Automating negotiation for M-services
نویسندگان
چکیده
منابع مشابه
Automating negotiation for M-services
Mobile electronic commerce (m-commerce) is an emerging manifestation of internet electronic commerce that bridges the domains of Internet, mobile computing and wireless telecommunications in order to provide an array of sophisticated services (m-services) to mobile users. To date, much of the research in the area has concentrated on the problem of service discovery. However, once a service has ...
متن کاملTowards Automating Negotiation for M-Services
Mobile electronic commerce (m-commerce) is an emerging manifestation of internet electronic commerce that bridges the domains of Internet, mobile computing and wireless telecommunications in order to provide an array of sophisticated services (m-services) to mobile users. In such an open market place, the flexible exchange of m-services will necessarily be through some form of negotiation. To t...
متن کاملAutomating Human Based Negotiation Processes for Autonomic Logistics1
1 0-7803-5846-5/00/$10.00 © 2000 IEEE Affordability and responsiveness are two key requirements for the next generation of aircraft support systems. Aircraft have to be repaired with minimum downtime and the support process has to be economical and efficient. The vision of Autonomic Logistics (AL) entails a maintenance and support system that can autonomously respond to “events”, e.g. problems ...
متن کاملAutomating Infrastructure Composition for Internet Services
This paper describes a framework for automatically configuring relationships that tie together the software and hardware infrastructure components for an Internet-based service, which we also call ‘‘composing’’ the service infrastructure. Management and infrastructure software employ the framework to specify, discover, and react to changes in the infrastructure components participating in the s...
متن کاملAutomating Compliance for Cloud Computing Services
We present an integrated approach for automating service providers’ compliance with data protection laws and regulations, business and technical requirements in cloud computing. The techniques we propose in particular include: natural-language analysis (of legislative and regulatory texts, and corporate security rulebooks) and extraction of enforceable rules, use of sticky policies, automated p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans
سال: 2003
ISSN: 1083-4427
DOI: 10.1109/tsmca.2003.819654