The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Faced with the unrelenting traffic growth and rising costs, access ISPs (Internet Service Providers) realize that their traditional revenue model of flat subscription fees is unsustainable. Regulatory concerns, e.g., about content-specific charging, constrain the ISPs' search for new revenue sources. This paper analyzes a revenue model where an access ISP acts as a publisher of ads to users who explicitly...
Word representations, which are critical to the performance of convolutional neural network, has attracted considerable attention from many researchers. Two popular categories of word representations for convolutional neural network are the pre-trained representation, which requires training on external web documents, and the internal presentation, which relies on the internal text features. Although...
In these recent years, a new channel of tuition fee payment using Internet banking has been introduced to Indonesian students. However, based on obtained data field, payment method using Internet banking service has turned out to be not quite popular among the students. The development of this study is adapted from Chan and Lu [4] research model about Internet banking service adoption in Hong Kong...
The graph-based algorithm for personalized recommendations mainly depends on the user-item model to construct a bipartite graph. We can provide recommendations by analyzing the bipartite graphs. However, for personalized videos recommendations, the classical recommendation algorithm based on graphs has low efficiency. Therefore, this paper gives an improved video recommendation algorithm that is based...
Malware attacks have become ubiquitous in modern large data-centric networks. Therefore advanced malware threat detection and related countermeasures are an important paradigm in cybersecurity research. This work studies malware propagation in fully connected networks, where network topology plays a minimal role in lateral spread within the network. The live netflow and perimeter alert data used in...
Zero shot learning (ZSL) provides a solution to recognising unseen classes without class labelled data for model learning. Most ZSL methods aim to learn a mapping from a visual feature space to a semantic embedding space, e.g. attribute or word vector spaces. The use of word vector space is particularly attractive as compared to attribute, it offers vast auxiliary classes with free parts embedding...
Mathematical Models Database (MMD) is an online repository of mathematical models that can be easily used for research purposes, in teaching or in performing comparative tests. In a single free-of-charge, freely accessible Internet service all the data from the database is available with an expected (in its final form) several ready-to-use models, either purely mathematical or physics-based. Apart...
Behavior-based recommendation algorithm is one class of the most important methods in recommendation systems. A variety of models are researched for a long time, such as collaborative filtering, graph-based models, matrix factorization and so on. Different characteristics in many aspects of these methods are also be analyzed. In this study, we design a new similarity measure from the perspective of...
With the development of computer science and technology and the further progress of IC fabrication, GPU-accelerating computer systems are more and more widely used to provide higher performance on HPCs(High Performance Computers) and even regular desktop and laptop computers. Almost the same time, the Internet era and the rise of mobile Internet produced PBs of data. Bulk data are useless until carefully...
Internet traffic destined to routable yet unallocated IP addresses is commonly referred to as telescope or darknet data. Such unsolicited traffic is frequently, abundantly and effectively exploited to generate various cyber threat intelligence related, but not limited to, scanning activities, distributed denial of service attacks and malware identification. However, such data typically contains a...
In recent years, modeling data in graph structure became evident and effective for processing in some of the prominent application areas like social analytics, health care analytics, scientific analytics etc. The key sources of massively scaled data are petascale simulations, experimental devices, the internet and scientific applications. Hence, there is a demand for adapt graph querying techniques...
Computers and Smartphone's becomes vital part of everyday life and hence use of internet becomes more and more. Due to internet, computers are becomes vulnerable of different kinds of security threats. Therefore it is required that we need to have efficient security method in order to avoid leakage of important data or misuse of data. This security method is called as Intrusion Detection System (IDS)...
Nowadays, micro blogging platforms, which have strong influence in social network, have become major platforms for Internet public opinion formation and propagation. By means of hot topic detection and topic tendency research on micro blogging platforms, it will help government and companies in a timely manner to get social public opinion and popular investment spots. LDA is a commonly used method...
With the rapid development of P2P network technology, the share of P2P Internet traffic is growing among the total internet traffic. Because of the complex structure of P2P network and its protocals is flexible, most of the traditional P2P simulations simulate P2P protocols. This paper presents a distributed P2P users' action simulation system which is able to flexibly configure the content and P2P...
The article describes a method for constructing a model for ranking the search engine delivery on the Internet using inductive GMDH algorithms. The method makes it possible to enhance substantially the relevance of scientific and technical information search on the Internet provided to sift spam and the commercial information. The process of discovering the web resources ranking model is described...
Questions are essential components for assessment of learners' knowledge in teaching - learning environments. The questions should be developed related to tasks of the instructional objectives associated with a learning object. It is expected that a given set of question will cover maximum possible topics under an instructional objective. By analyzing the response to these questions, instructors are...
In the context of the EC-funded project Instant Mobility, we have defined a comprehensive architecture for transport and mobility applications that aim to innovate by introducing future Internet technologies to this domain. We have defined an Internet-based “multimodal travel platform” that provides information and services able to support new types of connected transport applications. The considered...
The discussion of alternatives to the Internet architecture has been the subject of research for several years, resulting in a number of solutions and mechanisms that can help even the current approach. Within this context, the paradigm of Software Defined Networking (SDN) is becoming popular due to recent initiatives based on OpenFlow. This article presents an analysis of security policy rules applied...
In this paper we revisit the advances made on invalidation policies to explore attack possibilities in organizational models. One aspect that has so far eloped systematic analysis of insider threat is the integration of data into attack scenarios and its exploitation for analyzing the models. We draw from recent insights into generation of insider data to complement a logic based mechanical approach...
As an outcome of a seminar on the 'Ethics in Data Sharing', we sketch a model of best practice for sharing data in research. We illustrate this model with two current and timely real-life cases from the context of computer and network security.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.