The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As the increasing number of intelligent mobile phones that are available for people which lead to tones of network flow data are produced. Hence, how to dig the user's behavior pattern by using the data collected form mobile phones is a significant problem. While some achievements have been made in this area, it is still too complicated to be put into practice due to various conditions needed by traditional...
User intention understanding from text is an important task in NLP. In this paper, we study the problem of phone-changing intention prediction. And we propose a novel feature extraction method, which selects the most representative intention feature, to represent user's intention from text scratch. Then we adopt a supervised learning approach, that is to train SVM classifier, for intention prediction...
Video service in mobile network generates massive Internet traffic and consumes a large share of bandwidth. Nowadays, more and more video portals have upgraded their service to a comprehensive one-stop solution, providing UGC, VoD and Live streaming at the same time. Understanding the characteristics of such service is crucial for the network traffic engineering and the sustainable development of...
Packet size distribution (PSD), known as the probability distribution of packet size in a flow, is an important attribute for traffic analysis. However, to get a flow's precise PSD is computationally intensive due to the massive flows in networks and massive packets in some flows. In this paper, we propose an alternative attribute, sampled packet size distribution (SPSD), which can give a proper estimation...
The following is an introduction of a general framework for public opinion simulation, based on the Multilayer Synchronization Network. The Multilayer Synchronization Network is a multilayer network where the corresponding nodes in each layer have a synchronization relationship. It is especially useful to represent a single person's various roles in different social systems, for example, the online...
Classification of mobile web traffic on dimensions of domain names is critically important for Internet Service Provider (ISP) to understand the situation of mobile Internet, so as to balance the network resource allocation. In this paper, we propose a novel method as the first step on this topic, to identify unknown IP addresses, by using statistical information derived from massive data collected...
Darknets can be used to monitor unexpected network traffic destined for allocated but unused IP address blocks, thus providing an effective traffic measurement technique for viewing certain remote network security events. Past works in this field discussed the possible causes (events) of darknet traffic and applied their classification schemes on short-range traces. Our interest lies, however, in...
With the rapid rising of the number of cellular phone users, accessing the Internet via mobile device is becoming a new norm in terms of network activities and people's daily life, resulting in an ever-increasing usage of the mobile Internet. This paper analyze Service Provider (SP) traffic characteristics Based on the massive data collected from a commercial Internet Service Provider (ISP) covering...
This paper introduces a new opinion model using space-time elements. It proposes the concept of an Opinion Importance Factor which is composed of a Time Importance Factor and a Source Importance Factor. Based on that, it analyzes the characteristics of the Time Importance Factor in different applications and divides the Source Importance Factor into two parts, the influence of source and the relatedness...
Existing traffic characterization systems today use passive monitoring techniques. Compared with active measurements, passive measurements have their own disadvantages: they are not easy to implement and need the cooperation of intermediate nodes along the path. Hence they require hardware change, which can significantly increase the cost of measurements. This makes active measurements an attractive...
Sequential mining is the process of applying data mining techniques to a sequential database for the purposes of discovering the correlation relationships that exist among an ordered list of events. An important application of sequential mining techniques is Web usage mining, for mining Web log accesses, which the sequences of Web page accesses made by different Web users over a period of time, through...
in this paper, two new parameters, user vigilance and removing time, are incorporated into the classical email virus propagation model SEIR. New model extended the classical virus propagation model SEIR. The experimental results showed that these parameters greatly influence the virus propagation. Meanwhile, the simulations demonstrate that improved model can be used for calculating the costs of virus...
Remote visualization service is an indispensable part for super computing center and network computing services. We present a web-based remote visualization system architecture - ScVisGrid. It provides a web-based interface for end users to access visualization resources in SCCAS by launching visualization tasks in interactive mode. With component-based visualization framework, the existing standalone...
Intelligence of humankind mostly includes five parts: the ability of observe, the ability of memory, the ability of practice, the ability of thought, the ability of imagine ...etc, that are the total of the mentality. At this paper, the intelligence behavior processing the data book index is discussed. The process searching data and information in Internet is similar as data book index. And so there...
The current behavior models of Web user are difficult to describe the semantic information of behavior. Most of them are only used to improve the performance of Web sites. To resolve the issue, a hierarchy metamodel of user behavior and a method for user behavior modeling are proposed in this paper. Based on the metadata of pages, the method can build a behavior model of Web user from three layers,...
Vehicular networks will become an important component for information accesses in one's daily life. A vehicular network provides a vehicular user not only chances to communicate with peer vehicles but also to use Internet through roadside access points (APs). During a trip a vehicular user could roam across multiple APs either belong to their home wireless domain or to domains owned by different authorities...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.