The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The following topics are dealt with: hash table based index structure; Linux; Web services; weighting replacement policy; network based authorization framework; noble path selection algorithm; support vector machines; matrix-vector multiplication; visual programming language; genetic programming; software reliability; face recognition system; VOIP communications; IEEE 802.11 based wireless LAN; mobile...
Extreme programming (XP) is one of the most frequently used methodologies in Agile Software Development. According to various reports it had a significant effect on the software projects that use XP. In this paper, one of the main practices of XP, called "on-site customer" is considered, in detail. Also, various important cases and problems related to its implementation are considered. In...
In this paper, we present a method for providing quality of service using bandwidth limitation. In practical demonstration of the idea, we have used an algorithm for packet queuing, a technique applicable in a setup where the systems are connected to the Internet through a server and the server receives and distributes all the packets requested from the all the users in the network. The idea basically...
Emergence of enterprise modeling, and high integration of supply chains, virtual enterprises (VEs), virtual organizations (VOs), virtual government, agent programming, and autonomous systems represent a major trend in which organizations and enterprises seek joint organizations that allow them to participate in competitive business opportunities in new markets for innovative developments. An the virtual...
Traditional index structures do not work well on moving objects because of the need of frequently updating the index which leads to the poor performance. This paper presents a novel index structure based on the improved Quadtree and Hash table, namely the QH-index which can index the past, present and future positions of moving objects and can support moving objects' range queries and point queries...
This paper presents a new access-density-based prefetching strategy to improve prefetching for the access patterns that have not been dealt with in the current Linux read-ahead algorithm. These access patterns include: reading file data backwards, reading files in a stridden way (leaving holes in between two adjacent references), alternating references between multiple file regions and reading files...
In order to conceal malware, malware authors use the packing and encryption techniques. If the malware is packed or encrypted, then it is very difficult to analyze. Therefore, to prevent the harmful effects of malware and to generate signatures for malware detection, the packed and encrypted executable codes must initially be unpacked. The first step of unpacking is to detect the packed executable...
In this paper, we present an adaptive transport framework which addresses multiple message exchange patterns (MEPs) and transparent switching between multiple transports for Web services. In the framework, we separate the transportation process into transport input stage and transport output stage by using pipelined pattern. Moreover, we introduce a set of abstractions, such as transport protocol,...
As the performance gap between memory systems and processors has increased, virtual memory management plays an important role in system performance. Different caching policies have different effects on the system performance. This paper studies an adaptive replacement policy which has low overhead on system and is easy to implement. Simulations show that our algorithm performs better than least-recently-used...
One of the major threats that an enterprise information system networks are facing today is the internal threat. In this paper we develop a formal network access control model as per ISO/IEC security evaluation criteria - common criteria to provide a formal framework for implementing an Internal threat protection security solution in network computing environment. We used network interpretation of...
An automatic semantic term-network construction system is implemented in this research. This system uses the statistical values of the terms appeared in a document corpus. The term to term relationships in the term-network are decided by the similarities between term and term vectors. In order to measure the performance of our system, a standard data collection set, Reuters-21578, is used and about...
As the network is growing exponentially, challenges and issues also increases. They affect the performance of the network. Many factors contribute to improve the performance of the network. One such factor is finding the path quickly. In this paper, we are going to find a shortest path faster compared to Dijkstra's shortest path algorithm. We have introduced new ideas in building the end-to-end path...
Mining generalized association rules is closely related to the taxonomy(is-a hierarchy) data which exists widely in retail, geography, biology and financial domains. If we use traditional method to mine the generalized association rules, it becomes inefficient because the itemsets will be huge along with the items and levels of taxonomy increasing, and it also wastes lots of time to calculate the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.