The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This article consists of a collection of slides from the author's conference presentation on the special features, system design and architectures, processing capabilities, and targeted markets for Baidu's family of software defined accelerator products (SDA) for large scale deep neural network (DNN) systems.
In this paper, we use the TCP/IP protocol stack and PPP dialer integrated in single chip terminal to gather information, through GPRS wireless communications to connect internet, transmitting the data to the upper monitor to analysis and process, realizing the remote monitoring to the transmission towers' on-line monitoring to ensure the reliability of electricity and raise the ability of troubleshoot.
In view of the technical features of CNGI and IPv6, we introduce the construction and transplant of China's first CNGI-based GIS, carry out new geographic information application technology research as well as build demonstration application of Government GIS based on “Geo-Windows”, which is a GIS software platform for E-Government application, and establish a series of technical foundation for the...
Employee Assistance Programs (EAPs) are free, voluntary benefit which plan to help employees and their families cope with everyday problems. EAPs provide a wide range of services including short-term counseling, crisis intervention, occupational mental health and referrals. Since their rise approximate fifty years ago, EAPs have undergone fundamental changes. They have extended range and deepened...
In the signed networks the links between nodes can be either positive (means relations are friendship) or negative (means relations are rivalry or confrontation), which are very useful for analysis the real social network. After study data sets from Wikipedia and Slashdot networks, We find that the signs of links in the fundamental social networks can be used to classified the nodes and used to forecast...
In this paper, we proposed a three-layer dynamic gateway strategy, which integrates mobile IP and AODV protocol. This is one kind of multi-gateway mechanisms. By using irregular nodes not attached fixed gateway as gateway in Ad Hoc network, network overload will decreased. And the efficiency of the network will increased. According to the distance, the registered number of nodes and traffic-weighted...
Online advertising is a rapidly growing industry currently dominated by the search engine 'giant' Google. In an attempt to tap into this huge market, Internet Service Providers (ISPs) started deploying deep packet inspection techniques to track and collect user browsing behavior. However, such techniques violate wiretap laws that explicitly prevent intercepting the contents of communication without...
This paper analyzes the hybrid supply chains of internet supply chain and traditional supply chain with one supplier selling directly to consumers by internet supply chain, and a retailer selling to consumers by traditional store as the supplier's agent. The coordination mechanism which is Perfect Coordination Mechanism and two noncoordination mechanisms which are Stackelberg Mechanism and W=C Mechanism...
This paper analyzes the supply chains of traditional retailing and direct internet with one supplier and two Cournot competitive retailers. The noncoordination mechanisms which are Second-best Mechanism and Stackelberg Mechanism and one coordination mechanism which is Quantity Discount Mechanism are studied. We show that whether the supplier selects coordination mechanism will depend on concrete circumstance.
Lifelong education is a tendency with the fast progress of society and technologies, and traditional educational forms including correspondence have some limits to meet the new requirements arisen from the tendency. P2P is one of contents distributed ways, in which all the hosts are treated equally and can access and make use of each other's resources such as storage of hard disk and CPU. The idea...
The threat from web Trojan in electric power systems (EPS) is complex, which perhaps infects computers, damage SCADA system, or even cause electricity fail. The paper presents the potential Trojan attack risks of EPS by analyzing the security architecture of power systems, such as firewall, intrusion detection system and intrusion prevention system. The paper analyzed some possible attack methods...
Web rootkits Trojan, which can download virus from remote control server and hide in BIOS, is very harmful to web security. Reverse assembly analysis on web rootkit Trojan can help virus analyzer to trace malicious code and find some immunization methods. The paper presents deeply reverse analysis methods of web rootkit Trojan according to malicious assembly codes. The MASM assembly instructions in...
Peer-to-Peer (P2P) file sharing is an important Internet application. Among lots of P2P systems, BitTorrent is the most efficient P2P collaborative file sharing protocol and the de facto standard of this kind of system. However, BitTorrent protocol requires publishing the Torrent file by Web and allocating neighbors by a dedicated tracker. These requirements hinder the usage of this protocol. In this...
Networks exist anywhere around us, say, the World Wide Web is a scale-free network whose vertices are Web pages and files, and edges are hyperlinks between Web pages and files. Employing the link architecture of World Wide Web network, search engines like Google help people locate resources efficiently. However, the performance of search engine is greatly decreased as search engine spam is involved...
Statistic analyses are applied to empirical data to test the Internet accessibility. Results indicate a strong statistical correlation between Internet access and computer domain density at international scale, but visit pages/host does not show a correlation with either computer domain density or physical distance. At international scale, access hosts are the most from North America, followed by...
For security and share of Internet IP addresses, NAT (network address translation) firewalls are widely used to isolate the private networks from Internet in some enterprises/organizations. Unfortunately, NATs block the data transmitted directly between two clients under different private networks in many P2P (peer to peer) applications. A protocol, STUN, has been proposed by IETF to solve the problem...
In this paper, a congestion avoidance routing algorithm is proposed to solve congestion problems in satellite IP networks. Because of long delay of satellite IP networks, congestions degrade performances of networks dramatically which can not be solved by current routing algorithms proposed in previous works. The routing algorithm named AARA is based on globally optimizing ant-algorithm, which is...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.