The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A huge amount of mobile traffic runs on Internet every day. The complex mobile traffic data may degrade the network performance if they are not well managed. As the important foundation of network management, mobile network traffic classification aim to map IP packets into a predefined traffic class set. Most work in this area until now has focused on classification schemes. In contrast, little attention...
Internet Background Radiation (IBR) traffic is a kind of abnormal traffic, which is ubiquitous on the Internet. Detecting or filtering out IBR traffic from all traffic is benefit to ensure network security. This paper proposes a novel IBR traffic filtering method based on relative uncertainty theory. It directly filters out IBR traffic from collected Net Flow data without specific configurations or...
Traditional topic extraction methods only take text document into account and ignore user's contribution in the process of extraction. But it occurs to us that the browsing status of users in one topic plays a more important role in indicating whether this topic is currently hot than the properties of text document. So in this paper, we bring forward a method of extracting ??Chinese hot topic?? from...
In order to advance the development of tourism e-commerce in China, this paper selected two tourism e-commerce companies from China and United States, the Ctrip and Expedia, to compare from the pattern of the earnings, core strengths and macro setting. The results show that there are some drawbacks in Ctrip and its core competencies need to be reconstructed. The paper also gives some suggestions for...
A method of developing Web3d-based children's education software is presented, on the basis of constructivism for learning, children like to learn knowledge in entertainment manner, and 3D virtual environment is suitable for children's exploration. The method is illustrated with three examples, the first is a virtual observation experiment for sun, users can handle a virtual telescope to watch a virtual...
If two 3d models are similar, they look similar from all angles of view. In this paper, a method for 3d polygon model retrieval based on multiple characteristic views is proposed. First, a model called NCM (New Canonical Model) is obtained by preprocess to an original model, and the range images under 21 different angles of view based on NCM are obtained. Secondly, the features of 3d model called...
False data injection is a severe attack that compromised sensor nodes ("moles"1) can launch. These moles inject large amount of bogus traffic that can lead to application failures and exhausted network resources. Existing sensor network security proposals only passively mitigate the damage by filtering injected packets; they do not provide active means for fight back. This paper studies...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.