The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Health related Question Answering (QA) systems have proven to be useful to patients. However, most of the QA systems focus on improving system performance against a standard set of questions, but neglect the problem of designing effective user interfaces. We build a health QA with enhanced user interface which includes three formats – single answer, list of fragments and combination of fragments....
This paper presents an optimal coordinated operation framework for minimizing the overall electricity cost of distributed internet data center (IDC) microgrids, which consists of cost of purchasing power from main grid, the operation cost of onsite generations, and the cost of carbon emissions. With forecasted day-ahead and real-time locational marginal prices (LMPs), the proposed model could help...
In this paper, we use software defined network (SDN) technology characteristic of forwarding separating and control to concentrate the control functions in the control layer (comprised by SDN controllers), and design a kind of communication network architecture for energy interconnection. Firstly, we give the concept of Intelligent Energy Controller (IEC), and make it as a device to arrange underlying...
In this work, the performance of 5 representative caching replacement policies was investigated and compared for caching Internet video-on-demand (VoD) in local access networks. Two measured traces of end-user requests were used in the analyses for two typical VoD services: TV-on-demand and user generated content represented by YouTube. The studied policies range from simple least recently used (LRU)...
Multi-homing is one of the primary causes for the exponential growth rate of the global routing table (GRT). This work proposes a stub multihoming solution called Multi-Addressing with Stub Tunnels (MAST). By combining IPv6 multi-addressing with backup tunnels between a stub and each of its providers, stubs can enjoy the reliability advantages of multihoming without adding to the size of the GRT....
While making the Internet totally trustworthy is intractable, making as trustworthy as possible is a crucial problem. Within this landscape, authentication of the IP source address remains one important topic in need of further study. However, most source address validation methods are difficult to implement in practice because of deployment difficulties. This research designs an efficient inter-domain...
The authentication of the IP source address remains one of the most important steps in making the Internet as trustworthy as possible. With existing anti-spoofing solutions, deployed ASes lack cooperation when exchanging routing decisions and disseminations. In general, this makes anti-spoofing mechanisms inefficient and does not adapt to incremental deployment. By introducing routing choice feedback,...
The functional deficiency of the Internet architecture enables attackers the ability to easily to spoof IP source address. The traditional signature-and-verification based anti-spoofing methods are often limited by essential process based on an explicit analysis and process of the IP header and does not adapt to incremental deployment. This paper designs a multi-fence countermeasure based inter-domain...
Next generation Internet is highly concerned with the issue of trustworthy. An important foundation of trustworthy is authentication of the source IP address. With existing signature-and-verification based defense mechanisms, there is a lack of hierarchical architecture, which makes the structure of the trust alliance excessively flat and single. Moreover, with the increasing scale of trust alliances,...
Based on the “digital city”, “smart city” is widely used in daily livelihood, environmental protection, public security, city services and other fields. In this paper, we mainly focus on recent research and the concept of “smart city”, summarizing the relationship between "smart city" and "digital city", putting forward the main content of application systems as well as the importance...
This paper puts forth a straw man proposal for future diverse internets. Guided by a principle that we call Align-and-Decouple (AD), our AD protocol architecture design calls for lightweight transport protocols that allow for decoupled operation of networks that are either owned by different organizations, or are networks of different types/protocols. TCP's fragmentation and congestion control mechanisms...
In order to become truly ubiquitous, the Internet of Things (IoT) has to evolve to provide connectivity anytime, any place, for any thing. IEEE 802.15.4-based wireless personal area networks (WPANs) is a preferable communication method for IoT. Wireless personal area networks (WPANs) are used to convey information over relatively short distances. Connections effected via WPANs involve little or no...
Synchronization is the fundamental problem of confrontation systems for the reason that the communication pairs should keep pace with each other during traffic jam attacks or eavesdropping. The paper focuses on a strategy of timestamp synchronization which requires no precise clock but a simple timestamp instead to generate right communication information. Thus it can be competent for large-scale...
This paper describes a web-based project management system (PMS) for large-scale and complex agricultural scientific research projects which need the cooperation among scientific research institutions located in different areas. This teamwork system integrated with the modem project management bases on workflow and combined the Internet with communication networks to manage the research process in...
The widely discussed scientific data deluge creates a need to computationally scale out eScience applications beyond the local desktop and cope with variable loads over time. Cloud computing offers a scalable, economic, on-demand model well matched to these needs. Yet cloud computing creates gaps that must be crossed to move existing science applications to the cloud. In this article, we propose a...
A literature review of electronic commerce research in China is presented in this paper. The articles are searched with the keyword “electronic commerce” separately from the core journals and the Engineering Index (EI) journals of the China Academic Journals Full-text Database at www.cnki.net. The distributions of articles published by the core and the EI journals by year and topics are analyzed....
The combination of low-cost sensors, low-cost commodity computing, and the Internet is enabling a new era of data-intensive science. The dramatic increase in this data availability has created a new challenge for scientists: how to process the data. Scientists today are envisioning scientific computations on large scale data but are having difficulty designing software architectures to accommodate...
Along with Internet and Infobahn is springing up, it has become an important problem that how to catch the interesting information exactly and rapidly in drug ocean. Information Extraction (IE) is a new information management technology: basing on pre-definition template, it extracts special information from semi-structured data and unstructured data. A new approach to extracting drug product information...
With the development of electronic information technique, electronic e-commerce grows speedily, including online book-shopping. The evaluation of online bookstores is a multiple-criteria decision making (MCDM) problem with many quantitative and qualitative attributes. This paper proposes fuzzy analytical hierarchy process (FAHP) approach to evaluate online bookstores. In addition, a case study is...
According to the fact that consumer trust is widely perceived as an essential factor to the success of electronic commerce, we develop a model of consumer trust in e-commerce and use empirical research method to test it. After deep analyzing, we find that perceived size, propensity to trust, perceived privacy information protection, and perceived legal environment security are insignificantly related...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.