The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper tries to do the research of analyzing the relation of the customer trust, the customer satisfaction and purchase intention under the electronic commerce shopping environment. Drawing on the theory of customer trust, customer satisfaction and purchase intention, based on a survey of 102 respondents from the University in China, the United Kingdom, and the United States, the results showed...
The security risks associated with each cloud delivery model vary and are dependent on a wide range of factors including the sensitivity of information assets, cloud architectures and security controls involved in a particular cloud environment. Over time, organizations tend to relax their security posture. To combat a relaxation of security, the cloud provider should perform regular security assessments...
The accuracy of network coordinate (NC) which is comprehensively applied is suffering seriously from triangle inequality violations (TIVs). A novel approach - embeddable overlay networks (EON) - has been proposed to address this problem. It runs NC on an overlay environment where round trip times (RTTs) are measured with respect to overlay forwarding that has eliminated all the TIVs. In this paper,...
Network coordinate (NC) system is an efficient and scalable system for Internet distance prediction. In this paper, we propose 3 two-layer NC systems HNPS, HBBS and HIDES derived from NPS, BBS and IDES, respectively. We use hierarchical idea in both Euclidean coordinate systems (NPS and BBS) and matrix factorization model (IDES). And to the best of our knowledge, we first introduce the thought of...
With the development of the computer network and the message expansion over the Internet, information security is becoming increasingly important. The technology of embedding audio watermark into an audio signal was researched in the DWT domain and an algorithm of additive audio watermarking based on SNR adaptive to determine a scaling parameter is proposed in this paper. The intensity of embed watermark...
Multicast based videoconference (MVC) is one of representative applications in next generation Internet. Native IP multicast has advantages in group communications for large scale multipoint videoconferencing. This paper introduces the service and applications of native multicast based videoconference on China Education and Research Network (CERNET). The native multicast service, conferencing service...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.