The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
For the purposes of efficient network resource management and QoS (Quality of Service) support of different video services, this paper proposes a fine grained classification scheme for Internet video traffics based on hierarchical clustering. We study a number of QoS and network resource requirements related statistical features of some typical video applications and validate their effectiveness in...
The main difference between cloud computing and traditional enterprise internal IT services is that the owner and the user of cloud IT infrastructures are separated in cloud. This change requires a security duty separation in cloud computing. Cloud service providers (CSP) should secure the services they offer and cannot exceed the customers' authorities. Currently, no traditional information security...
The extensive uses of Internet promote the e-marketing and the rapid development of the e-marketing provides a new but effective channel for the traditional brand enterprises. This paper analyzes the development of the e-shopping market scale, the advantages of e-marketing, the advantages and disadvantages of the traditional brand enterprises develop the e-marketing. In order to help the enterprises...
The prevalence of the Internet has promoted the development of the electronic commerce. Digital products shopping system appeared in peoples' eyes. The security problems become very important. The core is how to guarantee the secure and flexible access of the digital products. As the most promising access control model, Usage control has been generally accepted. But the trust problem is the shortcoming...
There has been a constant barrage of worms over the Internet during the recent past. To develop appropriate tools for thwarting quick spread of worms, researchers are trying to understand the behavior of the worm propagation with the aid of epidemiological models. In this paper a worm propagation model with quarantine strategy is presented and discussed based on the classical epidemic Kermack-Mckendrick...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.