A Voice-Enabled Pervasive Web System with Self-Optimization Capability for Supporting Enterprise Applications

Author(s):  
Shuchih Ernest Chang

Other than providing Web services through popular Web browser interfaces, pervasive computing may offer new ways of accessing Internet applications by utilizing various modes of interfaces to interact with their end-users, and its technology could involve new ways of interfacing with various types of gateways to back-end servers from any device, anytime, and anywhere. In this chapter, mobile phone was used as the pervasive device for accessing an Internet application prototype, a voice-enabled Web system (VWS), through voice user interface technology. Today’s Web sites are intricate but not intelligent, so finding an efficient method to assist user searching is particularly important. One of these efficient methods is to construct an adaptive Web site. This chapter shows that multimodal userinterface pages can be generated by using XSLT stylesheet which transforms XML documents into various formats including XHTML, WML, and VoiceXML. It also describes how VWS was designed to provide an adaptive voice interface using an Apache Web server, a voice server, a Java servlet engine, and a genetic algorithm based voice Web restructuring mechanism.

2011 ◽  
pp. 714-730
Author(s):  
Shuchih Ernest Chang

Other than providing Web services through popular Web browser interfaces, pervasive computing may offer new ways of accessing Internet applications by utilizing various modes of interfaces to interact with their end-users, and its technology could involve new ways of interfacing with various types of gateways to back-end servers from any device, anytime, and anywhere. In this chapter, mobile phone was used as the pervasive device for accessing an Internet application prototype, a voice-enabled Web system (VWS), through voice user interface technology. Today’s Web sites are intricate but not intelligent, so finding an efficient method to assist user searching is particularly important. One of these efficient methods is to construct an adaptive Web site. This chapter shows that multimodal userinterface pages can be generated by using XSLT stylesheet which transforms XML documents into various formats including XHTML, WML, and VoiceXML. It also describes how VWS was designed to provide an adaptive voice interface using an Apache Web server, a voice server, a Java servlet engine, and a genetic algorithm based voice Web restructuring mechanism.


Author(s):  
Udo Averweg

Portals may be seen as World Wide Web (“the Web”) sites that provide the gateway to corporate information from a single point of access. The potential of the Web portal market and its technology has inspired the mutation of search engines (e.g., Yahoo!) and the establishment of new vendors (e.g., Hummingbird and Brio Technology). Leveraging knowledge, both internal and external, is the key to using a portal as a centralised database of best practices that can be applied across all departments and all lines of business within an organisation (Zimmerman, 2003). A portal is simply a single, distilled view of information from various sources. Portal technologies integrate information, content, and enterprise applications. However, the term portal has been applied to systems that differ widely in capabilities and complexity (Smith, 2004). Portals “aim to serve particular communities, including various business groups” (Deise, Nowikow, King, & Wright, 2000). A portal aims to establish a community of users with a common interest or need.


Author(s):  
Yang Xiang ◽  
Wanlei Zhou

Recently the notorious Distributed Denial of Service (DDoS) attacks made people aware of the importance of providing available data and services securely to users. A DDoS attack is characterized by an explicit attempt from an attacker to prevent legitimate users of a service from using the desired resource (CERT, 2006). For example, in February 2000, many Web sites such as Yahoo, Amazon.com, eBuy, CNN.com, Buy. com, ZDNet, E*Trade, and Excite.com were all subject to total or regional outages by DDoS attacks. In 2002, a massive DDoS attack briefly interrupted Web traffic on nine of the 13 DNS “root” servers that control the Internet (Naraine, 2002). In 2004, a number of DDoS attacks assaulted the credit card processor Authorize. net, the Web infrastructure provider Akamai Systems, the interactive advertising company DoubleClick (left that company’s servers temporarily unable to deliver ads to thousands of popular Web sites), and many online gambling sites (Arnfield, 2004). Nowadays, Internet applications face serious security problems caused by DDoS attacks. For example, according to CERT/CC Statistics 1998-2005 (CERT, 2006), computer-based vulnerabilities reported have increased exponentially since 1998. Effective approaches to defeat DDoS attacks are desperately demanded (Cisco, 2001; Gibson, 2002).


Author(s):  
Heather Fulford

This chapter reports on a study investigating a community Web site project operating in a UK village community. The aim of the study is to determine the impacts the online business directory component of this community Web site is having on the small businesses in the village, including consideration of the benefits they are deriving from their participation in the directory, the problems they have encountered through their participation, and the effects their involvement is having on their wider Internet adoption strategy and decisions. The findings highlight the value of community Web sites for small businesses, both for those that have already adopted various Internet applications into their operations, as well as for non-adopters of the Internet. It is suggested that existing discussions of small business approaches to Internet adoption might usefully be extended to incorporate the role of community Web sites.


2006 ◽  
Vol 8 (2) ◽  
Author(s):  
David Raitt

This column aims to draw your attention to various interesting Web sites, which I have come across and which might appeal to you, and to keep you up-to-date with news and views on Internet trends, developments and statistics. It offers essentially a personal selection rather than comprehensive coverage.


2020 ◽  
Vol 8 (3) ◽  
pp. 69-81
Author(s):  
Nitin Chawla ◽  
Deepak Kumar ◽  
Dinesh Kumar Sharma

Cloud computing is gradually increasing its popularity in enterprise-wide organizations. Information technology organizations e.g., IBM, Microsoft, and Amazon have already shifted towards Cloud computing. Cloud-based offerings such as Software as a Service, Platform as a Service and Infrastructure as a Service (IAAS) are the most famous offerings. Most of the existing enterprise applications are deployed using an on-premise model. Organizations are looking for Cloud based offerings to deploy or upgrade their existing applications. SAP, Microsoft Dynamics, and Oracle are the most famous ERP or CRM application OEMs. These enterprise applications generate lots of data are hosted in an organization or on client data centers. Moving data from one data center to the Cloud is always a challenging tasks which cost a lot and takes much effort. This study proposes an efficient approach to optimize cost for data migration in cloud computing. This study also proposes the approach to optimize cost for data collection from multiple locations which can be processed centrally and then migrate to Cloud Computing.


2017 ◽  
Vol 2017 ◽  
pp. 1-28 ◽  
Author(s):  
Gabriela Bosetti ◽  
Sergio Firmenich ◽  
Silvia E. Gordillo ◽  
Gustavo Rossi ◽  
Marco Winckler

The trend towards mobile devices usage has made it possible for the Web to be conceived not only as an information space but also as a ubiquitous platform where users perform all kinds of tasks. In some cases, users access the Web with native mobile applications developed for well-known sites, such as, LinkedIn, Facebook, and Twitter. These native applications might offer further (e.g., location-based) functionalities to their users in comparison with their corresponding Web sites because they were developed with mobile features in mind. However, many Web applications have no native counterpart and users access them using a mobile Web browser. Although the access to context information is not a complex issue nowadays, not all Web applications adapt themselves according to it or diversely improve the user experience by listening to a wide range of sensors. At some point, users might want to add mobile features to these Web sites, even if those features were not originally supported. In this paper, we present a novel approach to allow end users to augment their preferred Web sites with mobile features.We support our claims by presenting a framework for mobile Web augmentation, an authoring tool, and an evaluation with 21 end users.


1998 ◽  
Vol 26 (4) ◽  
pp. 283-290 ◽  
Author(s):  
Russell L. Kahn

Faculty wishing to use Web sites in class lectures face a dilemma: either they bookmark a list of sites and work their lecture around the list, or they try to learn and then integrate a new Web-based teaching application into their teaching paradigm. The first method presents difficult pedagogical and organizational problems that may leave students with scattered, unfocused learning experiences. The second technique—learning a new application—takes added time and learning and requires a new application that may or may not reflect the mental model that the faculty member developed in his/her mind's eye. The purpose of this article is to provide a third method that's both simple and powerful, and which faculty can use to generate lecture notes and students can use for giving presentations. The result is a seamless way to include links to Web sites and in-line graphic images, charts, flowcharts, models, animations, and photos, and which can be projected to the class as they are used, and printed out or viewed outside of class. Generating these active and universally accessible lecture notes require only “point and click” technology and basic word processing skills and uses software that's available in any version of the Netscape Web browser subsequent to 3.0, which is free to educators.


Mobile precise internet web sites dissent drastically from their computer laptop equivalents in cloth, format and functionality. Sooner or later, present techniques to sight detrimental net internet internet sites rectangular movement now not probably to determine for such webpages. During this paper, we often typically have a propensity to format and exercising paintings over, a mechanism that distinguishes amongst terrible and benign mobile net net web sites. Activity over makes this energy of will supported normal picks of a net internet web page beginning with the quantity of iframes to the life of identified dishonourable cellular mobile cellphone numbers. First, we have a tendency to via attempting out show the requirement for mobile information strategies so installation a spread of new regular options that very correlate with cellular malicious pages. We will be predisposed to then use work over to a dataset of over 350,000 famous benign similarly to volatile cellular webpages and show 90th accuracy in splendor. In addition, we frequently normally normally have a tendency to discover, end up aware of and furthermore document choice of websites incomprehensible through Google Safe Surfing and furthermore Virus Total, however decided through art work over. Lastly, we will be inclined to growth a web browser extension victimization undertaking over to comfortable customers from damaging mobile internet web sites in length. In doing consequently, we provide the number one everyday assessment technique to view volatile cellular webpages


2003 ◽  
Vol 5 (2) ◽  
Author(s):  
David Raitt

This column aims to draw your attention to various interesting Web sites that I have come across and that might appeal to you, and to keep you up-to-date with news and views on Internet trends, developments and statistics. It offers essentially a personal selection rather than comprehensive coverage.


Sign in / Sign up

Export Citation Format

Share Document