scispace - formally typeset
Search or ask a question

Showing papers in "Sigecom Exchanges in 2002"


Journal ArticleDOI
TL;DR: This paper attempts to identify the various indoor and outdoor positioning techniques that can be used for the provision of mobile and wireless applications and services and proposes a novel taxonomy based on the accuracy that is needed for various mobile location-based services.
Abstract: Wireless positioning determination has received increased attention during the past few years. Several wireless applications have been envisaged when mobile terminal location can be determined with sufficient accuracy at any time. In this paper, we attempt to identify the various indoor and outdoor positioning techniques that can be used for the provision of mobile and wireless applications and services. In order to maximize the benefits of this research in the area of positioning technologies, we propose a novel taxonomy with detailed analysis and evaluation of these techniques based on the accuracy that is needed for various mobile location-based services.

212 citations


Journal ArticleDOI
TL;DR: In this paper, the strategic parameters have been studied in order to determine the ways in which mobile service providers acquire new customers, and the dependent variable is the service subscribers' intention to switch to a new service provider with personalized services.
Abstract: There has been a notable increase in consumer use of mobile applications. Consumers begin to adopt mobile commerce applications. In response, firms have been investing billions of dollars in order to enhance the hardware and software platforms for mobile commerce. Consequently, with such large investments, firms are highly motivated to attract new clients and retain their old customers. In the present study, the strategic parameters have been studied in order to determine the ways in which mobile service providers acquire new customers. For the purpose of analysis, the dependent variable is the service subscribers' intention to switch to a new service provider with personalized services. Four main constructs have been studied - the amount and the perceived usefulness of general advertisements, the perceived usefulness and privacy issues about personalized advertisements. This empirical study indicates that all four constructs are significant in affecting the decision by subscribers to change to a new mobile service provider.

147 citations


Journal ArticleDOI
TL;DR: In order to maximize the benefit of P2P file sharing application that is to facilitate file sharing among various P2p file sharing applications, this paper proposes a framework to integrate various P1-2-1 file sharing protocols using P1P gateway.
Abstract: Peer-to-Peer (P2P) file sharing software has brought a hot discussion on P2P file sharing among all businesses. Freenet, Gnutella, and Napster are the three most popular P2P file sharing applications. They use three distinct protocols and these protocols come with different characteristics. In this paper, we discuss the protocols of these P2P file sharing applications, in terms of the methodologies used for peer registry, query and content sharing. In order to maximize the benefit of P2P file sharing application that is to facilitate file sharing among various P2P file sharing applications, we propose a framework to integrate various P2P file sharing protocols using P2P gateway in this paper.

96 citations


Journal ArticleDOI
TL;DR: Some of the work done on fair exchange protocols is reviewed and areas that still need to be addressed are identified.
Abstract: Many business transactions over the Internet involve the exchange of digital products between two parties - electronic mails, digital audio and video, electronic contract signing and digital signatures, to name a few. Often these transactions occur between players that do not trust each other. To facilitate such transactions, a number of secure protocols have been proposed. The main objective of these protocols is: either both the parties obtain each other's items or none do. Sometimes it is not possible to meet the above objective and researchers have aimed for a weaker objective: gather evidence during protocol execution using which an honest party can prove his case. Protocols which meet any of the two objectives are collectively termed fair exchange protocols. In this paper we review some of the work done on such fair exchange protocols and identify areas that still need to be addressed.

83 citations


Journal ArticleDOI
TL;DR: The identification and documentation of relevant patterns, both at the analysis and design levels, is an important step in this direction for enabling Business-to-Business (B2B) Collaborations.
Abstract: The composition of Web services has gained a considerable momentum as a paradigm for enabling Business-to-Business (B2B) Collaborations. Numerous technologies supporting this new paradigm are rapidly emerging, thereby creating a need for methodologies that bring these technologies together. The identification and documentation of relevant patterns, both at the analysis and design levels, is an important step in this direction.

65 citations


Journal ArticleDOI
TL;DR: This paper describes several scenarios of using web services in mobile devices and identifies their advantages, issues and challenges.
Abstract: The web service paradigm is a promising technology for developing applications in open, distributed and heterogeneous environments. The proliferation of this new technology has coincided with significant advances in the hardware and software capabilities of mobile devices. Due to the great benefits that come with the web service technology, such as interoperability, dynamic service discovery and reusability, there is a strong interest in making mobile devices capable of providing and consuming web services over wireless networks. This paper describes several scenarios of using web services in mobile devices and identifies their advantages, issues and challenges.

62 citations


Journal ArticleDOI
TL;DR: This paper proposes an enhanced license management model for the online music business, which integrates both models together and thus enables online and offline purchasing.
Abstract: Digital rights management has become a pressing concern for the online music business. Existing digital rights management systems are backed by two license management models, the tethered model and the untethered model. These two license management models focus on the management of payments and usage rights. The problems with these models are that the tethered model forces consumers to be online, while the untethered model provides relatively less security to the license residing locally. This paper proposes an enhanced license management model for the online music business, which integrates both models together and thus enables online and offline purchasing.

59 citations


Journal ArticleDOI
TL;DR: This work presents the design of a middleware that attempts to solve problems for P2P interaction in pervasive environments using concepts of the Contract Net Protocol, Semantic Service Discovery and secure transaction protocols.
Abstract: Pervasive environments are characterized by the presence of wireless devices ranging from sensors to mobile PDA-phones to laptops. Peer-to-Peer (P2P) information sharing in such environments presents a tremendous opportunity for people and devices to exchange information such as music, pictures, documents and stock tickers with peers. Information that has a monetary value introduces a whole new set of problems for P2P interaction in pervasive environments. In this work, we present the design of a middleware that attempts to solve these problems using concepts of the Contract Net Protocol, Semantic Service Discovery and secure transaction protocols.

22 citations


Journal ArticleDOI
TL;DR: It is believed that by better understanding how these factors affect revenue, content providers can develop services that generate more revenue while also being more compelling to users.
Abstract: The explosive increase in Internet bandwidth and usage opens a vista of opportunities to sell multimedia-rich software and services using the Internet. Once e-content is created, the cost of replication is negligible. Customers can download the e-content immediately after online transactions. Alternately, the content provider can stream the content to the customers. A sound business model is necessary for the success of such an enterprise. In this paper, we examine the determinants of revenue for an Internet based on-demand content delivery service. The determinants of revenue are: transaction model, pricing strategy, customer behavior, distribution resources, and competition. We briefly describe each of these factors and discuss how they relate to revenue. Our belief is that by better understanding how these factors affect revenue, content providers can develop services that generate more revenue while also being more compelling to users.

17 citations


Journal ArticleDOI
TL;DR: The WSEL is extended to specify the conflict of interest in the processes of matchmaking and delegation as one of the endpoint properties and the concepts of separation of duties and security risk factor in the Web service assignments are introduced.
Abstract: A Web service is an autonomous unit of application logic that provides either some business functionalities or information to other applications through an Internet connection. A business process contains a set of activities, and service locators assign an appropriate Web service for each activity.Recently IBM proposed a new XML language called Web Services Endpoint Language (WSEL) for describing endpoint properties of Web services. Web services will be described through endpoint properties by the appropriate extensibility elements in WSEL in order to facilitate the processes of matchmaking and delegation.It is obvious that security issues are important endpoint properties at Web services.This paper extends the WSEL to specify the conflict of interest in the processes of matchmaking and delegation as one of the endpoint properties.In addition to this, this paper also introduces the concepts of separation of duties and security risk factor in the Web service assignments.

13 citations


Journal ArticleDOI
TL;DR: A statistical analysis on the data from the Second Trading Agent Competition (TAC01) suggests that although this competition may not give a quantitative evaluation of the agents' trading strategies, it can still provide some useful qualitative evaluation.
Abstract: We present a statistical analysis on the data from the Second Trading Agent Competition (TAC01). Our goal is to study the effectiveness of this competition as a testbed for the evaluation of trading strategies in artificial markets. Our results suggest that in TAC01 no agent performed significantly better than all the others, from a pure statistical viewpoint. Instead, it reveals groups of agents which performed significantly better than others. Thus, our results suggest that although this competition may not give a quantitative evaluation of the agents' trading strategies, it can still provide some useful qualitative evaluation.

Journal ArticleDOI
TL;DR: There were evidences that the perceived usability of an electronic store is affected by its organization of information and features, suggesting that it is timely to eliminate inconsistent store design as a factor contributing to the consumers' negative perception of electronic retailing.
Abstract: This paper describes an investigation on how the perceived usability of electronic stores is affected by the organization of information and features. An experiment was developed to measure the perceived usability of a sample of electronic stores. This allowed for systematic comparison of information items and features between "high usability" and "low usability" stores. Within the sample of electronic stores tested, there were evidences that the perceived usability of an electronic store is affected by its organization of information and features. This suggests that it is timely to eliminate inconsistent store design as a factor contributing to the consumers' negative perception of electronic retailing. This usability testing approach can provide the basis for developing usable electronic store systems.

Journal ArticleDOI
TL;DR: The present invention provides a re agent for the determination of glycosilated hemoglobin in a blood sample, as well as a reagent for the differentiation of Glycosilated and non-glycosilated Hemoglobin, comprising haptoglobin.
Abstract: A process for the determination of glycosilated hemoglobin in a blood sample comprises liberating glycosilated and non-glycosilated hemoglobin from the erythrocytes by chemical or physical treatment; converting, if desired, the hemoglobin into methemoglobin, and thereafter differentiating the glycosilated and non-glycosilated hemoglobin portion using its reaction with haptoglobin, and determining the glycosilated and/or the non-glycosilated hemoglobin portion. The present invention also provides a reagent for the determination of glycosilated hemoglobin in a blood sample, as well as a reagent for the differentiation of glycosilated and non-glycosilated hemoglobin, comprising haptoglobin.