The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Online shopping is the process whereby consumers directly buy goods, services etc from a seller interactively in real-time without an intermediary service over the Internet. Nowadays, online shopping has become increasingly popular. However, affected by many factors, the purchase activities of consumers in online shopping is different from that of consumers in traditional shopping. This essay involves...
Online payment is the key point and the basic conditions to the development of electronic commerce, which greatly promote the development of e-commerce, and brought prosperity to the e-commerce. As e-commerce is one of the fastest economic growth of China, the online payment and its security becomes particularly important. This paper analysis from three aspects: the current development status of e-commerce...
With the development of Internet, the efficient network management of heterogeneous network devices from different vendors becomes more and more difficult. The Network Configuration Protocol (NETCONF) is presented as a new solution. But it can't be widely used in current networks soon because most devices are based on Simple Network Management Protocol (SNMP) and Command Line Interface (CLI). Therefore...
Man-In-The-Middle (MITM) attack is one of the primary techniques employed in computer based hacking. MITM attack can successfully invoke attacks such as Denial of service (DoS), DNS spoofing and Port stealing. MITM attack is particularly suitable in a LAN environment, Where it is typically performed through ARP poisoning. MITM attack of every kind has lot of surprising consequences in store for users...
The natural connectivity as a novel robustness measure of complex networks is proposed. The natural connectivity has a clear physical meaning and a simple mathematical formulation. It is shown that the natural connectivity can be derived mathematically from the graph spectrum as an average eigenvalue and that it changes strictly monotonically with the addition or deletion of edges. By comparing the...
New network technologies constantly seek to displace incumbents. Their success depends on technological superiority, the size of the incumbent's installed base, users' adoption behaviors, and various other factors. The goal of this paper is to develop an understanding of competition between network technologies and identify the extent to which different factors, in particular converters (a.k.a. gateways),...
We studied a class of Service Overlay Network (SON) capacity allocation problem. By analyzing the problem with two different nonlinear optimization formulations, we show that the prices of offering service guarantees are closely related to a set of Lagrange multipliers. Moreover, if the Grade of service (GoS) constraints are not hard requirements, the network design resulting from the set of prices...
Two parties that conduct a business transaction through the internet do not see each other face-to-face nor do they exchange any document or currency hand-to-hand. Electronic payment is a way by which the two parties transfer the money through internet. Offering electronic payment can also help businesses improve and customer retention. When electronic money is transferred from a buyer to a seller...
Wireless mesh networks (WMNs) have attracted increasing attention and deployment as a high-performance and low cost solution to last-mile broadband Internet access. Wireless mesh networks have emerged as a potential technology for next-generation wireless networking. WMNs have been widely accepted in the traditional application sectors of ad hoc networks because of their advantages over other wireless...
The last decade has witnessed an explosion of interest in technology of large simulation with the rapid growth of both the complexity and the scale of problem domains. A variety of techniques have been developed for fostering large simulations over the Internet. Along this direction, existing work normally only suit for coarse-grained models. In this paper, we present a hybrid grid infrastructure...
Wireless sensor networks have become very useful in so many applications. Applications such as grape monitoring, insect movement monitoring and etc., that allows connectivity between sensor network and Internet can solve many remote control and monitoring problems. IPv6 over low power WPAN (6lowPAN) protocols are suitable technology that can be adapted in wireless sensor network. The deployment of...
Information and digital age presents tremendous opportunity to the development of embedded products and shows the embedded market a prosperous prospect, Web server embedded in equipment can provide uniform operation and control interface based on browser mode for any legal user accessing to its network, browser has become the front control board of equipment and a hot spot for development in recent...
Connecting the wired and wireless networks particularly the Mobile ad hoc Network is interesting in real world situations due to its usefulness and practicality. Different mechanisms have been proposed to integrate MANETs and the Internet. These strategies differ in gateway discovery mechanism, cell switching criteria, ad hoc routing protocol. In this paper, Mobile-IP is integrated with Hierarchical...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.