The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The present study aims to identify the intellectual structure of computed-supported collaborate learning (CSCL) so as to provide more insights into the research trend, the most influential scholars, categories, and regions. This paper analyzed the articles and conference publications derived from Web of Science (WOS) in the field of CSCL from 2006 to 2016. A total of 792 articles were selected and...
Through three Internet software company 40 people were Behavioral Event Interview (BEI), the establishment of a discriminative Competency Model Java software engineers that companies need innovation and strong emphasis on interpersonal communication, customer service-oriented software developer, interpersonal communication, customer service orientation and innovation will become the core of Internet...
This paper studied the key factors influencing consumer purchase decision on infant milk powders under the context of e-commerce. In recent years there have been several scandals exposed about Chinese milk powders, causing major concerns among consumers and scholars. Meanwhile, e-commerce is fast developing in China, this study is aimed to understand what are the key factors influencing the consumer...
Linked data is developing very fast and becomingmore and more important in different domains. As a relativelycomprehensive linked data set, DBpedia contains billions oftriples, which involves knowledge from diverse domains. This paper aims to utilize the metal materials knowledge in DBpeida to provide more useful services for materials experts. A knowledge extraction algorithm is designed to extract...
Due to the inherent design faults of the Border Gateway Protocol (BGP), BGP prefix hijacking remains a serious security threat to the Internet routing system. AS hijacking enables an attacker to pass the prefix ownership validation mechanism, it is more sophisticated than IP prefix hijacking. So far, many efforts have been done on the detection of prefix hijacking, however, AS hijacking has not received...
Network virtualization is viewed as a promising way for overcoming the ossification of the Internet. Virtual network mapping plays an important role in building virtual networks. The substrate network conditions change synchronously when the process of virtual network mapping, when a network failure happens, virtual network mapping without protection may lead to virtual network service interruption...
Looking for usable gateway is a process, which brings the biggest overhead, in MANET accessing Internet. For controlling the routing overhead effectively, a gateway discovery method for MANET accessing Internet based on overhead control, which is according to the similar between ant searching path and mobile node searching gateway, is proposed in this paper. By simulating the pheromone's update process...
In recent years, the modern information technology, whose core includes the computer technology, network communication technology and the multimedia technology, has developed rapidly. It has become the important way to spread knowledge, and impacted deeply to the traditional teaching concept, teaching content, teaching process and teaching resource. This article elaborated the changes of the teaching...
With the rapid development of Internet, it has become an essential infrastructure for communication today, while the IP layer has a poor ability in fast failure recovery, which impending the improving of the Internet performance. Concerned to the single link failure problems, this paper proposed a fast link failure recovery mechanism based on multi-topology. Firstly, by theoretical analysis, the number...
We present N2Cloud, a novel Cloud-based neural network simulation system, which provides and exchanges neural network knowledge and simulation resources to and between arbitrary users on a world-wide basis following the Web 2.0 principle. N2Cloud enables the exchange of knowledge, as neural network objects and paradigms, by a virtual organization environment and delivers ample resources by exploiting...
To deal with the problem of many-answers returned from an E-commerce Web database in response to an approximate query, this paper proposes a novel approach to rank the approximate query results. Based on the database workload, we speculate how much the user cares about each attribute and assign a corresponding weight to it. Then, based on the similarity of different attribute values, a satisfaction...
The rapid expansion of the World Wide Web has made a large number of E-Commerce Web databases like used cars, houses databases etc. to become accessible to lay users. These users often have vague or imprecise query intentions when searching the E-Commerce Web databases and may not know how to precisely formulate queries that lead to satisfactory answers. This paper proposes a novel approach of the...
An important issue arising from Web databases fuzzy query is how to rank the answers from data sources, this paper investigates the problem of ranking the answers by taking advantage of the user's needs and preferences. Firstly, based on fuzzy set theory, a satisfaction degree ranking method, which ranks the answer according to the tuple's satisfaction degree to the fuzzy query, is presented. Next,...
With the development of Mobile IPv6 and multicast technology, mobile multicast becomes a research hotspot. Based on two basic mobile multicast methods, the Bi-directional Tunnel (BT) method and the Remote Subscription (RS) method, some mobile multicast schemes have been proposed. However, most of them evaluate the performance by means of analysis and simulation, but lack of testing the performance...
In framework for integrating Internet and MANET, because the equipments in the networks are fixed, there is no need to consider the problem of energy. In MANET (mobile ad hoc network), the energy of the mobile nodes will affect the life time and the performance of the network, so it must consider the load and energy of a node. This paper proposes a new routing method called Load balancing and asymmetrical...
The failures occurring frequently in networks can cause transient routing loops. Each of these transient loops will cause packet losses and may prohibit the Internet server providers from meeting the promised connectivity recovery time and packet loss ratio specified in service level agreements. To enhance failure resiliency without jeopardizing routing stability, and we propose an Imperative-Forwarding...
In order to users be able to find their own favorite resources quickly and accurately, this paper presents a personalized service which recommends resources for users at massive education resources net. On the basis of analyzing the characteristics of users and resources, this paper discusses the model of resourcepsilas description and userpsilas interest, and the treatment of userpsilas interest...
With the advent of the World Wide Web, many business applications that utilize data mining and text mining techniques to extract useful business information on the Web have evolved from Web searching to Web mining. It is important for students to acquire knowledge and hands-on experience in Web mining during their education in information systems curricula. This paper reports on an experience using...
Link-based ranking has contributed significantly to the success of Web search. PageRank and HITS are the best known link-based ranking algorithms. These algorithms do not consider an important dimension, the temporal dimension. They favor older pages because these pages have many in-links accumulated over time. Bringing new and quality pages to the users is important because most users want the latest...
E-commerce, or business done on the Internet has become more and more popular. Meanwhile, the number of customer reviews for products on the internet grows rapidly. For a popular product, the number of reviews can be in hundreds. As a result, the problem of ??opinion mining?? has seen increasing attention over several years. In this paper, we proposed a statistical method to extract product features...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.