The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Social networks are the major routes for most individuals to exchange their opinions about new products, social trends and political issues via their interactions. It is often of significant importance to figure out who initially diffuses the information, i.e., finding a rumor source or a trend setter. It is known that such a task is highly challenging and the source detection probability cannot be...
Named Data Networking (NDN) uses content names as routing entries, and thus the scalability of NDN routing is of primary concern. NDN allows in-network caching as a built-in functionality; however, if network nodes make caching decisions individually, duplicate copies of the same content may exist among nearby nodes. To address these problems, we propose Coordinated Routing and Caching (CoRC) that...
Recently, mobile broadcast services such as DMB, multimedia streaming services and IPTV, caused rapid increase of multimedia services sent over the Internet. It is important to define, measure and evaluate the elements related to the quality of providing the services over the Internet. In this paper, we propose multimedia quality measurement model that evaluates the quality of multimedia from consumers...
Recently, the problem of detecting the rumor source in a social network has been much studied, where it has been shown that the detection probability cannot be beyond 31% even for regular trees. In this paper, we study the impact of an anti-rumor on the rumor source detection. We first show a negative result: the anti-rumor's diffusion does not increase the detection probability under Maximum-Likelihood-Estimator...
This paper presents a new selection-based question answering dataset, SelQA. The dataset consists of questions generated through crowdsourcing and sentence length answers that are drawn from the ten most prevalent topics in the English Wikipedia. We introduce a corpus annotation scheme that enhances the generation of large, diverse, and challenging datasets by explicitly aiming to reduce word co-occurrences...
Game is one of the content services provided by an IPTV based on a Set-Top Box which is a terminal required for interactive multimedia communication at home. However, because IPTV service providers have an overall control of the Set-Top Box, game developers experience difficulty in fully testing the games before launching them. In this paper an IPTV game test-bed system is implemented based on Bluetooth...
Community Question-Answering (CQA), where questions and answers are generated by peers, has become a popular method of information seeking in online environments. While the content repositories created through CQA sites have been used widely to support general purpose tasks, using them as online digital libraries that support educational needs is an emerging practice. Horizontal CQA services, such...
Terrorism research has begun to focus on the issue of radicalization, or the acceptance of ideological belief systems that lead toward violence. There has been particular attention paid to the role of the Internet in the exposure to and promotion of radical ideas. There is, however, minimal work that attempts to model the ways that messages are spread or how individual participation in radical on-line...
The Internet encompasses websites, email, social media, and Internet-based television. Given the widespread use of networked computers and mobile devices, it has become possible to monitor the behavior of Internet users by examining their access logs and queries. Based on large-scale web and text mining of Internet media articles and associated user comments, we propose a framework to rapidly monitor...
Traditionally SCADA is connected only in a limited private network. With new technology and facilities, there are also demands of connecting SCADA though the internet. The internet SCADA facility has brought a lot of advantages in terms of control, data viewing and generation. Aside from connecting SCADA to the internet, there are also operators who want to connect their system wirelessly. This can...
IoT has emerged to realize the notion of ubiquitous interaction of everything. With the help of IoT, various types of objects including human, machine, and almost all things can communicate with each other via the Internet. However, the current state of the art in IoT technology focuses on the limited application such as signalling and exchange of sensing data. In this paper, we look into the necessity...
In this paper, we present evaluation results of Service Function Chaining implementation scheme using multiple flow tables of OpenFlow. With a single flow table in the implementation, the number of flow entries in the flow table significantly increases as the number of service chains increases. This results in looking up larger flow table and higher processing time in processing packets. We have addressed...
In this paper, we designed a mechanism to mitigate the existence of device fingerprinting process by utilizing personal HTTP proxy. For the purpose of detection and prevention of device fingerprinting, the proxy utilizes a two-stage filtering process; header-based filtering and content-based filtering. We define 6 values of attribute among with their weight based on the value of the highest entropy...
Internet of things (IoT) has rapidly become one of the most familiar and perhaps most discussed topic on the research field. The attention for the Internet of Things is mainly due to the new connected products intended to bring greater efficiencies and simplicity to life. Variety of IoT applications lead to equally wide variety of security issues. In this paper, we propose an approach to provide secure...
In this paper, we address the inefficient implementation of Service Function Chaining, which comes from the use of a single flow table. It is because the number of flow entries in the flow table significantly increases according to the increment of the number of service chains. So the switch should look up larger flow table to process packets, and this also makes harder to update the path of the service...
When hackers try to attack a target system, their first goal is to install a malware to the target system. It is because hackers can do anything what they want if a malware is installed. In the past, most of the malwares were Microsoft PE files, however they have been changed to various file formats such as pdf, jpg, doc, jar and so on. Under this circumstances some network security systems such as...
Network Neutrality states that users should have equal access to all Internet content and that Internet Service Providers (ISP) should not unfairly block or degrade access to any site. The Network Neutrality controversy has been in the spotlight for several years due to political, economic, social, and technical implications. While proponents argue that enforcing Network Neutrality by law is important...
Advance in Software Defined Network is enabling more possibilities of network infrastructure utilization. For example, underutilized network resource in the production network can be shared to provide research and development network that does not mix with the production one. In our previous work, we already provide users a way to manage their defined network infrastructure through a web interface...
Today, Internet is incessantly attacked by wide variety of network-based threats. One of the ways to monitor or identify such prevailing threats is to monitor incoming traffic to unused network addresses popularly known as darknet and often also referred with various other names like network telescope or black hole. As, all the traffic arriving at darknet is mainly the result from malicious probing...
Green Internet is becoming a major concern recently. The main concept of it is to improve energy efficiency in the Internet for reduction of unnecessary energy consumption. Generally, energy consumption of data network equipment in the Internet is unknown although they use a substantial amount of energy. In this area, there is a lack of deeper related studies with a special focus on wired networking...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.