Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
The development of MOOC brings opportunities and challenges to higher education. Based on the analysis of MOOC and traditional classroom teaching, a teaching mode based on MOOC for computer specialty is presented to improve the teacher-centered and rigid teaching mode in traditional education. The proposed teaching mode promotes the teaching reform in favor of the advantages of MOOC and classroom...
As for the traditional Internet, network management usually did not evolve together with the newly introduced networking technology, and becomes a post-technology these days. In order to avoid patching Software-Defined Networking (SDN) later, an additional management plane may possibly be of great significance. Currently, both SDN management and non-SDN network management still coexist, and Simple...
The Intrusion Detection Systems (IDSs) play an important role in monitoring networks, but they lack abilities in automated intrusion response; the Intrusion Prevention Systems (IPSs) can guard networks in entrance, but they have no abilities in response inner-intranet attacks; many proposals focus on solutions in automated intrusion response, but they still have various problems existed, the main...
The traditional intrusion detection systems (IDSs) play an important role in monitoring our network, but they lack abilities in automated intrusion response. Nowadays with the rapidly increased complexity and speed of the attacks spread, there has an urgent need in automated intrusion response. This field has already aroused wide concern. The main obstacle now lies in that accurate measurement of...
The efficient configuration management of heterogeneous network devices from different vendors is a great challenge. The network configuration protocol (NETCONF) is presented as a new solution. It aims to overcome the shortcomings of simple network management protocol (SNMP) and command line interface (CLI) which are predominantly used for configuration tasks at present. This paper gives an architecture...
Web video databases tend to contain tremendous near-duplicates with the explosive growth of online videos. How to detect and eliminate these near-duplicates has become an essential problem for Web video storage and indexing. In this paper, we propose a hierarchical approach to solve this problem efficiently and effectively. For an incoming video, firstly we compare global features to exclude videos...
As the Internet continues to grow, the tasks of network management are becoming more and more difficult. Over the past few years, much effort has been given to implement the automation of network management. Ontology seems to be a promising technology for that purpose. However, only ontology alone may not easily achieve the goal of automatic network management. Thus under this background, policies...
As the Internet continues to grow, the tasks of configuration management for IP network devices are becoming more and more difficult. Over the past few years, much effort has been given to improve the deficiency of SNMP in the configuration management scope, but only few have succeeded to be standardized, the famous one of which is Netconf, developed by the IETF. Even the Netconf is still far from...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.