The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We propose a new virtualized Peer-to-Peer (P2P) core-network architecture where each user gets its own private copy of the core network. This enables higher security and novel services, that cannot be deployed in today's architecture. We describe the new architecture in detail, presenting some of its many advantages and novel services. Lastly, we discuss some architectural options and their tradeoff...
Content-Centric Networking (CCN) is a novel networking paradigm that treats the named contents, not the hosts, as the first-class citizens of the network. In the forwarding plane, CCN employs a stateful forwarding scheme, which maintains per-packet state information in Pending Interest Table (PIT). By employing stateful forwarding, CCN enables native support for content requests aggregation and multicast...
After studying the current principle andarchitecture of antivirus gateway for Web security detection, we found that the conventional virus scan is based on filescanning, which takes significant processing time. Whenscanning big size files, it may often cause disconnection of filetransferring with a time-out error message prompted out. Tosolve the problem of slow file virus scan, we propose a newmethod...
To construct various Virtual Environments (VEs) is essential for geographically dispersed users to real-time interact and roam in various virtual worlds(e.g., virtual city, massively multiuser online games). However, this operation has been hindered by the contradiction between explosively growing 3D contents and relatively slower increasing resources (e.g., bandwidth, CPU resource). This work thus...
As the popularity of WebVR applications rises in recent years, a great disparity exists between the huge 3D content on servers and the limited cache capacity on clients. In order to alleviate server loading, peer-to-peer (P2P)-based 3D content distribution has been proposed recently. However, given the limited cache sizes at clients, how to maintain and replace the cache content effectively becomes...
A reputation service is an essential part of a reputation system, which collects, distributes, and aggregates feedback about service providers' past behaviour. The feedback, as a score, is given interactively or by a user or is derived from a monitoring process automatically. The reputation service accommodates for each service provider an accumulated score as its reputation, which is produced by...
With the rapid growth of both information and users, how to effectively improve the quality of network service becomes an urgent problem to be addressed. Load balancing is to overcome this problem in an effective way. At present it is mainly achieved by the load-balancing hardware and software, but there are also many problems, such as unscientific and inaccurate algorithm, imperfect and impractical...
Now all kinds of 3D virtual worlds have been popular on Internet, but due to gigantic data of virtual scenes and limit network bandwidth, traditional Client/Server based downloading scheme has been bottleneck for a user to construct local virtual worlds swiftly. This paper proposes a parallel delivery scheme for large scale virtual scenes in a two-layer hybrid based P2P(Peer-to-Peer) overlay, in which...
Web services over the Internet are widely used nowadays. The problem of secure access to Web-based systems is of great importance naturally. Compared with the existing models, the action-based access control (ABAC) model is the most suitable to control the access on Web services. In this paper, the ABAC model is introduced. Then, the security architecture of ABAC for Web services is proposed. In the...
FEA is a key product development tool, and remote FEA (finite element analysis) services via internet are an effective and economical way to popularizing FEA technology for different-sized manufacturing enterprises. For FEA grid portal, modeling technologies of FEA grid services and grid information management structure are presented in this paper. For modeling technologies of FEA grid service, workflow...
The paper raises a load schedule strategy of web server cluster, which comprehensively applies the multistage fuzzy system and the technique of artificial neural network to carry on fuzzy prediction for the user request of response delay, as considering prefix caching and patch prefetching technology of the Web node server, raises the load schedule algorithm based on the threshold value of response...
The World Wide Web has become the default knowledge resource for many areas of endeavor, organizations need to understand their customers' behavior, preferences, and future need, but when users browsing the Web site, many factors affect their interesting, and different factor has different degree of influence, the more factors we consider, the more precisely can mirror the user's interest. This paper...
Bot nicknames within one IRC-based botnet must have uniform structure, because they are generated by the same bot fixedly. In this paper, the similarity of nicknames in the same channel is defined by the term dasiachannel distancepsila. And a novel algorithm based on channel distance is proposed to detect IRC-based botnets. The most significant contribution of this algorithm is that it can detect...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.