The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
NATO doctrine [1] clearly expresses that the establishment of a peaceful and secure environment requires a comprehensive political-civilian-military approach to crisis management [2]. According to [1], coherence was achieved through the harmonization of strategic processes, planning and objectives across the civil and military actors. This requires the establishment of trusted information channels...
“Gatekeeping theory” is the conceptual framework that was developed during the 20th century within the journalism and mass communication research discipline to help us understand the complex, multivariate factors that collectively influence the content of the media. But gatekeeping theory in its extant form is limited in its descriptive value for today's media environment because it was developed...
In this paper we evaluate eight well-known Information Extraction (IE) tools on a task of Named Entity Recognition (NER) in microposts. We have chosen six NLP tools and two Wikipedia concept extractors for the evaluation. Our intent was to see how these tools would perform on relatively short texts of microposts. Evaluation dataset has been adopted from the MSM 2013 IE Challenge. This dataset contained...
This paper puts forth a straw man proposal for future diverse internets. Guided by a principle that we call Align-and-Decouple (AD), our AD protocol architecture design calls for lightweight transport protocols that allow for decoupled operation of networks that are either owned by different organizations, or are networks of different types/protocols. TCP's fragmentation and congestion control mechanisms...
We present an accountability framework for the Internet which ties a user''s action to her identity on an online social network. The framework is optional in that users do not need to be accountable at all times, but various web services can force accountability on the part of their users by only allowing accountable users access. Our design is general enough that higher level applications can place...
Multiagent plays an important role in various applications. As the Internet becomes prerequisite of human life, large scale Multiagent systems on the Internet become more and more important. However, large scale multiagent systems encounter many big issues such as scalability and inter-operability. This paper presents a different approach of large scale multiagent system based on semantic P2P Network-Virtual...
NASPI is a collaborative effort between the U.S. Department of Energy (DOE), the North American Electric Reliability Corporation (NERC), and North American electric utilities, vendors, consultants, federal and private researchers and academics. NASPInet is an effort to develop an "industrial grade", secure, standardized, distributed, and expandable data communications infrastructure to support...
Traditionally, e-Business uses Client/Server technologies. In this model, the consumers and producers do businesses through the third parties like Alibaba.com. When we investigate the more wide scope of e-Business such as e-Business corporations of many partners for the whole supply chain, the complex business activities are not easily modeled and implemented by several third parties. When a lot of...
Recent studies have shown in which extent peer-to-peer file sharing traffic occurs in the global Internet. Mobile users want the same type of service, thus supporting them with peer-to-peer applications is naturally the next step. The main goal in the design of proposed architecture was to provide searching for shared files not only among vehicles during opportunistic meetings, but also among all...
With the recent emergence of business being conducted over the Internet, companies are inevitably using information technology to cut costs, increase productivity, reduce the time required to develop new products harness the collective expertise of their employees, and create an extended enterprise by forging closer relationships with their customers, suppliers, distributors and partners in order...
A personal network (PN) is a network composed of devices of a person that can communicate with each other independently from their geographical location. An extra functionality added to PNs can enable different persons to cooperate and to form a group-oriented network called a Federation of Personal Networks (Fednet). A Fednet is a secure, opportunity or purpose driven ad-hoc network for sharing personal...
Increasing incidents of security breaches and identity thefts have pressured organizations to make information security a priority in order to restore consumerspsila trust. As shown in the four case studies reported in this paper, ensuring information security goes beyond advanced technological solutions as it involves a complex interaction process between human actors and these technological solutions...
In recent years, the wireless roaming infrastructure has been deployed in many organizations. The eduroam is one of the wireless roaming infrastructures which realize international roaming by cooperating hierarchically structured user authentication systems. However, the guest userpsilas IP address assigned is the foreign organizations then the network access of the guest users may be restricted....
Sem@ntica is a system for extracting the information contained in collections of documents into a knowledge base. It combines high quality conventional named entity analysis with an ontology class labeling capability for open class words. The ontology comprises an upper ontology and one or more domain ontologies. The system has tools for rapidly designing the ontology and mapping segments of Word...
Information privacy is usually concerned with the confidentiality of personally identifiable information (PII), such as electronic medical records. Nowadays, Web services are used to support different applications which may contain PII, such as healthcare applications. Thus, the information access control mechanism for Web services must be embedded into privacy-enhancing technologies. Further as application...
This paper describes a new path computation model in Multi-protocol Label Switching (MPLS) and Generalized MPLS (GMPLS) networks. It introduces a path computation element (PCE), which is functionally separate from label switching routers (LSRs). The Path Computation Element (PCE) is an entity that is capable of computing a network path or route based on a network graph, and applying computational...
In this paper we describe a visa scheme for implementing access control in Inter-Organization Network (ION) gateways. The purpose of the scheme is to allow an organization to modify and trust only them internal system that require ION access all other internal system can not communicate with the outside. Control is distributed among the ION participants so that each may make its own design tradeoffs...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.