The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Information-leakage is one of the most important security issues in the current Internet. In Named-Data Networking (NDN), Interest names introduce novel vulnerabilities that can be exploited. By setting up a malware, Interest names can be used to encode critical information (steganography embedded) and to leak information out of the network by generating anomalous Interest traffic. This security threat...
In this study, we outline a potential problem in normalising texts that are based on a modified version of the Arabic alphabet. One of the main resources available for processing resource-scarce languages is raw text collected from the Internet. Many less-resourced languages, such as Kurdish, Farsi, Urdu, Pashtu, etc., use a modified version of the Arabic writing system. Many characters in harvested...
Analysing text-based data has become increasingly important due to the importance of text from sources such as social media, web contents, web searches. The growing volume of such data creates challenges for data analysis including efficient and scalable algorithm, effective computing platforms and energy efficiency. Compression is a standard method for reducing data size but current standard compression...
Data compression algorithms are used to reduce the redundancy, storage requirement and efficiently reduce communication costs. Data Encryption is used to protect our data from unauthorized users. Due to the unprecedented explosion in the amount of digital data transmitted via the Internet, it has become necessary to develop a compression algorithm that can effectively use available network bandwidth...
With the development of the internet and popularization of computer application, the Chinese input method is paid attention to by people increasingly. Currently although there are various Chinese language input methods, but there still are some shortage on input efficiency. For example most input methods pick up an input candidate by the number key, the user must pay attention to the display and the...
As XML gradually becomes the standard of the data exchange and expression for Internet, how to accurately access the data stored in the XML documents has already been a crucial problem to be solved. At first, the paper illustrates the structure of Patricia Tries and gives the search method of Patricia Tries based on analyzing the difference between Tries tree with Patricia Tries. Afterwards, the dictionary-based...
As XML has become the standard of data exchange and express of Internet and e-commerce, it is being more and more widely used, while XML is a kind of self-described language, with a large number of redundant structural information, so that is the hot study now on how to use XML data stream to be reasonable and efficient. The existing compression techniques of XML require two-pass scan on data, which...
Data compression algorithms are used to reduce the redundancy and storage requirement for data. Data compression is also an efficient approach to reduce communication costs by using available bandwidth effectively. Over the last decade we have seen an unprecedented explosion in the amount of digital data transmitted via the Internet in the form of text, images, video, sound, computer programs, etc...
As residential Internet access has become increasingly commoditized, the incentives to lower costs in enterprise and similar networks with service level agreements have grown as well. Simply switching to a VPN provided over Internet brings cost savings but at the same time loses any guarantees of service level. We have devised a Mobile IP-based approach to virtualize networks without neglecting Quality...
Web log files, storing user activity on a server, may grow at the pace of hundreds of megabytes a day, or even more, on popular sites. It makes sense to archive old logs, to analyze them further, e.g., for detecting attacks or other server abuse patterns. In this work we present a specialized lossless Apache web log preprocessor and test it with combination of several popular general-purpose compressors...
An asymmetric channel environment is considered and the slow uplink direction is speeded-up by means of a new compression scheme, based on a dictionary transmitted on the downlink channel. The performance of this cooperative scheme approaches those of perfect knowledge of dictionary and it improves as much as the download over upload ratio improves. The letter makes an investigation on this cooperative...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.