The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Broadcasting corporations have begun distributing programs via Internet simulcast and video on demand (VOD). Such diversification of content distribution has created various ways for users to view programs, e.g., broadcast on TV, Internet simulcast on smartphones, and VOD on a connected TV. However, at the same time, this diversification of viewing operations creates complexity that can hamper users'...
Botnets are a class of internet attacks having different characteristics as compared to the normal internet attacks. One of the features that uniquely characterize a botnet attack is that "the infected machine (Bot) is being remotely controlled by an entity called "Botmaster". The Botmaster remotely controls these infected systems through "Command and Control" servers (C&C)...
Application-defined and location-independent addressing is a founding principle of information centric networking (ICN) that is inherently difficult to realize if one also wants scalable routing and forwarding. We propose an ICN architecture, called TagNet, intended to combine expressive application-defined addressing with scalable routing and forwarding. TagNet features two independent delivery services:...
According to the statistics of MIIT, at the end of January 2014, China mobile users had reached 1.235 billion. Maps as mobile internet key entrance, whether ordinary users or enterprise customers have unprecedented requirements to user experience of the map, traditional mobile map using online tiles load slowly, and can not meet the needs of the current application. The ability to quickly load map...
Voice over IP (VoIP) gains more and more attractiveness by large companies as well as private users. Therefore, the risk increases that VoIP systems get attacked by hackers. In order to effectively protect VoIP users from misuse, researchers use, e.g., honeynets to capture and analyze VoIP attacks occurring in the Internet. Global VoIP security threats are analyzed by studying several millions of...
Age of digital television has brought many changes to television user's experience. On one side there is comfort because of great amount of data available in the stream and possibility of accessing the Internet over TV. On the other side great amount of data brings significant discomfort, if the data is not organized well and user has to browse through it for a long time. This paper describes a solution...
With the increasing user demand for geographic information, storage and operational problems of massive spatial data to traditional GIS technology presented a huge challenge. Application of WebGIS technology makes traditional GIS functionality is extended, to achieve effective management and utilization of geospatial data, allowing users to obtain geographic information and other functions through...
CCN(Content-Centric Networking) enables users to retrieve content using the content's name. Researchers face critical challenges in terms of mobility. Since the routing information is part of the content name, when the provider moves, it is necessary to update all the routers' routing information. However, this requires significant costs. In this paper, we propose PNPCCN(Proactive Neighbor Pushing...
The proposed embedded personalization engine (EPE) utilizes valuable in-device usage data for inferring mobile user interests in a privacy-preserving manner. To provide users with personalized services, the proposed approach analyzes both the usage data inside a mobile device and service items--such as news articles and mobile apps--using the Open Directory Project (ODP) as a knowledge base. Embedded...
Data Mining promises potential improvements in a variety of real-world problems. However large-scale implementations face an array of challenges between their inception and deployment, many of which are not technical in nature. This paper will describe the author's experience building one of the largest data mining systems in the world. The objective is to help orientate practitioners to the challenges...
The continued rise in internet users and the ever-greater complexity of Web content degrade user-perceived latency in the Web. Web caching, prefetching and data deduplication are techniques that are used to try to mitigate this effect. Regardless of the amount of bandwidth available for network traffic, Web prefetching has the potential to consume free bandwidth to its limits. Deduplication explores...
This paper gives out a PUB/SUB-based application server software, which aims at improving the coarse granularity of the pushed information in current LBS systems. Taking the advantage of PUB/SUB system's asynchronous, loosely-coupled and multiplex communication mechanism, the server software pushes LBS information with its granularity refined. By combining position information and the PUB/SUB paradigm,...
Today, Internet is usually used as large databases. However, Web pages published by an author is often modified and deleted by the author but not by viewers. Therefore, it is difficult for viewers to guarantee the contents of Web pages referred by an official documents. So, in this paper, we propose a system that guarantees Web page existence. This system checks whether the contents of a page accessed...
Recently, emerging research efforts have been focused on question and answer (Q\& A) systems based on social networks. The social-based Q\& A systems can answer non-factual questions, which cannot be easily resolved by web search engines. These systems either rely on a centralized server for identifying friends based on social information or broadcast a user's questions to all of its...
A key challenge in developing RESTful Web systems is the lack of software development frameworks that support REST principles. This article gives practical guidelines for designing frameworks for developing such systems. Derived from intuitive formal models, these guidelines enable a development process that improves separation of concerns and the modifiability of developed systems. The authors analyze...
In recent years, there have been to studied to construct a new network infrastructure for accepting evolved network technology. There is a research of controlling the network by "Flow". Flow is used a combination of layers of L4 from L2, to identify the communication network traffic. High Performance Packet Processing Engine (HPPPE), that FUJITSU developed, is one of the next generation...
Recently, Internet use has increased rapidly especially in Asia, and the stock of IPv4 address has been exhausted. Fundamental solution for IPv4 address depletion is to migrate IPv6. However, since IPv6 is not compatible with IPv4 (such as address length, header structure), they can't communicate with each other directly. High Performance Packet Processing Engine (HPPPE) is a network processing software...
Internet topic detection and classification is an intelligent information access technology. It studies how to detect new events and classify sentiment of the content. Classical detection and analysis system of internet topics has low analysis efficiency and large process delay. The functions of cluster-based analysis system are internet data collection, real-time analysis and off-line data analysis...
Social learning is showing one of the immersive potentialities for human knowledge gathering on the Internet throughout the last decade. Due to rapid growth of Internet, people can communicate with each other using IM (Instant Messaging), WWW and P2P. IM Services, such as, Yahoo, Twitter, Google Talk, ICQ (I seek you), etc. which provides individual and group communications. Web search engines (Google,...
Network virtualisation is an emerging technology for the future Internet. It enables the co-existence of several network architectures on a single substrate, and eases the introduction of new functionalities. The expected benefits include an optimal usage of resources and flexible service provisioning. Presence service enables the discovery, retrieval of and the subscription to changes in end-user...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.