The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Today, there is an increase in the number of elderly people who want to start using computers and the Internet. However, elderly people are hindered by limited education, limited knowledge of digital information, words they do not know, and not knowing how to use the computer keyboard and mouse. The setbacks and frustration they face in learning to use the computer causes them to feel computer anxiety...
Understanding user behavior of mobile Internet is vital for network infrastructure planning and radio resource allocation. In this paper, we investigate the spatial-temporal characteristics of users' access behavior and mobility patterns based on a data set collected from a cellular network in a city of China. We first propose a method called Maximum Distance Criterion (MDC) to distinguish users'...
Node mobility in a vehicular network is strongly affected by driving behaviour, such as the choice of route. Although various route choice models have been studied in the transportation community, the effects of preferred routes on vehicular networks have not been discussed much in the networking literature. In this work, we set out to understand the effects of different parameters, such as route...
As the mobile Internet gradually penetrates into the daily life, it is becoming the most important way people acquire information. Statistical characteristics of users' data access behavior can be used as the foundation for optimization of network deployment, or even trigger new business models. In this paper, distribution patterns of the subscriber's data access behavior have been discussed both...
BGP prefix hijacking is one of the main threatens for the Internet. It is important to identify the impact factors for prefix hijacking. This paper studies the problem from the view of AS logical topology by analysis of the data from the snapshots of CAIDA. We propose a hierarchical model based on AS relationship to classify the AS nodes into different level and define core size of each node to prioritize...
In this paper, a correlation-based clustering hierarchical P2P network model is proposed,which overcomes the problems of poor scalability and low search efficiency in unstructured P2P networks.This model devides the whole unstructured P2P network into clusters formed by a number of nodes through correlation.Each cluster elects a master node to be responsible for managing the entire cluster.The whole...
In this paper, we investigate the mobile P2P file-sharing problem, and proposed a mobile P2P content distribution architecture. Due to mobile specific influence factors, a hybrid architecture has been employed. We assume that the P2P mobile terminal can publish, index and retrieve resources on the Index Server, and collect the real-time state and cache content resource through Resource Management...
Distributed Denial of Service (DDoS) attacks pose a major threat to today's cyber security. Defense against these attacks is complicated by source IP address spoofing, which is exploited by attackers to conceal source IP addresses and localities of malicious traffic. In this paper, we propose HPi (Hash-based Path Identification), a novel packet marking scheme to defeat DDoS attacks regardless of forged...
Distributed denial of service (DDoS) attacks pose a major threat to today's cyber security. Defense against these attacks is complicated by source IP address spoofing. The Path Identification (Pi) mechanism is a promising technique to defend against DDoS attacks with IP spoofing. In the Pi scheme, each router marks forwarding packets to generate particular identifiers corresponding to different paths,...
Jini and .NET are the two most popular distributed computing environments nowadays. Jini architecture provides an infrastructure for defining, advertising, and finding services in a network, while .NET lets developers build Internet-based, distributed applications using .NET remoting. These two environments are very similar in many aspects and both are capable of facilitating implementation of distributed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.