枫树 发表于 2025-3-30 11:22:07
Product Variety, Consumer Preferences, and Web Technology: Can the Web of Data Reduce Price Competit diversity in the individual preferences of consumers, current Web search fosters a very early reduction of the search space to just a few commodity makes and models. As soon as this reduction has taken place, search is reduced to flat price comparison. This is unfortunate for the manufacturers andfigurine 发表于 2025-3-30 13:25:38
Perspectives for Web Service Intermediaries: How Influence on Quality Makes the Differencef loose coupling to achieve organizational capabilities of dynamic customer-provider-relationships. In practice, this role has quickly evolved into a variety of intermediary concepts that refine and extend the basic functionality of service brokerage with respect to various forms of added value likeEvocative 发表于 2025-3-30 19:36:31
Aligning Risk Management and Compliance Considerations with Business Process Developmention and its stakeholders. The design of processes should also ensure that its result and the value obtained compensates for the risks affecting this value. In this paper the different kinds of risk affecting a business process are introduced, after which solutions to the problem of risk mitigation a抱负 发表于 2025-3-30 23:05:30
http://reply.papertrans.cn/31/3001/300071/300071_54.pngInstitution 发表于 2025-3-31 03:52:01
http://reply.papertrans.cn/31/3001/300071/300071_55.png表被动 发表于 2025-3-31 06:12:03
Integrating Markets to Bridge Supply and Demand for Knowledge Intensive Tasks. Three general observations of knowledge intensive work produced by actors working in such organizations served as the basis for the initiation of this research. First, knowledge intensive tasks become increasingly complex. Second, actors that perform such tasks experience an increase in cognitiveSystemic 发表于 2025-3-31 10:27:26
Bargaining Agents in Wireless Contexts: An Alternating-Offers Protocol for Multi-issue Bilateral Negsues within a shared common ontology. Finally, non standard inference services integrated with utility theory help in finding suitable agreements. We illustrate and motivate the provided theoretical framework in a wireless commerce case study.不满分子 发表于 2025-3-31 14:20:24
http://reply.papertrans.cn/31/3001/300071/300071_58.pnglibertine 发表于 2025-3-31 18:04:58
http://reply.papertrans.cn/31/3001/300071/300071_59.png控制 发表于 2025-3-31 23:21:18
ling process. To enforce the security related trustworthy behaviours, we then define a set of general rules to capture the semantics. Finally, the language is applied in a mobile agent context to demonstrate how the trust can be explicitly modelled and reasoned about to support better security decisions for the mobile agent based systems.