The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper is on failure detectors to solve the consensus problem in asynchronous systems made up of anonymous processes prone to crash and connected by asynchronous reliable channels. Anonymity means that any two processes cannot be distinguished one from the other: they have no name and execute the same code. The paper has several contributions. It first introduces two new classes of failures detectors,...
Web robots have been widely used for various beneficial and malicious activities. Web spambots are a type of web robot that spreads spam content throughout the web by typically targeting Web 2.0 applications. They are intelligently designed to replicate human behaviour in order to bypass system checks. Spam content not only wastes valuable resources but can also mislead users to unsolicited websites...
Due to the Recent development in wireless technology, wireless sensor networks attract researchers' attention because of their applicability in many fields for effective collection of sensing data with low cost. Wireless sensor networks have many applications; some of the applications are military application, environmental application and flood detection. For example, in an environmental application...
Accurately locating the geographical position of Internet hosts has many useful applications. Existing approaches for host geolocation use Internet latency measurements, IP-to-location mapping and also geographical and demographical hints. In this paper, we investigate the applicability of the Maximum Likelihood Estimation (MLE) technique for Internet host geolocation. Our approach is based on a probability...
A recommendation system enables us to take information from huge datasets about tastes effectively. Many cryptographical protocols for computing privacy-preserving recommendation without leaking the privacy of users are proposed. However, the current issue is the large computational overhead depending the number of users. Hence, the application of the protocol is limited within small communities....
Identifying applications and classifying network traffic flows according to their source applications are critical for a broad range of network activities. Such classifications can be based on information derived from packet header fields and payload content, or statistical characteristics of flows and communication patterns of hosts. However, most of present methods rely on some forms of priori knowledge...
In peer-to-peer (P2P) applications, a group of multiple peer processes (peers) are required to cooperate with each other in a distributed manner. Messages sent by peers have to be causally delivered to every peer in a group. Due to the message overhead O(n) for the number n of peers, the vector clock cannot be used to causally deliver messages in a scalable group. On the other hand, the linear clock...
This paper presents simulation results of a setup strategy for wireless sensor networks, based on an agent-oriented middleware. A great problem that has to be tackled in sensor networks is how to setup them to provide the data required from the user with a minimal overhead. Having this goal in mind, the proposed approach abstracts the network setup as missions, which are handled within the network...
There are several strategies in the literature to geolocate Internet hosts, however the accuracy of their estimates is a common issue. Furthermore, accurate Internet host location remains a challenge due to incomplete domain registers. In this paper, we propose a classification for geolocation strategies and present the Whois Based Geolocation (WBG) approach, a strategy developed to geolocate Internet...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.