The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Due to the increasing network risk of large-scale disaster, it is important to protect failed requests for network operators. For the disaster survivable problem in an elastic optical datacenter networks with a bandwidth constraint, we formulate an integer linear program (ILP) for shared protection model. The algorithm utilizes the priori method to maximize the network throughput firstly, and then...
Apache Hadoop is the famous open source cloud computing software in recent years, the performance is much better than before due to lots of researchers' efforts, but its performance still has chance to be improved further because of unsatisfied distributed computing speed and slow response time from heterogeneous Internet's uncertain and dynamic environment. In this paper, coupling emerging GPU computing...
In this paper, we illustrate the significance and advantage of combining the results of multiple detection methods. We implement these methods as bolts in a Apache Storm cluster which is a famous real-time computation framework. We simulate two kinds of anomalies — one involving large number of small network flows and the other involving small number of large network flows. The experiments show that...
Routing detours raise concerns both on network security of nations and efficiency of resource consumption. Geo-optimal routing can be viewed as a long term goal of Internet routing, and a careful designed Internet together with geo-optimal routing can produce the best performance for the Internet. In this paper, we focus on some representative intercontinental circuitous paths summarized from our...
Aiming at the problem that the existing GPRS monitoring system has no signal in some areas and the expensive price, an on-line monitoring system for transmission line based on 6LoWPAN technology is proposed. 6LoWPAN technology has built a bridge for communication between the wireless sensor and the Internet for the system, and achieved data collection, analysis to the transmission line temperature,...
The rapid growth of mobile device usage stimulates the application of high-speed mobile broadband services. Thus, the adoption of Long Term Evolution (LTE), the leading standard of the fourth generation (4G) of mobile phone communication technology, becomes the main growth strategy for carriers. However, the LTE network services do not transmit voice data until the Voice over LTE (VoLTE) initiatives...
To access to the Internet, regional Internet Service Providers (ISPs) have to buy transit service from global ISPs. Provider selection strategies are related closely to ISPs' economic interests. With the growing number of potential transit provider and the flattening topology of the Internet, it's getting harder for ISPs to select upstream provider empirically as before. In this paper, we propose...
Feeds are user-generated contents or actions in online social network (OSN). Users generate feeds for self-expression and view feeds generated by friends. In this paper, we try to analyze activities of users in one OSN by exploring two aspects: whether users are becoming inactive in generating feeds, and how these inactive users affect the feeds received by other users and thus cause collapse of the...
In this paper, we propose a novel method based on the combination of Named Entity Recognition and Entity Rank algorithm for detecting key entities with significant influence and importance from huge sentiment data collected from Internet. Firstly, we extract entities from the target news websites and forums using a rule-based and CRF combined method. Secondly, we use the Entity Rank algorithm to calculate...
Understanding of the Internet evolution is important for many research topics, such as network planning, optimal routing design, etc. In this paper, we try to analyze CAIDA AS-level topology dataset from 2004 to 2010 to validate two conjectures on the Internet evolution, i.e., the Internet flattening trend and the preferential attachment rule. Our analysis shows that the evolvement of the Internet...
Multipath routing is an important and promising technique to increase the Internet's reliability and to give users greater control over the service they receive. Currently the interdomain routing protocol limits each router to using a single route for a destination network, which does not satisfy the diverse requirements of end users. In this paper, in order to support the effective and efficient...
Multi-path routing is a promising technique to increase the Internet's reliability and to give users greater control over the service they receive. Currently the interdomain routing protocol limits each router to using a single route for same destination, which may not satisfy the diverse requirements of end users. In this paper, in order to support the effective and efficient multi-path service(MPS),...
In recent years, many pricing schemes have been proposed for network service access in wireless networks. Most of them model this access problem as a cooperative game, where the network service is assumed to be open to every user. However, few of them have considered the scenario where the network service is private, i.e., users cannot access the network service freely. In this paper, we study the...
Taking the technology advances of bio-monitoring sensor, wireless sensor network (WSN), pervasive Internet and prevalent smartphone, we design a ubiquitous personal health surveillance and management system called UPHSM. Our system cost-effectively integrates health-related sensory devices with the application-layer gateway (ALG) implemented on an open-source smartphone (i.e. Google Android phone)...
Many network pricing schemes have been proposed in recent years for spectrum/network service access. Most of them model the spectrum/service access problem as a cooperative game, where the spectrum/network service is assumed to be open to every user. However, few of them have considered the scenarios that the spectrum/network service is private. In this paper, we study the network pricing of private...
IPTV is an emerging multimedia network application over prevalent Internet. IPTV over P2P streaming network preserves significant advantages in scalability over conventional client-server architecture. IPTV media content delivered in P2P networks over public Internet still preserves the issues of privacy and intellectual property. In this paper, we use SIP protocol to construct a secure application-layer...
In order to render WebGIS vector map with better effects, build a client-side multi-level structural vector map rendering engine, which is built upon Microsoft's Silver light-based RIA and SQL Server 2008 spatial database. Implement a marine management system for Nan tong City (MMSNT) based on this engine. build the architecture of the system used Windows Communication Foundation(WCF) data com-munication...
In this paper, we explore the problem of content understanding of public events images, and our objective is preventing malicious utilization of public events image in the Internet to impose negative effect on the public opinion. Towards this goal, we propose a public events image content understanding approach, which is based on the object combination feature. We first identify the typical objects...
As the development of the Internet and the increment of the bandwidth, large-scale video transmission on the IP network is getting further development and application. Especially, the application of the broadcasting system based on single sender but multiple receivers are applied widely. Therefore, the multimedia data transmission is becoming one of the most important aspects in the broadcasting system...
Several studies have found some properties of Internet such as Triangle Inequality Violations (TIVs). The studies have reported the existence of TIV in the Internet delay space. Triangle inequality violations that are important to peer-to-peer applications can be leveraged to build overlay routing to improve peer-to-peer performance. How to select relay nodes becomes a crucial factor to overlay routing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.