The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
“Tell Me What” is smart phone based image recognition system, and it is also an automatic pipeline for generating image recognition systems to recognize an arbitrary set of entities. For any given set of entities, “Tell Me What” backend system automatically fetches related image data from the Internet for each entity, and then run a comprehensive data cleaning process to purify the data. A multi-class...
Recently, emerging research efforts have been focused on question and answer (Q\& A) systems based on social networks. The social-based Q\& A systems can answer non-factual questions, which cannot be easily resolved by web search engines. These systems either rely on a centralized server for identifying friends based on social information or broadcast a user's questions to all of its...
Wireless Sensor Network (WSN) is one of the key technologies of 21st century, while it is a very active and challenging research area. It seems that in the next coming year, thanks to 6LoWPAN, these wireless micro-sensors will be embedded in everywhere, because 6LoWPAN enables P2P connection between wireless nodes over IPv6. Nowadays different implementations of 6LoWPAN stacks are available so it...
DDoS attack is a major Internet security problem-DoS is that lots of clients simultaneously send service requests to certain server on the internet such that this server is too busy to provide normal services for others. Attackers using legitimate packets and often changing package information, so that traditional detection methods based on feature descriptions is difficult to detect it. This paper...
Internet-based video streaming applications is becoming more and more popular and attract millions of online viewers every day. The incredible growth of viewers, dynamics of participants, and high video quality-of-service (QoS) requirement pose scalability, availability and low-latency challenges to peer-to-peer (P2P) live video streaming systems. Tree-based systems have low-delay but are vulnerable...
China is undergoing rapid economic and political change, accompanied by developments in e-government, with radical implications for citizens. Public administrations in China must make a greater effort to implement e-government systems that allow fluid communication with the general public. This article gives some suggestions as to how to improve e-government performance from the point of view of creativity.
E-government has now become a reality for the vast majority of developed countries and is also beginning to take root among the developing nations. Public administrations must make a greater effort to implement e-government systems that allow fluid communication with the general public, thereby achieving a greater degree of participation, which is the key to the success for e-government. This article...
The paper first outlines changing concept and expectations towards the university in the process of massification of higher education. The emergence of knowledge economy and the increased internationalization in the higher education sector is analysed. Under such circumstances, the university is expected to move away from being an ivory tower, and become more economically and socially relevant and...
There is an ongoing explosion of interactive Internet applications. By nature, these applications require responsive client-server data exchange and lossless, in-order delivery. In previous work, we have shown that a hybrid FEC-ARQ protocol which combines sending original data packets with forward error correction (FEC) packets is effective in reducing the latency caused by retransmissions of lost...
As an effective tool for the analysis of internet glance behavior, Markov chain prediction method has an optimistic future in the applications such as internet intrusion detection, information security evaluation, etc.. However, it is usually difficult to get satisfactory results due to the small quantity of the state partition while dealing with actual problems. Applying the concept of fuzzy transition...
Global enterprises are increasingly adopting unified communication solutions over traditional telephone systems. Such solutions provide integrated audio/video conferencing and messaging services, and enable flexible working environments by allowing mobile and dispersed users to communicate and collaborate easily and efficiently. The ultimate goal of unified communications is to ensure a smooth and...
China is undergoing rapid economic and political change, accompanied by developments in e-government, with radical implications for citizens. This paper analyses what is e-government and the significance of it first. Progression of Chinese e-government is introduced in the second part. Then the paper lays out the factors that determine the performance of e-government. Suggestions as to how to improve...
Voice over Internet (VoIP) has been experiencing enormous growth in recent years. While posed to replace traditional PSTN for both enterprise and residential customers, VoIP has yet to achieve the same level of quality and reliability as PSTN. One key challenge is that a growing segment of customers is increasingly relying on WiFi connections. VoIP over WiFi (VoWiFi) experiences significant degradation...
With the rapid development of computer science and communication technologies, doctors will employ electronic communication to facilitate patient care more and more. We have developed a multimedia telemedicine system which is much more flexible, robust and easier to use. In this paper we compare our system with the traditional telemedicine systems, present the architecture of our system and analyze...
As Cloud Computing becomes prevalent, more and more sensitive information are being centralized into the cloud. For the protection of data privacy, sensitive data usually have to be encrypted before outsourcing, which makes effective data utilization a very challenging task. Although traditional searchable encryption schemes allow a user to securely search over encrypted data through keywords and...
Cloud computing is the long dreamed vision of computing as a utility, where data owners can remotely store their data in the cloud to enjoy on-demand high-quality applications and services from a shared pool of configurable computing resources. While data outsourcing relieves the owners of the burden of local data storage and maintenance, it also eliminates their physical control of storage dependability...
Peer-to-peer (P2P) systems provide a scalable way to stream content to multiple receivers over the Internet and has become a major type of application traffic. The maximum rate achievable by all receivers is the capacity of a P2P streaming session. We provide a taxonomy of the problem formulations. In each formulation, computing P2P streaming capacity requires the computation of an optimal set of...
We address the following question in this study: Can a network application detect not only the occurrence, but also the location of congestion? Answering this question will not only help the diagnostic of network failure and monitor server's QoS, but also help developers to engineer transport protocols with more desirable congestion avoidance behavior. The paper answers this question through new analytic...
Interactive Internet applications that rely on sequential streams for lossless data exchange often use retransmission protocols (e.g. TCP) for reliability and the guarantee of sequential data ordering. More so than for bulk file transfer or media delivery, lossless sequential streaming poses an even greater challenge for the common problem cases of retransmission protocols, such as lossy links or...
We consider multi-rate peer-to-peer multi-party conferencing applications, where different receivers in the same group can receive videos at different rates using, for example, scalable layered coding. The quality of video received by each receiver can be modeled as a concave utility function of the video rate. We study and address the unique challenges introduced by multi-rate setting as compared...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.