The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Internet of Things is one of the hottest topics in both industry and academia of the communication engineering world. On the other hand, wireless mesh networks, a network topology that has been discuss for decades that haven't been put into use in large scale, can make a difference when it comes to the network in the IoT world today. This paper is a brief introduction of how these technologies has...
Software Defined Network (SDN) is able to provide better network management and higher utilization for data center. However the centralized control of entire network may trigger large overhead and limit the scalability of control plane. In this paper, we propose an enhanced mechanism of elephant flow scheduling in SDN-based data center. The mechanism can efficiently reduce the overhead and improve...
Today's interdomain routing is traffic agnostic when determining the single, best forwarding path. Naturally, as it does not adapt to congestion, the path chosen is not always optimal. In this paper, we focus on designing a multi-path interdomain forwarding (MIFO) mechanism, where AS border routers adaptively forward outbound traffic from a congested default path to an alternative path, without touching...
As a path vector protocol, Border Gateway Protocol (BGP) messages contain the entire Autonomous System (AS) path to each destination for breaking arbitrary long AS path loops. However, after observing the global routing data from RouteViews, we find that BGP AS path looping (BAPL) behavior does occur and in fact can lead to multi-AS forwarding loops in both IPv4 and IPv6. The number and ratio of BAPLs...
With the fast development of video and voice network applications, CDN (content distribution networks) and P2P (peer-to-peer) content distribution technologies have gradually matured. How to effectively use Internet resources thus has attracted more and more attention. For resource pricing, a whole pricing strategy covers all related topics, including pricing models, service mechanisms and pricing...
It is commonly recognized that the dual semantics of IP address has brought about serious scaling and security problems in today's Internet. Aiming at addressing these problems, several recent researches propose identifier-based universal network to replace the IP namespace with an identity namespace and a locator namespace. In this architecture, it successfully introduces the mapping idea to accomplish...
An anti-PROXY detecting scheme based on characters is proposed. According the characters of data flow, viz. flow rate character, application character, content character, process character and behavior character, it is identified whether the user is an PROXY object or not. The next step anti-proxy action will be made in terms of practical policies. The scheme includes character collection, modes matching,...
Presently, as mobile computing develops, more attention has been paid to mobile mashups. With mobile data and context information such as GPS location, we are able to get more novel mashups. Nevertheless, most of the researches are simply applications for specific purpose rather than a platform. In this paper, we present a semantic-based mobile mashup system (SMMS) which implements a platform that...
Concentrated on Chinese photoelectron firms, the paper analyzes the relationship between firm size and patterns of knowledge acquisition. The patterns of knowledge acquisition are described by 33 potential variables of knowledge acquisition. The empirical results confirm that differences in the firm size affect the choice of knowledge acquisition means, suggesting that firms with different size should...
Role provisioning is an essential yet complex aspect of the design of virtual organisations. This paper addresses an even more complex scenario in telecare. Here the roles may be doctor, nurse, carer, etc. And they must be enabled to participate in monitoring remote care-receivers via the internet, using their professional expertise and skills, with access to online-resources. We show that the complexity...
High-speed evolution of computer technology in 21th century, college professors and teachers face many challenges in delivering computer foundation courses effectively for popular students in the universities. According to “Comments on Strengthening Computer Foundation Education in Colleges” and “Computer Foundation Education Course System for Universities and Colleges in China, 2006” issued by MOE...
In the SaaS application, users can order corresponding software services from the service provider according to their application needs and adjust their services content in use based on the changes of the enterprise development, with strong elasticity and expansibility. However, despite of so advanced concept of SaaS, there are still some problems in the SaaS field constraining the wider use of SaaS...
This paper proposes a method of identified reciprocating motion in pornographic video from other human action using Hidden Markov Model (HMM). The motion vectors are obtained by decoding the compressed MPEG video. Then the feature vectors are extracted by calculating the direction and the magnitude of the motion vectors. The feature vectors are fed to Hidden Markov Model for training and classification...
Many Web news sites have similar structures and layout styles. Our extensive case studies have indicated that there exists potential relevance between Web content layouts and path patterns. Compared with the delimiting features of Web content, path patterns have many advantages, such as a high positioning accuracy, ease of use and a strong pervasive performance. Consequently, a Web information extraction...
This paper presents the design and implementation of the FPGA-based Web server for biological sequence alignment. Central to this Web-server is a set of highly parameterisable, scalable, and platform-independent FPGA cores for biological sequence alignment. The Web server consists of an HTML-based interface, a MySQL database which holds user queries and results, a set of biological databases, a library...
The verification of service replaceability is an important issue for service composition in a seamless way. In this paper, it proposes the definition of service behavior impaction to judge the service replaceability. It defines the service behavior model based on the colored Petri Net, put forward service behavior impaction and service replaceability. The application of the method in the scenarios...
Abnormal remarks on World Wide Web, such as violence, threat, superstition, etc. may disturb the social order and public morality. Most traditional methods filter a page as long as it contains a keyword in a predefined blacklist. Such methods cannot provide a quantitative measure of how sensitive the content is. In this paper, we propose a utility-based Web content sensitivity mining approach. Utility...
The marketing theory indicates that the promulgating of network advertisement has a significant impact on the effectiveness of cyber-marketing. Therefore the proper strategy about network advertisement is extremely concerned with the network advertisement releaser. Using the technique of user identification and session identification, the access path (the sequence of visit pages) is analyzed on the...
This paper analyzes the factors which affect the sales and conversion rate (the proportion which visits convert to sales) of online auction and proposed the assumptions based on previous literature study. A Logistic model and a multiple regression model are built to analyze every factor's contribution to the probability of successful transaction and conversion rate. The results show that the probability...
The performance and capabilities of Web search engines is an important and significant area of research. Millions of Chinese people use Web search engines every day. This paper describes the evaluation of three Chinese search engines based on human judgments. As a case study, three popular Chinese search engines are examined. We develop an online tool to assist human evaluation. The evaluation takes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.