The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Twitter sentiment analysis offers organizations ability to monitor public feeling towards the products and events related to them in real time. The first step of the sentiment analysis is the text pre-processing of Twitter data. Most existing researches about Twitter sentiment analysis are focused on the extraction of new sentiment features. However, to select the pre-processing method is ignored...
Micro-blog services have become popular tools in the social networks. Online users discuss various topics in the micro-blog and some influential users can affect the opinions, attitudes, behaviors, or emotions of others. This paper proposes a user influence rank (UIRank) algorithm to identify the influential users through interaction information flow and interaction relationships among users in the...
Increased adoption of smartphones leads to the explosive growth of mobile network traffic. Understanding the traffic characteristics of mobile network is important for Internet service providers (ISPs) to optimize network resources. In this paper, we conduct a detailed measurement study on the hyper text transfer protocol (HTTP) traffic characteristics of cellular network among different operating...
Various types of micro-sensors in smart communication devices can measure a significant amount of potentially useful information. Mobile Crowd Sensing (MCS) between users with smart mobile devices is a new trend of development in Internet of Things. With the powerful sensing capability of smart device and user mobility, various services could be provided by building a trusted chain between service...
Analyze the disadvantages of KVM original network connection modes, and design the third network connection mode: NAT + Bridge mode. For the malicious virtual machines in user mode are difficult to detect and locate in normal way, the article proposes a strategy for detecting TCP DDOS attack based on an improved CUSUM algorithm in the KVM. This strategy detects attack of virtual machines in user mode...
The coverage control technology is the one of the basic technologies of wireless sensor network, and is mainly concerned about how to prolong the network lifetime on the basis of meeting user sense demands and network connection. Among this technology, localized area coverage algorithm in the study of area coverage technology is gradually attracting wide attention, for its less traffic and lower single-node...
The coverage control technology is the one of the fundamental technologies of wireless sensor networks, and is mainly concerned how to prolong the network lifetime on the basis of meeting user sense demands. Localized area coverage algorithm in the study of area coverage technology is gradually becoming attention, for its less traffic and lower single-node computation. Nevertheless, the existing localized...
Many extant natural language watermarking techniques demand deep structure analysis, and so suffer in reliability. We propose a scheme for natural language watermarking, which embedding watermark bits into the pragmatics feature of text by rewriting sentences. In contrast, we eschew syntactic and semantic analysis. We make use of transformation templates and our templates based on pragmatics rule...
More and more entriprises, organsizaions and goverments have used and distrubed information in word documents, pdf etc.. It makes easily to unauthorized copying and dissemination. According to DRM's requirements, we evaluated several text watermarking methods for instructing practical applications, and proposed a new approach in text watermarking where inter-character spaces are slightly modified...
More and more enterprises, organisations and governments have used and disturbed information in word documents, pdf etc. It makes easily to unauthorized copying and dissemination. According to DRM??s requirements that are high performance and feasible, we evaluated two common text watermarking methods for instructing practical applications, and proposed a new approach in text watermarking where inter-character...
A scalable trusted P2P system requires fast convergence of trust data when assessing the risk of a peer in performing a task. In this paper, a new reputation aggregation mechanism is introduced, which adopts a novel feedback trust aggregating mechanism based on direct trust tree (DTT). First, for every peer in the P2P system, a DTT is constructed and maintained based on peer's last direct interaction...
For supporting Grid application to be executed availably in Grid resources, the scheduler should allocate the most suited resources to the application. To address such problem, we need evaluate the grid resources in trust, reputation and performance etc. In this paper, a trust and reputation model for protecting the benefit of grid user is introduced. The trust and reputation is dynamically judged...
For supporting Grid application to be executed availably in Grid resources, the scheduler should allocate the most suited resources to the application. To address such problem, we need evaluate the grid resources in trust, reputation and performance etc. In this paper, a trust and reputation model for protecting the benefit of grid user is introduced. The trust and reputation is dynamically judged...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.