Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

2006

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 38

Full-Text Articles in Business

Reputation Stretching In Online Auctions, Jianqing Chen, Mei Lin, Andrew B. Whinston Dec 2006

Reputation Stretching In Online Auctions, Jianqing Chen, Mei Lin, Andrew B. Whinston

Research Collection School Of Computing and Information Systems

Reputation systems are ubiquitously employed in the online marketplaces to provide information on users’ abilities and trustworthiness. We focus particularly on the problem of reputation stretching, the extension of an established reputation into a new market. By examining various factors—market size, the expected performance in the expanding market, and the risk of performance in the expanding market—we characterize conditions that affect bidder’s stretching decision in the expanding market. Moreover, we analyze both the short-term and the long-term expanding cases, and obtain contrasting results in the two settings.


Online Advertising By The Comparison Challenge Approach, Jae Wong Lee, Jae Kyu Lee Dec 2006

Online Advertising By The Comparison Challenge Approach, Jae Wong Lee, Jae Kyu Lee

Research Collection School Of Computing and Information Systems

To enhance the effectiveness of online comparisons from a manufacturer's point of view, we develop a framework for the comparison challenge approach. To develop the comparison challenge framework, we analyze 12 factors that determine the characteristics of comparison and propose models of valuable comparison challenges using the CompareMe and CompareThem strategies. We demonstrate the approaches with the example of PC selection. To help plan the comparison challenges, we formulate a mathematical programming model that maximizes the total value of comparison under the constraints of comparison opportunity and budgetary limitation. The model is applied to eight comparison scenarios, and its performance …


Supply Chain Information Sharing In A Macro Prediction Market, Zhiling Guo, Fang Fang, Andrew B. Whinston Dec 2006

Supply Chain Information Sharing In A Macro Prediction Market, Zhiling Guo, Fang Fang, Andrew B. Whinston

Research Collection School Of Computing and Information Systems

This paper aims to address supply chain partners' incentives for information sharing from an information systems design perspective. Specifically, we consider a supply chain characterized by N geographically distributed retailers who order a homogeneous product from one manufacturer. Each retailer's demand risk consists of two parts: a systematic risk part that affects all retailers and an idiosyncratic risk part that only has a local effect. We propose a macro prediction market to effectively elicit and aggregate useful information about systematic demand risk. We show that such information can be used to achieve accurate demand forecast sharing and better channel coordination …


Development Of Genetic Algorithm For Solving Scheduling Tasks In Fms With Coloured Petri Nets, Liana Napalkova, Galina Merkuryeva, Miquel Angel Piera Oct 2006

Development Of Genetic Algorithm For Solving Scheduling Tasks In Fms With Coloured Petri Nets, Liana Napalkova, Galina Merkuryeva, Miquel Angel Piera

Liana Napalkova

The paper describes the algorithm, which is developed to solve scheduling tasks in Flexible Manufacturing Systems. The algorithm is a combination of Genetic Algorithm and Coloured Petri Nets. It is proposed to use Coloured Petri Nets to tackle the encoding problem in Genetic Algorithm. The objective is to minimize the total make-span subject to different constraints obtained in Flexible Manufacturing Systems.


India’S Rise As A Software Power: Governmental Policy Factors, Tad Drozdowski, Hai Huynh, Brian Lininger, Yicheng Peng, Naruedom Sakulyong Oct 2006

India’S Rise As A Software Power: Governmental Policy Factors, Tad Drozdowski, Hai Huynh, Brian Lininger, Yicheng Peng, Naruedom Sakulyong

Engineering and Technology Management Student Projects

The Indian government’s policies toward an open, global market, support of educational institutions, and enhancement of appropriate infrastructure helped enable their software industry to become critical components of India’s economic growth in the 1990s. The Technical, Organizational, and Personal perspective (T, O, and P) model is utilized to examine different affects that each perspective, inclusive of government policies, has on a socio-technical system (Software development in India). The Indian government has provided substantial economic liberalization to support their software industries, though continued reform is necessary to ensure that they remain a software superpower.


Two-Instant Reallocation In Two-Echelon Spare Parts Inventory Systems, Huawei Song, Hoong Chuin Lau Oct 2006

Two-Instant Reallocation In Two-Echelon Spare Parts Inventory Systems, Huawei Song, Hoong Chuin Lau

Research Collection School Of Computing and Information Systems

In this paper, we study the problem of deciding when and how to perform reallocation of existing spare parts in a multi-echelon reparable item inventory system. We present a mathematical model that solves the problem when there are two reallocation instants, in response to the open challenge post by Cao and Silver(2005) to consider two or more possible reallocations within a replenishment cycle.


Service Pattern Discovery Of Web Service Mining In Web Service Registry-Repository, Qianhui Althea Liang, Jen-Yao Chung, Steven M. Miller, Yang Ouyang Oct 2006

Service Pattern Discovery Of Web Service Mining In Web Service Registry-Repository, Qianhui Althea Liang, Jen-Yao Chung, Steven M. Miller, Yang Ouyang

Research Collection School Of Computing and Information Systems

This paper presents and elaborates the concept of Web service usage patterns and pattern discovery through service mining. We define three different levels of service usage data: i) user request level, ii) template level and iii) instance level. At each level, we investigate patterns of service usage data and the discovery of these patterns. An algorithm for service pattern discovery at the template level is presented. We show the system architecture of a service-mining enabled service registry repository. Web service patterns, pattern discovery and pattern mining supports the discovery and composition of complex services, which in turn supports the application …


The Viability Of Is Enhanced Knowledge Sharing In Mission-Critical Command And Control Centers, Sameh A. Sabet Aug 2006

The Viability Of Is Enhanced Knowledge Sharing In Mission-Critical Command And Control Centers, Sameh A. Sabet

Dissertations

Engineering processes such as the maintenance of mission-critical infrastructures are highly unpredictable processes that are vital for everyday life, as well as for national security goals. These processes are categorized as Emergent Knowledge Processes (EKP), organizational processes that are characterized by a changing set of actors, distributed knowledge bases, and emergent knowledge sharing activities where the process itself has no predetermined structure. The research described here utilizes the telecommunications network fault diagnosis process as a specific example of an EKP. The field site chosen for this research is a global undersea telecommunication network where nodes are staffed by trained personnel …


Crossing The Chasm: The Xid Technologies Story, Arcot Desai Narasimhalu, Roberto Mariani Jul 2006

Crossing The Chasm: The Xid Technologies Story, Arcot Desai Narasimhalu, Roberto Mariani

Research Collection School Of Computing and Information Systems

XID Technologies is a face processing start up company built initially around a disruptive face recognition technology. The technology innovation came from Kent Ridge Digital Labs, a publicly funded software research laboratory in Singapore. Face recognition is the least intrusive and harmless among the various biometric solutions available in the market. The basic approach to human face recognition is to identify a robust feature set that was unique enough to differentiate amongst the many millions of human faces that the system was required to verify. The technology innovation used by XID framed the problem differently and thereby overcame the challenges …


Sla Automated Negotiation Manager For Computing Services, Halina Kaminski, Mark Perry Jun 2006

Sla Automated Negotiation Manager For Computing Services, Halina Kaminski, Mark Perry

Computer Science Publications

Success in today’s marketing arena can often depend on companies embracing effective new technologies and integrating them into their business model. In the computing service supply industry, Service Level Agreements (SLAs) are commonly prepared and signed agreements between the service provider and its customers. SLAs should match business needs of both sides of the agreement as closely as possible. This paper focuses on at the steps and activities that the service provider can take to facilitate agreement. It proposes an automated way for creating SLA’s from a set of Service Level Objectives (SLOs). The SLA should achieve business goals, including …


Can Online Reviews Reveal A Product's True Quality? Empirical Findings Analytical Modeling Of Online Word-Of-Mouth Communication, Nan Hu, Paul Pavlou, Jennifer Zhang Jun 2006

Can Online Reviews Reveal A Product's True Quality? Empirical Findings Analytical Modeling Of Online Word-Of-Mouth Communication, Nan Hu, Paul Pavlou, Jennifer Zhang

Research Collection School Of Computing and Information Systems

As a digital version of word-of-mouth, online review has become a major information source for consumers and has very important implications for a wide range of management activities. While some researchers focus their studies on the impact of online product review on sales, an important assumption remains unexamined, that is, can online product review reveal the true quality of the product? To test the validity of this key assumption, this paper first empirically tests the underlying distribution of online reviews with data from Amazon. The results show that 53% of the products have a bimodal and non-normal distribution. For these …


Economics Of Information Security Investment In The Case Of Simultaneous Attacks, C. Derrick Huang, Qing Hu, Ravi S. Behara May 2006

Economics Of Information Security Investment In The Case Of Simultaneous Attacks, C. Derrick Huang, Qing Hu, Ravi S. Behara

Qing Hu

With billions of dollars being spent on information security related products and services each year, the economics of information security investment has become an important area of research, with significant implications for management practices. Drawing on recent studies that examine optimal security investment levels under various attack scenarios, we propose an economic model that considers simultaneous attacks from multiple external agents with distinct characteristics, and derive optimal investments based on the principle of benefit maximization. The relationships among the major variables, such as systems vulnerability, security breach probability, potential loss of security breach, and security investment levels, are investigated via …


Winning Back The Cup For Distributed Pomdps: Planning Over Continuous Belief Spaces, Pradeep Varakantham, Ranjit Nair, Milind Tambe, Makoto Yokoo May 2006

Winning Back The Cup For Distributed Pomdps: Planning Over Continuous Belief Spaces, Pradeep Varakantham, Ranjit Nair, Milind Tambe, Makoto Yokoo

Research Collection School Of Computing and Information Systems

Distributed Partially Observable Markov Decision Problems (Distributed POMDPs) are evolving as a popular approach for modeling multiagent systems, and many different algorithms have been proposed to obtain locally or globally optimal policies. Unfortunately, most of these algorithms have either been explicitly designed or experimentally evaluated assuming knowledge of a starting belief point, an assumption that often does not hold in complex, uncertain domains. Instead, in such domains, it is important for agents to explicitly plan over continuous belief spaces. This paper provides a novel algorithm to explicitly compute finite horizon policies over continuous belief spaces, without restricting the space of …


Homeland Security: Engaging The Frontlines - Symposium Proceedings, George H. Baker, Cheryl J. Elliott Apr 2006

Homeland Security: Engaging The Frontlines - Symposium Proceedings, George H. Baker, Cheryl J. Elliott

George H Baker

The rise of the American homeland security endeavor under the leadership of the new Department of Homeland Security has been heralded by several major national strategy documents. These documents have served to organize efforts at top levels within the government and industry. However, the national strategy guidance is not getting to many organizations and people at the grass-roots level who can make the most difference in preventing attacks, protecting systems, and recovering from catastrophic events, viz. the general citizenry, private infrastructure owners, and local governments. To better understand grass-roots issues and solutions, James Madison University, in cooperation with the Federal …


Clarifying The Role Of Self-Efficacy And Metacognition As Indicators Of Learning: Construct Development And Test, Trevor T. Moores, Jerry Cha-Jan Chang, Deborah K. Smith Apr 2006

Clarifying The Role Of Self-Efficacy And Metacognition As Indicators Of Learning: Construct Development And Test, Trevor T. Moores, Jerry Cha-Jan Chang, Deborah K. Smith

Management, Entrepreneurship and Technology Faculty Publications

We propose extending our understanding of self-efficacy by comparing self-efficacy with a related construct called metacognition. Metacognition involves the monitoring and control of one's thought processes and is often related, as is self-efficacy, to performance on a task. We develop an instrument that attempts to measure both self-efficacy and metacognition with respect to one's performance on a test covering declarative and procedural knowledge (knowing that, and knowing how) of DFDs and ERDs. With data collected from a sample of 124 students, we use partial least squares (PLS) to show that self-efficacy and metacognition are distinct yet related constructs. While self-efficacy …


Experimental And Empirical Perspectives On Grid Resource Allocation For The Singapore Market, Danny Oh, Steven Miller, Nan Hu Apr 2006

Experimental And Empirical Perspectives On Grid Resource Allocation For The Singapore Market, Danny Oh, Steven Miller, Nan Hu

Research Collection School Of Computing and Information Systems

In this paper, we describe our work on using the Tycoon system developed by HP Labs to provide a market-based resource allocation and bidding framework for a grid. We discuss how we intend to evaluate the feasibility of the Tycoon system by measuring its economic performance using agent-based simulation experiments for a particular type of grid usage scenario, namely, the digital media market scenario. We will also discuss a related effort in collecting and using real grid data from the National Grid Pilot Platform in Singapore and how we will be using real data collected to derive actual usage patterns …


Factors Impacting Key Management Effectiveness In Secured Wireless Networks, Yongjoo Shin Mar 2006

Factors Impacting Key Management Effectiveness In Secured Wireless Networks, Yongjoo Shin

Theses and Dissertations

The use of a Public Key Infrastructure (PKI) offers a cryptographic solution that can overcome many, but not all, of the MANET security problems. One of the most critical aspects of a PKI system is how well it implements Key Management. Key Management deals with key generation, key storage, key distribution, key updating, key revocation, and certificate service in accordance with security policies over the lifecycle of the cryptography. The approach supported by traditional PKI works well in fixed wired networks, but it may not appropriate for MANET due to the lack of fixed infrastructure to support the PKI. This …


Tacit Knowledge, Nonaka And Takeuchi Seci Model And Informal Knowledge Processes, Siu Loon Hoe Mar 2006

Tacit Knowledge, Nonaka And Takeuchi Seci Model And Informal Knowledge Processes, Siu Loon Hoe

Research Collection School Of Computing and Information Systems

The organizational behavior and knowledge management literature has devoted a lot attention on how structural knowledge processes enhance learning. There has been little emphasis on the informal knowledge processes and the construct remains undefined. The purpose of this paper is to highlight the importance of informal knowledge processes, propose a definition for these processes and link them to the socialization and internalization processes suggested by Nonaka and Takeuchi in the SECI model. The paper offers a fresh perspective on how informal knowledge processes in organizations help to enhance the organization’s learning capability. It will enable scholars and managers to have …


A Hybrid Scatter Search/Electromagnetism Meta-Heuristic For Project Scheduling, Dieter Debels, Bert De Reyck, Roel Leus, Mario Vanhoucke Mar 2006

A Hybrid Scatter Search/Electromagnetism Meta-Heuristic For Project Scheduling, Dieter Debels, Bert De Reyck, Roel Leus, Mario Vanhoucke

Research Collection Lee Kong Chian School Of Business

In the last few decades, several effective algorithms for solving the resource-constrained project scheduling problem have been proposed. However, the challenging nature of this problem, summarised in its strongly NP-hard status, restricts the effectiveness of exact optimisation to relatively small instances. In this paper, we present a new meta-heuristic for this problem, able to provide near-optimal heuristic solutions for relatively large instances. The procedure combines elements from scatter search, a generic population-based evolutionary search method, and from a recently introduced heuristic method for the optimisation of unconstrained continuous functions based on an analogy with electromagnetism theory. We present computational …


Text Mining With Exploitation Of User's Background Knowledge : Discovering Novel Association Rules From Text, Xin Chen Jan 2006

Text Mining With Exploitation Of User's Background Knowledge : Discovering Novel Association Rules From Text, Xin Chen

Dissertations

The goal of text mining is to find interesting and non-trivial patterns or knowledge from unstructured documents. Both objective and subjective measures have been proposed in the literature to evaluate the interestingness of discovered patterns. However, objective measures alone are insufficient because such measures do not consider knowledge and interests of the users. Subjective measures require explicit input of user expectations which is difficult or even impossible to obtain in text mining environments.

This study proposes a user-oriented text-mining framework and applies it to the problem of discovering novel association rules from documents. The developed system, uMining, consists of two …


Dynamic Measuring Tools For Online Discourse, Jeffrey S. Saltz Jan 2006

Dynamic Measuring Tools For Online Discourse, Jeffrey S. Saltz

Dissertations

When evaluating participation within an Asynchronous Learning Network (ALN), current best practices include counting messages and reviewing participant surveys. To understand the impact of more advanced dynamic measurement tools for use within an ALN, a web-based tool, known as iPET (the integrated Participation Evaluation Tool), was created. iPET, which leverages Social Network Analysis and Information Visualization techniques, was then evaluated via an empirical study. This research demonstrates that using a tool such as iPET increases participation within an ALN without increasing facilitator workload. Due to the fact that active online discussion is a key factor in the success of an …


Using Content And Process Scaffolds For Collaborative Discourse In Asynchronous Learning Networks, Irene Wong-Bushby Jan 2006

Using Content And Process Scaffolds For Collaborative Discourse In Asynchronous Learning Networks, Irene Wong-Bushby

Dissertations

Discourse, a form of collaborative learning, is one of the most widely used methods of teaching and learning in the online environment. Particularly, in large courses, discourse needs to be 'structured' to be effective. Historically, technology-mediated learning (TML) research has been inconclusive with often conflicting results. To address this issue, TML research needs greater breadth and depth in pedagogical grounding. The purpose of this research is to build and test an original, technology-mediated, discourse-centered model called the Asynchronous Learning Network Cognitive Discourse Model (ALNCDM) grounded in pedagogy. Cognitive discourse is defined as discourse on conceptual subject matter. The model is …


The Antecedents Of M-Commerce Adoption, Morris Kalliny, Michael S. Minor Jan 2006

The Antecedents Of M-Commerce Adoption, Morris Kalliny, Michael S. Minor

Business and Information Technology Faculty Research & Creative Works

The growth of Internet shopping has been attributed to rapid advances in technology and other influences such as convenience. We empirically investigate the relationship between demographics, ease of use, convenience, usefulness and enjoyment and intention to use m-commerce and attitude toward m-commerce. Two studies were conducted where a student and a non student sample was used. Data analysis revealed age, gender and educational level of customers do not play a role in influencing intention to use m-commerce. However, convenience, ease of use, usefulness and enjoyment all play a role in the customer's intention to use m-commerce.


Use Of A Classroom Response System To Enhance Classroom Interactivity, Keng Siau, Hong Sheng, Fiona Fui-Hoon Nah Jan 2006

Use Of A Classroom Response System To Enhance Classroom Interactivity, Keng Siau, Hong Sheng, Fiona Fui-Hoon Nah

Business and Information Technology Faculty Research & Creative Works

Classroom interactivity is a critical component of teaching and learning. This paper reports on the use of a classroom response system to enhance classroom interactivity in a systems analysis and design course. The success of the project was assessed using both quantitative and qualitative data. A pretest/posttest design was used to examine the effects of a classroom response system on interactivity. The results show that a classroom response system can significantly improve classroom interactivity. Qualitative data was also collected to identify the strengths and weaknesses of using a classroom response system to enhance classroom interaction. Based on the quantitative and …


Biometric Security: Are Inexpensive Biometric Devices Reliable Enough To Gain Wide-Spread Security Usage?, Brian Thanh Tran Jan 2006

Biometric Security: Are Inexpensive Biometric Devices Reliable Enough To Gain Wide-Spread Security Usage?, Brian Thanh Tran

Inquiry: The University of Arkansas Undergraduate Research Journal

The ever growing need for security in today' s world requires exploring the feasibility of various security methods to ensure the safety of the world's population. With the tremendous growth of technology, e-commerce, and business globalization, society implements new methods to try to battle security problems. Technology advances has resulted in a number of inexpensive biometric devices to the marketplace. Two questions surface regarding this devices-are they reliable enough for general usage and will people be willing to use them? This research conducted a repeated design experiment to determine the effectiveness of four inexpensive biometric devices-three fingerprint readers and an …


Development Of A Design Environment For End Users To Build The Target-Relevant Decision Support Tools In Rural Industry, Shah Jahan Miah Jan 2006

Development Of A Design Environment For End Users To Build The Target-Relevant Decision Support Tools In Rural Industry, Shah Jahan Miah

Dr Shah Jahan Miah

Decision support systems (DSS) developed by end users have had limited success in rural operations. This paper will discuss the development stages of a new tool for improving the DSS development process in the rural industries. The object of this project is to develop an end user enabled design environment (EUEDE) which will allow a non-technical computer user to build target-relevant decision support tools. The resultant design environment aims to allow the end user to re-use and share their knowledge within a specific business context. This approach will facilitate flexibility to build relevant DSS’s for an end user’s specific decision …


The Role Of Connective Tissue Growth Factor In Skeletal Growth And Development, Philadelphia University Jan 2006

The Role Of Connective Tissue Growth Factor In Skeletal Growth And Development, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


The Impact Of Financial Market And Resale Market On Firm Strategies, Zhiling Guo, Andrew B. Whinston Jan 2006

The Impact Of Financial Market And Resale Market On Firm Strategies, Zhiling Guo, Andrew B. Whinston

Research Collection School Of Computing and Information Systems

The ever-increasing use of information technology (IT) in business transactions greatly expands firms? exposure to different electronic markets. This paper provides a framework to understand how firms can leverage different strategies across external financial markets and an internal resale market to improve overall profitability. We develop a model in which a group of risk-averse retailers sell a homogeneous product to their respective uncertain consumer markets. We study a scenario where an internal resale market can be constructed among the retailers and outside financial markets can be used to improve their ability to manage uncertainty. We identify strategies for retailers operating …


Multiagent Teamwork: Hybrid Approaches, Praveen Paruchuri, Emma Bowring, Ranjit Nair, Jonathan Pearce, Nathan Schurr, Milind Tambe, Pradeep Varakantham Jan 2006

Multiagent Teamwork: Hybrid Approaches, Praveen Paruchuri, Emma Bowring, Ranjit Nair, Jonathan Pearce, Nathan Schurr, Milind Tambe, Pradeep Varakantham

Research Collection School Of Computing and Information Systems

Today within the multiagent community, we see at least four competing methods to building multiagent systems: beliefdesireintention (BDI), distributed constraint optimization (DCOP), distributed POMDPs, and auctions or game-theoretic methods. While there is exciting progress within each approach, there is a lack of cross-cutting research. This article highlights the various hybrid techniques for multiagent teamwork developed by the teamcore group. In particular, for the past decade, the TEAMCORE research group has focused on building agent teams in complex, dynamic domains. While our early work was inspired by BDI, we will present an overview of recent research that uses DCOPs and distributed …


Evaluating Microsoft .Net Technology: Implementation Online Store, Jie Dou Jan 2006

Evaluating Microsoft .Net Technology: Implementation Online Store, Jie Dou

Theses Digitization Project

The purpose of this project is to design, develop and implement an e-commerce shopping cart system based on Microsoft.NET technology and to evaluate ASP.NET technology by developing a shopping cart system.