle allows faster and easier recovery from mistakes and oversights. With a more traditional software and development life cycle, an error or oversight or change in the perceived requirements of the user obliges you to review the entire conception, which takes a lot more time and money. Overall it gives the developer more control and allows a more ambitious system design 4
5 3. Example Scenario and Analysis The example e-commerce scenario to which we applied KADS and agents dealt with flight tickets. For example, an Internet user wants to find information about alternative flights for a particular journey. As it is becomes more time consuming to find such information on the web, an intelligent buying agent is to be used. This intelligent agent knows of a few flight companies web sites and will go to visit them to collect information. It will learn from other agents different kinds of travelling information and new sites to visit. First generation e-commerce agents tend to rank information purely on one-dimension, for example prices. They do not take into consideration other factors, such as services. Here we try to reproduce real consumer behaviour by allowing multiattribute decision-making in our agent framework. Our system should be able to: Receive a user request that defines the flight ticket attributes Collect the information related to this request from the network. Compute a multi-attribute decision over the collected information. Link the result to the related electronic web site. Return the collated and classified result to the user Requirements, task modelling and agent categorisation. Here we detail the requirements for our prototype e-commerce framework and the agents within the framework. As we intended to simulate real scenarios, we required flight information sites distributed across a network, accessed by the user from a different site. The tasks in this framework can be complicated and are best modelled using different categories of agents. The agents in this framework can be categorised in a number of ways, and at a number of levels. We can for example differentiate between stationary and mobile agents as described above. We can differentiate between agents on the basis of their tasks at some generic (application and domain independent) level. A task agent is an agent that supports decision making by exchanging information with other software agent. An information agent is an agent that is able to answer queries from the user or other agent by collating and manipulating information. An interface agent is an agent that interacts with the user, receive user requests and delivers results. Hybrid agents of different natures are used for all the agents. The interface-task agent is static, and closer to a pure deliberative architecture than a pure reactive architecture. The information agent is mobile, often changing its local environment and its route plan if one of the servers is down or unavailable. It also needs to filter the incoming messages to store only useful information. Again a kind of hybrid architecture will be needed but this time closer to the reactive architecture. Figure 1 5
6 gives an example configuration of this framework. The Framework Manager and its task agent (Static1) manage services within the framework. These tasks include the supply of electronic addresses of the users to each other. All communication between users occurs via an agent transport protocol (ATP) that allows mobile agents to travel between compatible sites. ATPs exist between server sites and are maintained by the framework manager. Here a task agent (Home1) associated with Buyer One, responds to a specific user request by creating three mobile information agents, Mobile1, Mobile2 and Mobile3. A different task agent (unseen and unknown to Home1) has created Mobile4. Initially the Home1 knows of three flight companies (A, B, C), and dispatches mobile agents to these known information providers. Mobile1 has returned and relays its gathered information. Mobile3 is interacting (via KQML) with one of the known flight companies and Mobile2 is returning to Home1. Mobile2 has also sensed a mobile agent from an unknown source and communicates with it via KQML. In a benign situation, it discovers the address of Flight Company U. In non-benign situations, it runs the risk of compromising agent Home1 s task. Table 1. Specifications of the Home agent and the mobile agent. Attributes Master (Home Agent) Slave (Mobile Agent) Autonomous It controls its actions and own state and cooperates with the mobile agent. It performs its task over the network by itself. Communication It needs to communicate both with the user and its slave It needs to communicate both with its master and the Flight Company agent Epistemological It needs to perform multi-attribute It needs to analyse the flight company Objectives decision-making. agent request and to modify its knowledge base. Mobility Stationary. Mobile. Reactivity It is reactive to the environment especially the messages sent to show the progression of its mobile agent. It is reactive to its environment and can change its plan if one of the servers it is visiting is unavailable. Role Get the flight company information Get the flight company information for Social ability Display an updated user interface. It co-operates with the user and with the mobile agent to complete the goal. its master. It co-operates with master and Flight Company agents to complete the goal. We can differentiate between these agents in terms of their responsibilities at the domain level. At this level of analysis, there are three major classes of agent in this framework. Home (or client) agents that act on behalf a customer interested in making an air ticket purchase. Flight company agents that act on the behalf of different air flight companies. Mobile agents capable of travelling between the sites servicing the needs of the flight company and client agents. The Home agent is stationary and responsible for all interactions with the user and multi-attribute negotiation. It delegates the search for information to a mobile agent. The Home agent can allow the user to 6
7 continuously monitor the progress of the mobile agent. For instance, the mobile agent can regularly send progress reports - which will be displayed by the Home agent through a progress bar in the user interface. This solution allows extensions. The Home agent can perform several other tasks like looking for trains companies offers. It will only have to create another mobile agent for that subtask. The specification of our system on the client side is represented in table 1. Table 2: Specifications of the Flight Company Agent Attributes Autonomous Communication Epistemological objectives Mobility Reactivity Role Social ability FlightCompany Agent It controls its actions and co-operates with mobiles It needs to communicate both with the incoming agent and the database. It needs to analyse the incoming request, build a corresponding SQL request and map all the result into an answer message. Stationary It needs to be reactive to the ODBC driver message and the incoming messages. Give the flight company information. It co-operates with the mobile agent. On the flight company side, the task is much simpler. The FlightCompany agent just has to interpret the incoming requests, translate them into SQL, connect to its Database, get and map the result and send the answer. As these tasks are consecutive; there is no need to delegate any of them. Hence there is only one agent on the Flight Company server. The specification of the Flight Company agent is given in table 2. The Flight Company agent needs to analyse incoming requests, to build SQL requests and to map all the information into answer messages. It needs to be reactive to poor database connections and to incoming messages Multi-attribute decision making Making decisions is part of the daily life, and there are many criteria with which to define an optimal decision. The same is true in e-commerce. In many situations, the price of product is one among many attributes used in sorting options. The multiple-criteria decision model we adopted involves four important elements [Yu (1985)]: The set of alternatives X The set of criteria f=(f1, f2, f3 ) used to make a decision. The outcome is measured in terms of value maximisation over the function Y=f(x) x X. The preference structures of the decision-maker. Decision making is easier if the preferences over the possible outcomes Y are clearly and perfectly specified. 7
8 This model tries to attach a value function to the possible decision outcomes and search for the best (highest) value. Three solution types are possible: Alpha: providing good and bad solutions Beta: providing good, undefined and bad solutions Gamma: extracting k better solutions from the set of possibilities The gamma solution is the one adapted for the prototype because the user has a set of classified better solutions and is able to make a final choice each solution can be reviewed in terms of the weight of each criterion. Such a model is understandable to the type of user expected to use the service. For the prototype system, the three criteria used are the price, the planning convenience and the services expected. Each criterion has a different importance represented by their weight defined on a 10 point rating scale. The price rate depends on prices offered by each company. The lowest price will have a rate of 10 and the most expensive a rate of 1. The planning convenience includes factors such as the time of the departure, the duration of the travel, the number of connections. All these different criteria have the own rating scale and the global rate is the average of each result. The service rate is evaluated as a function of eight criteria: reduction card; taxi waiting at the airport; hotel booking; youth price; children price; business class; car renting; disable facilities etc. The service rate is evaluated as a function of the number of services available. For instance, if company B provide all the services, it has a service rate of ten. Once each of these criteria is evaluated, the decision-making algorithm classifies the information and returns it to the user. Table 3 gives an example scenario, with each metric calculated using: m i = Σ (w i * x i ) / Σ w i, where m i is the final value, w i is the weight, x i is the value attributed. Table 3: Example of the multiple attribute decision making. Option Price Post-selling-service Offers Calculation Metric Rank A Very Bad Bad (10*10 + 2*5 + 2*5) 6 3 Low (48 hour guarantee) (nothing) / ( ) B Low Very good (exchangeable, refundable, guarantee) Medium (reduction on next purchase) (10*10 + 2*5 + 2*5) / ( ) C Medium Medium (good guarantee) 3.3. KADS Task Model Good (Buy one get one free, card) (5*10 + 6*5 + 10*5) / ( ) Figure 2 shows the KADS task decomposition model for the flight client side but does not relate tasks to agents. The model defines all the tasks and sub-tasks that have to be done by the system or the user. The first level of decomposition is relatively simple. Successive sub-tasks are: get user 8
9 request, get flight companies addresses, request each flight companies, compute the classified result, choice the desired flight ticket, order. At a more detailed level, tasks are: Specify travel information i.e. departure, destination, date, hour, eligibility etc. Specify decision-making parameters i.e. the price, service and convenience weight. Collect the flight company address. Select the company address. For each flight company address: Go on the flight company server. Request the flight company server. Store the result. Compute a classified result with the multi-attribute decision-making parameters. Select the desired solutions. Go on the flight company web server. Order the flight. A similar task decomposition model can be produced for the Flight Companies in figure1. In this model, we have assumed all agents, even if competitive, are benign. The flight company task is to accept and communicate with an incoming mobile agent, requiring three sub-tasks: receive request from mobile, execute query associated with request, reply to mobile. Such task models define of the general nature of the framework. Once complete, these tasks can then be defined in terms of the different agents and the user Co-operation Model The co-operation model in figure 3 shows the distribution of each task of figure 2 between the user and the system. The system tasks are distributed between one task (Home) agent and information seeking (Mobile) agents. The user supplies travel information and the multi-attribute parameters through a request interface managed by the Home Agent. The Home Agent produces a set of flight companies (and their addresses) from its own database. This specific task can be broken down further. The flight company addresses are initially provided by the Framework Manager. The Home Agent is periodically informed by the Framework Manager as further flight companies are introduced into the framework. The Home Agent is opportunistically updated through its own mobile agents, for example Mobile2 in figure 1 (after its communication with Mobile4). The user is able to reduce this set of addresses for example the user may not be interested in flying with specific companies. Mobile agents are responsible for the intermediate task sequence. They need to go to each flight company defined and collect the requested information. When these tasks are done, the mobile agents return home and pass the information to the Home agent. The Home agent 9
10 is then able to perform the multi-attribute decision making result and display the results to the user. The distribution of the tasks on the flight company side is simpler as there is no human intervention. In fact, in our prototype systems we decided to let one agent, the flight agent, to assume all the tasks of the flight company server Agent Communication An agent in e-commerce must be able to communicate with its environment and other agents. It is obvious that agents need a common language to communicate and understand each other, hence for example the ABROSE project s attempt to define CBL. As we needed to use declarative communication protocols in other work on multiple agent systems, we decided to pursue our use of KIF-KQML [ARPA (1993)]. We require only a small part of KQML for this project. We retain the readability concept of KIF by using understandable performative name and structure, but limit the syntax of KQML language between agents to ensure privacy of internal data structures. As most of the flight companies have different databases, the Flight Company Agent will interpret the incoming message and translate it into its own database language (SQL most of the time). Therefore, the Flight Company does not have to notify external agents of its database structure but communication remains transparent. It is a good way also to avoid hacker troubles - nobody knows how information is stored. We are looking to develop this language further for other e-commerce scenarios [Liu et al, (2000)] Agents, Processes and Architectures Having produced our task and co-operation models we can move onto designing computational processes. In designing the agent architectures we considered the nature of the agent tasks as given by the KADS task and co-operation models. We then placed these tasks on a continuum moving from pure deliberative to pure reactive systems. Deliberative process models were chosen only when reactive process models were impossible. This resulted in the design (and implementation) of three hybrid agents. The home agent manipulates symbolic information from the user and communicates about it with the mobile agents that it spawns. The home agent makes use of default values but does require the user to supply the flight information i.e. the source, the destination, the date, the hour and the eligibility. Any changes to the default multi-attribute decision-making parameters are stored locally in the memory of the home agent. Having constructed a user request and profile from this interaction, a mobile agent is created and initialised. KIF-KQML is used to inform the mobile agent 10
11 of its task. The mobile communicates with its home agent as it moves around the Internet, providing progress report messages that are relayed to the user interface. The mobile, on completing its task, returns to its home agent, relays all its stored information via KIF-KQML and is then extinguished. The home agent runs its multi-attribute decision-making module on the information provided by the mobile, storing it in the home database and updating the user interface with the final result. The mobile agent on receiving its initial message, sorts its itinerary and the set of tasks. It then begins its journey over the Internet. Each time it arrives at a new destination, it sends a progress report message to its Home Agent. In our prototype system the reactive mobile agent is limited to two tasks. A generic task system is not used for reasons of computational compactness. On arriving at a Flight Company server, a mobile agent sends a FlightInformationRequest message related to the user request. In turn will receive a FlightInformationResponse message containing the information about the requested flight or an error message if the server is down or has any other kind of trouble. It will unpack the message content using a communication filter and store it in its database and then proceed to its next destination. This sequence of actions continues until the mobile agent arrives at its source of origin. The Flight Company agent on receiving a FlightInformationRequest from a mobile agent. unpacks the message content and frames it as a SQL request. It connects to its personal database and executes the query though a JDBC-ODBC driver. The information response is then mapped back into our subset of KIF-KQML. This mapping allows the system to use several kinds of databases such as ORACLE, Sybase, and Ingres as far as they are support ODBC. After the mapping of the data, it constructs the answer message and sends it to the mobile agent Computational Platform In our prototype system, the framework is modelled using the IBM Aglets software [Lange and Oshima (1999)]. This Java based agent toolkit also models the Framework Manager and the maintenance of ATP (Agent Transport Protocol) connections across a distributed system. ATP is a TCP/IP based protocol by which agents can be made mobile. In a more open system, there are a great number of other issues that need to be considered, including the nature of computational platforms across the framework and the type of agents that can be used. Our prototype implementation mixes Java and IBM Aglets. Pure Java presents some major technical disadvantages, especially for agent implementations. These include: Inadequate support for Resource Control resulting in for example deny of service. 11
12 No protection of references. For example there is no way that the agent can directly monitor and control which other agents are accessing its methods. No support for the preservation and resumption of the execution state. It is currently impossible in Java to retrieve the full Execution State of an object. Information such as the status of the program counter and frame stack is permanently forbidden territory for Java programs. Therefore, for a mobile agent to properly resume a computation on a remote host, it must rely on internal attributes and external events to direct it. An embedded automaton can keep track of the agent s travels and ensure that computations are properly halted and properly resumed. Security. The Java commerce framework provides security protocols such as SSL (Secure Socket Layer) but other stronger standard protocols such as SET (Secure Electronic Transaction) are not available yet. An Aglet is a mobile Java object that visits Aglet-enabled hosts in a computer network. It is autonomous, running in its own thread of execution after arriving at a host, and reactive. It provides developers a whole framework with the aim of resolving the problems associated with Java through the implementation of a number of agent-related concepts. A context is an Aglet s workplace. It is a stationary object that provides a means for maintaining, managing and running a uniform execution environment where the host system is secured against malicious Aglets. One node in a computer network may host multiple contexts. A proxy is a representative of an Aglet. It serves as a shield for the Aglet that protects the Aglet from direct access to its public methods. The proxy also provides location transparency for the Aglet. That is, it can hide the real location of the Aglet. An identifier is bound to each Aglet. This identifier is globally unique and immutable throughout the term of the Aglet s life cycle. This allows the design and implementation of mobile agents that can execute in a platform-specific independent way. An Aglet application is the only entity to choose where and when to move and it can suspend or resume its execution at a certain point. Finally, an Aglet can interact with other mobile agents in a synchronous or asynchronous way. 4. Summary This mobile agent e-commerce framework is a mix of traditional and nouvelle architectures. Many initially simplifying assumptions were made, including the absence of many attributes such as negotiation, or dynamic action-selection. It makes use of three agents: the stationary Home Agent is responsible for user interaction and multi-attribute decision making. It creates Mobile Agent to traverse the Internet and procure required information. The stationary Flight Company agents provide the interface between the agent framework and the flight companies databases. Each server 12
13 needs to run an Aglet server to embed Aglets and allow the Aglet transfer protocol. This feature can be avoided by using Remote Method Interface in Java. No communication between mobile agents has been implemented. They could have been able to communicate to exchange new flight company servers addresses. This extension would require an extension to the mobile agent model and the KIF-KQML language and would provide an interesting extension of the framework. Many of these inadequacies are being addressed in an ongoing e-commerce project related to stock trading. 5. References Anderson Consulting Ltd, (1999), Oneswoop Home Pages, Chavez, A. and Maes, P. (1996), Kasbah: An Agent Marketplace for Buying and Selling Goods. Proceedings of the First International Conference on the Practical Application of Intelligent Agents and Multi-Agent Technology. London, UK. Gleizes, M.-P., Glize, P. & Léger, A. (2000), Abrose : An Adaptive Brokerage Tool Based on Multi-Agent, IEEE Computer Communications. Lange, D. and Oshima, M., 1999, Programming and Deploying Java Mobile Agents with Aglets, Addison-Wesley. Maes, P., Guttman, R. and Moukas, A. (1999), Agents that Buy and Sell: Transforming Commerce as we Know It. Communications of the ACM, March Issue, Schreiber, G., Akkermans, H, Anjewierden, A, de Hoog,R., Shadbolt, N., Van de Velde, W., and Wielinga, B. (1999), Knowledge Engineering and Management: The CommonKADS Methodology, MIT Press Williams, J., (1996), Bots and Other Internet Beasties, SAMS.Net publishing, Wurman, P.R. Wellman,M.P. and Walsh.W.E., (1998), The Michigan Internet AuctionBot: A configurable auction server for human and software agents. Second International Conference on Autonomous Agents. Yu, Y-L, (1985), Multiple-Criteria Decision Making, 13
14 Buyer One Task Agent: Home1 Key: ATP Agent Transport Protocol Actual Connection Potential Connection Flight Company C JDBC+ODBC SQL Task Agent: StaticC User Interaction ATP KQML Mobile1 ATP ATP Flight Company A Task Agent: StaticA JDBC+ODBC SQL KQML Mobile3 Flight Company U JDBC+ODBC SQL Task Agent: StaticU ATP Mobile2 Mobile4 KQML Flight Company B Task Agent: StaticB JDBC+ODBC SQL Framework Manager JDBC+ODBC SQL Task Agent: StaticM Figure 1. Electronic commerce framework for the flight ticket domain 14
15 Figure 2. KADS task decomposition model for the flight client 15
16 Figure 3: KADS model of co-operation on the flight client. 16
17 Figure 4: Mobile agent architecture 17
An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents
An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents M. Anber and O. Badawy Department of Computer Engineering, Arab Academy for Science and Technology
More informationADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS
ANNALS OF THE FACULTY OF ENGINEERING HUNEDOARA 2006, Tome IV, Fascicole 1, (ISSN 1584 2665) FACULTY OF ENGINEERING HUNEDOARA, 5, REVOLUTIEI, 331128, HUNEDOARA ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS
More informationA Multi-Agent Approach to a Distributed Schedule Management System
UDC 001.81: 681.3 A Multi-Agent Approach to a Distributed Schedule Management System VYuji Wada VMasatoshi Shiouchi VYuji Takada (Manuscript received June 11,1997) More and more people are engaging in
More informationComputer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
More informationDistributed Data Management
Introduction Distributed Data Management Involves the distribution of data and work among more than one machine in the network. Distributed computing is more broad than canonical client/server, in that
More informationManaging Variability in Software Architectures 1 Felix Bachmann*
Managing Variability in Software Architectures Felix Bachmann* Carnegie Bosch Institute Carnegie Mellon University Pittsburgh, Pa 523, USA fb@sei.cmu.edu Len Bass Software Engineering Institute Carnegie
More informationTransparent Redirection of Network Sockets 1
Transparent Redirection of Network Sockets Timothy S. Mitrovich, Kenneth M. Ford, and Niranjan Suri Institute for Human & Machine Cognition University of West Florida {tmitrovi,kford,nsuri@ai.uwf.edu.
More informationIntroduction to CORBA. 1. Introduction 2. Distributed Systems: Notions 3. Middleware 4. CORBA Architecture
Introduction to CORBA 1. Introduction 2. Distributed Systems: Notions 3. Middleware 4. CORBA Architecture 1. Introduction CORBA is defined by the OMG The OMG: -Founded in 1989 by eight companies as a non-profit
More informationResearch on Mobile Agent-based E-Commerce System Framework
440 Research on Mobile -based E-Commerce System Framework Wenna Liu 1, Deli Yang 2 School of Management, Dalian University of Technology, Dalian 116024, China 1 wenal@sina.com, 2 somdyang@dlut.edu.cn ABSTRACT
More informationA Satellite Network Management Architecture based on Mobile Agents and SNMP
2012 4th International Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Singapore A Satellite Network Management Architecture based on Mobile Agents and SNMP Jianli
More informationThe EMSX Platform. A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks. A White Paper.
The EMSX Platform A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks A White Paper November 2002 Abstract: The EMSX Platform is a set of components that together provide
More informationConsiderations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
More informationEfficient Scheduling Of On-line Services in Cloud Computing Based on Task Migration
Efficient Scheduling Of On-line Services in Cloud Computing Based on Task Migration 1 Harish H G, 2 Dr. R Girisha 1 PG Student, 2 Professor, Department of CSE, PESCE Mandya (An Autonomous Institution under
More informationA Semantic Marketplace of Peers Hosting Negotiating Intelligent Agents
A Semantic Marketplace of Peers Hosting Negotiating Intelligent Agents Theodore Patkos and Dimitris Plexousakis Institute of Computer Science, FO.R.T.H. Vassilika Vouton, P.O. Box 1385, GR 71110 Heraklion,
More informationIntroduction to E-Commerce
Introduction to E-Commerce 1/12/2016 What is E-commerce? Buying and selling of products or services over electronic systems such as the Internet and other computer networks Online purchase of goods or
More informationOnline Auction Software Fundamentals
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Online Auction Software Fundamentals Jarrod Trevathan +, Wayne Read and Rodel Balingit
More informationMODEL DRIVEN DEVELOPMENT OF BUSINESS PROCESS MONITORING AND CONTROL SYSTEMS
MODEL DRIVEN DEVELOPMENT OF BUSINESS PROCESS MONITORING AND CONTROL SYSTEMS Tao Yu Department of Computer Science, University of California at Irvine, USA Email: tyu1@uci.edu Jun-Jang Jeng IBM T.J. Watson
More informationFourth generation techniques (4GT)
Fourth generation techniques (4GT) The term fourth generation techniques (4GT) encompasses a broad array of software tools that have one thing in common. Each enables the software engineer to specify some
More informationHigh Performance Cluster Support for NLB on Window
High Performance Cluster Support for NLB on Window [1]Arvind Rathi, [2] Kirti, [3] Neelam [1]M.Tech Student, Department of CSE, GITM, Gurgaon Haryana (India) arvindrathi88@gmail.com [2]Asst. Professor,
More informationAn Object Model for Business Applications
An Object Model for Business Applications By Fred A. Cummins Electronic Data Systems Troy, Michigan cummins@ae.eds.com ## ## This presentation will focus on defining a model for objects--a generalized
More informationNational Institute of Standards and Technology
1 Title: Author: Affiliation: Postal Address: Network Security Testing Using Mobile Agents T. Karygiannis National Institute of Standards and Technology NIST Information Technology Laboratory Building
More informationMiddleware support for the Internet of Things
Middleware support for the Internet of Things Karl Aberer, Manfred Hauswirth, Ali Salehi School of Computer and Communication Sciences Ecole Polytechnique Fédérale de Lausanne (EPFL) CH-1015 Lausanne,
More informationWait-Time Analysis Method: New Best Practice for Performance Management
WHITE PAPER Wait-Time Analysis Method: New Best Practice for Performance Management September 2006 Confio Software www.confio.com +1-303-938-8282 SUMMARY: Wait-Time analysis allows IT to ALWAYS find the
More informationAn Overview of Distributed Databases
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 207-214 International Research Publications House http://www. irphouse.com /ijict.htm An Overview
More informationChapter 6. CORBA-based Architecture. 6.1 Introduction to CORBA 6.2 CORBA-IDL 6.3 Designing CORBA Systems 6.4 Implementing CORBA Applications
Chapter 6. CORBA-based Architecture 6.1 Introduction to CORBA 6.2 CORBA-IDL 6.3 Designing CORBA Systems 6.4 Implementing CORBA Applications 1 Chapter 6. CORBA-based Architecture Part 6.1 Introduction to
More informationThe Key Technology Research of Virtual Laboratory based On Cloud Computing Ling Zhang
International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) The Key Technology Research of Virtual Laboratory based On Cloud Computing Ling Zhang Nanjing Communications
More informationInformation integration platform for CIMS. Chan, FTS; Zhang, J; Lau, HCW; Ning, A
Title Information integration platform for CIMS Author(s) Chan, FTS; Zhang, J; Lau, HCW; Ning, A Citation IEEE International Conference on Management of Innovation and Technology Proceedings, Singapore,
More informationService Oriented Architecture
Service Oriented Architecture Charlie Abela Department of Artificial Intelligence charlie.abela@um.edu.mt Last Lecture Web Ontology Language Problems? CSA 3210 Service Oriented Architecture 2 Lecture Outline
More informationOverview of Routing between Virtual LANs
Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information
More informationOnline Trading and Negotiation
Online Trading and Negotiation Instructor: Jerry Gao Ph.D. San Jose State University email: jerrygao@email.sjsu.edu URL: http://www.engr.sjsu.edu/gaojerry May, 2000 Outline - Introduction of Trading -
More informationMulti Agent System for Negotiation and Decision Support
Multi Agent System for Negotiation and Decision Support Zoltán BALOGH, Michal LACLAVÍK, Ladislav HLUCHÝ Institute of Informatics, Slovak Academy of Sciences, Bratislava balogh.ui@savba.sk, laclavik.ui@savba.sk,
More informationBASHO DATA PLATFORM SIMPLIFIES BIG DATA, IOT, AND HYBRID CLOUD APPS
WHITEPAPER BASHO DATA PLATFORM BASHO DATA PLATFORM SIMPLIFIES BIG DATA, IOT, AND HYBRID CLOUD APPS INTRODUCTION Big Data applications and the Internet of Things (IoT) are changing and often improving our
More informationAgent Design Patterns: Elements of Agent Application Design
Agent Design Patterns: Elements of Agent Application Design Yariv Aridor IBM Tokyo Research Laboratory Yamato, Kanagawa, Japan tayariv@trl.ibm.co.jp Danny B. Lange General Magic Inc. Sunnyvale, California,
More informationVortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems
Vortex White Paper Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Version 1.0 February 2015 Andrew Foster, Product Marketing Manager, PrismTech Vortex
More informationRadware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical
Radware ADC-VX Solution The Agility of Virtual; The Predictability of Physical Table of Contents General... 3 Virtualization and consolidation trends in the data centers... 3 How virtualization and consolidation
More informationLoad Balancing using Pramati Web Load Balancer
Load Balancing using Pramati Web Load Balancer Satyajit Chetri, Product Engineering Pramati Web Load Balancer is a software based web traffic management interceptor. Pramati Web Load Balancer offers much
More informationCCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
More informationA Tool for Evaluation and Optimization of Web Application Performance
A Tool for Evaluation and Optimization of Web Application Performance Tomáš Černý 1 cernyto3@fel.cvut.cz Michael J. Donahoo 2 jeff_donahoo@baylor.edu Abstract: One of the main goals of web application
More informationModule 17. Client-Server Software Development. Version 2 CSE IIT, Kharagpur
Module 17 Client-Server Software Development Lesson 42 CORBA and COM/DCOM Specific Instructional Objectives At the end of this lesson the student would be able to: Explain what Common Object Request Broker
More informationHP-UX File System Replication
Paper 4155 What is it, how does it work, and what are its benefits? Jim Kramer John Saylor Quest Software, Inc. 610 Newport Center Drive Suite 1400 Newport Beach, California 92660 (800) 306-9329 Introduction
More informationConcepts of Database Management Seventh Edition. Chapter 9 Database Management Approaches
Concepts of Database Management Seventh Edition Chapter 9 Database Management Approaches Objectives Describe distributed database management systems (DDBMSs) Discuss client/server systems Examine the ways
More informationAn Active Packet can be classified as
Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,pat@ati.stevens-tech.edu Abstract-Traditionally, network management systems
More informationQint Software - Technical White Paper
Qint Software - Technical White Paper Improved Reporting and Document Generation via Object-Oriented Data Access and Enterprise Information Integration Objects do not only change the way in which we develop
More informationLOAD BALANCING TECHNIQUES FOR RELEASE 11i AND RELEASE 12 E-BUSINESS ENVIRONMENTS
LOAD BALANCING TECHNIQUES FOR RELEASE 11i AND RELEASE 12 E-BUSINESS ENVIRONMENTS Venkat Perumal IT Convergence Introduction Any application server based on a certain CPU, memory and other configurations
More informationDesigning a Microsoft SharePoint 2010 Infrastructure
Designing a Microsoft SharePoint 2010 Infrastructure Course Details Course Code: Duration: Notes: 10231B 5 days This course syllabus should be used to determine whether the course is appropriate for the
More informationModule 6. e-business and e- Commerce
Module 6 e-business and e- Commerce 6.1 e-business systems 6.2 e-commerce systems 6.3 Essential e- commerce processes 6.4 Electronic payment processes 6.5 e-commerce application trends 6.6 Web store requirements
More informationIFS-8000 V2.0 INFORMATION FUSION SYSTEM
IFS-8000 V2.0 INFORMATION FUSION SYSTEM IFS-8000 V2.0 Overview IFS-8000 v2.0 is a flexible, scalable and modular IT system to support the processes of aggregation of information from intercepts to intelligence
More informationAgent-based Systems: Do They Provide a Competitive Advantage? Onn Shehory IBM Haifa Research Labs
Agent-based Systems: Do They Provide a Competitive Advantage? Onn Shehory IBM Haifa Research Labs Organization Portfolio IBM is among the 5 largest companies in the world, yearly income more than 80 Billion
More informationSFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3
SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange
More informationTechnology to Control Hybrid Computer Systems
INFORMATION TECHNOLOGY Hynomics (formerly HyBrithms Corporation, formerly Sagent Corporation) Technology to Control Hybrid Computer Systems Businesses and industries, both large and small, increasingly
More informationAerospace Software Engineering
16.35 Aerospace Software Engineering Software Architecture The 4+1 view Patterns Prof. Kristina Lundqvist Dept. of Aero/Astro, MIT Why Care About Software Architecture? An architecture provides a vehicle
More informationMobile Agents based Architecture for building Virtual Markets *
Mobile Agents based Architecture for building Virtual Markets * Departamento de Electrónica y Sistemas, Universidad de A Coruña, Campus de Elviña s/n 15071 A Coruña Tlfno: +34 81 167150 Ext. 1213 Fax:
More informationCHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL
CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL This chapter is to introduce the client-server model and its role in the development of distributed network systems. The chapter
More informationApplication Architectures
Software Engineering Application Architectures Based on Software Engineering, 7 th Edition by Ian Sommerville Objectives To explain the organization of two fundamental models of business systems - batch
More informationA Strategic Framework for Enterprise Information Integration of ERP and E-Commerce
A Strategic Framework for Enterprise Information Integration of ERP and E-Commerce Zaojie Kong, Dan Wang and Jianjun Zhang School of Management, Hebei University of Technology, Tianjin 300130, P.R.China
More informationUser experience storyboards: Building better UIs with RUP, UML, and use cases
Copyright Rational Software 2003 http://www.therationaledge.com/content/nov_03/f_usability_jh.jsp User experience storyboards: Building better UIs with RUP, UML, and use cases by Jim Heumann Requirements
More informationOne for All and All in One
One for All and All in One A learner modelling server in a multi-agent platform Isabel Machado 1, Alexandre Martins 2 and Ana Paiva 2 1 INESC, Rua Alves Redol 9, 1000 Lisboa, Portugal 2 IST and INESC,
More informationCOMP5426 Parallel and Distributed Computing. Distributed Systems: Client/Server and Clusters
COMP5426 Parallel and Distributed Computing Distributed Systems: Client/Server and Clusters Client/Server Computing Client Client machines are generally single-user workstations providing a user-friendly
More informationUser Guide. You will be presented with a login screen which will ask you for your username and password.
User Guide Overview SurfProtect is a real-time web-site filtering system designed to adapt to your particular needs. The main advantage with SurfProtect over many rivals is its unique architecture that
More informationA Dell Technical White Paper Dell Storage Engineering
Networking Best Practices for Dell DX Object Storage A Dell Technical White Paper Dell Storage Engineering THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND
More information1 Organization of Operating Systems
COMP 730 (242) Class Notes Section 10: Organization of Operating Systems 1 Organization of Operating Systems We have studied in detail the organization of Xinu. Naturally, this organization is far from
More informationA very short history of networking
A New vision for network architecture David Clark M.I.T. Laboratory for Computer Science September, 2002 V3.0 Abstract This is a proposal for a long-term program in network research, consistent with the
More informationOracle WebLogic Server 11g Administration
Oracle WebLogic Server 11g Administration This course is designed to provide instruction and hands-on practice in installing and configuring Oracle WebLogic Server 11g. These tasks include starting and
More informationthoughtonomy Virtual Workforce for Service Automation
thoughtonomy Virtual Workforce for Service Automation The Thoughtonomy Virtual Workforce uses software to replicate the interactions of people and technology to automate a wide range of operational and
More informationGrid Computing Vs. Cloud Computing
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 6 (2013), pp. 577-582 International Research Publications House http://www. irphouse.com /ijict.htm Grid
More informationNetwork Design Best Practices for Deploying WLAN Switches
Network Design Best Practices for Deploying WLAN Switches A New Debate As wireless LAN products designed for the enterprise came to market, a debate rapidly developed pitting the advantages of standalone
More informationTransparent Redirection of Network Sockets 1
Transparent Redirection of Network Sockets 1 Timothy S. Mitrovich, Kenneth M. Ford, and Niranjan Suri Institute for Human & Machine Cognition University of West Florida {tmitrovi,kford,nsuri}@ai.uwf.edu
More informationE-commerce refers to paperless exchange of business information using following ways.
E-Commerce E-Commerce or Electronics Commerce is a methodology of modern business which fulfills the need of business organizations, vendors and customers to reduce cost and improve the quality of goods
More information1. Introduction and Background
A Multi- Framework for Stock Trading Darryl Davis Department of Computer Science, University of Hull, HU6 7RX, UK d.n.davis@dcs.hull.ac.uk Yuan Luo, Kecheng Liu School of Computing, Staffordshire University,
More informationE-Commerce Supply Chain Management Domain Research and Standard Architectures Kunal Chopra, Jeff Elrod, Bill Glenn, Barry Jones.
E-Commerce Supply Chain Management Domain Research and Standard Architectures Kunal Chopra, Jeff Elrod, Bill Glenn, Barry Jones Introduction E-Commerce Supply Chain Management involves the co-ordination
More informationTHE BCS PROFESSIONAL EXAMINATION Professional Graduate Diploma. April 2001 EXAMINERS REPORT. Network Information Systems 2001
THE BCS PROFESSIONAL EXAMINATION Professional Graduate Diploma April 2001 EXAMINERS REPORT Network Information Systems 2001 A number of candidates had clearly not followed the syllabus for this module
More informationTest Automation Architectures: Planning for Test Automation
Test Automation Architectures: Planning for Test Automation Douglas Hoffman Software Quality Methods, LLC. 24646 Heather Heights Place Saratoga, California 95070-9710 Phone 408-741-4830 Fax 408-867-4550
More information04 Internet Protocol (IP)
SE 4C03 Winter 2007 04 Internet Protocol (IP) William M. Farmer Department of Computing and Software McMaster University 29 January 2007 Internet Protocol (IP) IP provides a connectionless packet delivery
More informationToken-ring local area network management
Token-ring local area network management by BARBARA J. DON CARLOS IBM Corporation Research Triangle Park, North Carolina ABSTRACT This paper describes an architecture for managing a token-ring local area
More informationTier Architectures. Kathleen Durant CS 3200
Tier Architectures Kathleen Durant CS 3200 1 Supporting Architectures for DBMS Over the years there have been many different hardware configurations to support database systems Some are outdated others
More informationWhite Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary
White Paper The Ten Features Your Web Application Monitoring Software Must Have Executive Summary It s hard to find an important business application that doesn t have a web-based version available and
More informationCommunications and Computer Networks
SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the
More informationAskAvanade: Answering the Burning Questions around Cloud Computing
AskAvanade: Answering the Burning Questions around Cloud Computing There is a great deal of interest in better leveraging the benefits of cloud computing. While there is a lot of excitement about the cloud,
More informationiseries TCP/IP routing and workload balancing
iseries TCP/IP routing and workload balancing iseries TCP/IP routing and workload balancing Copyright International Business Machines Corporation 2000, 2001. All rights reserved. US Government Users Restricted
More informationHYBRID JINI FOR LIMITED DEVICES
HYBRID JINI FOR LIMITED DEVICES VINCENT LENDERS, POLLY HUANG AND MEN MUHEIM ETH Zürich E-mail: lenders, huang @tik.ee.ethz.ch, men@ife.ee.ethz.ch We envision a future of heterogeneous mobile devices collaborating
More informationInformation Systems Analysis and Design CSC340. 2004 John Mylopoulos. Software Architectures -- 1. Information Systems Analysis and Design CSC340
XIX. Software Architectures Software Architectures UML Packages Client- vs Peer-to-Peer Horizontal Layers and Vertical Partitions 3-Tier and 4-Tier Architectures The Model-View-Controller Architecture
More informationAssociate Professor, Department of CSE, Shri Vishnu Engineering College for Women, Andhra Pradesh, India 2
Volume 6, Issue 3, March 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Special Issue
More informationThe Service Availability Forum Specification for High Availability Middleware
The Availability Forum Specification for High Availability Middleware Timo Jokiaho, Fred Herrmann, Dave Penkler, Manfred Reitenspiess, Louise Moser Availability Forum Timo.Jokiaho@nokia.com, Frederic.Herrmann@sun.com,
More informationestos SIP Proxy 5.1.30.33611
estos SIP Proxy 5.1.30.33611 1 Welcome to estos SIP Proxy... 4 1.1 WAN Settings... 4 1.2 Network interfaces... 5 1.3 Network Interface Configuration... 6 1.4 SSL/TLS Communications Certificate... 6 1.5
More informationDATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
More informationMiddleware- Driven Mobile Applications
Middleware- Driven Mobile Applications A motwin White Paper When Launching New Mobile Services, Middleware Offers the Fastest, Most Flexible Development Path for Sophisticated Apps 1 Executive Summary
More informationSoftware Development for Multiple OEMs Using Tool Configured Middleware for CAN Communication
01PC-422 Software Development for Multiple OEMs Using Tool Configured Middleware for CAN Communication Pascal Jost IAS, University of Stuttgart, Germany Stephan Hoffmann Vector CANtech Inc., USA Copyright
More informationNetwork Scanning: A New Feature for Digital Copiers
Network Scanning: A New Feature for Digital Copiers Abstract Introduction The method of implementing electronic document capture and distribution, known as network scanning, into the traditional copier/printer
More informationREMOTE BACKUP-WHY SO VITAL?
REMOTE BACKUP-WHY SO VITAL? Any time your company s data or applications become unavailable due to system failure or other disaster, this can quickly translate into lost revenue for your business. Remote
More informationAgile Manufacturing for ALUMINIUM SMELTERS
Agile Manufacturing for ALUMINIUM SMELTERS White Paper This White Paper describes how Advanced Information Management and Planning & Scheduling solutions for Aluminium Smelters can transform production
More information1 Which of the following questions can be answered using the goal flow report?
1 Which of the following questions can be answered using the goal flow report? [A] Are there a lot of unexpected exits from a step in the middle of my conversion funnel? [B] Do visitors usually start my
More informationMobile Cloud Computing In Business
Mobile Cloud Computing In Business Nilam S. Desai Smt. Chandaben Mohanbhai Patel Institute of Computer Applications, Charotar University of Science and Technology, Changa, Gujarat, India ABSTRACT Cloud
More informationTivoli Endpoint Manager for Remote Control Version 8 Release 2. User s Guide
Tivoli Endpoint Manager for Remote Control Version 8 Release 2 User s Guide Tivoli Endpoint Manager for Remote Control Version 8 Release 2 User s Guide Note Before using this information and the product
More informationRARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
More informationIT Architecture Review. ISACA Conference Fall 2003
IT Architecture Review ISACA Conference Fall 2003 Table of Contents Introduction Business Drivers Overview of Tiered Architecture IT Architecture Review Why review IT architecture How to conduct IT architecture
More informationTrapeze Rail System Simulation and Planning
trapeze Rail System English Software for Rail Modelling and Planning Trapeze Rail System Simulation and Planning www.trapezegroup.com Enabling future railway plans Cost reductions through integrated planning
More informationSoftware Development Kit
Open EMS Suite by Nokia Software Development Kit Functional Overview Version 1.3 Nokia Siemens Networks 1 (21) Software Development Kit The information in this document is subject to change without notice
More informationOverview of CORBA 11.1 I NTRODUCTION TO CORBA. 11.4 Object services 11.5 New features in CORBA 3.0 11.6 Summary
C H A P T E R 1 1 Overview of CORBA 11.1 Introduction to CORBA 11.2 CORBA architecture 11.3 Client and object implementations 11.4 Object services 11.5 New features in CORBA 3.0 11.6 Summary In previous
More informationCloud Computing for Agent-based Traffic Management Systems
Cloud Computing for Agent-based Traffic Management Systems Manoj A Patil Asst.Prof. IT Dept. Khyamling A Parane Asst.Prof. CSE Dept. D. Rajesh Asst.Prof. IT Dept. ABSTRACT Increased traffic congestion
More informationRoCE vs. iwarp Competitive Analysis
WHITE PAPER August 21 RoCE vs. iwarp Competitive Analysis Executive Summary...1 RoCE s Advantages over iwarp...1 Performance and Benchmark Examples...3 Best Performance for Virtualization...4 Summary...
More information