The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Today's modern information era society imposes great necessity of various software applications which now have an increasingly important impact on human life. The need for software applications and developers is rapidly increasing. To make up that demands enterprises have to make more applications in shorter time frames. Workload of software companies is constantly increasing, as they not only have...
From 2004 to 2016 the Leipzig Linguistic Services (LLS) existed as a SOAP-based cyberinfrastructure of atomic micro-services for the Wortschatz project, which covered different-sized textual corpora in more than 230 languages. The LLS were developed in 2004 and went live in 2005 in order to provide a webservice-based API to these corpus databases. In 2006, the LLS infrastructure began to systematically...
Technological advancements have provided Banks several means of sending messages to their customers. In the context of business-to-customer interaction, Single Channel Messaging (SCM) model is prominently used by most Banks in Africa. SCM is restricted to one communication medium and messages are not sent based on urgency or priority. The ultimate aim of this research study is to propose and implement...
In this paper, we focus on the exception handling mechanism of CA-CCML (Context-aware Cooperative Composition Modeling Language). First, according to level of exception generation, we divide Web service exceptions into three broad categories by levels of exception generation, which are Service invocation level exception, Syntax level exception and Semantic level exception. Then we make detail classification...
Today, there is an abundance of information technology (I.T) components that needs to be mapped so that everyone can have access to full information system (I.S) mapping. This paper presents Ariane which brings you a ubiquitous digital data pattern, allowing you to map any piece of your digital runtime in real time. Ariane is a framework that yields a highly modular system and API (Java or Representational...
In this paper we investigate the problem of providing web service interception hooks while maintaining consistency, high availability and durability for Web Service transactions. We consider ways of adding runtime configurable interception hooks for after release customization while guaranteeing the correctness of the entire transaction. We study integration hooks that offer an opportunity for optimization...
The new technology supports new business scenarios or new implementations for the existing ones. The paper describes an implementation of B2B scenario. The Google cloud platform as service makes possible a digital broker system between businesses linked by interests. Architecture of this digital broker consists of common Cloud SQL database, hosted on Google platform, and a Google App Engine application...
To solve the problem existing in the traditional centralized workflow systemsuch as poor scalability and strong coupling between process management and business application, we present the architectural design of a distributed multi-engine workflow system based on web services. The separation of the process logic implementation and the application logic implementation improves the flexibility and...
The widespread use of SOA (Service-oriented architecture) is making Web services, which now is used more frequently to manage interfaces and resources, more popular. The new value-added services, generated by Web service composition, provide more powerful and flexible features. It's a big challenge to manage these increasing services efficiently for providing a convenient developing environment, which...
Secure mobile payment is the most important link for a mobile phone to realize full payment. At the present stage, there are many researches about security of mobile information in the country. Those researches are mainly based on Windows Mobile, BREW or software of J2ME, and limited to specific areas. On the aspect of the hardware cryptograph, they focus on the security of computer information. There...
SaaS (Software as a Service) is a modern approach to deliver large scalable enterprise software as a service on Internet. Cloud computing platform provides the scalability, availability and utility computing for services on Internet. There are many technical challenges involved in SaaS development. One of them is multi-tenancy, which allows single instance of software to serve multiple organizations...
With the evolution of mobile networks, web services play a tremendous role in many aspects of our life. Therefore, the service providers have to guarantee an acceptable QoS level especially for those offering challenging services such as multimedia applications. Web services provisioning is used to allocate particular services to the tasks of business processes. One of the challenges in web service...
Program development concepts are highly dependent on software architecture, complexity of algorithm, re-usability purposes, efficiency, efficacy, etc. The evolution of SAP development concepts reflects the changes through important milestones, such as mainframe, client-server and service-oriented architecture. Those issues can easily be resolved by making new programs which were impossible to handle...
This paper presents a new system to automatically recognize fishes based their digital pictures. The system follows the requirement of SOA (Service Oriented Architecture) in order to provide a self-service platform for public. The system provides services like the training mode, the recognition mode, and the consulting mode. These services can be deployed onto various application servers at different...
Research on the Web Service technology is carried out according to the practical system acquirement, the priority and advantage of the Web Service technology is explained. Based on the deep analysis of the architecture and the implementing theory of the Web Service technology, the network teaching platform based on multi-tier architecture is designed, in which Web Service is used to the design of...
E-commerce system design based on B / S structure gives us a lot of convenience, but it also brings security risks: the password is compromised or decoded. This paper presents a solution for rural e-commerce platform based on smart client security technology, it can not only increase the security of the system, but also has the characteristics of flexible operation. If a new type of rural e-commerce...
An interface adapter is used to allow a client application to transparently work with a service available in the local environment by converting the interface of an originally requested service into that of the available service. To generate adapters for users, interface matching is the first job to find out all the possible method matching pairs between a source interface and a target interface....
Web Service is becoming the next generation of web-based application. With enhancement of quality of services and increasing quantity of services, how to recommend the suitable services according to personalized requirement becomes an urgent question. In the existing approaches of service recommendation, the result of service recommendation is the service list in which there is no evaluation standard...
This paper reviews three kinds of information exchanging technology in the distributed computing environment, and introduces message-oriented middleware to implement the integration of todo-list distributed in the different business applications. Based on the analysis of the architecture and implementation framework of message-oriented middleware, the paper discusses the enterprise application integration...
This paper examines capacity-driven Web services from a transactional perspective. Such services are empowered with different sets of operations that are selectively triggered in response to requirements posed on them and hence, need to be satisfied. Each set of operations forms a capacity that either fails or succeeds at run-time. In case of failure and for the sake of business continuity, a capacity...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.