The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the current diversity and complexity of the network information environment, the technology of web page sensitive keywords detection is an important and immediate way to manage public opinion online. We propose a system for web page sensitive keywords detection. This system can detect sensitive keywords in the web pages timely and effectively. And it will mark the position of the keywords in web...
Discovery service (DS) is designed to serve the following lookup function: Given the RFID identifier of an object, it returns a list of Internet addresses of servers about this object across the supply chain, which offer detailed information about it. The information stored in DS is commercially sensitive, which can reveal flow patterns, trading relationships or inventory levels, etc. Therefore DS...
The influence of the negative spillover effect on the different strategies of sales promotion was studied by game theory in dual-channel under Internet environment. The equilibrium results of uniform strategy and non-uniform strategy were analyzed and compared with the integrated decision mode according to the difference of strategies. Combined with the numerical example, the analytical results show...
With the explosive development of the Internet, there is the rapid proliferation of the online science-and-technology cooperation communities (OSTCC), which are playing an increasingly important role in the advances in science and the developments in technology. From another perspective, the basic function of an OSTCC is to provide the participants with knowledge services so as to solve intellectual...
Because of possessing the huge superiority on selective services marketing [1], and that could bring tremendous research value, users' usage preference of network services is becoming an issue. But there was seldom research on changes in users' usage of network services at different time scales. In this paper, we investigated the changes in users' usage of network services at different time scales,...
Cloud computing is another buzzword and the latest effort after Web 2.0. It is a technology that access remote servers through Internet to maintain data and applications. Whilst cloud computing developes into a major trend in IT industry, academic research has recently joined. This paper compared existing definitions of cloud computing and gave personal opinion. The case of mainstream cloud computing...
To attract and serve an expanded customer base, telecommunication service providers need to provide more targeted, focused and personalized services, which brings challenges to both business model and technologies to development of value added services. In this paper, we introduce Service Storm, a novel self-service telecommunication Service Delivery Platform with Platform-as-a-Service technologies...
With the popularity of cloud computing, Platform-as-a Service (PaaS) becomes one of the core technical enablers by enterprise to change the services to both customers and internal organizations. An application in an enterprise needs to take into account various specific requirements for hosting in private and hybrid cloud, with unique requirements on rapid development, simplicity for deployment and...
With rising concerns on user privacy over the Internet, anonymous communication systems that hide the identity of a participant from its partner or third parties are highly desired. Existing approaches either rely on a relative small set of pre-selected relay servers to redirect the messages, or use structured peer-to-peer systems to multicast messages among a set of relay groups. The pre-selection...
With the rapid development of Internet, network user behavior analysis is getting more and more attention. In this paper, an algorithm combining entropy concept and clustering method is proposed to analyze current broadband users' usage modes of network services, providing a strong support for further analysis or commercial applications. This algorithm can complete the process of division or clustering...
The classification of network users is very important in user behavior analysis. The algorithm which was based entropy and latent Dirichlet allocation (LDA) was used in this paper. It is important but difficult to select an appropriate number of topics for a specific dataset. Entropy was first used to solve the problem. A concept named difference-entropy was built to determine the number of topics...
There was a close relationship among network traffic, network user and network application in the complex network environment. We use Gini coefficient in economics to describe elephant and mice phenomenon the network traffic. A new model of network traffic which was comprised of network traffic, network user and network application was built on the basis of Gini coefficient. The result of experiment...
Nowadays, remote control applications via the Internet are going to be used more and more widely with the development of powerful chips and network technology. For applications which do not need real time communication or persistent connection and have a little amount of data transportation, conventional approaches based on Web services either are a little bit complex, or have a higher overhead. In...
It takes most people much time to look for new information from one to another Website. Now part of the problem can be solved by some RSS readers, desktop applications. In this paper, a design for an online RSS reader was given after analyzing the limitation of traditional RSS readers. Firstly, Ajax was utilized to view the syndication feeds and make the automatic updating work. Secondly, the system...
The issue of how to combine a distributed database based Web with the technology of mobile agent has attracted more and more attention. However there are some problems in the combination of the present existed platform of mobile agent and a Web database, especially in respect of security, conformity and interaction. So the structure and function of the present existed platform of mobile agent should...
Web services are widely accepted and adopted to provide business functionality in business world. Especially, Web service is chosen to compose business process by companies to achieve their business objectives. Business process contains a set of activities, which represent business interactions between Web services spanning company boundaries. As Web services are built in open distributed environment,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.