The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The virtual networking embedding (VNE) problem is a core issue in network virtualization. This is also a challenging problem as it contains different kinds of constraints, and its complexity becomes even higher in an online VNE problem with thousands of virtual network (VN) requests. In this paper, we proposed an ant colony system based VNE algorithm, called ACS-VNE, for the online VNE problem. The...
Applying internet data to investor attention research is a trend now. This paper propose a new method to measure positive and negative investor attention paid to a certain industry by using of search data from search engine. We select keywords from a corpus of energy industry by text-analysis technique including TextRank algorithm instead of taking company names or stock tickers as keywords in previous...
Network virtualization is considered to be not only an enabler to overcome the inflexibility of the current Internet infrastructure but also an enabler to achieve an energy-efficient Future Internet. Virtual network embedding (VNE) is a critical issue in network virtualization technology. This paper explores a joint power-aware node and link resource allocation approach to handle the VNE problem with...
This paper proposes an integrated approach to the VNE problem, in which different virtual nodes of a virtual network could be assigned to a physical node as long as this node's available resources can satisfy the total resource requirements of these virtual nodes. We carry out extensive simulations to investigate the benefits of sharing physical nodes. The simulation results demonstrate that (1) Compared...
In DHT (Distributed Hashing Table) based P2P system, load of some nodes is as much as O(logn) times the average. In this paper, an algorithm for ID allocation with complete knowledge is proposed. Based on hierarchical structured topology, even node distribution is achieved in key space according to top-down ID allocation. The algorithm can deal with issues caused by node departure. It is proved that...
This paper presents the design and implementation of a web-based application for video content sharing in the driver assistance research domain. The domain has special needs for video such as the ability to zoom and the ability to play related clips concurrently. In addition, since large amounts of data (video contents) have to be transmitted over the network, network usage and efficiency are critical...
The rapid development of Internet traffic and the advance in link/interface technologies in the last few years have given rise to a strong research interest in Concurrent MultiPath (CMP) technology. According to the shortcoming of random CMP transmission algorithm, a novel Position-based Concurrent Transmission (PCT) algorithm is proposed. Compared with random CMP algorithm, NS2 simulations prove...
As the wide adoption of in-cloud services (e.g., software-as-a-service), some major identity related issues are brought up. For enterprises, it usually introduces additional cost and risk to manage identities in services. For service providers, typical pairwise identity federation solutions are not scalable to support single sign-on, service composition, etc. among services for large environment like...
Spam is a key problem in electronic communication. The increasing volume of spam has become a serious threat not only to the Internet, but also to society. Content-based filtering is one mainstream method of combating this threat in its various forms, but the previous Content-based filtering methods are hard to find a balance between efficiency and effectiveness. In this paper we intend to seek a...
In this work, we study the traffic adjustment over multipath network in the presence of both inelastic and elastic traffic flows. The characteristics of these two types of traffic differ significantly. Hence, earlier approaches that focus on homogeneous scenarios with a single traffic type are not directly applicable. We formulate a new traffic adjustment problem based on time series prediction and...
In this short paper, we present a preliminary design of a behavior profiling system in wireless home network (WHN) for network security monitoring. Figure 1 illustrates a schematic architecture of the behavior profiling system that is deployed in a typical wireless home network. The goals of the proposed behavior profiling system are to i) actively learn the traffic patterns of wireless home networks,...
In order to improve the survivability of IP networks, this paper presents a fast self-healing mechanism for distance vector routing protocol called FS-DVP.(Fast Self-healing distance vector protocol). The mechanism can dealing with network failures effectively through the precomputed multiple feasible next hops per destination. This local rerouting scheme guarantee the forwarding continuity in the...
Tag services have recently become one of the most popular Internet services on the World Wide Web. Due to the fact that a Web page can be associate with multiple tags, previous research on tag recommendation mainly focuses on improving its accuracy or efficiency through multi-label learning algorithms. However, as a Web page can also be split into multiple sections and be represented as a bag of instances,...
Along with the explosive growth of the Web, Web image search has become a more and more popular application which helps users digest the large amount of online visual information. Previous research mainly exploits visual information between images while rarely uses the text information surrounding the images on the Web pages. In this paper, we consider the relevance feedback as a machine learning...
Some of the traditional application on the Internet is experiencing the phase of scale expansion and sharp increase in traffic. In addition to expanding the capability of the server and building server clusters, making full use of P2P to solve the problems of bottlenecks, single point of failure and other issues is also a relatively new method. Based on the careful study of multimedia materials retrieval...
Abnormal traffic detection is important to network management. This paper aims at the characteristic of multi-hop network, and defines abnormity that traffic-burst after failure. Then the paper presents a fast auto-adaptive traffic-aware abnormal detection method. This method compresses data via efficient histogram, and detects double-size bursts via congregate function. We analyze the status of links...
Aiming at the RIP (routing information protocol) canpsilat dealing with network failures effectively, causing significant forwarding discontinuity after a failure. The drawback with this protocol is that it need to trade off routing stability and forwarding continuity. To improve failure resiliency without jeopardizing routing stability, we propose a fast local rerouting based on RIP called FR-RIP...
With the quick development and the combination of modern education technology, multimedia technology and network technology, multimedia network curriculum based on Internet will become the major resource of future education. Network curriculum refers to the content of courses and teaching activities of a certain discipline displayed by the network. It not only helps to enhance students' initiatives...
The data security is one of the biggest problems which inhibit the further application of the ASP platform. This paper put forward an ASP-based security system strategy which includes infrastructure security, safeguard security boundary and computing environment protection. An ASP-oriented intrusion detection model was also proposed, and the intrusion detection subsystem function was analyzed in detail...
To integrate manufacturing resources is an important way out for small and medium-sized enterprises (SMEs) to compete with big ones. An e-hub-based manufacturing resources integration method was introduced, which can decrease the running costs and improve competence and resources utilizing efficiency of the enterprises. E-hub-based application integration frame and mode was illustrated in detail....
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.