The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Health related Question Answering (QA) systems have proven to be useful to patients. However, most of the QA systems focus on improving system performance against a standard set of questions, but neglect the problem of designing effective user interfaces. We build a health QA with enhanced user interface which includes three formats – single answer, list of fragments and combination of fragments....
We propose a dual hash tables algorithm which can realize the durable top-k search. Two hash tables are constructed to keep the core information, such as score and time in the inverted lists. We use the key-value relationships between the two hash tables to calculate the scores which measure the correlations between a keyword and documents, and search the versioned objects that are consistent in the...
In mobile ad hoc networks (MANETs), service composition faces severe challenges such as the lack of central server, node mobility and wireless network failure, which are usually not considered in web service composition on Internet. This paper designs and implements an on-demand service composition protocol for MANETs with consideration of quality of service (QoS). Based on the well-known Dynamic...
Along with the proliferation of Web-delivered services and the wide adoption of popular Web technologies, it has been an emerging development style that composes services into Rich Internet Applications in the client-side runtimes, i.e. web browser. These service-oriented rich clients (SoRC) have to access and process client-side data for rich user experiences. Though server-side data access has become...
A web-based management system for urban road lighting is developed for the purpose of energy-saving. Following the trends of energy-saving and emission reduction, energy-saving lamps are widely used as measures taken by related organizations, including previous loop control systems and current single-lamp control systems. Our system consists of a platform of remote monitoring and management of street...
Collaborative Filtering (CF) is widely used in the Internet for recommender systems to find items that fit users' interest by exploring users' opinion expressed on other items. However there are two challenges for CF algorithm, which are recommendation accuracy and data sparsity. In this paper, we try to address the accuracy problem with an approach of deviation adjustment in item-based CF. Its main...
With more and more security threat events happened aiming at financial web services, there is an increasing amount of transactions performed over the Internet. As a de-facto standard the security protocol SSL (Secure Sockets Layer) or TLS (Transport Layer Security) is used to create a secure connection to web services. This paper analyze the weakness of the SSL and TLS protocols, based on which, we...
Cloud Storage is an important part of Cloud Computing, and it provides a way to achieve large scale storage architecture. And virtual storage is a strategy for Cloud Storage. A load balancing virtual storage strategy (LBVS) is proposed in this paper. The contribution of this strategy is that, it provides a large scale net data storage model and Storage as a Service model based on Cloud Storage. Three...
Previous wrappers of information extraction are mostly set for the web page which has one information block, so they are unable to deal with the multiple information blocks web page. Because of the adapt ability of the above mentioned shortcomings, this paper proposes a multiple wrappers information extraction method based on tree model. It will generate a wrapper for every block using the Tree-Align...
Applying automatic summarization to search engine can make it easier for users to find out the content of the Web page. In this paper, the results of search engine are analyzed. On the basis of query keywords expansion, we propose a new summary approach which calculates the sentence weight utilizing the information of the distance between words. The results of experiment show that this method can...
The bloom of Internet and the convenience of e-Commerce bring a lot of demands of Internet booking applications. There are two challenges in Internet Booking Applications: high volume concurrent processing and complex business processing. Facing these two challenges, we designed an extensible framework for Internet booking applications, which includes an Internet Booking Engine, a rule engine, and...
Internet topology measurement is an important part of Network measurement. Nowadays, traceroute probing method is widely used to obtain the original route data, and the IP alias resolution technique is to identify IP addresses belonging to the same router for constructing accurate Internet maps. However, there are thousands of IP addresses only in a region topology exploration, while current alias...
A web-based problem solving environment for weave pattern design is proposed in this paper. The contribution of this PSE platform is on providing a SaaS-type application model, and SaaS-type application integration in PSE. Besides, the PSE presents designers a very friendly personal workspace in which they can customize services, information and schedule. This paper describes the PSE architecture,...
This article regarded the popularization of GIS as a starting point. It researched the feasibility of the transformations based on special GIS to popular GIS. It proved the popular spatial information service platform structure mainly from data base, technical feasibility, system framework, function frame and user perspective. And it also gave a future construction idea about popular spatial information...
This paper aims to mine popular words and phrases from internet by specific algorithm. We download web pages from Jan 1st 2007 to Jun 30th 2007 from different information sources of the network. We filter the set of the candidate words by three times in turn based on full segmentation with Pat-Tree. The first is the weight filter based on the vector space model, then used by the model of language...
With the wide use of anonymity tools, both blocking and anti-blocking of these tools have become hot topics. And the traffic identifications of the corresponding tools are key issues of both blocking and anti-blocking. In this paper, we address on identifying Tor and Web-Mix traffics, which are two of the most famous anonymity tools. Taking advantage of the typical methods for traffic identification,...
The Web page rank algorithm is always regarded as the core of the search engine. Firstly, this article analyzes the traditional and classical rank algorithms briefly. Then, it proposes a new rank algorithm, which is called A-PageRank. In this algorithm, the PageRank value of the source page is distributed to its link-out pages according to the topic similarity. Lastly, a new method which uses both...
The traditional annotation technologies focus on the content of the resources which is normally done by the system managers. There are some Web applications which allow users to annotate the resources besides the content; we call this phenomenon as pervasive annotation. This paper defines the pervasive annotation as a correlative procedure of tag assignation, rating, description and usage status marking...
Anonymity systems have been widely used to protect the privacy of the Internet users. Generally, the users should login to a central server before they join the system. Such action brings a risk that the attackers can block the system by cutting the connection between the user and the central server, which will deny the users from the anonymity service. In this paper, we present a design scheme based...
Internet brings more flexibility and possibilities to software. How to develop and maintain the software conveniently and easily is a big challenge for the developers of Internet applications. The purpose of this paper is to create a systemic framework for object oriented design (OOD) and map between the program and the reality. This paper investigates the things, relations and interactions between...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.