The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to enable the development of smart services, many IoT platforms were proposed to securely and reliably connect IoT devices to the Internet and to each other. Examples are IoTivity from Open Connectivity Foundation (OCF), AllJoyn from AllSeen Alliance, Weave from Google and HomeKit from Apple. However, such fragmentation of IoT platforms has made the development of IoT applications very difficult...
In the wake of the rapid development of internet, the information security issue brought about by the internet has been increasingly prominent, e.g. data leakage and hacker attack. Despite that many protective measures have been proposed to solve those issues, such as building firewall, applying for secure routing technology and installing antivirus programs, those measures are unable to ensure the...
With the development of internet and information technology network security has become the hot spots of computer science. Effective monitoring operational status of every equipment is very important in the Local Area Network (LAN). This paper studies key techniques for monitoring LAN, such as process automatic loading and hidden, network covert communications, network data secure transmission, to...
In analyzing goal-oriented multiparty discussions, one challenge is to determine who is responding to whom when they are supporting or opposing a remark put forward by another participant. This paper looks at algorithms for detecting the target discussant, comparing findings of important features for three genres of text and spoken discussions. Comparing to the common baseline of “previous speaker,”...
Internet technologies are making rapid progress, but achieving high performance of network application over the WAN remains a challenge. When branch office's workers access enterprise applications locating in data center, the performances drop dramatically. To solve this problem, many hardware accelerators are produced. In this paper, we introduce a Software-only IP Network Application Accelerator...
Online Social Networks (OSNs) are more and more popular recently, people may through them interact with each other for the purpose of social intercourse. The client/server OSN architecture brings about the bottleneck of bandwidth and computation. It leads to the scalability problem and the communication latency increases as users grows. This paper proposes a bandwidth- and latency-aware peer-to-peer...
Insect pests and diseases are major constraints to crop yield. Solutions to pests and diseases management are inevitably not independent of location. In the current study, a web-base geographic information system for crop pests and diseases management system was developed using ArcIMS, ASP.NET, networking and database management technologies. The application system provides client users with pests...
With the rapid growth of web data, people sometime need semantic similar information in order to obtain a clear outline of their interests, so recommendation is needed to provide relevant information to users' queries. In this paper, we propose a method to recommend semantic similar movies and stars to users' queries, styles and stories. The system measures the similarities between movies according...
It is expected that Peer-to-Peer (P2P) services will co-exist with the client-server based services such as IMS. Mobile users may subscribe to the traditional wireless cellular services while participating in P2P overlay networks. In this paper, a method is proposed to reduce the signaling overhead in a mobile P2P system. With the help of the underlying infrastructure, a mobile device in the P2P overlay...
TCP/IP, the most commonly used network protocol, consumes a significant portion of time in Internet servers. While a wide spectrum of studies has been done to reduce its processing overhead such as TOE and Direct Cache Access, most of them did studies solely from the per-packet perspective and concentrated on the packet memory access overhead. They ignored per-session data TCP Control Block (TCB),...
With the rapid development of broadband networks and multimedia technologies, P2P video-on-demand service is increasingly gaining popularity over the past few years. However, little work has been done on an important design issue for P2P video-on-demand systems, i.e., determining the maximal service capacity of a system. In this paper, we first propose an optimal rate allocation scheme to maximize...
Large-scale corpus contains abundant language phenomenon. It can reflect the universal law of language use and has drawn the interest of many countries in the field of information technology and linguistics circle. It has become a hot topic in the field of natural language processing. But based on the current scarcity of Chinese corpus, especially in the field of text categorization, the Chinese categorization...
Spyware infection that exploits the vulnerabilities of client-side Web application, especially browser, to install malicious programs has gain significant popularity in recent years. Unlike traditional infection vectors such as software bundling in shareware/freeware and placing Trojan in pirated version of commercial software that generally requires user consent to be successfully installed, Web-based...
Spyware, a type of potentially unwanted programs (PUPs), has become a significant threat to most Internet users as it introduces serious privacy disclosure and potential security breach to the systems. Current anti-spyware tools use signatures to detect spyware programs. Over time, spyware programs have grown more resilient to this technique; they utilize critical areas of the system to survive reboots...
This paper solved the problem of how to connect DALI (digital addressable lighting interface) with Internet. A design of embedded DALI dimming controller which based on muC -Linux embedded operation system is presented, the hardware construction using ARM7 MCU and the software conversion between thin TCP/IP and DALI protocol are mainly expounded. The DALI receiving/transmitting circuits and the information...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.