The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The novel real-time traffic sensing (RTS) model proposed in this paper not only senses traffic patterns but also chaotic traffic conditions, known as the fractal breakdowns, on the fly. If a web-based industrial ecosystem has included RTS as a functional component, it would possess the ability to acquire ambient intelligence of, and act upon, changes in traffic patterns. Its use of the results by...
We propose a novel flagging system (FS) to make the Neural Network Controller (NNC), which is an extant real-time dynamic buffer tuner, more realistic for real-time applications over the mobile Internet. Even though the extant NNC may prevent buffer overflow, it fails under certain traffic conditions easily. This happens because the intrinsic NNC control intelligence cannot handle the whole spectrum...
We propose a novel wavelet-based approach (WBA) that accurately decides if the Internet traffic is currently SRD (short-range dependence) or LRD (long-range dependence) on the fly. As a result, it helps a real-time dynamic cache size tuner such as the MACSC (Model for Adaptive Cache Size Control) maintain the given cache hit ratio under all Internet traffic conditions. The WBA mechanism utilizes the...
Although social informatics has been a subject of systematic analytical and critical research for more than three decades, previous research has rarely noted the importance of social informatics on cyber trust. Therefore, it is essential to establish a research framework that applies in cyber trust from a perspective of social informatics so that cyber trust may be achieved by different professionals...
The Internet follows the power law. For this reason its traffic pattern takes many forms, which change without warning. For example it may change suddenly from LRD (long-range dependence) such as heavy-tailed or self-similar to SRD (short-range dependence) such as Poisson or multifractal. This makes it difficult to run time-critical pervasive applications over the Internet successfully because it...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.