The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to successfully resolve the network infrastructure's problems the network provider has to improve the service quality. However in traditional ways, maintaining and improving of the service quality are generally determined in terms of quality of service criteria, not in terms of satisfaction and perception to the end-user. The latter is represented by Quality of Experience (QoE) that becomes...
In this paper we propose a web log mining-based network user behavior analysis scheme, which plays an important role in network structure optimization and website server configuration. Based on clustering and regression model, we studied the network user's visit model in a university by analyzing a large amount of web log data which is collected from the university campus network. The data analyzing...
Internet service providers (ISP) apply traffic engineering (TE) in the underlay network to avoid congestion. On the other hand, content providers (CP) use different server selection (SS) strategies in the overlay network to reduce delay. It has been shown that a joint optimization of TE and SS is beneficial to the performance from both ISP's and CP's perspectives. One challenging issue in such a network...
By introducing the factors of online auction like the entry fee, the commission, the penalties and the stochastic arrival of bidders, the dissertation formulates online auctions' decision-make model of maximization of seller's expected revenue in open reserve price and private reserve price respectively, and studies the online auction's optimal open reserve price and optimal private reserve price,...
Attractiveness of social network analysis as a research topic in many different disciplines is growing in parallel to the continuous growth of the Internet, which allows people to share and collaborate more. Nowadays, detection of community structures, which may be established on social networks, is a popular topic in Computer Science. High computational costs and non-scalability on large-scale social...
Internet path available bandwidth is an important metric for distributed application performance optimization. However, current network coordinate system causes large errors when being used to predict such performance metric. In this paper, based on theoretical and Internet measurement data analysis result, we show that though not strictly satisfy the constraint, Internet path available bandwidth...
With the ever growing number of hosts connected to the Internet, network and information security has become more and more important. Due to the increasing sophistication of attacking techniques and automated attacking tools, it is necessary for large scale information to combine multiple and heterogeneous security mechanisms' collaboration to discover and defend various distributed and coordinated...
In high performance routers design, fast IP address lookup is always a challenge. In order to obtain fast lookup speed, multi-bit tries are often used to represent the routing tables. The drawbacks of multi-bit tries are the large memory usage and extensive update cost. To reduce the memory usage of multi-bit tries, Srinivasan and Varghese proposed a scheme called controlled prefix expansion (CPE)...
Pricing and return policy is of great significance for the Internet sellers in e-business environment. This paper establishes an optimization model of pricing and return policy in the statistics perspective and obtains a solution. Itpsilas of a decisive impact to determine the market parameter on making an optimal policy. The authors present a method to estimate the market parameter according to sales...
We show how to ensure a constant cost for the computation-unit in graphs depicting the number of (sequential) computation-units at different (distributed) problem sizes. We report empirical evaluation with ADOPT revealing that the computation cost associated with constraint check (commonly used - and assumed constant - in ENCCCs evaluations) actually varies with the problem size, by orders of magnitude...
This paper investigates loss of self-similarity (LoSS) detection performance using exact and asymptotic second order self-similarity (ESOSS and ASOSS) models. Previous works on LoSS detection have used ESOSS model with fixed sampling that we believe is insufficient to reveal LoSS detection efficiently. In this work, we study two variables known as sampling level and correlation lag in order to improve...
The growth of the Internet has facilitated data collection on a large scale. User opinions and behavior are private information and need to be collected using a method that protects their confidentiality. In this paper, we develop a method of collecting information that employs probability conversion. We make clear the relations among the answer functions' variance, the number of respondents, confidence...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.