To provide efficient monitoring of web service-based business processes, a web service proxy (WS- proxy) is developed to monitor business activities by monitoring the enactment of services. WS-proxy is deployed as a...To provide efficient monitoring of web service-based business processes, a web service proxy (WS- proxy) is developed to monitor business activities by monitoring the enactment of services. WS-proxy is deployed as an intermediary between internal business processes and external service providers, and it provides a single point of service access with the functions of message routing and content inspection. By using an XPath engine named WS-filter, performance indicators can be generated from service messages for assessing business performance. In the experiments, the feasibility of WS-proxy is verified and it achieves good performance in the monitoring work. The latency introduced by WS-proxy is only about 15% of the overall latency while extracting performance indicators just consumes less than one third of the processing time.展开更多
Kang, et al. [Journal of Electronics(China), 23(2006)4] proposed a threshold multi-proxy multi-signature scheme, and claimed the scheme satisfies the security requirements of threshold multi-proxy multi-signature. How...Kang, et al. [Journal of Electronics(China), 23(2006)4] proposed a threshold multi-proxy multi-signature scheme, and claimed the scheme satisfies the security requirements of threshold multi-proxy multi-signature. However, in this paper, two forgery attacks are proposed to show that their schemes have serious security flaws. To overcome theses flaws, an improvement on Kang, et al.’s scheme is proposed.展开更多
In a proxy blind signature scheme,the proxy signer is allowed to generate a blind signature on behalf of the original signer. The proxy blind signature scheme is useful in several applications such as e-voting,e-payme...In a proxy blind signature scheme,the proxy signer is allowed to generate a blind signature on behalf of the original signer. The proxy blind signature scheme is useful in several applications such as e-voting,e-payment,etc. Recently,Zheng,et al. presented an IDentity(ID) -based proxy blind sig-nature. In this paper,a new efficient ID-based proxy blind signature scheme from bilinear pairings is proposed,which can satisfy the security properties of both the proxy signatures and the blind signature schemes. Analysis of the scheme efficiency shows that the new scheme is more efficient than Zheng,et al.'s scheme. The proposed scheme is more practical in the real world.展开更多
In the mid-latitude regions of the Asian continent, Zhuye Lake is located in the northwest margin of the Asian monsoon, where the modem climate is affected by the Asian monsoon and Westerlies. In this study, we invest...In the mid-latitude regions of the Asian continent, Zhuye Lake is located in the northwest margin of the Asian monsoon, where the modem climate is affected by the Asian monsoon and Westerlies. In this study, we investi- gated the absolutely dated Holocene records in Zhuye Lake for detecting the Holocene climate cycles. Totally, 14 14C dates and 6 optically simulated luminescence (OSL) dates are obtained from the QTH01 and QTH02 sections. The proxies of grain-size, total organic carbon content (TOC), C/N and 813C are used for wavelet analysis, and the results show obvious -256, -512 and -1024-year climate cycles, which are consistent with the Holocene millennial and cen- tennial scale climate cycles in the typical Asian summer monsoon domain. In different parts of the Zhuye Lake, the Holocene sediments show variable climate cycles that are affected by the lake basin topography. In the Zhuye Lake, the Holocene climate cycles are mainly correlated with the solar-related Asian summer monsoon variability and the North Atlantic ice-rafting events.展开更多
Distributed Data Mining is expected to discover preciously unknown, implicit and valuable information from massive data set inherently distributed over a network. In recent years several approaches to distributed data...Distributed Data Mining is expected to discover preciously unknown, implicit and valuable information from massive data set inherently distributed over a network. In recent years several approaches to distributed data mining have been developed, but only a few of them make use of intelligent agents. This paper provides the reason for applying Multi-Agent Technology in Distributed Data Mining and presents a Distributed Data Mining System based on Multi-Agent Technology that deals with heterogeneity in such environment. Based on the advantages of both the CS model and agent-based model, the system is being able to address the specific concern of increasing scalability and enhancing performance.展开更多
TCP/IP is a next generation key technology in the wireless communication network where the different characteristics of wireless and wired links result in performance degradation. We can use the proxy and automatic re...TCP/IP is a next generation key technology in the wireless communication network where the different characteristics of wireless and wired links result in performance degradation. We can use the proxy and automatic repeat request (ARQ) schemes to deal with this problem. In this work, we investigate the TCP performance over proxy and ARQ in the wireless network. Our analysis results showed that using the proxy can result in lower transfer latency and higher throughput and that ARQ can decrease the loss rate of wireless link and improve the performance with little additional latency. The analytical results were validated against simulations using the NS-2 with some more realistic parameters.展开更多
This study empirically investigates the impact of managerial entrenchment on firm financial performance of Chinese firms initial public offerings (IPOs). Using 142 firms listed in the Shenzhen Stock Exchange (SZSE...This study empirically investigates the impact of managerial entrenchment on firm financial performance of Chinese firms initial public offerings (IPOs). Using 142 firms listed in the Shenzhen Stock Exchange (SZSE), which was collected from the Guotaian Research Service Center (GTA-RSC) databases, this study uses two proxies to measure firm performance and three proxies to measure managerial entrenchment. The two proxies for firm performance are Tobins' Q and return on assets (ROA), and the three proxies for managerial entrenchment are entrenchment 1, entrenchment 2, and entrenchment 3. These three entrenchment proxies are derived from the principal component analysis (PCA). Though previous studies of managerial entrenchment and firm performance variables suffer from endogeneity, with respect to the corporate governance it is unclear as to which variables are endogenous and which are exogenous. This study confirms that the data are linear and no endogeneity issue should be address in this study, but only heteroskedasticity, non-normality for Tobins' Q are a problem, therefore, the regression method employed for Tobins' Q is the generalised least square (GLS) and the ordinary least square (OLS) between estimators for ROA. The regression result for Tobins' Q reveals that managerial entrenchment is negatively impact on firm performance. The results are in contradiction to the stewardship theory for new firms whereas the managerial entrenchment for new firms is positive. Furthermore, only one entrenchment proxy yields a significant coefficient. In conclusion, the negative results of entrenchment proxies were caused by the different institutional structures and legal systems which are the Chinese corporations that are still largely owned and controlled by a state and hence the centralised state controlled was responsible for all managerial actions.展开更多
Within an agent server, the model introduces a trusted third party entity called Secure Service Station(SSS). The SSS is a non\|hardware component and is intended to prevent most attacks performed by malicious hosts, ...Within an agent server, the model introduces a trusted third party entity called Secure Service Station(SSS). The SSS is a non\|hardware component and is intended to prevent most attacks performed by malicious hosts, by providing mechanisms that ensure attack detection and provide integrity to mobile agents. This noble technique involves encapsulating partial results obtained on each intermediate host and binding these results together using a hash function, thus forming a strong bonded chain that cannot be compromised. An analytical model to explore the system performance was also developed.展开更多
The paper provides information about the concept and the characteristics of the service outsourcing. It also analyzes the service outsourcing classification and the modem economy theory of the service outsourcing. Thr...The paper provides information about the concept and the characteristics of the service outsourcing. It also analyzes the service outsourcing classification and the modem economy theory of the service outsourcing. Through the analysis, we hope to provide the foundation for further study.展开更多
An enterprise based on web services can benefit from computer-based monitoring for its normal course of business. No services, delayed services, inadequate services and poor or delayed information flow all hinder or p...An enterprise based on web services can benefit from computer-based monitoring for its normal course of business. No services, delayed services, inadequate services and poor or delayed information flow all hinder or prevent the normal course of business. The health of the service-oriented approach, the communication flow and the services themselves directly equate to the health and vitality of the enterprise. By health we mean, availability, performance, integrity, and reliability of web services. This paper proposes and details an agent based approach for web service monitoring in an enterprise environment. The objective of this approach is to provide enhanced security, improved help desk information and attribution across a diverse web services landscape that is logically a system but physically distributed. The definition of the agents, their logical locations, their functionality and relationships has not been described previously. This architecture provides many advantages over previous methodologies for event monitoring including assignment of overlapping responsibilities, reduction in help desk effort and placement of measurements throughout the upper layers of the web services system. This is also the first enumeration of significant events and information requirements at the service level. It also assigns responsibility to the components (agents, handlers or the service itself) for logging and alerting such events. This architecture is currently being implemented by a major defense entity.展开更多
Today's society has entered the Intemet era, the Internet technology has brought great changes to all walks of life.With the development of"Internet plus",traditional industry, service industry and business have to...Today's society has entered the Intemet era, the Internet technology has brought great changes to all walks of life.With the development of"Internet plus",traditional industry, service industry and business have to make the appropriate changes to meet the demand of the "Internet plus" era.Similarly,human resource management has to face new challenges in "Intemet plus" era.This paper expounds the characteristics of"Internet plus" era and the changes brought to the human resource management,put forward the idea that human resources management should make changes to meet the demand of the "Internet plus" era from three aspects:big data,decentration and staff self management,establishing a new talent incentive mechanism.展开更多
The research dealt with assessment of logistics service providers' capabilities in SECs (supporting subsea engineering companies) on the Tweneboa, Enyenra and Ntomme (TEN) project in Ghana. SECs need logistics se...The research dealt with assessment of logistics service providers' capabilities in SECs (supporting subsea engineering companies) on the Tweneboa, Enyenra and Ntomme (TEN) project in Ghana. SECs need logistics service providers who offer consolidated services for project optimization and fulfillment of local content requirements of the project. Relevant Staffof7 SECs and 10 logistics service providers in Ghana formed part of the target group. The weighted scoring model was used in selecting a logistics service provider based on certain criteria. The selection criteria included Quality, Health, Safety and Environmental (QHSE) policies [Q], Compliance to regulations (GRA, Work permit, petroleum regulation) [C], Delivery of goods on time and response rate to deliver [D], Vessel, Cargo attendance and transportation (sea freight and air freight) [V], and Logistics (Personal logistics and Logistics base facilities) [L]. The study concluded Consolidated Shipping Agency (Conship) was the best Logistics Service Provider to offer the best consolidated services for project optimization under the TEN project.展开更多
Composing web services is gained daily attention in Service Oriented Computing. It includes the dynamic discovery, interaction and coordination of agent-based semantic web services. The authors first follow Function O...Composing web services is gained daily attention in Service Oriented Computing. It includes the dynamic discovery, interaction and coordination of agent-based semantic web services. The authors first follow Function Ontology and Automated Mechanism Design for service agents aggregating. Then the problem is formulated but it is ineffective to solve it from the traditional global view. Because the complexity is NP-complete and it is dii^cult or even impossible to get some personal information. This paper provides a multi-agent negotiation idea in which each participant negotiates under the condition of its reservation payoff being satisfied. Numerical experiment is given and well evaluates the negotiation.展开更多
基金The National Natural Science Foundation of China(No60473078)
文摘To provide efficient monitoring of web service-based business processes, a web service proxy (WS- proxy) is developed to monitor business activities by monitoring the enactment of services. WS-proxy is deployed as an intermediary between internal business processes and external service providers, and it provides a single point of service access with the functions of message routing and content inspection. By using an XPath engine named WS-filter, performance indicators can be generated from service messages for assessing business performance. In the experiments, the feasibility of WS-proxy is verified and it achieves good performance in the monitoring work. The latency introduced by WS-proxy is only about 15% of the overall latency while extracting performance indicators just consumes less than one third of the processing time.
基金Supported by the National Natural Science Foundation of China (No.60503005)the Natural Science Foundation of Hunan Province (No.07JJ6110)
文摘Kang, et al. [Journal of Electronics(China), 23(2006)4] proposed a threshold multi-proxy multi-signature scheme, and claimed the scheme satisfies the security requirements of threshold multi-proxy multi-signature. However, in this paper, two forgery attacks are proposed to show that their schemes have serious security flaws. To overcome theses flaws, an improvement on Kang, et al.’s scheme is proposed.
基金the National Natural Science Foundation of China (No.60473027).
文摘In a proxy blind signature scheme,the proxy signer is allowed to generate a blind signature on behalf of the original signer. The proxy blind signature scheme is useful in several applications such as e-voting,e-payment,etc. Recently,Zheng,et al. presented an IDentity(ID) -based proxy blind sig-nature. In this paper,a new efficient ID-based proxy blind signature scheme from bilinear pairings is proposed,which can satisfy the security properties of both the proxy signatures and the blind signature schemes. Analysis of the scheme efficiency shows that the new scheme is more efficient than Zheng,et al.'s scheme. The proposed scheme is more practical in the real world.
基金Under the auspices of National Natural Science Foundation of China (No. 41001116)Fundamental Research Funds for the Central Universities (No. LZUJBKY-2010-99)
文摘In the mid-latitude regions of the Asian continent, Zhuye Lake is located in the northwest margin of the Asian monsoon, where the modem climate is affected by the Asian monsoon and Westerlies. In this study, we investi- gated the absolutely dated Holocene records in Zhuye Lake for detecting the Holocene climate cycles. Totally, 14 14C dates and 6 optically simulated luminescence (OSL) dates are obtained from the QTH01 and QTH02 sections. The proxies of grain-size, total organic carbon content (TOC), C/N and 813C are used for wavelet analysis, and the results show obvious -256, -512 and -1024-year climate cycles, which are consistent with the Holocene millennial and cen- tennial scale climate cycles in the typical Asian summer monsoon domain. In different parts of the Zhuye Lake, the Holocene sediments show variable climate cycles that are affected by the lake basin topography. In the Zhuye Lake, the Holocene climate cycles are mainly correlated with the solar-related Asian summer monsoon variability and the North Atlantic ice-rafting events.
文摘Distributed Data Mining is expected to discover preciously unknown, implicit and valuable information from massive data set inherently distributed over a network. In recent years several approaches to distributed data mining have been developed, but only a few of them make use of intelligent agents. This paper provides the reason for applying Multi-Agent Technology in Distributed Data Mining and presents a Distributed Data Mining System based on Multi-Agent Technology that deals with heterogeneity in such environment. Based on the advantages of both the CS model and agent-based model, the system is being able to address the specific concern of increasing scalability and enhancing performance.
文摘TCP/IP is a next generation key technology in the wireless communication network where the different characteristics of wireless and wired links result in performance degradation. We can use the proxy and automatic repeat request (ARQ) schemes to deal with this problem. In this work, we investigate the TCP performance over proxy and ARQ in the wireless network. Our analysis results showed that using the proxy can result in lower transfer latency and higher throughput and that ARQ can decrease the loss rate of wireless link and improve the performance with little additional latency. The analytical results were validated against simulations using the NS-2 with some more realistic parameters.
文摘This study empirically investigates the impact of managerial entrenchment on firm financial performance of Chinese firms initial public offerings (IPOs). Using 142 firms listed in the Shenzhen Stock Exchange (SZSE), which was collected from the Guotaian Research Service Center (GTA-RSC) databases, this study uses two proxies to measure firm performance and three proxies to measure managerial entrenchment. The two proxies for firm performance are Tobins' Q and return on assets (ROA), and the three proxies for managerial entrenchment are entrenchment 1, entrenchment 2, and entrenchment 3. These three entrenchment proxies are derived from the principal component analysis (PCA). Though previous studies of managerial entrenchment and firm performance variables suffer from endogeneity, with respect to the corporate governance it is unclear as to which variables are endogenous and which are exogenous. This study confirms that the data are linear and no endogeneity issue should be address in this study, but only heteroskedasticity, non-normality for Tobins' Q are a problem, therefore, the regression method employed for Tobins' Q is the generalised least square (GLS) and the ordinary least square (OLS) between estimators for ROA. The regression result for Tobins' Q reveals that managerial entrenchment is negatively impact on firm performance. The results are in contradiction to the stewardship theory for new firms whereas the managerial entrenchment for new firms is positive. Furthermore, only one entrenchment proxy yields a significant coefficient. In conclusion, the negative results of entrenchment proxies were caused by the different institutional structures and legal systems which are the Chinese corporations that are still largely owned and controlled by a state and hence the centralised state controlled was responsible for all managerial actions.
文摘Within an agent server, the model introduces a trusted third party entity called Secure Service Station(SSS). The SSS is a non\|hardware component and is intended to prevent most attacks performed by malicious hosts, by providing mechanisms that ensure attack detection and provide integrity to mobile agents. This noble technique involves encapsulating partial results obtained on each intermediate host and binding these results together using a hash function, thus forming a strong bonded chain that cannot be compromised. An analytical model to explore the system performance was also developed.
文摘The paper provides information about the concept and the characteristics of the service outsourcing. It also analyzes the service outsourcing classification and the modem economy theory of the service outsourcing. Through the analysis, we hope to provide the foundation for further study.
文摘An enterprise based on web services can benefit from computer-based monitoring for its normal course of business. No services, delayed services, inadequate services and poor or delayed information flow all hinder or prevent the normal course of business. The health of the service-oriented approach, the communication flow and the services themselves directly equate to the health and vitality of the enterprise. By health we mean, availability, performance, integrity, and reliability of web services. This paper proposes and details an agent based approach for web service monitoring in an enterprise environment. The objective of this approach is to provide enhanced security, improved help desk information and attribution across a diverse web services landscape that is logically a system but physically distributed. The definition of the agents, their logical locations, their functionality and relationships has not been described previously. This architecture provides many advantages over previous methodologies for event monitoring including assignment of overlapping responsibilities, reduction in help desk effort and placement of measurements throughout the upper layers of the web services system. This is also the first enumeration of significant events and information requirements at the service level. It also assigns responsibility to the components (agents, handlers or the service itself) for logging and alerting such events. This architecture is currently being implemented by a major defense entity.
文摘Today's society has entered the Intemet era, the Internet technology has brought great changes to all walks of life.With the development of"Internet plus",traditional industry, service industry and business have to make the appropriate changes to meet the demand of the "Internet plus" era.Similarly,human resource management has to face new challenges in "Intemet plus" era.This paper expounds the characteristics of"Internet plus" era and the changes brought to the human resource management,put forward the idea that human resources management should make changes to meet the demand of the "Internet plus" era from three aspects:big data,decentration and staff self management,establishing a new talent incentive mechanism.
文摘The research dealt with assessment of logistics service providers' capabilities in SECs (supporting subsea engineering companies) on the Tweneboa, Enyenra and Ntomme (TEN) project in Ghana. SECs need logistics service providers who offer consolidated services for project optimization and fulfillment of local content requirements of the project. Relevant Staffof7 SECs and 10 logistics service providers in Ghana formed part of the target group. The weighted scoring model was used in selecting a logistics service provider based on certain criteria. The selection criteria included Quality, Health, Safety and Environmental (QHSE) policies [Q], Compliance to regulations (GRA, Work permit, petroleum regulation) [C], Delivery of goods on time and response rate to deliver [D], Vessel, Cargo attendance and transportation (sea freight and air freight) [V], and Logistics (Personal logistics and Logistics base facilities) [L]. The study concluded Consolidated Shipping Agency (Conship) was the best Logistics Service Provider to offer the best consolidated services for project optimization under the TEN project.
基金This research is supported by the National Natural Science Fund for Distinguished Young Scholars of China under Grant No.60625204the Key Project of National Natural Science Foundation of China under Grant No.60736015+1 种基金the National 863 Hight-Tech Project of China under Grant No.2006AA01Z155the Knowledge Innovation Program of the Chinese Academy of Sciences
文摘Composing web services is gained daily attention in Service Oriented Computing. It includes the dynamic discovery, interaction and coordination of agent-based semantic web services. The authors first follow Function Ontology and Automated Mechanism Design for service agents aggregating. Then the problem is formulated but it is ineffective to solve it from the traditional global view. Because the complexity is NP-complete and it is dii^cult or even impossible to get some personal information. This paper provides a multi-agent negotiation idea in which each participant negotiates under the condition of its reservation payoff being satisfied. Numerical experiment is given and well evaluates the negotiation.