共查询到20条相似文献,搜索用时 62 毫秒
1.
不久前有媒体报道家住北京通州的林先生发现,小区底商开了一家名为"嘿客"的门店,进去后发现,这家店里没有食品、饮料、衣服等商品,只有各种商品的纸板广告。店员介绍称,顾客可以预购店内展示商品,通过电子触摸屏平板电脑下单,快递就会送货上门。此外该店可以帮客户代缴水电费、购买飞机票火车票,寄取快递等等。经过询问得知,这家"嘿客"属于顺丰速运旗下。 相似文献
2.
3.
前不久,继业务体量超过顺丰后,中通的盈利能力也开始直逼顺丰。为此,顺丰最近召开了一次高管会议,王卫(顺丰总裁)传达的信号很明确,就是要转型,要改革,要突破。但顺丰转型和改革依旧绕不开电商。 相似文献
4.
如何评判这场物流与电商的跨界战甲企业自身的布局、行业发展的前景,构成预测和评判的纵横坐标,或可如此盖棺定论:京东自建物流是扩充产业链,顺丰进军电商是追逐多元化;但若要从规避国内快递困境、扫清电商发展的物流瓶颈角度来看,二者的跨界均是贡献寥寥。 相似文献
5.
不甘心受制于电商约束,而是要充分利用自己的送货渠道优势,建立属于自己的交易平台,物流业巨头,正在纷纷编织着自己的"电商梦"。国内快递业的领头羊——顺丰快递获得第三方支付牌照的信息,在电子商务领域产生了一系列的猜想,这也使得电商行业的格局变得愈发扑朔迷离。不仅仅是被动地将商品送货到家,还要涉足前 相似文献
6.
7.
8.
9.
近期,马云联合了银泰集团、复星集团、富春集团、顺丰、申通、圆通、中通、韵达组建了一个新公司,名为"菜鸟网络科技有限公司",成立了"中国智能骨干网"物流项目。很明显,马云从淘宝的电商平台向建设物流平台过渡。2012年,淘宝加天猫的销售额超过万亿,在销售数据日创新高的同时,消费者对电商物流的投诉也日渐增多,要么送货非常 相似文献
10.
11.
对酒店用电系统进行智能化控制,设计一款基于单片机的节能用电控制装置。该装置以单片机AT89C51为主控芯片,分为走廊、过道等公共区域节能用电控制和客房节能用电控制2个模块。通过光敏电阻、热释电红外传感器、步进电机的巧妙配合,完成光照度和人体存在信息的采集。这种新装置真正达到了在公共区域“人在灯亮,人走灯灭”,客房无人时自动关闭电源的目的。
相似文献
12.
e-CLV: A Modeling Approach for Customer Lifetime Evaluation in e-Commerce Domains, with an Application and Case Study for Online Auction 总被引:1,自引:0,他引:1
e-Commerce companies acknowledge that customers are their most important asset and that it is imperative to estimate the potential
value of this asset.
In conventional marketing, one of the widely accepted methods for evaluating customer value uses models known as Customer
Lifetime Value (CLV). However, these existing models suffer from two major shortcomings: They either do not take into account
significant attributes of customer behavior unique to e-Commerce, or they do not provide a method for generating specific
models from the large body of relevant historical data that can be easily collected in e-Commerce sites.
This paper describes a general modeling approach, based on Markov Chain Models, for calculating customer value in the e-Commerce
domain. This approach extends existing CLV models, by taking into account a new set of variables required for evaluating customers
value in an e-Commerce environment. In addition, we describe how data-mining algorithms can aid in deriving such a model,
thereby taking advantage of the historical customer data available in such environments. We then present an application of
this modeling approach—the creation of a model for online auctions—one of the fastest-growing and most lucrative types of
e-Commerce. The article also describes a case study, which demonstrates how our model provides more accurate predictions than
existing conventional CLV models regarding the future income generated by customers.
Opher Etzion is a research staff member and the manager of the active management technology group in IBM Research Laboratory in Haifa,
Israel, and a visiting research scientist at the Technion—Israel Institute of Technology. He received BA degree in Philosophy
from Tel-Aviv University and Ph.D. degree in Computer Science from Temple University, Prior to joining IBM in 1997, he has
been a faculty member at the Technion, where he has served as the founding head of the information systems engineering area
and graduate program. Prior to his graduate studies, he held professional and managerial positions in industry and in the
Israel Air-Force, receiving the air-force highest award in 1982. His research interests include active technology (active
databases and beyond), temporal databases, middleware systems and rule-base systems. He is a member of the editorial board
of the IIE Transactions Journal, was a guest editor in the Journal of Intelligent Information Systems in 1994, and a guest
editor in the International Journal of Cooperative Information Systems (2001). He served as a coordinating organizer of the
Dagstuhl seminar on Temporal databases in 1997, has been the coeditor of the book “Temporal Databases—Research and Practice”
published by Springer-Verlag, in 2000 he has been program chair of CoopIS'2000, and demo and panel chair of VLDB'2000. He
also served in many conferences program committees (e.g. VLDB, ICDE, ER) as well as national committees and has been program
and general chair in the NGITS workshop series.
Amit Fisher is a research staff member in the active management technology group in IBM Research Laboratory in Haifa, Israel. He received
B.Sc. degree in Industrial Engineering and Management and M.Sc. degree in Information System Engineering from the Technion—Israel
institute of Technology.
Prior to joining IBM research, Amit held a professional position in Israel Air-Force. He's research interests include Customer
Behavior Analysis, CRM, Data Mining and Business Process Management.
Segev Wasserkrug is a research staff member at IBM's Haifa Research lab (HRL). He has a M.Sc. in computer science, in the area of neural networks.
In addition, he has significant experience in modeling of various types, automatic model derivation, and optimization, gained
from leading the development of a technology in HRL that deals with optimization of an IT infrastructure according to business
objectives. He is also currently studying towards a Ph.D. in information systems at the Technion, Israel Institute of Technology,
in the area of uncertainty handling, based on Bayesian network techniques 相似文献
13.
14.
针对Xen虚拟机系统执行网络I/O密集型负载时容易耗尽Domain0的CPU资源而过载和执行计算密集型负载时在客户域平均性能与数目之间存在线性规划的问题,提出了两个负载类型相关的性能模型。首先,通过分析Xen虚拟机系统处理网络I/O操作的CPU资源消耗规律,建立了CPU核共享和CPU核隔离两种情况下的客户域网络I/O操作请求次数计算模型;然后,通过分析多个相同客户域并行执行计算密集型负载的平均性能与一个相同客户域执行相同负载的性能表现之间的关系,建立了并行执行计算密集型负载的客户域平均性能分析模型。实验结果表明,两个性能模型能够有效地限制客户域提交的网络I/O操作请求次数以防止Xen虚拟机系统过载,并求解给定资源配置情况下执行计算密集型负载的Xen虚拟机系统客户域伸缩性数目。 相似文献
15.
On virtualization platforms, peak memory demand caused by hotspot applications often triggers page swapping in guest OS, causing performance degradation inside and outside of this virtual machine (VM). Even though host holds sufficient memory pages, guest OS is unable to utilize free pages in host directly due to the semantic gap between virtual machine monitor (VMM) and guest operating system (OS). Our work aims at utilizing the free memory scattered in multiple hosts in a virtualization environment to improve the performance of guest swapping in a transparent and implicit way. Based on the insightful analysis of behavioral characteristics of guest swapping, we design and implement a distributed and scalable framework HybridSwap. It dynamically constructs virtual swap pools using various policies, and builds up a synthetic swapping mechanism in a peer-to-peer way, which can adaptively choose different virtual swap pools.We implement the prototype of HybridSwap and evaluate it with some benchmarks in different scenarios. The evaluation results demonstrate that our solution has the ability to promote the guest swapping efficiency indeed and shows a double performance promotion in some cases. Even in the worst case, the system overhead brought by HybridSwap is acceptable. 相似文献
16.
云计算技术已飞速发展并被广泛应用,虚拟化作为云计算的重要支撑,提高了平台对资源的利用效率与管理能力。作为一款开源虚拟化软件,Xen独特的设计思想与优良的虚拟化性能使其被许多云服务商采用,然而Xen虚拟机监视器同样面临着许多安全问题。Xen为虚拟机提供的特权接口可能被虚拟机恶意代码利用,攻击者可以借此攻击Xen或者运行其上的虚拟机。文章针对Xen向虚拟机提供的超级调用接口面临被恶意虚拟机内核代码利用的问题,提出了一种基于执行路径的分析方法,用以追溯发起该超级调用的虚拟机执行路径,与一个最初的路径训练集进行对比,可以避免超级调用被恶意虚拟机内核代码利用。该方法通过追溯虚拟机内核堆栈信息,结合指令分析与虚拟机内核符号表信息,实现了虚拟化平台下对虚拟机执行路径的动态追踪与重构。在Xen下进行实验,通过创建新的虚拟机并让其单独运行来获得训练集,训练集中包含所有发起该超级调用的虚拟机路径信息。在随后虚拟机运行过程中针对该超级调用动态构造出对应的虚拟机执行路径,将其与训练集对比,避免非正常执行路径的超级调用发生。 相似文献
17.
Ryu K.D. Hollingsworth J.K. 《Parallel and Distributed Systems, IEEE Transactions on》2004,15(10):878-892
We present the design, implementation, and performance evaluation of a suite of resource policing mechanisms that allow guest processes to efficiently and unobtrusively exploit otherwise idle workstation resources. Unlike traditional policies that harvest cycles only from unused machines, we employ fine-grained cycle stealing to exploit resources even from machines that have active users. We developed a suite of kernel extensions that enable these policies to operate without significantly impacting host processes: 1) a new starvation-level CPU priority for guest jobs, 2) a new page replacement policy that imposes hard bounds on physical memory usage by guest processes, and 3) a new I/O scheduling mechanism called rate windows that throttle guest processes' usage of I/O and network bandwidth. We evaluate both the individual impacts of each mechanism, and their utility for our fine-grain cycle stealing. 相似文献
18.
Gunter F. K. Purcheck 《控制论与系统》2013,44(3):27-60
Abstract This paper presents a combinatorial method of grouping objects into guest families, and of providing accommodation in a system of host cells. The method maximises the amount of hospitality extended by the hosts towards the guests. A guest job requiring few facilities will have a greater chance of finding a host cell than a more demanding guest job, and not all the host cells will be equally busy. As a consequence, there will be greater scheduling flexibility and better cell utilisation. 相似文献
19.
互联网网站的发展为人类知识与信息的传播提供了前所未有的便利,但是,人们在正常浏览的同时,也有人恶意下载或非法下载,甚至非法修改网站,损害了网站拥有者的合法权益。针对客户对网站的访问,本文提出了网站服务器客户行为模糊监控方法。对于客户浏览网页链接跳转所用的时间,运用模糊分析技术,确定客户的操作行为是正常浏览还是下载,对恶... 相似文献
20.
This study considers those questions posed by students during e-mail “tutorials” to elicit information from “guest lecturers” and the use of that information by students in their essays. The “tutorials” were conducted for students in the U.K. by a “guest lecturer” in France. The “guest lecturer” was accredited as a tutor on the module for which the students were enrolled, and participated in the module by the provision of lecture notes prior to the e-mail tutorials. Data for the study, drawn from a comparative education assignment set for undergraduate students enrolled on the module, comprised surveys of students' perceived IT capabilities and attitudes towards IT, analyses of students' questions and analyses of students' essays. The findings of the study indicate (1) that tutees tend to pose questions to elicit information or clarification rather than to elicit the viewpoint or opinions of the “guest lecturer” and (2) that two-thirds of tutees' essays cited information elicited from the “guest lecturer”. 相似文献