The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the advent of the era of big data, O2O as a new industry of making an integration of online and offline effectively, attracts more and more people to start to talk about this topic. In this article, after exploring the past academic research for two years, it is considered to select the local service industry and study the problem of the O2O industry, such as “Meituan.com”.
With IPv4 addresses quickly dwindling, the Internet is forcing an evolution of itself. During the long term transition from IPv4 to IPv6, what's going on in IPv6 world becomes unknown for network operators and researchers. In this paper, we propose a heuristic algorithm to identify p2p traffic accurately and implement traffic classification based on Netflow v9 exports to illustrate what applications...
PCA-subspace method has been proposed for network-wide anomaly detection. Normal subspace contamination is still a great challenge for PCA although some methods are proposed to reduce the contamination. In this paper, we apply PCA-subspace method to six-month Origin-Destination (OD) flow data from the Abilene. The result shows that normal subspace contamination is mainly caused by anomalies from a...
In analyzing goal-oriented multiparty discussions, one challenge is to determine who is responding to whom when they are supporting or opposing a remark put forward by another participant. This paper looks at algorithms for detecting the target discussant, comparing findings of important features for three genres of text and spoken discussions. Comparing to the common baseline of “previous speaker,”...
Multipath routing is an important and promising technique to increase the Internet's reliability and to give users greater control over the service they receive. Currently the interdomain routing protocol limits each router to using a single route for a destination network, which does not satisfy the diverse requirements of end users. In this paper, in order to support the effective and efficient...
Multi-path routing is a promising technique to increase the Internet's reliability and to give users greater control over the service they receive. Currently the interdomain routing protocol limits each router to using a single route for same destination, which may not satisfy the diverse requirements of end users. In this paper, in order to support the effective and efficient multi-path service(MPS),...
The user review on a web topic is particular useful information. These reviews usually concern such sentiment or opinions as positive, negative or mixed mood which will affect other users' behaviors, psychological and cognitive activities. Classical web sentiment analysis system could not reach the real-time demand. The functions of online web sentiment analysis system are campus network net flow...
Internet topic detection and classification is an intelligent information access technology. It studies how to detect new events and classify sentiment of the content. Classical detection and analysis system of internet topics has low analysis efficiency and large process delay. The functions of cluster-based analysis system are internet data collection, real-time analysis and off-line data analysis...
The regional Informationization is inseparable from government's push and promotion. From the observation, the Governments can directly contributes to informationization by making overall planning, developing strategies, conducting the infrastructure roll-outs, encouraging ICT-use, or indirectly improve the external environment of ICT development by establishing regulatory agencies, introducing regulation...
Domain Name is a scarcity finite resource and is the base for internet business operation well. Enterprises could build websites to expand its value chain through register domain names. But the phenomenon of improper competition frequently occurred because of many companies domain name has been Cyber-squatting, so brought very large negative impact to the function of market reputation mechanisms....
There exists a series of problems for current enterprises in the process of the informatization and systematization of human resource. This paper put forward the fundamental idea and premise about the eHR project based on the perspective of organization and technology. Taking the eHR project of KD Ltd. as an example, this paper described the construction, development, the analysis of each functional...
Governments worldwide are increasingly becoming aware of the importance of employing e-government to improve the delivery of public services to the people. E-government readiness index is a composite measurement of the capacity and willingness of countries to use e-government for ICT-led development. This paper analyzes the Global e-Government readiness with a focus on e-Government Readiness Index...
Network traffic feature is generally described as self-similarity in a time series of volume counts (e.g. of bytes or packets) view. What is omitted from this view of traffic is the content of packets. In this paper, we find the self-similarity also exists in traffic information through long-time statistics of the internet traffic data, coupled with a discussion of the underlying mathematical and...
With the increase of the number of web services on the Internet, QoS driven service selection as an important way to satisfy user's constraint on quality and maintain the runtime performance of services, has received much attention. The existing QoS driven service selection approaches always assume that the estimated QoS data is effective and trustworthy, which is actually impossible in reality. This...
Blog provides a simple way for people to share personal experiences and ideas, and has already become an important tool for people to communicate with each other. This fact turns blog into one of the most important information providers of the World Wide Web, but also makes how to find useful blogs for people to read an urgent problem. In this paper, we propose a blog clustering algorithm BCBSM (Blog...
The main objective of this paper to enhance the entire supply chain of Small and Medium sized Enterprises (SMEs) in Pakistan, and to examine the SMEs in Pakistan and how the SMEs adopt their way of undertaking business from traditional practice to e-business? Implementation of supply chain management will lower costs and increase efficiency and thus lead to the significant gain for SMEs. The Supply...
In the SaaS application, users can order corresponding software services from the service provider according to their application needs and adjust their services content in use based on the changes of the enterprise development, with strong elasticity and expansibility. However, despite of so advanced concept of SaaS, there are still some problems in the SaaS field constraining the wider use of SaaS...
Community structure has been recognized as an important statistical feature of network systems over the past decade. The web service in SOA system naturally forms into some service community during execution process, within which the links between nodes are very dense, but between which they are quite sparse. These service communities were generated by repeatedly interaction between composite services...
Clustered Web pages, such as blog posts, could be used to improve Web search. In this paper, we propose a folksonomy extending framework using relations in the Blogosphere and demonstrate how the framework could be used to help clustering blog posts. We evaluate the framework by comparing it with content-based folksonomy extending approach. Experiment results show that the framework does help the...
With the fast growing of electronic market, fraud has become a top barrier to e-commerce. Subsequently, online escrow service, such as Paypal and Zhifubao, provided by trusted third party (TTP) is considered as an effective method to protect the business from the fraud. However, who will supervise the fraud of the TTP? TTP takes charge of more and more money from buyers. Moral hazards from TTP, such...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.