Skip to main content

2008 | Buch

Towards Sustainable Society on Ubiquitous Networks

The 8th IFIP Conference on e-Business, e-Services, and e-Society (I3E 2008), September 24–16, 2008, Tokyo, Japan

insite
SUCHEN

Über dieses Buch

The massive growth of the Internet has made an enormous amount of infor- tion available to us. However, it is becoming very difficult for users to acquire an - plicable one. Therefore, some techniques such as information filtering have been - troduced to address this issue. Recommender systems filter information that is useful to a user from a large amount of information. Many e-commerce sites use rec- mender systems to filter specific information that users want out of an overload of - formation [2]. For example, Amazon. com is a good example of the success of - commender systems [1]. Over the past several years, a considerable amount of research has been conducted on recommendation systems. In general, the usefulness of the recommendation is measured based on its accuracy [3]. Although a high - commendation accuracy can indicate a user's favorite items, there is a fault in that - ly similar items will be recommended. Several studies have reported that users might not be satisfied with a recommendation even though it exhibits high recommendation accuracy [4]. For this reason, we consider that a recommendation having only accuracy is - satisfactory. The serendipity of a recommendation is an important element when c- sidering a user's long-term profits. A recommendation that brings serendipity to users would solve the problem of “user weariness” and would lead to exploitation of users' tastes. The viewpoint of the diversity of the recommendation as well as its accuracy should be required for future recommender systems.

Inhaltsverzeichnis

Frontmatter

Organized Session

eService Innovation and Sensor Based Healthcare
Abstract
This paper discusses eServices using frontier applications, which targets medical domain applications using sensor network, along with New standardized health check system introduced to Japanese nations recently. We clarify the ubiquitous aspects of this application, and address challenges for ubiquitous innovation. We also describe the experience of introducing and operating the system with a real field trial.
Osamu Sudoh, Sozo Inoue, Naoki Nakashima

Research Track

User Behavior Modeling

Decision Making Model for Online Music Service Users
Abstract
This paper describes a consumer behavior model for online shopping, especially online music services, because they are the most popular online shopping service in Japan. Based on Howard’s consumer decision model, questionnaires about decision making for online music services were given to 282 students. The questionnaire results show that almost 90% of respondents have downloaded from online music services, and high school students use such services slightly more than university students. This paper analyzes the questionnaire results by structure equation modeling and examines the relationships between the factors in Howard’s model.
Ayako Hiramatsu, Takahiro Yamasaki, Kazuo Nose
Intraday-scale Long Interval Method of Classifying Intramonth-Scale Revisiting Mobile Users
Abstract
Penetration of the mobile Internet has increased its visibility worldwide. This enables analysis of detailed time-dimensional user behavior data. It also increases the industry need to identify and retain mobile users with strong loyalty to a particular mobile Web site. The author proposes an intramonth-scale revisit classification method for identifying intramonth-scale, revisiting mobile users. The author performs a case study and the result shows that the proposed method shows 87 % classifier accuracy. The author discusses a trade-off between classifier accuracy and a true positive ratio.
Toshihiko Yamakami
The Study of Customer Segmentation Examined by Catastrophe Model
Abstract
Convenience stores in Taiwan have made remarkable successes with retail delivery services by integrating E-commerce and logistics systems to form a new retail delivery model: “On-line shopping with pick-ups at convenience stores.” Although choice behavior has been discussed in marketing, few studies describe the non-linear characteristic of choice behavior. The catastrophe model was used to analyze the linkages between customer satisfaction and switching cost on pick-up point service loyalty. The results indicated that the switching cost plays the splitting factor in the catastrophe model, and a high switching cost makes the discontinuous choice behavior. In the cusp catastrophe mode, “Reselection electronic map” is the main index of the splitting factor. Nevertheless, “The quality of relative service concerning the electronic map” is the main index of the normal factor. It has been expected that a catastrophe approach to discontinuous behavior has made clearly abundant implications. Based on the findings of loyalty in the application of cusp catastrophe theory, the cusp catastrophe model is an appropriate model to know the process of loyalty. It suggests that other researchers could consider the cusp catastrophe theory and other nonlinear techniques, especially for standard approaches not adequately to capture the underlying dynamic.
Yu-Kai Huang

Information Overload and Recommendation Systems

A Procedure of How to Conduct Research in Transparent Mobile Recommendations
Abstract
The information overflow of today’s information society can be overcome by the usage of recommender systems. Due to the fact that most recommender systems act as black boxes, trust in a system decrease, especially when a recommendation failed. Recommender systems usually don’t offer any insight into the systems logic and cannot be questioned as it is normal for a recommendation process between humans. Transparency, which is about explaining to the user why a recommendation is made, supports the user in a way of understanding the reasoning behind a recommendation. Within a mobile environment, it is possible to address the user more individualized but transparency needs a completely different way of visualization and interaction. The paper in hand aims at setting up a process model on how to address transparency in mobile recommendations and therefore introduce into a complex new area of research, recommender systems didn’t address in the past.
Mike Radmacher
Development of Recommender Systems Using User Preference Tendencies: An Algorithm for Diversifying Recommendation
Abstract
Many e-commerce sites use a recommendation system to filter the specific information that a user wants out of an overload of information. Currently, the usefulness of the recommendation is defined by its accuracy. However, findings that users are not satisfied only with accuracy have been reported. We consider that a recommendation having only accuracy is unsatisfactory. For this reason, we define the usefulness of a recommendation as its ability to recommend an item that the user does not know, but may like. To improve user satisfaction levels with recommendation lists, we propose an alternative recommendation algorithm that increases the diversity of the recommended items. We examined items that appeal to several different taste tendencies to create a list and achieved diversity in that list. First, we created a similarity network of items by using item rating data. Second, we clustered the items in the network and identified the topics that appealed to the same preference tendency. Our proposed algorithm was able to include items covering several topics in the recommendation list. To evaluate the effect on user satisfaction levels, we used our algorithm to make a recommendation list for DVD items carried by Amazon.co.jp and conducted a questionnaire survey. The results showed higher levels of user satisfaction with our list than a list created using Collaborative Filtering (CF).
Yuki Ogawa, Hirohiko Suwa, Hitoshi Yamamoto, Isamu Okada, Toshizumi Ohta

Trust and Security

Cryptographic Approch for Workflow Systems
Abstract
This paper proposes encryption schemes to enforce the order of the procedure in a workflow system. In workflow systems, it is important to perform a procedure according to an order that is given by some regulation. In addition, it is desired that each reviewer checks a necessary part of a document to admit the application because the document sometime contains privacy information, e.g., name, birthday, income and so on. There is a procedure in a workflow system which it is sufficient to pass if one of two reviewers admits the document. More generally, there is a procedure in a workflow system that can be passed if k of n reviewers admit the document, which we call a “threshold procedure”. By applying a cryptographic technique, e.g., a multiple encryption and secret sharing, this paper gives a method to realize various procedures in workflow systems, i.e., controlling the order of reviewers, disclosing a part of document selectively, and a threshold procedure. Conventional workflow systems control their procedure by a server, which we consider a trusted one. This implies that an administrator might tamper a procedure. The proposed schemes help us to enforce a procedure even if he/she is not trustworthy.
Yasuo Hatano, Kunihiko Miyazaki, Toshinobu Kaneko
A Fuzzy Model for Scalable Trust in E-Commerce
Abstract
With the rapid development of e-commerce and the expansion of e-commerce system scale, scalable trust in e-commerce becomes critical. This article examines scalable trust of multiagent e-commerce system (MECS) and proposes a fuzzy model for scalable trust in e-commerce. It also discusses the realization of scalable trust from the viewpoint of engineering. The proposed approach will facilitate research and development of trust, multiagent systems, e-commerce and e-services.
Zhaohao Sun, Xifeng Guo, Shuliang Zhao
Extending RBAC for Large Enterprises and Its Quantitative Risk Evaluation
Abstract
Systems and security products based on the RBAC model have been widely introduced to enterprises. Especially, the demands on enforcement of enterprise-level security policies and total identity management are rapidly growing. The RBAC model needs to be extended to deal with various circumstances of large enterprises, such as geographical distribution and heterogeneous environments including physical access control. In this paper, we introduce a new RBAC model, suitable for single sign-on systems. This model optimizes evaluation of rule-based RBAC so that total operation costs and productivity can be improved.
Furthermore, to select most cost-effective RBAC extensions for enterprise-wide requirements, we propose a quantitative risk evaluation method based on fault trees. We construct fault trees having security violation and productivity loss as top events, and RBAC standard functions and security incidents as basic events. Probabilities of the top events are computed for given RBAC models and operation environments. We apply this method to a real enterprise system using the above RBAC extension and the proposed model realizes more safety and productivity over the base model.
Seiichi Kondo, Mizuho Iwaihara, Masatoshi Yoshikawa, Masashi Torato

Service Oriented Computing and Web Services

Presence-Based Runtime Composition of IMS Services Deployed in a SIP Servlet Platform
Abstract
The IP Multimedia Subsystem (IMS) is aimed to enable the delivery of rich multimedia services in converged networks. Due to the current needs of the mobile telecommunications market to deliver tailored experiences to its users, IMS operators must be able to manage the interoperability and cooperation between the deployed services, in order to provide a high level of customization to their subscribers. With this goal in mind, this paper presents an extension to the Default Application Router introduced in the Java SIP Servlet API v1.1. The proposed Presence AR allows runtime changes in the precedence relationships and application subscriptions that build the composition chains, based on the Presence information of the users involved in the session.
Juan Miguel Espinosa Carlín
A Service Oriented and Agent-Based Architecture for the e-Collaboration of SMEs
Abstract
The concept of a Service-Oriented Architecture (SOA) to flexibly address business needs with the use of Information Technology (IT) is increasingly being recognized as important for a company’s agility and responsiveness to change. A SOA approach can also help to design more agile web portals, in order to enable companies to increase their responsiveness and adaptability with regards to addressing a business opportunity as a collaborative Virtual Organization (VO). Value can be added to the operations of such a VO with the use of Intelligent Agents to automate the processes of finding collaboration partners and negotiating the creation of VOs based on user-defined business rules. This paper discusses these concepts and their benefits for Virtual Organizations based on the work of a European Union (EU) co-funded Information Society Technologies (IST) project examining these issues for Small and Medium Enterprises (SMEs) in the European Enterprise Resource Planning (ERP) industry.
Ioannis Ignatiadis, Dimitrios Tektonidis, Adomas Svirskas, Jonathan Briggs, Stamatia-Ann Katriou, Adamantios Koumpis
Autonomous Web Services Based on Dynamic Model Harmonization
Abstract
Web Services has become the infrastructure to connect business applications over the Internet. Under the current Web Services, however, stakeholder systems must follow the predefined rules for a particular business service including those about business protocols to send/receive messages and about system operation. Only the systems built strictly to follow the predefined rules can participate in the concerning service. This is insufficient when considering future eBusiness systems. More flexible mechanism is desired where freely built and autonomously running systems can exchange business messages without pre-agreed strict rules. We call it Autonomous Web Services (AWS) and proposed the framework called Dynamic Model Harmonization (DMH) with its algorithm, which dynamically adjusts different business process models between systems [1]. In this paper, we propose middleware technology that realizes AWS based on the DMH. The proposal includes the mechanism and specification to drive an application by a dynamically harmonized business process model, as well as the DMH algorithm extended in line with the proposed mechanism. In addition, the way to control very long transactions often appear in AWS environment is proposed, and messaging infrastructure for AWS is discussed based on the prototype implementation.
Makoto Oya

P2P Co-Operation and Content Management

A Nonlinear Representation of Page History in P2P Wiki System
Abstract
Awareness about the document evolution is an important part in collaborative editing systems. It is represented always by the versions history. The representation of the document history in centralized collaborative editing systems is linear. However, in distributed collaborative editors, there is no central server and the users can work asynchronously or in isolation and some versions may be produced concurrently, in this case, the history is no long linear. The existing history representations are limited because they don’t provide any information about the concurrence on the document history. We introduce here a non linear representation for the page history in P2P wiki systems. The concurrency information about the page versions is provided; the user can explore the page versions that resulted under the user’s control or produced by the server in case of merging concurrent modifications.
Sawsan Alshattnawi, Gérôme Canals, Pascal Molli
Distributed Secure Virtual File System Using FUSE
Abstract
In this paper, we describe the implementation and evaluation of the distributed secure file system based on FUSE. A tremendous amount of content is now saved on file servers. File servers and network storage can also easily be installed in small organizations by using operating systems such as Linux. However, the storage capacity of PCs that are generally used is also increasing due to low-priced hard disks. The surplus disk capacity of these PCs is also increasing rapidly especially for work and research. Therefore, we need to use these surplus disks effectively by using distributed preservation of files. Furthermore, administrators may also inadvertently contribute to information leakage and falsification. Therefore, it has recently become necessary to ensure not only user authentication and communication pathways but security within the medium used for storage. Therefore, we implemented and evaluated a system we called JIGFS, which accomplishes secure file management based on a public key for all users. It also distributes and saves file using common PCs, and efficiently uses surplus disk capacity and the communication band. As it is implemented using Filesystem in USErspace (FUSE), users can use it like a conventional file system.
Shin Tezuka, Akifumi Inoue, Ryuya Uda, Kenichi Okada

Ubiquitous, Mobile and Pervasive Services

Pricing for Maximizing Provider’s Revenue in Multicast Content Delivery Services
Abstract
With the rapid growth of broadband computer networks, users are inclined to use delivery services that can handle large-size content. When offering download service of popular contents, it is more useful to use a multicast system and deliver content to all users who request the content than using unicast system. Using a multicast system, the content server can increase the number of users and decrease user’s waiting time. As a result, increasing user’s WTP (Willingness To Pay) and the provider’s revenue can be expected. In this paper, we suggest two content delivery methods which can be employed in the multicast content download services. We also discuss the provider’s revenue of each delivery method. Using user’s behaviour model in which a user participates in the service and leaves it, we show the relation between price for the service and user’s participation rate of the service through simulation. The relation between price and the provider’s revenue is also demonstrated in the simulation. In addition, in each delivery method, we show an optimal price which maximizes the provider’s revenue.
Takehiro Kajita, Kyoko Yamori, Yoshiaki Tanaka
Personalized Public-Transport Guidance Using Mobile End Devices
Abstract
Mobility is a vital part of human life. Mobility needs can be met in a variety of ways: motorized and non-motorized individual traffic, local public transport using buses and trains, or mixed systems like taxis and park and ride systems. Individual traffic in particular causes major environment problems and problems of traffic congestion. Strengthening public transport is often favored, but this preference is not reflected in the number of local transport users. This phenomenon can be explained by the fact that a central problem involved in local public transport usage is its complexity. The article presented here develops demands on a personalized local public transport guidance system, analyzes existing systems and presents a solution for a personalized support system for users of local public transport systems. The software Hermes was developed for this purpose. It accompanies the travelers through all steps of public traffic usage — from checking time tables to purchasing tickets to a navigation system for pedestrians guiding the user to a street address destination.
Stefan Christmann, Thorsten Caus, Svenja Hagenhoff
Internet Adoption in Tourism Industry in China
Abstract
Information communication technologies (ICTs) have significantly revolutionized the travel industry in the last decade. E-tourism has been developed in travel industry in the world, which helps to realize digitalization of travel service process and value chains in travel industry, and has been used to evaluate the entire range of ICT application in tourism industry. E-tourism has developed variedly in different regions or countries. This research aims to examine how ICTs and Internet have impacted the travel industry in China. This study explores the current e-tourism development in China and examines the use of Internet in travel organizations. In addition, it investigates some issues related to the e-tourism development, including the drivers and barriers in e-commerce adoption from both travel organizations’ and travelers’ perspectives. The results indicate that in general China is a late-adopter as regards to the adoption of e-commerce in tourism industry. In China only a few innovative travel organizations are at the early adoption stage of Internet and have experienced the benefits and advantages of early-adopters. Though e-tourism has been a growing trend, travel agency still keeps the main travel service delivery channel in China. This study also suggests that travel organizations in China should learn from developed countries to know how to develop e-tourism and improve the competitiveness of tourism in China.
Hongxiu Li, Reima Suomi

e-Health and e-Education

The Use of Data Sources of Medication Information — a Finnish Primary Care Organization in the Light of National e-Health Scenarios
Abstract
Many areas of the healthcare sector are information-rich and data-intensive, and often lack of time is a problem. Patient-specific medication information is often seen as highly important part of patient data for patients’ safe treatment and therefore the availability of it should be guaranteed. The aim of this paper is to study healthcare professionals’ perceptions of their utilization of sources of medication information and to assess it in the light of national e-Health scenarios using a Finnish primary care organization as a case study. The healthcare professionals reported frequent use of the patient as a source of information as they could not be convinced of the correctness of the medication lists in the electronic patient record. The future e-Health solutions should be usable and guarantee the correctness and completeness of the medication information if the clinical workers are expected to use them. The valuable information provided by the patients could be also exploited more efficiently in the future.
Eeva Aarnio, Reetta Raitoharju
Student Retention through Customized Service Processes
Abstract
Due to the Bologna declaration and the subsequent switch to the bachelor/master system, student mobility is rising and competition among universities across Europe becomes intense. Furthermore, students are demanding comfortable information and communication solutions. Hence, universities are required to align educational- and serviceprocesses more closely to their students. This paper presents an innovative approach to adapt modern concepts of Customer Relationship Management (CRM) to institutions of higher education in order to retain students at their university. Furthermore, an architecture is presented which is capable of integrating university legacy systems with state of the art CRM technology.
Reinhard Jung, Jessica Kochbeck, Annett Nagel
e-Government in the Finnish Early Childhood Education: An Analysis of Current Status and Challenges
Abstract
With the increasing number of citizens accessing the Internet, governments at all levels around the world have no other choice but to utilize information technology, especially the Internet, to provide improved services to their citizens. This paper studies and analyzes the status and challenges of e-government services within early childhood education context in ten of the largest municipalities in Finland. The study draws upon previous research on e-government stage models and e-government challenges. Our analysis indicates that there is significant development work in progress in the field of early childhood education and e-government in many Finnish municipalities. Many of them have reached relatively mature stage in developing early childhood education e-services. The paper also discusses the challenges municipalities face when they try to implement e-government services. Overall, the paper tries to provide examples and ideas for researchers and practitioners for developing better quality early childhood education e-government services.
Annukka Vahtera

e-Government (G2G, G2B and G2C)

Network-driven Context in User-driven Innovation
Abstract
As new networks such as sensor and grid computing are developed, service providers, intermediaries, and users are exposed to an increasing number of contexts, which is a set of information that affects users’ behavior and value system in accordance with a network they belongs to. This paper proposes that citizens’ contextual data should be collected based on service quality, satisfaction, and technological acceptance model in administrative IT investment and management framework. The main objectives are that the usage rate of online applications increases, and that multi-channel service delivery and One-stop Portal is efficiently and effectively offered in Japanese e-Gov initiative. We present a methodology of visualizing citizens’ trust and continual usage intentions in light of an existing service science model as well as providing governance across multiple administrative agencies and organizations.
Yumiko Kinoshita, Osamu Sudoh
Does E-government Trust in e-Commerce when Investigating Trust? A Review of Trust Literature in E-Commerce and e-government Domains
Abstract
Trust has been acknowledged to be an important determinant of e-commerce acceptance. Therefore, understanding the nature and importance of trust is momentous in promoting e-government adoption. This paper reviews the trust discussion in business-to-consumer (B2C) e-commerce and government-to-individuals (G2IS) e-government. The aim of the paper is to identify potential differences as well as common denominators in order to introduce aspects that could potentially mutually benefit the research in the e-government and e-commerce domains. The main findings of the study are: 1. both domains trust largely conceptualize as multidimensional construct. 2. In the e-government field, trust is more often also empirically investigated as more than only one variable. 3. In the e-government literature, two main discourses related to trust were identified; trust in government in general, and trust in e-government, referring to the technology aspects.
Matti Mäntymäki
Effects of Information Communication Technology on Urban and Rural Service Sectors: An Empirical Analysis of Japanese Economic Geography
Abstract
The present paper investigates the impacts of information communication technology (ICT) on economic geography by focusing on the Japanese service sectors. The authors empirically assess the effects of ICT on the urban and rural service sectors using Japanese economic data. There are two main findings. The first indicates that the service sectors in urban areas agglomerated from 2000 to 2006. The second is that the ICT environment might affect the location of the service sectors; an especially dense ICT service could accelerate agglomeration in urban areas. However, the effects of the ICT-related environment on the location of the service sectors are different in urban and rural areas. A dense ICT service environment might disperse service sectors in a rural area.
Hideyuki Tanaka, Takeshi Okamoto

Legal, Societal and Cultural Issues

The Age-Divide in E-Government — Data, Interpretations, Theory Fragments
Abstract
14 of the world’s 15 ‘oldest’ countries (largest percentage of people age 65 plus) are to be found in Europe. While E-Government is currently establishing as the most important public sector reform strategy in the EU (Lisbon Agenda), age is a factor which strongly affects E-Government usage. Under the label of ‘E-Inclusion’ EU policies seeks to solve also age-related digital divide issues. This paper seeks to explore the age-divide in E-Government and discusses 2006 Eurostat data on online service usage. The case of Germany will be given as example.
Björn Niehaves, Jörg Becker
Software Piracy in Chilean e-Society
Abstract
The Business Software Alliance and their counterparts in the global market are determined to make significant progress in curbing the Software Piracy globally. Their aggressive pursuit in their endeavor has produced results in bringing down the piracy rate. However, despite the highly net-ready Chile being part of the Latin American region still leads in the software piracy rate. In this study, a micro-level research is performed on the convenient sample of Chilean graduate students to measure their moral intensity towards piracy. The results show that Chileans are at the lower level of moral intensity toward Software Piracy. This suggests that more work needs to be done in educating Chileans in curbing the software piracy and its impact on the economy and business environment.
Ranjan B. Kini
A Computing System to Assist Business Leaders in Making Ethical Decisions
Abstract
This paper explores whether it is possible to build a computing system that can make ethical decisions autonomously, and if it is possible, then what it takes to build such a system. Firstly, this paper introduces ethical business decision-making, and also explains the reason for building an autonomous computing system that can assist business leaders. Secondly, a literature study is presented on the existing models for ethical decision-making; from the literature study, and with the help the stakeholder analysis (ethical theories that are relevant to the business environment), a new model is proposed. Thirdly, based on the new model, this paper proposes building an autonomous computing system; the proposed system has a layered architecture. This paper concludes that if such a system is built then inherently it has to be an adaptive system in order to cope with ever changing environment.
Reggie Davidrajuh

Industrial and Administration Track

Local Government ICT Platform in Japan

Local Government ICT Platform Standardization Activities of ICT Systems and Services for Offering High Value-added Service by Interacting Local Governments, Regional Institutions and Private Sector
Abstract
As Japanese local governments are facing severe financial situation, reduction of administration cost with use of ICT is in burning necessity. However, electronic local government has not been promoted smoothly in Japan, since ICT systems have been introduced without sufficient business process reengineering. On the other hand, the citizens’ needs for enhancing public services have increased. In order to respond the citizens’ needs with the fiscal constraint, enriching public online service by the service interaction between local governments and regional institutions and private sector is indispensable. The Association for Promotion of Public Local Information and Communication (APPLIC), its members are local governments and private companies, has promoted the standardization activities of Local Government ICT Platform, which enables smooth interaction of data and services and brings solutions to the problems. By applying the standard specifications, business operation in local governments will be streamlined, and local governments and regional entities will be able to provide high value-added services such as one-stop service to citizens. This paper describes problems Japanese local governments have regarding the public service utilizing the ICT, activity of APPLIC to establish and promote Local Government ICT Platform for alleviating the problems, and the effect and architecture of Local Government ICT Platform.
Akihira Yoshimoto, Shu-ichi Muto, Genichi Kaneda, Kazuaki Ohara, Masahiko Nakayama, Atsushi Hirao, Hidekazu Masaki, Daisuke Miyamoto
Service Interaction Platform Technologies Providing High Value-added ICT Services
Abstract
In ubiquitous network society, various kinds of entities offer online services. For the user’s convenience, providing high value-added service such as one-stop online service is in urgent need. One-stop services transform citizens’ daily lives more convenient by, for example, improving online application procedures to local governments and companies. Service interaction platform technology, which securely and flexibly combines various kinds of services operated under different sites or established under different system architectures, is essential to realize high value-added services. In this paper we propose the core components of service interaction platform technology, and its effectiveness measured through demonstration experiments. The scenario of moving is applied in the experiments.
Takashi Kai, Atsushi Hirao, Daisuke Miyamoto, Yuko Ueda

Infrastructure and Implementation

Realizing Interoperable Infrastructure for Electronic Business Systems and Local Government Systems
Abstract
Web Services and related open standard technologies are key technologies for system infrastructure in industry systems and local government systems. There are many projects that have adopted these technologies in the local government systems and also in B2B systems in various industries. We found that one of the key requirements to promote these standards in industries is pull messaging for client/server systems, since many small and medium enterprises can’t afford server systems. To achieve this, we have standardized Pull messaging specification as a part of ebXML (Electronic Business using eXtensible Markup Language) Messaging Services Specification Version3.0, with inputs of industries requirements. We also have developed Conformance test tool and additional test assertions for ebMS3.0 to promote interoperable implementation for ebMS3.0, and executed interoperability test. In this experience, we have found interoperability issues in open source. We will investigate this issue further, and continue giving feedbacks to implementations and prototype. We believe this experience regarding Pull messaging technology will be valuable for local government systems in the future, when it is going to expand its infrastructure to connect with medium and small entities.
Kazunori Iwasa, Masahiko Narita, Makiko Shimamura
Group Support in Collaborative Networks Organizations for Ambient Assisted Living
Abstract
Collaborative Work plays an important role in today’s organizations and normally in areas where decisions must be made. However, any decision that involves a collective or group of decision makers is, by itself, complex. In this work we present the VirtualECare project, built in terms of an intelligent multi-agent system able to monitor, interact and serve its customers, which are, normally, in need of care services, and assisted with tools based on open standards, like OSGi an R-OSGi.
Paulo Novais, Ricardo Costa, Davide Carneiro, José Machado, Luís Lima, José Neves
Backmatter
Metadaten
Titel
Towards Sustainable Society on Ubiquitous Networks
herausgegeben von
Makoto Oya
Ryuya Uda
Chizuko Yasunobu
Copyright-Jahr
2008
Verlag
Springer US
Electronic ISBN
978-0-387-85691-9
Print ISBN
978-0-387-85690-2
DOI
https://doi.org/10.1007/978-0-387-85691-9

Premium Partner