Using KADS to Build Agents for E-Commerce

Size: px
Start display at page:

Download "Using KADS to Build Agents for E-Commerce"

Transcription

1 Using KADS to Build Agents for E-Commerce Darryl N. Davis and Laetitia Cailleteau Department of Computer Science, University of Hull, Kingston-upon-Hull, HU6 7RX, U.K. Fax: +44 (0) Abstract In this paper, we present a knowledge engineering perspective on a number of types of activities associated with building e-commerce systems. Through the use an appropriate methodology, a principled approach to designing a multiple agent framework results. Our analysis makes use of KADS to provide a number of levels of task definition. The task related models are mapped onto the IBM Aglets framework. The work addresses the activities associated with client, server and mobile agents. The agents communicate to each other using a well-defined agent communication language. The use of multi-attribute decision making enables the client agents to sort information according to the needs of the user. We suggest that such frameworks will play an important role in the development of e-commerce as the data available from the Internet continues to expand, while the time available to filter and sort it becomes more critical. Keywords: E-commerce, Agents, Methodologies. 1. Introduction Software agents can help with many e-commerce activities. A software agent is an autonomous, reactive, goal directed and social computational system. Agents are autonomous, operating without direct interaction of others entities they control their actions and their own state. An agent exists as part of a dynamic environment that they perceive and change; i.e. they are reactive. Agents not only react to their environment, but their decisions and actions are made in an attempt to satisfy their internal goals. Social agents communicate or interact in some other way with other agents [Ferber (1999)]. Different categories of agents can be devised according to the requirements of an application domain and the type of computational system needed. Now with Anderson Consulting, London. 1

2 Buyer agents work on the behalf of a procurer or consumer. Seller agents can personalise their service by taking in consideration the buying agent s preferences and try to establish a long-term relationship. Seller agents can advertise around the web, exchange information with buying agents and attract them to their sites. Client agents can independently retrieve information and sort it according to user s requirements. Agents can exchange information with other agents, enabling faster and more appropriate data access across the Internet. Agents can make comparisons and retrieve only the information needed. A mobile agent is not bound to the system on which it begins its execution; it can transport itself from one system to another in the network. This ability to travel allows agents to move to a system that contains services with which they want to interact with and then take advantage of being on the same host or network as that service. The use of mobile agents provides many advantages: Reduction of network load. A distributed system with static agents involves continuous traffic on the network. The use of mobile agents causes only an instantaneous load as the agent moves. Furthermore, as the computation of the information is done on the remote host, only the result of this computation needs to be transferred. They overcome network latency. Agents are dispatched to remote hosts to execute their jobs. Most network troubles of continuous interaction and latency can be avoided. They can reconnect with their home only when they have completed their task providing better control of a real-time system. They encapsulate protocols. As they execute asynchronously and autonomously, they do not need a permanent, expensive and sometimes unreliable connection with the home system. Tasks are embedded into the agent. Agents are therefore autonomous and independent of the creating process. They are naturally heterogeneous. Mobile agents, at least at a theoretical level, are computer and transport layer independent. They depend only on their execution environment. They therefore provide optimal conditions for seamless system integration. They are robust and fault tolerant. The ability of an agent to react dynamically to unfavourable situations and events make it easier to build robust and fault tolerant distributed systems. If an host is being shut down, all agents executing on that machine will be warned and given time to dispatch and continue their operation on another host on the network. There are a considerable number of agent based e-commerce frameworks ranging from research mock-ups to academic-collaborative and commercial projects. The main principle of Kasbah [Chavaz and Maes (1996)] is the use of static software agents to negotiate a sale. The agents goal is 2

3 to make an acceptable deal in terms of price and date of delivery. AuctionBot [Wurman et al (1998)] uses a distributive negotiation principle. Users have a set of parameters to define the way their agent has to act, to bid. Buyers and Sellers can then bid according to the multilateral distributive negotiation protocols of the created auction. BargainFinder [Williams (1996)] was the first intelligent agent system to provide comparison shopping on the Internet. It was developed to demonstrate the impact of e-commerce on the retail industry; it also revealed how Web-based agents could provide tremendous power to consumers. A more recent commercial system from the same source is Oneswoop [Anderson (1999)]. There are a number of e-commerce projects supported by the European Union, predominantly addressing issues related to the establishment of new e-commerce protocols and standards. ABROSE (Agent Based Brokerage Service in E- commerce) is a large-scale e-commerce project [Gleizes et al (2000)] that aims to create an agentbased brokerage service. The main features are dynamic knowledge capture using a multiple agent system. Agents are used to provide user support for requests and navigation, registration and propagation of information. They aim to demonstrate how agent technology helps to create customisable and adaptive applications in the information brokerage domain. In an attempt to overcome potential problems of interoperability between different e-commerce implementations the consortium is developing an object-oriented framework called Eco System. In order to ease interoperation between layers they are also developing a Common Business Language (CBL) with the aim that different application agents will be able to communicate with each other. Since many applications are being developed and few standards have dominance, it seems that application vendors in this area will achieve interoperability between systems through the agreement of metaprotocols. Essentially, systems will support multiple protocols and "negotiate" with each other to achieve interoperation. 2. Why Use KADS for Agents in E-commerce KADS is a methodology for knowledge-based systems [Schreiber et al (19990] which supports project management, organisational analysis, knowledge acquisition, conceptual modelling, user interaction, system integration, and design. This methodology describes systems development from two perspectives. From the result perspective, KADS provides the means for developing a set of models of different aspects of the system and its environment that are continuously improved during the life cycle. From a project management perspective, KADS provides a risk-driven generic spiral life-cycle model that can be configured into a process adapted to any particular project. 3

4 KADS is a cyclic methodology, requiring several encompassing passes of seven phases; each stage adding a degree of functionality or progress. The planning and organisational issues stage (phase 1) analyses the effects of the introduction of the system on the organisation and people. Subsequently, it defines the typical user profile and the way the system will change their traditional tasks. It brings an interesting human dimension to the system. The application analysis stage (phase 2) defines precisely the problem the system is going to solve. The task model (phase 3) consists of identifying and modelling the knowledge needed top build and run the system. It decomposes the application model into a series of tasks and sub-tasks. In phase 4 a model of co-operation is built. This relies on the task model to define how the user and the system will work together. The distribution of the tasks is defined and interfaces and interactions with the user are specified. The model of expertise (phase 5) also relies on the task model to specify the desired behaviour and the knowledge involved. The co-operation model and model of expertise can be designed in parallel. Together the model of expertise and the model of co-operation provide a conceptual model (phase 6) that specifies the behaviour of the artefact to be built. Conceptual models are abstract descriptions of the objects and operations of the system. The design model (phase 7) is the description of the computational and representational techniques that the artefact should use to realise the specified behaviour. In building a design model, the knowledge engineer addresses external requirements such as speed, hardware and software. The main principle is the evolutionary prototyping concept. The spiral life cycle allows greater flexibility with the management of the project. The main functions of the project can be developed at first, then improved in parallel as secondary requirements are addressed. Specifications are not static, and the system can be reviewed and improved over time, in response to the real and changing needs of the user. This feature is particularly powerful when developing systems in a new area. The Internet, its standards and e-commerce are changing so fast that a non-evolutionary life cycle is totally inadequate and can lead to a born-dead obsolete solution. It provides for shorter and more forgiving development. The evolutionary life cycle allows faster and easier recovery from mistakes and oversights. With a more traditional software and development life cycle, an error or oversight or change in the perceived requirements of the user obliges you to review the entire conception, which takes a lot more time and money. Overall it gives the developer more control and allows a more ambitious system design 4

5 3. Example Scenario and Analysis The example e-commerce scenario to which we applied KADS and agents dealt with flight tickets. For example, an Internet user wants to find information about alternative flights for a particular journey. As it is becomes more time consuming to find such information on the web, an intelligent buying agent is to be used. This intelligent agent knows of a few flight companies web sites and will go to visit them to collect information. It will learn from other agents different kinds of travelling information and new sites to visit. First generation e-commerce agents tend to rank information purely on one-dimension, for example prices. They do not take into consideration other factors, such as services. Here we try to reproduce real consumer behaviour by allowing multiattribute decision-making in our agent framework. Our system should be able to: Receive a user request that defines the flight ticket attributes Collect the information related to this request from the network. Compute a multi-attribute decision over the collected information. Link the result to the related electronic web site. Return the collated and classified result to the user Requirements, task modelling and agent categorisation. Here we detail the requirements for our prototype e-commerce framework and the agents within the framework. As we intended to simulate real scenarios, we required flight information sites distributed across a network, accessed by the user from a different site. The tasks in this framework can be complicated and are best modelled using different categories of agents. The agents in this framework can be categorised in a number of ways, and at a number of levels. We can for example differentiate between stationary and mobile agents as described above. We can differentiate between agents on the basis of their tasks at some generic (application and domain independent) level. A task agent is an agent that supports decision making by exchanging information with other software agent. An information agent is an agent that is able to answer queries from the user or other agent by collating and manipulating information. An interface agent is an agent that interacts with the user, receive user requests and delivers results. Hybrid agents of different natures are used for all the agents. The interface-task agent is static, and closer to a pure deliberative architecture than a pure reactive architecture. The information agent is mobile, often changing its local environment and its route plan if one of the servers is down or unavailable. It also needs to filter the incoming messages to store only useful information. Again a kind of hybrid architecture will be needed but this time closer to the reactive architecture. Figure 1 5

6 gives an example configuration of this framework. The Framework Manager and its task agent (Static1) manage services within the framework. These tasks include the supply of electronic addresses of the users to each other. All communication between users occurs via an agent transport protocol (ATP) that allows mobile agents to travel between compatible sites. ATPs exist between server sites and are maintained by the framework manager. Here a task agent (Home1) associated with Buyer One, responds to a specific user request by creating three mobile information agents, Mobile1, Mobile2 and Mobile3. A different task agent (unseen and unknown to Home1) has created Mobile4. Initially the Home1 knows of three flight companies (A, B, C), and dispatches mobile agents to these known information providers. Mobile1 has returned and relays its gathered information. Mobile3 is interacting (via KQML) with one of the known flight companies and Mobile2 is returning to Home1. Mobile2 has also sensed a mobile agent from an unknown source and communicates with it via KQML. In a benign situation, it discovers the address of Flight Company U. In non-benign situations, it runs the risk of compromising agent Home1 s task. Table 1. Specifications of the Home agent and the mobile agent. Attributes Master (Home Agent) Slave (Mobile Agent) Autonomous It controls its actions and own state and cooperates with the mobile agent. It performs its task over the network by itself. Communication It needs to communicate both with the user and its slave It needs to communicate both with its master and the Flight Company agent Epistemological It needs to perform multi-attribute It needs to analyse the flight company Objectives decision-making. agent request and to modify its knowledge base. Mobility Stationary. Mobile. Reactivity It is reactive to the environment especially the messages sent to show the progression of its mobile agent. It is reactive to its environment and can change its plan if one of the servers it is visiting is unavailable. Role Get the flight company information Get the flight company information for Social ability Display an updated user interface. It co-operates with the user and with the mobile agent to complete the goal. its master. It co-operates with master and Flight Company agents to complete the goal. We can differentiate between these agents in terms of their responsibilities at the domain level. At this level of analysis, there are three major classes of agent in this framework. Home (or client) agents that act on behalf a customer interested in making an air ticket purchase. Flight company agents that act on the behalf of different air flight companies. Mobile agents capable of travelling between the sites servicing the needs of the flight company and client agents. The Home agent is stationary and responsible for all interactions with the user and multi-attribute negotiation. It delegates the search for information to a mobile agent. The Home agent can allow the user to 6

7 continuously monitor the progress of the mobile agent. For instance, the mobile agent can regularly send progress reports - which will be displayed by the Home agent through a progress bar in the user interface. This solution allows extensions. The Home agent can perform several other tasks like looking for trains companies offers. It will only have to create another mobile agent for that subtask. The specification of our system on the client side is represented in table 1. Table 2: Specifications of the Flight Company Agent Attributes Autonomous Communication Epistemological objectives Mobility Reactivity Role Social ability FlightCompany Agent It controls its actions and co-operates with mobiles It needs to communicate both with the incoming agent and the database. It needs to analyse the incoming request, build a corresponding SQL request and map all the result into an answer message. Stationary It needs to be reactive to the ODBC driver message and the incoming messages. Give the flight company information. It co-operates with the mobile agent. On the flight company side, the task is much simpler. The FlightCompany agent just has to interpret the incoming requests, translate them into SQL, connect to its Database, get and map the result and send the answer. As these tasks are consecutive; there is no need to delegate any of them. Hence there is only one agent on the Flight Company server. The specification of the Flight Company agent is given in table 2. The Flight Company agent needs to analyse incoming requests, to build SQL requests and to map all the information into answer messages. It needs to be reactive to poor database connections and to incoming messages Multi-attribute decision making Making decisions is part of the daily life, and there are many criteria with which to define an optimal decision. The same is true in e-commerce. In many situations, the price of product is one among many attributes used in sorting options. The multiple-criteria decision model we adopted involves four important elements [Yu (1985)]: The set of alternatives X The set of criteria f=(f1, f2, f3 ) used to make a decision. The outcome is measured in terms of value maximisation over the function Y=f(x) x X. The preference structures of the decision-maker. Decision making is easier if the preferences over the possible outcomes Y are clearly and perfectly specified. 7

8 This model tries to attach a value function to the possible decision outcomes and search for the best (highest) value. Three solution types are possible: Alpha: providing good and bad solutions Beta: providing good, undefined and bad solutions Gamma: extracting k better solutions from the set of possibilities The gamma solution is the one adapted for the prototype because the user has a set of classified better solutions and is able to make a final choice each solution can be reviewed in terms of the weight of each criterion. Such a model is understandable to the type of user expected to use the service. For the prototype system, the three criteria used are the price, the planning convenience and the services expected. Each criterion has a different importance represented by their weight defined on a 10 point rating scale. The price rate depends on prices offered by each company. The lowest price will have a rate of 10 and the most expensive a rate of 1. The planning convenience includes factors such as the time of the departure, the duration of the travel, the number of connections. All these different criteria have the own rating scale and the global rate is the average of each result. The service rate is evaluated as a function of eight criteria: reduction card; taxi waiting at the airport; hotel booking; youth price; children price; business class; car renting; disable facilities etc. The service rate is evaluated as a function of the number of services available. For instance, if company B provide all the services, it has a service rate of ten. Once each of these criteria is evaluated, the decision-making algorithm classifies the information and returns it to the user. Table 3 gives an example scenario, with each metric calculated using: m i = Σ (w i * x i ) / Σ w i, where m i is the final value, w i is the weight, x i is the value attributed. Table 3: Example of the multiple attribute decision making. Option Price Post-selling-service Offers Calculation Metric Rank A Very Bad Bad (10*10 + 2*5 + 2*5) 6 3 Low (48 hour guarantee) (nothing) / ( ) B Low Very good (exchangeable, refundable, guarantee) Medium (reduction on next purchase) (10*10 + 2*5 + 2*5) / ( ) C Medium Medium (good guarantee) 3.3. KADS Task Model Good (Buy one get one free, card) (5*10 + 6*5 + 10*5) / ( ) Figure 2 shows the KADS task decomposition model for the flight client side but does not relate tasks to agents. The model defines all the tasks and sub-tasks that have to be done by the system or the user. The first level of decomposition is relatively simple. Successive sub-tasks are: get user 8

9 request, get flight companies addresses, request each flight companies, compute the classified result, choice the desired flight ticket, order. At a more detailed level, tasks are: Specify travel information i.e. departure, destination, date, hour, eligibility etc. Specify decision-making parameters i.e. the price, service and convenience weight. Collect the flight company address. Select the company address. For each flight company address: Go on the flight company server. Request the flight company server. Store the result. Compute a classified result with the multi-attribute decision-making parameters. Select the desired solutions. Go on the flight company web server. Order the flight. A similar task decomposition model can be produced for the Flight Companies in figure1. In this model, we have assumed all agents, even if competitive, are benign. The flight company task is to accept and communicate with an incoming mobile agent, requiring three sub-tasks: receive request from mobile, execute query associated with request, reply to mobile. Such task models define of the general nature of the framework. Once complete, these tasks can then be defined in terms of the different agents and the user Co-operation Model The co-operation model in figure 3 shows the distribution of each task of figure 2 between the user and the system. The system tasks are distributed between one task (Home) agent and information seeking (Mobile) agents. The user supplies travel information and the multi-attribute parameters through a request interface managed by the Home Agent. The Home Agent produces a set of flight companies (and their addresses) from its own database. This specific task can be broken down further. The flight company addresses are initially provided by the Framework Manager. The Home Agent is periodically informed by the Framework Manager as further flight companies are introduced into the framework. The Home Agent is opportunistically updated through its own mobile agents, for example Mobile2 in figure 1 (after its communication with Mobile4). The user is able to reduce this set of addresses for example the user may not be interested in flying with specific companies. Mobile agents are responsible for the intermediate task sequence. They need to go to each flight company defined and collect the requested information. When these tasks are done, the mobile agents return home and pass the information to the Home agent. The Home agent 9

10 is then able to perform the multi-attribute decision making result and display the results to the user. The distribution of the tasks on the flight company side is simpler as there is no human intervention. In fact, in our prototype systems we decided to let one agent, the flight agent, to assume all the tasks of the flight company server Agent Communication An agent in e-commerce must be able to communicate with its environment and other agents. It is obvious that agents need a common language to communicate and understand each other, hence for example the ABROSE project s attempt to define CBL. As we needed to use declarative communication protocols in other work on multiple agent systems, we decided to pursue our use of KIF-KQML [ARPA (1993)]. We require only a small part of KQML for this project. We retain the readability concept of KIF by using understandable performative name and structure, but limit the syntax of KQML language between agents to ensure privacy of internal data structures. As most of the flight companies have different databases, the Flight Company Agent will interpret the incoming message and translate it into its own database language (SQL most of the time). Therefore, the Flight Company does not have to notify external agents of its database structure but communication remains transparent. It is a good way also to avoid hacker troubles - nobody knows how information is stored. We are looking to develop this language further for other e-commerce scenarios [Liu et al, (2000)] Agents, Processes and Architectures Having produced our task and co-operation models we can move onto designing computational processes. In designing the agent architectures we considered the nature of the agent tasks as given by the KADS task and co-operation models. We then placed these tasks on a continuum moving from pure deliberative to pure reactive systems. Deliberative process models were chosen only when reactive process models were impossible. This resulted in the design (and implementation) of three hybrid agents. The home agent manipulates symbolic information from the user and communicates about it with the mobile agents that it spawns. The home agent makes use of default values but does require the user to supply the flight information i.e. the source, the destination, the date, the hour and the eligibility. Any changes to the default multi-attribute decision-making parameters are stored locally in the memory of the home agent. Having constructed a user request and profile from this interaction, a mobile agent is created and initialised. KIF-KQML is used to inform the mobile agent 10

11 of its task. The mobile communicates with its home agent as it moves around the Internet, providing progress report messages that are relayed to the user interface. The mobile, on completing its task, returns to its home agent, relays all its stored information via KIF-KQML and is then extinguished. The home agent runs its multi-attribute decision-making module on the information provided by the mobile, storing it in the home database and updating the user interface with the final result. The mobile agent on receiving its initial message, sorts its itinerary and the set of tasks. It then begins its journey over the Internet. Each time it arrives at a new destination, it sends a progress report message to its Home Agent. In our prototype system the reactive mobile agent is limited to two tasks. A generic task system is not used for reasons of computational compactness. On arriving at a Flight Company server, a mobile agent sends a FlightInformationRequest message related to the user request. In turn will receive a FlightInformationResponse message containing the information about the requested flight or an error message if the server is down or has any other kind of trouble. It will unpack the message content using a communication filter and store it in its database and then proceed to its next destination. This sequence of actions continues until the mobile agent arrives at its source of origin. The Flight Company agent on receiving a FlightInformationRequest from a mobile agent. unpacks the message content and frames it as a SQL request. It connects to its personal database and executes the query though a JDBC-ODBC driver. The information response is then mapped back into our subset of KIF-KQML. This mapping allows the system to use several kinds of databases such as ORACLE, Sybase, and Ingres as far as they are support ODBC. After the mapping of the data, it constructs the answer message and sends it to the mobile agent Computational Platform In our prototype system, the framework is modelled using the IBM Aglets software [Lange and Oshima (1999)]. This Java based agent toolkit also models the Framework Manager and the maintenance of ATP (Agent Transport Protocol) connections across a distributed system. ATP is a TCP/IP based protocol by which agents can be made mobile. In a more open system, there are a great number of other issues that need to be considered, including the nature of computational platforms across the framework and the type of agents that can be used. Our prototype implementation mixes Java and IBM Aglets. Pure Java presents some major technical disadvantages, especially for agent implementations. These include: Inadequate support for Resource Control resulting in for example deny of service. 11

12 No protection of references. For example there is no way that the agent can directly monitor and control which other agents are accessing its methods. No support for the preservation and resumption of the execution state. It is currently impossible in Java to retrieve the full Execution State of an object. Information such as the status of the program counter and frame stack is permanently forbidden territory for Java programs. Therefore, for a mobile agent to properly resume a computation on a remote host, it must rely on internal attributes and external events to direct it. An embedded automaton can keep track of the agent s travels and ensure that computations are properly halted and properly resumed. Security. The Java commerce framework provides security protocols such as SSL (Secure Socket Layer) but other stronger standard protocols such as SET (Secure Electronic Transaction) are not available yet. An Aglet is a mobile Java object that visits Aglet-enabled hosts in a computer network. It is autonomous, running in its own thread of execution after arriving at a host, and reactive. It provides developers a whole framework with the aim of resolving the problems associated with Java through the implementation of a number of agent-related concepts. A context is an Aglet s workplace. It is a stationary object that provides a means for maintaining, managing and running a uniform execution environment where the host system is secured against malicious Aglets. One node in a computer network may host multiple contexts. A proxy is a representative of an Aglet. It serves as a shield for the Aglet that protects the Aglet from direct access to its public methods. The proxy also provides location transparency for the Aglet. That is, it can hide the real location of the Aglet. An identifier is bound to each Aglet. This identifier is globally unique and immutable throughout the term of the Aglet s life cycle. This allows the design and implementation of mobile agents that can execute in a platform-specific independent way. An Aglet application is the only entity to choose where and when to move and it can suspend or resume its execution at a certain point. Finally, an Aglet can interact with other mobile agents in a synchronous or asynchronous way. 4. Summary This mobile agent e-commerce framework is a mix of traditional and nouvelle architectures. Many initially simplifying assumptions were made, including the absence of many attributes such as negotiation, or dynamic action-selection. It makes use of three agents: the stationary Home Agent is responsible for user interaction and multi-attribute decision making. It creates Mobile Agent to traverse the Internet and procure required information. The stationary Flight Company agents provide the interface between the agent framework and the flight companies databases. Each server 12

13 needs to run an Aglet server to embed Aglets and allow the Aglet transfer protocol. This feature can be avoided by using Remote Method Interface in Java. No communication between mobile agents has been implemented. They could have been able to communicate to exchange new flight company servers addresses. This extension would require an extension to the mobile agent model and the KIF-KQML language and would provide an interesting extension of the framework. Many of these inadequacies are being addressed in an ongoing e-commerce project related to stock trading. 5. References Anderson Consulting Ltd, (1999), Oneswoop Home Pages, Chavez, A. and Maes, P. (1996), Kasbah: An Agent Marketplace for Buying and Selling Goods. Proceedings of the First International Conference on the Practical Application of Intelligent Agents and Multi-Agent Technology. London, UK. Gleizes, M.-P., Glize, P. & Léger, A. (2000), Abrose : An Adaptive Brokerage Tool Based on Multi-Agent, IEEE Computer Communications. Lange, D. and Oshima, M., 1999, Programming and Deploying Java Mobile Agents with Aglets, Addison-Wesley. Maes, P., Guttman, R. and Moukas, A. (1999), Agents that Buy and Sell: Transforming Commerce as we Know It. Communications of the ACM, March Issue, Schreiber, G., Akkermans, H, Anjewierden, A, de Hoog,R., Shadbolt, N., Van de Velde, W., and Wielinga, B. (1999), Knowledge Engineering and Management: The CommonKADS Methodology, MIT Press Williams, J., (1996), Bots and Other Internet Beasties, SAMS.Net publishing, Wurman, P.R. Wellman,M.P. and Walsh.W.E., (1998), The Michigan Internet AuctionBot: A configurable auction server for human and software agents. Second International Conference on Autonomous Agents. Yu, Y-L, (1985), Multiple-Criteria Decision Making, 13

14 Buyer One Task Agent: Home1 Key: ATP Agent Transport Protocol Actual Connection Potential Connection Flight Company C JDBC+ODBC SQL Task Agent: StaticC User Interaction ATP KQML Mobile1 ATP ATP Flight Company A Task Agent: StaticA JDBC+ODBC SQL KQML Mobile3 Flight Company U JDBC+ODBC SQL Task Agent: StaticU ATP Mobile2 Mobile4 KQML Flight Company B Task Agent: StaticB JDBC+ODBC SQL Framework Manager JDBC+ODBC SQL Task Agent: StaticM Figure 1. Electronic commerce framework for the flight ticket domain 14

15 Figure 2. KADS task decomposition model for the flight client 15

16 Figure 3: KADS model of co-operation on the flight client. 16

17 Figure 4: Mobile agent architecture 17

An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents

An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents M. Anber and O. Badawy Department of Computer Engineering, Arab Academy for Science and Technology

More information

ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS

ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS ANNALS OF THE FACULTY OF ENGINEERING HUNEDOARA 2006, Tome IV, Fascicole 1, (ISSN 1584 2665) FACULTY OF ENGINEERING HUNEDOARA, 5, REVOLUTIEI, 331128, HUNEDOARA ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS

More information

A Multi-Agent Approach to a Distributed Schedule Management System

A Multi-Agent Approach to a Distributed Schedule Management System UDC 001.81: 681.3 A Multi-Agent Approach to a Distributed Schedule Management System VYuji Wada VMasatoshi Shiouchi VYuji Takada (Manuscript received June 11,1997) More and more people are engaging in

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Distributed Data Management

Distributed Data Management Introduction Distributed Data Management Involves the distribution of data and work among more than one machine in the network. Distributed computing is more broad than canonical client/server, in that

More information

Managing Variability in Software Architectures 1 Felix Bachmann*

Managing Variability in Software Architectures 1 Felix Bachmann* Managing Variability in Software Architectures Felix Bachmann* Carnegie Bosch Institute Carnegie Mellon University Pittsburgh, Pa 523, USA fb@sei.cmu.edu Len Bass Software Engineering Institute Carnegie

More information

Transparent Redirection of Network Sockets 1

Transparent Redirection of Network Sockets 1 Transparent Redirection of Network Sockets Timothy S. Mitrovich, Kenneth M. Ford, and Niranjan Suri Institute for Human & Machine Cognition University of West Florida {tmitrovi,kford,nsuri@ai.uwf.edu.

More information

Introduction to CORBA. 1. Introduction 2. Distributed Systems: Notions 3. Middleware 4. CORBA Architecture

Introduction to CORBA. 1. Introduction 2. Distributed Systems: Notions 3. Middleware 4. CORBA Architecture Introduction to CORBA 1. Introduction 2. Distributed Systems: Notions 3. Middleware 4. CORBA Architecture 1. Introduction CORBA is defined by the OMG The OMG: -Founded in 1989 by eight companies as a non-profit

More information

Research on Mobile Agent-based E-Commerce System Framework

Research on Mobile Agent-based E-Commerce System Framework 440 Research on Mobile -based E-Commerce System Framework Wenna Liu 1, Deli Yang 2 School of Management, Dalian University of Technology, Dalian 116024, China 1 wenal@sina.com, 2 somdyang@dlut.edu.cn ABSTRACT

More information

A Satellite Network Management Architecture based on Mobile Agents and SNMP

A Satellite Network Management Architecture based on Mobile Agents and SNMP 2012 4th International Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Singapore A Satellite Network Management Architecture based on Mobile Agents and SNMP Jianli

More information

The EMSX Platform. A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks. A White Paper.

The EMSX Platform. A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks. A White Paper. The EMSX Platform A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks A White Paper November 2002 Abstract: The EMSX Platform is a set of components that together provide

More information

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc. Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet

More information

Efficient Scheduling Of On-line Services in Cloud Computing Based on Task Migration

Efficient Scheduling Of On-line Services in Cloud Computing Based on Task Migration Efficient Scheduling Of On-line Services in Cloud Computing Based on Task Migration 1 Harish H G, 2 Dr. R Girisha 1 PG Student, 2 Professor, Department of CSE, PESCE Mandya (An Autonomous Institution under

More information

A Semantic Marketplace of Peers Hosting Negotiating Intelligent Agents

A Semantic Marketplace of Peers Hosting Negotiating Intelligent Agents A Semantic Marketplace of Peers Hosting Negotiating Intelligent Agents Theodore Patkos and Dimitris Plexousakis Institute of Computer Science, FO.R.T.H. Vassilika Vouton, P.O. Box 1385, GR 71110 Heraklion,

More information

Introduction to E-Commerce

Introduction to E-Commerce Introduction to E-Commerce 1/12/2016 What is E-commerce? Buying and selling of products or services over electronic systems such as the Internet and other computer networks Online purchase of goods or

More information

Online Auction Software Fundamentals

Online Auction Software Fundamentals 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Online Auction Software Fundamentals Jarrod Trevathan +, Wayne Read and Rodel Balingit

More information

MODEL DRIVEN DEVELOPMENT OF BUSINESS PROCESS MONITORING AND CONTROL SYSTEMS

MODEL DRIVEN DEVELOPMENT OF BUSINESS PROCESS MONITORING AND CONTROL SYSTEMS MODEL DRIVEN DEVELOPMENT OF BUSINESS PROCESS MONITORING AND CONTROL SYSTEMS Tao Yu Department of Computer Science, University of California at Irvine, USA Email: tyu1@uci.edu Jun-Jang Jeng IBM T.J. Watson

More information

Fourth generation techniques (4GT)

Fourth generation techniques (4GT) Fourth generation techniques (4GT) The term fourth generation techniques (4GT) encompasses a broad array of software tools that have one thing in common. Each enables the software engineer to specify some

More information

High Performance Cluster Support for NLB on Window

High Performance Cluster Support for NLB on Window High Performance Cluster Support for NLB on Window [1]Arvind Rathi, [2] Kirti, [3] Neelam [1]M.Tech Student, Department of CSE, GITM, Gurgaon Haryana (India) arvindrathi88@gmail.com [2]Asst. Professor,

More information

An Object Model for Business Applications

An Object Model for Business Applications An Object Model for Business Applications By Fred A. Cummins Electronic Data Systems Troy, Michigan cummins@ae.eds.com ## ## This presentation will focus on defining a model for objects--a generalized

More information

National Institute of Standards and Technology

National Institute of Standards and Technology 1 Title: Author: Affiliation: Postal Address: Network Security Testing Using Mobile Agents T. Karygiannis National Institute of Standards and Technology NIST Information Technology Laboratory Building

More information

Middleware support for the Internet of Things

Middleware support for the Internet of Things Middleware support for the Internet of Things Karl Aberer, Manfred Hauswirth, Ali Salehi School of Computer and Communication Sciences Ecole Polytechnique Fédérale de Lausanne (EPFL) CH-1015 Lausanne,

More information

Wait-Time Analysis Method: New Best Practice for Performance Management

Wait-Time Analysis Method: New Best Practice for Performance Management WHITE PAPER Wait-Time Analysis Method: New Best Practice for Performance Management September 2006 Confio Software www.confio.com +1-303-938-8282 SUMMARY: Wait-Time analysis allows IT to ALWAYS find the

More information

An Overview of Distributed Databases

An Overview of Distributed Databases International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 207-214 International Research Publications House http://www. irphouse.com /ijict.htm An Overview

More information

Chapter 6. CORBA-based Architecture. 6.1 Introduction to CORBA 6.2 CORBA-IDL 6.3 Designing CORBA Systems 6.4 Implementing CORBA Applications

Chapter 6. CORBA-based Architecture. 6.1 Introduction to CORBA 6.2 CORBA-IDL 6.3 Designing CORBA Systems 6.4 Implementing CORBA Applications Chapter 6. CORBA-based Architecture 6.1 Introduction to CORBA 6.2 CORBA-IDL 6.3 Designing CORBA Systems 6.4 Implementing CORBA Applications 1 Chapter 6. CORBA-based Architecture Part 6.1 Introduction to

More information

The Key Technology Research of Virtual Laboratory based On Cloud Computing Ling Zhang

The Key Technology Research of Virtual Laboratory based On Cloud Computing Ling Zhang International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) The Key Technology Research of Virtual Laboratory based On Cloud Computing Ling Zhang Nanjing Communications

More information

Information integration platform for CIMS. Chan, FTS; Zhang, J; Lau, HCW; Ning, A

Information integration platform for CIMS. Chan, FTS; Zhang, J; Lau, HCW; Ning, A Title Information integration platform for CIMS Author(s) Chan, FTS; Zhang, J; Lau, HCW; Ning, A Citation IEEE International Conference on Management of Innovation and Technology Proceedings, Singapore,

More information

Service Oriented Architecture

Service Oriented Architecture Service Oriented Architecture Charlie Abela Department of Artificial Intelligence charlie.abela@um.edu.mt Last Lecture Web Ontology Language Problems? CSA 3210 Service Oriented Architecture 2 Lecture Outline

More information

Overview of Routing between Virtual LANs

Overview of Routing between Virtual LANs Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information

More information

Online Trading and Negotiation

Online Trading and Negotiation Online Trading and Negotiation Instructor: Jerry Gao Ph.D. San Jose State University email: jerrygao@email.sjsu.edu URL: http://www.engr.sjsu.edu/gaojerry May, 2000 Outline - Introduction of Trading -

More information

Multi Agent System for Negotiation and Decision Support

Multi Agent System for Negotiation and Decision Support Multi Agent System for Negotiation and Decision Support Zoltán BALOGH, Michal LACLAVÍK, Ladislav HLUCHÝ Institute of Informatics, Slovak Academy of Sciences, Bratislava balogh.ui@savba.sk, laclavik.ui@savba.sk,

More information

BASHO DATA PLATFORM SIMPLIFIES BIG DATA, IOT, AND HYBRID CLOUD APPS

BASHO DATA PLATFORM SIMPLIFIES BIG DATA, IOT, AND HYBRID CLOUD APPS WHITEPAPER BASHO DATA PLATFORM BASHO DATA PLATFORM SIMPLIFIES BIG DATA, IOT, AND HYBRID CLOUD APPS INTRODUCTION Big Data applications and the Internet of Things (IoT) are changing and often improving our

More information

Agent Design Patterns: Elements of Agent Application Design

Agent Design Patterns: Elements of Agent Application Design Agent Design Patterns: Elements of Agent Application Design Yariv Aridor IBM Tokyo Research Laboratory Yamato, Kanagawa, Japan tayariv@trl.ibm.co.jp Danny B. Lange General Magic Inc. Sunnyvale, California,

More information

Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems

Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Vortex White Paper Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Version 1.0 February 2015 Andrew Foster, Product Marketing Manager, PrismTech Vortex

More information

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical Radware ADC-VX Solution The Agility of Virtual; The Predictability of Physical Table of Contents General... 3 Virtualization and consolidation trends in the data centers... 3 How virtualization and consolidation

More information

Load Balancing using Pramati Web Load Balancer

Load Balancing using Pramati Web Load Balancer Load Balancing using Pramati Web Load Balancer Satyajit Chetri, Product Engineering Pramati Web Load Balancer is a software based web traffic management interceptor. Pramati Web Load Balancer offers much

More information

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

More information

A Tool for Evaluation and Optimization of Web Application Performance

A Tool for Evaluation and Optimization of Web Application Performance A Tool for Evaluation and Optimization of Web Application Performance Tomáš Černý 1 cernyto3@fel.cvut.cz Michael J. Donahoo 2 jeff_donahoo@baylor.edu Abstract: One of the main goals of web application

More information

Module 17. Client-Server Software Development. Version 2 CSE IIT, Kharagpur

Module 17. Client-Server Software Development. Version 2 CSE IIT, Kharagpur Module 17 Client-Server Software Development Lesson 42 CORBA and COM/DCOM Specific Instructional Objectives At the end of this lesson the student would be able to: Explain what Common Object Request Broker

More information

HP-UX File System Replication

HP-UX File System Replication Paper 4155 What is it, how does it work, and what are its benefits? Jim Kramer John Saylor Quest Software, Inc. 610 Newport Center Drive Suite 1400 Newport Beach, California 92660 (800) 306-9329 Introduction

More information

Concepts of Database Management Seventh Edition. Chapter 9 Database Management Approaches

Concepts of Database Management Seventh Edition. Chapter 9 Database Management Approaches Concepts of Database Management Seventh Edition Chapter 9 Database Management Approaches Objectives Describe distributed database management systems (DDBMSs) Discuss client/server systems Examine the ways

More information

An Active Packet can be classified as

An Active Packet can be classified as Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,pat@ati.stevens-tech.edu Abstract-Traditionally, network management systems

More information

Qint Software - Technical White Paper

Qint Software - Technical White Paper Qint Software - Technical White Paper Improved Reporting and Document Generation via Object-Oriented Data Access and Enterprise Information Integration Objects do not only change the way in which we develop

More information

LOAD BALANCING TECHNIQUES FOR RELEASE 11i AND RELEASE 12 E-BUSINESS ENVIRONMENTS

LOAD BALANCING TECHNIQUES FOR RELEASE 11i AND RELEASE 12 E-BUSINESS ENVIRONMENTS LOAD BALANCING TECHNIQUES FOR RELEASE 11i AND RELEASE 12 E-BUSINESS ENVIRONMENTS Venkat Perumal IT Convergence Introduction Any application server based on a certain CPU, memory and other configurations

More information

Designing a Microsoft SharePoint 2010 Infrastructure

Designing a Microsoft SharePoint 2010 Infrastructure Designing a Microsoft SharePoint 2010 Infrastructure Course Details Course Code: Duration: Notes: 10231B 5 days This course syllabus should be used to determine whether the course is appropriate for the

More information

Module 6. e-business and e- Commerce

Module 6. e-business and e- Commerce Module 6 e-business and e- Commerce 6.1 e-business systems 6.2 e-commerce systems 6.3 Essential e- commerce processes 6.4 Electronic payment processes 6.5 e-commerce application trends 6.6 Web store requirements

More information

IFS-8000 V2.0 INFORMATION FUSION SYSTEM

IFS-8000 V2.0 INFORMATION FUSION SYSTEM IFS-8000 V2.0 INFORMATION FUSION SYSTEM IFS-8000 V2.0 Overview IFS-8000 v2.0 is a flexible, scalable and modular IT system to support the processes of aggregation of information from intercepts to intelligence

More information

Agent-based Systems: Do They Provide a Competitive Advantage? Onn Shehory IBM Haifa Research Labs

Agent-based Systems: Do They Provide a Competitive Advantage? Onn Shehory IBM Haifa Research Labs Agent-based Systems: Do They Provide a Competitive Advantage? Onn Shehory IBM Haifa Research Labs Organization Portfolio IBM is among the 5 largest companies in the world, yearly income more than 80 Billion

More information

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3 SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange

More information

Technology to Control Hybrid Computer Systems

Technology to Control Hybrid Computer Systems INFORMATION TECHNOLOGY Hynomics (formerly HyBrithms Corporation, formerly Sagent Corporation) Technology to Control Hybrid Computer Systems Businesses and industries, both large and small, increasingly

More information

Aerospace Software Engineering

Aerospace Software Engineering 16.35 Aerospace Software Engineering Software Architecture The 4+1 view Patterns Prof. Kristina Lundqvist Dept. of Aero/Astro, MIT Why Care About Software Architecture? An architecture provides a vehicle

More information

Mobile Agents based Architecture for building Virtual Markets *

Mobile Agents based Architecture for building Virtual Markets * Mobile Agents based Architecture for building Virtual Markets * Departamento de Electrónica y Sistemas, Universidad de A Coruña, Campus de Elviña s/n 15071 A Coruña Tlfno: +34 81 167150 Ext. 1213 Fax:

More information

CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL

CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL This chapter is to introduce the client-server model and its role in the development of distributed network systems. The chapter

More information

Application Architectures

Application Architectures Software Engineering Application Architectures Based on Software Engineering, 7 th Edition by Ian Sommerville Objectives To explain the organization of two fundamental models of business systems - batch

More information

A Strategic Framework for Enterprise Information Integration of ERP and E-Commerce

A Strategic Framework for Enterprise Information Integration of ERP and E-Commerce A Strategic Framework for Enterprise Information Integration of ERP and E-Commerce Zaojie Kong, Dan Wang and Jianjun Zhang School of Management, Hebei University of Technology, Tianjin 300130, P.R.China

More information

User experience storyboards: Building better UIs with RUP, UML, and use cases

User experience storyboards: Building better UIs with RUP, UML, and use cases Copyright Rational Software 2003 http://www.therationaledge.com/content/nov_03/f_usability_jh.jsp User experience storyboards: Building better UIs with RUP, UML, and use cases by Jim Heumann Requirements

More information

One for All and All in One

One for All and All in One One for All and All in One A learner modelling server in a multi-agent platform Isabel Machado 1, Alexandre Martins 2 and Ana Paiva 2 1 INESC, Rua Alves Redol 9, 1000 Lisboa, Portugal 2 IST and INESC,

More information

COMP5426 Parallel and Distributed Computing. Distributed Systems: Client/Server and Clusters

COMP5426 Parallel and Distributed Computing. Distributed Systems: Client/Server and Clusters COMP5426 Parallel and Distributed Computing Distributed Systems: Client/Server and Clusters Client/Server Computing Client Client machines are generally single-user workstations providing a user-friendly

More information

User Guide. You will be presented with a login screen which will ask you for your username and password.

User Guide. You will be presented with a login screen which will ask you for your username and password. User Guide Overview SurfProtect is a real-time web-site filtering system designed to adapt to your particular needs. The main advantage with SurfProtect over many rivals is its unique architecture that

More information

A Dell Technical White Paper Dell Storage Engineering

A Dell Technical White Paper Dell Storage Engineering Networking Best Practices for Dell DX Object Storage A Dell Technical White Paper Dell Storage Engineering THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND

More information

1 Organization of Operating Systems

1 Organization of Operating Systems COMP 730 (242) Class Notes Section 10: Organization of Operating Systems 1 Organization of Operating Systems We have studied in detail the organization of Xinu. Naturally, this organization is far from

More information

A very short history of networking

A very short history of networking A New vision for network architecture David Clark M.I.T. Laboratory for Computer Science September, 2002 V3.0 Abstract This is a proposal for a long-term program in network research, consistent with the

More information

Oracle WebLogic Server 11g Administration

Oracle WebLogic Server 11g Administration Oracle WebLogic Server 11g Administration This course is designed to provide instruction and hands-on practice in installing and configuring Oracle WebLogic Server 11g. These tasks include starting and

More information

thoughtonomy Virtual Workforce for Service Automation

thoughtonomy Virtual Workforce for Service Automation thoughtonomy Virtual Workforce for Service Automation The Thoughtonomy Virtual Workforce uses software to replicate the interactions of people and technology to automate a wide range of operational and

More information

Grid Computing Vs. Cloud Computing

Grid Computing Vs. Cloud Computing International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 6 (2013), pp. 577-582 International Research Publications House http://www. irphouse.com /ijict.htm Grid

More information

Network Design Best Practices for Deploying WLAN Switches

Network Design Best Practices for Deploying WLAN Switches Network Design Best Practices for Deploying WLAN Switches A New Debate As wireless LAN products designed for the enterprise came to market, a debate rapidly developed pitting the advantages of standalone

More information

Transparent Redirection of Network Sockets 1

Transparent Redirection of Network Sockets 1 Transparent Redirection of Network Sockets 1 Timothy S. Mitrovich, Kenneth M. Ford, and Niranjan Suri Institute for Human & Machine Cognition University of West Florida {tmitrovi,kford,nsuri}@ai.uwf.edu

More information

E-commerce refers to paperless exchange of business information using following ways.

E-commerce refers to paperless exchange of business information using following ways. E-Commerce E-Commerce or Electronics Commerce is a methodology of modern business which fulfills the need of business organizations, vendors and customers to reduce cost and improve the quality of goods

More information

1. Introduction and Background

1. Introduction and Background A Multi- Framework for Stock Trading Darryl Davis Department of Computer Science, University of Hull, HU6 7RX, UK d.n.davis@dcs.hull.ac.uk Yuan Luo, Kecheng Liu School of Computing, Staffordshire University,

More information

E-Commerce Supply Chain Management Domain Research and Standard Architectures Kunal Chopra, Jeff Elrod, Bill Glenn, Barry Jones.

E-Commerce Supply Chain Management Domain Research and Standard Architectures Kunal Chopra, Jeff Elrod, Bill Glenn, Barry Jones. E-Commerce Supply Chain Management Domain Research and Standard Architectures Kunal Chopra, Jeff Elrod, Bill Glenn, Barry Jones Introduction E-Commerce Supply Chain Management involves the co-ordination

More information

THE BCS PROFESSIONAL EXAMINATION Professional Graduate Diploma. April 2001 EXAMINERS REPORT. Network Information Systems 2001

THE BCS PROFESSIONAL EXAMINATION Professional Graduate Diploma. April 2001 EXAMINERS REPORT. Network Information Systems 2001 THE BCS PROFESSIONAL EXAMINATION Professional Graduate Diploma April 2001 EXAMINERS REPORT Network Information Systems 2001 A number of candidates had clearly not followed the syllabus for this module

More information

Test Automation Architectures: Planning for Test Automation

Test Automation Architectures: Planning for Test Automation Test Automation Architectures: Planning for Test Automation Douglas Hoffman Software Quality Methods, LLC. 24646 Heather Heights Place Saratoga, California 95070-9710 Phone 408-741-4830 Fax 408-867-4550

More information

04 Internet Protocol (IP)

04 Internet Protocol (IP) SE 4C03 Winter 2007 04 Internet Protocol (IP) William M. Farmer Department of Computing and Software McMaster University 29 January 2007 Internet Protocol (IP) IP provides a connectionless packet delivery

More information

Token-ring local area network management

Token-ring local area network management Token-ring local area network management by BARBARA J. DON CARLOS IBM Corporation Research Triangle Park, North Carolina ABSTRACT This paper describes an architecture for managing a token-ring local area

More information

Tier Architectures. Kathleen Durant CS 3200

Tier Architectures. Kathleen Durant CS 3200 Tier Architectures Kathleen Durant CS 3200 1 Supporting Architectures for DBMS Over the years there have been many different hardware configurations to support database systems Some are outdated others

More information

White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary

White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary White Paper The Ten Features Your Web Application Monitoring Software Must Have Executive Summary It s hard to find an important business application that doesn t have a web-based version available and

More information

Communications and Computer Networks

Communications and Computer Networks SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the

More information

AskAvanade: Answering the Burning Questions around Cloud Computing

AskAvanade: Answering the Burning Questions around Cloud Computing AskAvanade: Answering the Burning Questions around Cloud Computing There is a great deal of interest in better leveraging the benefits of cloud computing. While there is a lot of excitement about the cloud,

More information

iseries TCP/IP routing and workload balancing

iseries TCP/IP routing and workload balancing iseries TCP/IP routing and workload balancing iseries TCP/IP routing and workload balancing Copyright International Business Machines Corporation 2000, 2001. All rights reserved. US Government Users Restricted

More information

HYBRID JINI FOR LIMITED DEVICES

HYBRID JINI FOR LIMITED DEVICES HYBRID JINI FOR LIMITED DEVICES VINCENT LENDERS, POLLY HUANG AND MEN MUHEIM ETH Zürich E-mail: lenders, huang @tik.ee.ethz.ch, men@ife.ee.ethz.ch We envision a future of heterogeneous mobile devices collaborating

More information

Information Systems Analysis and Design CSC340. 2004 John Mylopoulos. Software Architectures -- 1. Information Systems Analysis and Design CSC340

Information Systems Analysis and Design CSC340. 2004 John Mylopoulos. Software Architectures -- 1. Information Systems Analysis and Design CSC340 XIX. Software Architectures Software Architectures UML Packages Client- vs Peer-to-Peer Horizontal Layers and Vertical Partitions 3-Tier and 4-Tier Architectures The Model-View-Controller Architecture

More information

Associate Professor, Department of CSE, Shri Vishnu Engineering College for Women, Andhra Pradesh, India 2

Associate Professor, Department of CSE, Shri Vishnu Engineering College for Women, Andhra Pradesh, India 2 Volume 6, Issue 3, March 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Special Issue

More information

The Service Availability Forum Specification for High Availability Middleware

The Service Availability Forum Specification for High Availability Middleware The Availability Forum Specification for High Availability Middleware Timo Jokiaho, Fred Herrmann, Dave Penkler, Manfred Reitenspiess, Louise Moser Availability Forum Timo.Jokiaho@nokia.com, Frederic.Herrmann@sun.com,

More information

estos SIP Proxy 5.1.30.33611

estos SIP Proxy 5.1.30.33611 estos SIP Proxy 5.1.30.33611 1 Welcome to estos SIP Proxy... 4 1.1 WAN Settings... 4 1.2 Network interfaces... 5 1.3 Network Interface Configuration... 6 1.4 SSL/TLS Communications Certificate... 6 1.5

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

Middleware- Driven Mobile Applications

Middleware- Driven Mobile Applications Middleware- Driven Mobile Applications A motwin White Paper When Launching New Mobile Services, Middleware Offers the Fastest, Most Flexible Development Path for Sophisticated Apps 1 Executive Summary

More information

Software Development for Multiple OEMs Using Tool Configured Middleware for CAN Communication

Software Development for Multiple OEMs Using Tool Configured Middleware for CAN Communication 01PC-422 Software Development for Multiple OEMs Using Tool Configured Middleware for CAN Communication Pascal Jost IAS, University of Stuttgart, Germany Stephan Hoffmann Vector CANtech Inc., USA Copyright

More information

Network Scanning: A New Feature for Digital Copiers

Network Scanning: A New Feature for Digital Copiers Network Scanning: A New Feature for Digital Copiers Abstract Introduction The method of implementing electronic document capture and distribution, known as network scanning, into the traditional copier/printer

More information

REMOTE BACKUP-WHY SO VITAL?

REMOTE BACKUP-WHY SO VITAL? REMOTE BACKUP-WHY SO VITAL? Any time your company s data or applications become unavailable due to system failure or other disaster, this can quickly translate into lost revenue for your business. Remote

More information

Agile Manufacturing for ALUMINIUM SMELTERS

Agile Manufacturing for ALUMINIUM SMELTERS Agile Manufacturing for ALUMINIUM SMELTERS White Paper This White Paper describes how Advanced Information Management and Planning & Scheduling solutions for Aluminium Smelters can transform production

More information

1 Which of the following questions can be answered using the goal flow report?

1 Which of the following questions can be answered using the goal flow report? 1 Which of the following questions can be answered using the goal flow report? [A] Are there a lot of unexpected exits from a step in the middle of my conversion funnel? [B] Do visitors usually start my

More information

Mobile Cloud Computing In Business

Mobile Cloud Computing In Business Mobile Cloud Computing In Business Nilam S. Desai Smt. Chandaben Mohanbhai Patel Institute of Computer Applications, Charotar University of Science and Technology, Changa, Gujarat, India ABSTRACT Cloud

More information

Tivoli Endpoint Manager for Remote Control Version 8 Release 2. User s Guide

Tivoli Endpoint Manager for Remote Control Version 8 Release 2. User s Guide Tivoli Endpoint Manager for Remote Control Version 8 Release 2 User s Guide Tivoli Endpoint Manager for Remote Control Version 8 Release 2 User s Guide Note Before using this information and the product

More information

RARP: Reverse Address Resolution Protocol

RARP: Reverse Address Resolution Protocol SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it

More information

IT Architecture Review. ISACA Conference Fall 2003

IT Architecture Review. ISACA Conference Fall 2003 IT Architecture Review ISACA Conference Fall 2003 Table of Contents Introduction Business Drivers Overview of Tiered Architecture IT Architecture Review Why review IT architecture How to conduct IT architecture

More information

Trapeze Rail System Simulation and Planning

Trapeze Rail System Simulation and Planning trapeze Rail System English Software for Rail Modelling and Planning Trapeze Rail System Simulation and Planning www.trapezegroup.com Enabling future railway plans Cost reductions through integrated planning

More information

Software Development Kit

Software Development Kit Open EMS Suite by Nokia Software Development Kit Functional Overview Version 1.3 Nokia Siemens Networks 1 (21) Software Development Kit The information in this document is subject to change without notice

More information

Overview of CORBA 11.1 I NTRODUCTION TO CORBA. 11.4 Object services 11.5 New features in CORBA 3.0 11.6 Summary

Overview of CORBA 11.1 I NTRODUCTION TO CORBA. 11.4 Object services 11.5 New features in CORBA 3.0 11.6 Summary C H A P T E R 1 1 Overview of CORBA 11.1 Introduction to CORBA 11.2 CORBA architecture 11.3 Client and object implementations 11.4 Object services 11.5 New features in CORBA 3.0 11.6 Summary In previous

More information

Cloud Computing for Agent-based Traffic Management Systems

Cloud Computing for Agent-based Traffic Management Systems Cloud Computing for Agent-based Traffic Management Systems Manoj A Patil Asst.Prof. IT Dept. Khyamling A Parane Asst.Prof. CSE Dept. D. Rajesh Asst.Prof. IT Dept. ABSTRACT Increased traffic congestion

More information

RoCE vs. iwarp Competitive Analysis

RoCE vs. iwarp Competitive Analysis WHITE PAPER August 21 RoCE vs. iwarp Competitive Analysis Executive Summary...1 RoCE s Advantages over iwarp...1 Performance and Benchmark Examples...3 Best Performance for Virtualization...4 Summary...

More information