Mobile User Recovery in the Context of Internet Transactions
نویسندگان
چکیده
With the expansion of Web sites to include business functions, a user interfaces with e-businesses through an interactive and multistep process, which is often time-consuming. For mobile users accessing the Web over digital cellular networks, the failure of the wireless link, a frequent occurrence, can result in the loss of work accomplished prior to the disruption. This work must then be repeated upon subsequent reconnection—often at significant cost in time and computation. This “disconnection-reconnection-repeat work” cycle may cause mobile clients to incur substantial monetary as well as resource (such as battery power) costs. In this paper, we propose a protocol for “recovering” a user to an appropriate recent interaction state after such a failure. The objective is to minimize the amount of work that needs to be redone upon restart after failure. Whereas classical database recovery focuses on recovering the system, i.e., all transactions, our work considers the problem of recovering a particular user interaction with the system. This recovery problem encompasses several interesting subproblems: 1) modeling user interaction in a way that is useful for recovery, 2) characterizing a user’s “recovery state,” 3) determining the state to which a user should be recovered, and 4) defining a recovery mechanism. We describe the user interaction with one or more Web sites using intuitive and familiar concepts from database transactions. We call this interaction an Internet Transaction (iTX), distinguish this notion from extant transaction models, and develop a model for it, as well as for a user’s state on a Web site. Based on the twin foundations of our iTX and state models, we finally describe an effective protocol for recovering users to valid states in Internet interactions.
منابع مشابه
سیستم پیشنهاد دهنده زمینهآگاه برای انتخاب گوشی تلفن همراه با ترکیب روشهای تصمیمگیری جبرانی و غیرجبرانی
Recommender systems suggest proper items to customers based on their preferences and needs. Needed time to search is reduced and the quality of customer’s choice is increased using recommender systems. The context information like time, location and user behaviors can enhance the quality of recommendations and customer satisfication in such systems. In this paper a context aware recommender sys...
متن کاملDesigning an Intelligent Intrusion Detection System in the Electronic Banking Industry Using Fuzzy Logic
One of the most important obstacles to using Internet banking is the lack of Stability of transactions and some misuse in the course of transactions it is financial. That is why preventing unauthorized access Crime detection is one of the major issues in financial institutions and banks. In this article, a system of intelligence has been designed that recognizes Suspicious and unusual behaviors...
متن کاملLog Management support for recovery in mobile computing Environment
Rapid and innovative improvement in wireless communication technologies has led to an increase in the demand for mobile internet transactions. However, internet access from mobile devices is very expensive due to limited bandwidth available on wireless links and high mobility rate of mobile hosts. When a user executes a transaction with a web portal from a mobile device, the disconnection neces...
متن کامللبخوانی: روش جدید احراز هویت در برنامههای کاربردی گوشیهای تلفن همراه اندروید
Today, mobile phones are one of the first instruments every individual person interacts with. There are lots of mobile applications used by people to achieve their goals. One of the most-used applications is mobile banks. Security in m-bank applications is very important, therefore modern methods of authentication is required. Most of m-bank applications use text passwords which can be stolen b...
متن کاملRecovering Mobile Users in the Context of Internet Transactions (iTXs)
With the expansion of Web sites to include business functions, a user interfaces with e-businesses through an interactive and multi-step process, which is often time-consuming. A loss of connection, or any other system failure, can result in the loss of work accomplished prior to the disruption. This work must then be repeated upon subsequent reconnection { often at signi cant cost in time and ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IEEE Trans. Mob. Comput.
دوره 2 شماره
صفحات -
تاریخ انتشار 2003