The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The rising accessibility and popularity of gambling products has increased interest in the effects of gambling. Nonetheless, research of gambling measures is scarce. This paper presents the application of data mining techniques, on 46,514 gambling sessions, to distinguish types of gambling and identify potential instances of problem gambling in EGMs. Gambling sessions included measures of gambling...
Since the start of the 21st century, computer networks have been through an exponential growth in terms of the network capacity, the number of the users and the type of tasks that are performed over the network. With the resent boom of mobile devices (e.g., Tablet computers, smart phones, smart devices, and wearable computing), the number of network users is bound to increase exponentially. But, most...
Rate adaptation is an essential component in today's wireless standards, for its ability to adaptively approach the channel capacity, and maximize the system throughput. The difficulty in rate adaptation stems from estimating the optimal data rate in a fluctuated channel. Previous wisdoms leverage PHY layer information for rate estimation, such as Soft PHY hints or Channel State Information. These...
Companies increasingly rely on Internet for effective and efficient business communication. As Information Technology (IT) provides the infrastructure backbone for business activities, a corporate network connects the company to Internet and enables it to perform its activities globally. The corporate carries data packets generated by the users' while performing their business tasks. Traditionally,...
Understanding the impacts and patterns of network events such as link flaps or hardware errors is crucial for diagnosing network anomalies. In large production networks, analyzing the log messages that record network events has become a challenging task due to the following two reasons. First, the log messages are composed of unstructured text messages generated by vendor-specific rules. Second, network...
Secure multiparty computation allows multiple parties to participate in a computation. SMC (secure multiparty computation) assumes n parties where n>1. All the parties jointly compute a function. Privacy preserving data mining has become an emerging field in the secure multiparty computation. Privacy preserving data mining preserves the privacy of individual's data. Privacy preserving data mining...
Concept drifting poses a real challenge for network models which depends on statistical heuristics learned from the data stream, for example Anomaly Based Detection/Prevention Systems. These models tend to become inconsistent over a period of time as the underlying data stream like network traffic tends to change and get affected by evolution of concept drift. Change in network traffic pattern is...
For the important role of packets in the network management and security applications, many researches have been applied to network packet. How to record and store the packets in an efficient structure is a problem in this field. This paper focuses on the study of network packet tagging technique. Based on existing research, this paper presents a tagging method using the attributes of data stream...
Defined by the 3GPP, the IP multimedia subsystem (IMS) is an architectural framework that enables the delivery of multimedia services in mobile networks. Based on the session initiation protocol, the IMS offers unified billing, QoS negotiation mechanisms, and the possibility of combining services deployed in different environments like CAMEL and Parlay OSA. With the aim of determining the real limitations...
This work presents an empirical property-based model to describe Web-based vulnerability. We define a web application using a new descriptive model with pre-condition, behavior, entity and communication property sets. The vulnerable property relationship graph (VPRG) defines a vulnerability as vulnerable properties in application with relations to other properties in cause- and consequence-relationships...
Stabilizability of linear time invariant networked systems of general structure is studied with an observer-based approach. In the assumption of piecewise constant controls an average consensus network distributes input information to all agents enabling them to build local observers on the basis of which stabilizing gains are computed with recourse to standard centralized methodology. Stabilizability...
E-sports, multiplayer online games or similar Internet applications need peer-to-peer network to offer fast response and adaptability. Those typical P2P file sharing protocols can't meet this requirement good enough. This paper introduces an optimized double-layer overlay network, called GMeridian, which defines a node's placement by measuring its round-trip latency to other nodes. The results of...
This study aims to compare the use of targeted manual searches with broad automated searches, and to assess the importance of grey literature and breadth of search on the outcomes of SLRs. We used a participant-observer multi-case embedded case study. Our two cases were a tertiary study of systematic literature reviews published between January 2004 and June 2007 based on a manual search of selected...
At the present time there are many Peer-to-Peer (P2P) multicasting systems supporting live streaming, i.e. real-time dissemination of various content issued at a source node towards a set of receivers. The objective of content distributing can be twofold: maximization of the system throughput (i.e. the streaming rate) and minimization of the streaming cost while guaranteeing the particular streaming...
Digital technology has become a central element of how students learn and engineers work. This paper presents findings from a naturally occurring quasi-experiment that compares the design experience of two sophomore-level engineering design teams and their use of technology. Both teams met regularly during normal class hours, but outside of class one team exclusively used technology for collaboration...
In this study, we hypothesized that the static standing weight bearing steadiness and dynamic walking weight shifting stability could be improved by providing neuromuscular facilitation using subsensory stimulation and visual-auditory biofeedback in amputee respectively. To test this hypothesis, a computer protocol with sensory feedback neuromuscular facilitation system was developed and used for...
Storage management in wireless sensor networks is an area that has started to attract significant attention, and several methods have been proposed, such as local storage (LS), data-centric storage (DCS) and more recently location-centric storage (LCS). Several modern applications, like context-dependent information dissemination for pervasive computing, on-demand warning in surveillance sensor networks...
In various types of peer-to-peer (P2P) applications, peers have to efficiently and flexibly make an agreement on one value which satisfies an agreement condition. In traditional agreement protocols, each peer sends one value to the other peers at each round. If each peer could not make an agreement on the values, the peer sends another value to the other peers at next round. Depending on the order...
Secure multiparty computation (SMC) has gained tremendous importance with the growth of the Internet and e-commerce, where mutually untrusted parties need to jointly compute a function of their private inputs. However, SMC protocols usually have very high computational complexities, rendering them practically unusable. In this paper, we tackle the problem of comparing two input values in a secure...
In social networks, people can directly contact some acquaintances that potentially have knowledge about the resources they are looking for. Similarly to social networks, where people are connected by their social relationships, two autonomous peer nodes can be connected in unstructured peer-to-peer (P2P) networks if users in those nodes are interested in each other's data. The similarity between...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.