The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Open University of Japan (OUJ) and National Institute of Informatics (NII) have started collaborative study for learning analytics. OUJ is the largest distance education institution in Japan. In the academic year of 2015, OUJ launched interactive online courses. One of the essential features of online courses is the possibility to collect and analyze educational big data. To utilize such educational...
DIBBs Brown Dog is a recent cyberinfrastructure effort which aims to create two new services to aid users in the searching, accessing, and usage of digital data and provide these services in a manner that is as broadly and easily accessible as possible. At its lowest level, the Data Access Proxy (DAP) providing file format conversion capabilities and the Data Tilling Service (DTS) providing content...
World Wide Web is an enormous store of links and web pages. It provides huge amount of information for the Internet clients. The development of web is great as about one million pages are added every day. Users' accesses are traced in web logs. Because of the great usage of web, the web log files are increasing at a more rapidly rate and the range is becoming enormous. Web Usage Mining relates mining...
Interactive Learning Environment has proven to be an effective solution for overpowering the limits of traditional one-to-many teaching. However, these environments require accurate representation of knowledge about learner to provide suitable guidance. Based on the behavior and performance, the traces of learners are captured and categorized to provide appropriate guidance in the learning environment...
Twitter is a public social service that allows users to share information as short-text messages. Previous researchers have tried to analyze the information available on Twitter to discover topic trending. However, these topics are associated with the whole network, and are not associated to a particular place. In this work, we propose a scheme to discover places where something is happening by analyzing...
Defined by the 3GPP, the IP multimedia subsystem (IMS) is an architectural framework that enables the delivery of multimedia services in mobile networks. Based on the session initiation protocol, the IMS offers unified billing, QoS negotiation mechanisms, and the possibility of combining services deployed in different environments like CAMEL and Parlay OSA. With the aim of determining the real limitations...
Service creation by composing existing services and/or network resources is considered by Telecom and Internet industries as the trend for service provisioning in next generation networks. Related research work is being carried out for years, and various service composition approaches have been proposed by different standardization organizations and companies catering to different network requirements...
Risk management is an important process for public service organizations to maintain a high quality of service. However, many organizations are not satisfied with the result from risk handling. This paper proposes changes to a risk management model by integrating service level agreements into it. This makes responsibilities more clear to all parties involved in risk management. This paper also introduces...
With the popularity of the Internet and the rapid development of information technology, Web application has become an integral part of the information age. Ajax (Asynchronous JavaScript and XML) is a new interaction method between server and client side, and asynchronous interactive technology is involved with Web applications, so that applications could give users more efficient response and a good...
Many people want to know how the Internet grows. However, it is hard to answer, especially for the huge Internet today. In this paper, a new choice for the Internet growth measurement is introduced. As a fundamental component of the modern Internet, the Domain Name System (DNS) contains plenty of information about the Internet. By performing a longitudinal evolution analysis on the DNS traffic sampled...
In lambda-grid networks, data files are stored on file servers as replicas, and those replicas are downloaded in parallel to reduce downloading time. However, parallel downloading raises the blocking probability of lightpath establishments because parallel downloading wastes many wavelength resources. To resolve this problem, we propose a parallel downloading scheme with network coding which encodes...
In distributed virtual environment (DVE) systems, a distributed server infrastructure is often used to reduce the latency between servers and clients. Under this infrastructure, mapping clients to proper servers is one of the key issues for improving the interactivity and overall performance. Most traditional methods of mapping the clients to servers only consider the load balancing problem. However,...
Optical grids are widely deployed to solve complex problems we are facing today. An important aspect of the supporting network is resiliency i.e. the ability to overcome network failures. In contrast to classical network protection schemes, we will not necessarily provide a back-up path between the source and the original destination. Instead, we will try to relocate the job to another server location...
Current opportunities for students to improve their knowledge in a certain domain (e.g. computer science) through interaction with computer-based educational environments are increasing. The large number of students using such systems and their different knowledge and goals motivate the use of technologies to provide personalized activities, resources, and content to the students. Such environments...
In distance education, students in a remote classroom tend not to sustain their motivation, mainly because of a lack of intensity due to non-physical presence of a lecturer. To address this issue, two software tools were developed for teachers and students, respectively. The tool for teachers is called eRoster. On the teacher's PC, the eRoster can display not only the student's name but also the student's...
The database course needs to continue evolving to reflect changes in the computing environment and changes in current thought about how best to engage the student. We propose one possible evolution that is based on a semester-long multimedia database project involving a Web interface, called MeTube. The project supports uploading and downloading videos, images, and audio files as well as supplementary...
The national grid service (NGS) provides access to compute and data resources for UK academics. Currently users are required to have an X.509 certificate from the UK e-science certification authority (CA) or one of its international peers to access the NGS. The CA must satisfy the requirements for internationally agreed assurance levels and some users find the processes of obtaining and managing certificates...
The peer-to-peer network has been widely used to share large files anonymously. Because of its open nature, nodes can join and leave peer-to-peer networks freely. But there are few limited methods to ensure their trust. Malicious nodes can expose great security threats to peer-to-peer networks such as spreading unauthentic data and viruses. But handling all the malicious nodes in the same way causes...
These years, P2P applications have multiplied, evolved and take a big part of Internet traffic workload. Identifying the P2P traffic and understanding their behavior is an important field. Some port, payload and transport layer feature based methods were proposed. P2P traffic identification methods by examining user payload or well-defined port numbers no longer adapt to current P2P applications....
A new query intensive interface information extraction protocol (QIIIEP) for deep Web retrieval process is proposed. Auto query word extraction and auto form unification procedure are newly proposed in order to comprehend various functions of the proposed protocol. Proposed protocol offers great advantages in deep Web crawling without over burdening the requesting server. However, conventional deep...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.