The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the rapid development of computer networks, a variety of network applications continue to emerge, resulting in a surge of network data traffic. Therefore, the network congestion becomes more serious. Congestion control is facing many problems, including latency, fairness, stability and so on, especially the instability of the network caused by transmission delay. We introduce the traditional...
A system for collection, distribution, and long distant, asynchronous interpretation of cardiac auscultation has been developed and field-tested in rural China. We initiated a proof-of-concept test as a critical component of design of a system to allow rural physicians with little experience in evaluation of congenital heart disease (CHD) to obtain assistance in diagnosis and management of children...
Internet inquiry is playing an increasingly important role as the complement of the traditional medical service system, especially the similar cases recommendation. It can not only save the patients' waiting time, but also make use of the historical resources, for many cases with the same purpose have been solved perfectly. However, because of the diversity and non-standard of the patients' descriptions,...
More cooperation or coordination is necessary for future UDN (Ultra-Dense Network) scenario of 5G network, of which ICIC (Inter-Cell Interference Coordination) is a promising and typical scheme. Cooperating cellular network may be thought as a special kind of distributed computing system, whose basic theory and toolsets could be adopted. CAP theory for distributed computing state that any networked...
Similar cases recommendation is more and more popular in the internet inquiry. There have been lots of cases which have been solved perfectly, and recommending them to similar inquiries can not only save the patients' waiting time, but also giving more good references. However, the inquiry platform cannot understand the diversity of description, i.e. the same meaning with different description. This...
URL redirection is necessary in web applications. Well-designed redirection makes better user experience. However, if used improperly, it could give rise to attacks such as phishing. These improperly used redirections are called Unvalidated Redirects and Forwards (URF). This paper prescribes a mechanism to systemically discover URF vulnerabilities in web applications. The prototype implementation,...
We propose two robust methods for anomaly detection in dynamic networks in which the properties of normal traffic evolve dynamically. We formulate the robust anomaly detection problem as a binary composite hypothesis testing problem and propose two methods: a model-free and a model-based one, leveraging techniques from the theory of large deviations. Both methods require a family of Probability Laws...
This paper studies an online retailing supply chain system in which infomediary provides demand referral service to Internet retailer. We assume that the online demand is affected by retailer price, referral service effort and word-of-mouth. The demand function is developed based on Bass's model. A service cooperation model is established and then the optimal decisions of retailer's price and infomediary's...
Crisis information broadcast is researched in this paper. Compared with traditional media, characters of we-media are summarized. Information broadcast mode is instructed. Three critical points are highlighted. As a result, countermeasures are issued as crisis monitor, crisis control and crisis recovery.
Increasing size of online social networks (OSNs) has given rise to sampling method studies that provide a relatively small but representative sample of large-scale OSNs so that the measurement and analysis burden can be affordable. So far, a number of sampling methods already exist that crawl social graphs. Most of them are suitable for one-mode graph where there is only one type of nodes. Literatures...
Flow size statistics is a fundamental task of passive measurement. In order to bound the estimation error of passive measurement for both small and large flows, previous probabilistic counter updating algorithms used linear or nonlinear sampling function to automatically adjust the sampling rate. However, each of these methods employed a pre-set and fixed sampling function during the measurement period...
Valuation of target companies in merges and acquisitions is a complicated issue which contains potential pricing risk. In order to precisely measure the pricing risk of M&A valuation, hence to minimize the chance of M&A failure, a rough model of pricing risk measurement is set up in this paper. By dividing the estimated acquisition price into several interval, using corresponding shareholding...
Virtual organizations are increasingly pervasive in knowledge work, despite significant challenges with respect to support for common ground, member awareness, sense of community, work coupling, incentives, and other issues. Understanding how specific sociotechnical affordances of VOs can enhance effectiveness in new and distinctive ways will improve our understanding of virtual organizations, and...
With the newly developed information visualization methods, this paper analyzed the literature themed at Webometrics cited by ISI Web of Knowledge. Using the software CitespaceII, this study developed a knowledge map of the representative personage and works on Webometrics. Finally, based on the detection of the subject headings with word frequency of significant fluctuation, the research frontier...
With the widespread of Internet application, more and more enterprises build their Web sites and provide business information through Web pages. Web page classification could be used to assign the enterprise Web pages to one or more predefined business categories. On the purpose of Internet-based enterprises administration in E-government system, algorithms and application related to web page classification...
Mashups have gained popularity among the end users for its convenient building and sharing fashions. Inevitably, a mashup is vulnerable to break down caused by its integrated components' change, such as upgrade and inaccessibility. This paper focuses on the change impact analysis for mashups. We distill the data dependencies of mashups from pattern-oriented perspective, and abstract the mashup creation...
Though it has cost great research efforts for decades, object recognition is still a challenging problem. Traditional methods based on machine learning or computer vision are still in the stage of tackling hundreds of object categories. In recent years, non-parametric approaches have demonstrated great success, which understand the content of an image by propagating labels of its similar images in...
The paper is based on the knowledge and relevant literature that the author learned during the internship in the TD Technology Forum (Beijing). With the aid of expertise, firstly, the author analyzes China mobile communication market taking 2G and 3G as background. Secondly, introduces the development of E-Commerce in various stages of circumstances. Finally, comes up with solutions that can help...
Over the last few years, the area of electronic government (eGovernment) has received increased prominence and attention; people are increasingly interacting with e-Government systems. It is therefore important to measure the development of eGovernment. This study via principal component analysis (PCA) from the local perspective presents, validates and updates an evaluation model with 5 dimensions,...
IP traceback mechanisms are a critical part of the defense against IP spoofing and DoS attacks. Currently proposed traceback mechanisms are inadequate to address the traceback problem for the following reasons: they lack incentives for ISPs to deploy IP traceback in their networks; they do not scale to large scale distributed DoS attacks. In this paper, a novel IP traceback approach based on packet...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.