The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the paper, the feature of Intermittently Connected Mobile Networks (ICMN), that information can be propagated through the near-distance contact of nodes, is utilized as a supplement to the common Internet subscriber/publisher ser-vices. Specifically, the nodes with Internet connectivity can help those without in retrieving the messages once stored and carried by the former. With the modeling of...
Nowadays, the computer network equipment is highly efficient. It provides faster communication with low cost. Traffic analysis is one of major's factors for the network design. In recently, characteristic of HTTP, FTP, SMTP, VoIP and other Internet applications in the intra-domain network are being widely studied in term of bandwidth utilization. However, a characteristic of multicast traffic in the...
Having a better understanding of the properties of network traffic can help in both evaluating current networking protocols and in creating more realistic models which might help in improving today's Internet service. Based on one month traceroute data from 6 different sources to more than 380 destinations, we present an analysis of how the hop count (HC) varies as seen by IPs in the same Autonomous...
It's necessary to accelerate the modernization process of folk sports' reservation and ways and means of passing down. Based on Web system, this research uses advanced computer technology, information technology and database theory, to establish necessary database for folk sports to design and develop management information system, so as to achieve modernization and maximize reservation and passing-down...
We present a system to extract definitions from a term using the Web. Definitions are organized according to a typology and its context. The structural and functional design is described; emphasizing its relevant components: the extractor of definitional context to candidates using the Yahoo!'s BOSS API; the extractor of definitional contexts and a clustering module based on textual energy as a measure...
With the development of mobile communication, there arises the requirement of ubiquitous access to Internet Email service from small screen terminals such as mobile phones and Pads. This paper proposed a framework, MMSEmail, for delivering Emails to mobile phones through Multimedia Messaging Service (MMS). MMSEmail integrates the functions of Email proxy, content adaptation broker and MMS sender....
The deep study of anomaly feature based on the particular server was made in this paper. By continuously monitoring on the honeypot deployed in Internet Data Center for more than two months, the experimental results were summarized and some initial exploratory models were built. The models show that the number of attackers for the main attack types and ports can be described by normal distribution;...
Motivated by performance evaluation of a computer communication system, we consider a renewal input, general service time, single-server, and infinite-capacity queuing system with generally distributed time-out threshold. We obtain two moment approximate formulas for the mean system performance measures (including the mean number of customers in the system and the mean response time) by using the...
This article contents a brief description of an e-learning material, a set of interactive online exercises developed for the education of fuzzy systems with the aim to get a supplement to theoretical lessons. Students can do experiments by changing the input parameters, and after submitting the inputs, they get the results immediately via the Internet in form of a Web document containing variables...
Grid computing integrates scattered clusters, servers, storages and networks in different geographic locations to form a virtual super-computer. Along with the development of grid computing, dealing with the data distribution requires a method which is faster and more effective for parallel applications in order to reduce data exchange between clusters. In this paper, we present two methods to reduce...
The respond of traditional Web application to user interface is slow and wasting bandwidth, which bring user a lot of inconvenience, while the emergence of Ajax has changed this situation. Ajax can maintain data without refreshing the page, which greatly reduce the time of waiting for a large number of exchanged data for user. The advantages of both is fully demonstrated by the support which Struts2...
The article discusses the use of the diffusion approximation in transient analysis of queueing models applied to investigate some aspects of Internet transmissions. In classical queuing theory, the analysis of transient states is complex and practically does not go far beyond M/M/1 queue and its modifications. However, the time dependent flows in computer networks and especially in Internet focus...
Internet browsers, technologies, languages and applications have evolved dramatically over the last two decades. Markup languages like DHTML/XML, scripting languages like Javascript/VBScript, vector languages like VML/SVG, embedded logic with Java/Flash and server-side dynamism with Ruby/Java/C#/C++ have expanded the functionality of Internet Browsers beyond just presentation and into a data-driven...
Monitoring of Service Level Objectives (SLOs) determines an essential part of Service Level Agreement (SLA) management, since customers are to be reimbursed, if a provider fails to fulfil them. By automating this process, a timely detection of a violation is possible. The compliance approach must be flexible to adapt to potential changes, must be scalable with respect to the amount of data, and has...
With the growing number of service application, need for service platform has appeared. Various solutions were proposed to serve the applications through the existing physical network. Service overlay network is one of the solutions that provide application adaptations and service reliabilities. With this solution, we propose an architecture that composes a service overlay network dynamically to adapt...
Research in the area of peer-to-peer systems is mainly focused on structuring the overlay network. Little attention is paid to the process of setting up and joining a peer-to-peer overlay network, i.e. the bootstrapping of peer-to-peer networks. The major challenge is to get hold of one peer that is already in the overlay. Otherwise, the first peer must be able to detect that the overlay is currently...
The ever growing request for digital information raises the need for content distribution architectures providing high storage capacity, data availability and good performance. While many simple solutions for scalable distribution of quasi-static content exist, there are still no approaches that can ensure both scalability and consistency for the case of highly dynamic content, such as the data managed...
With the increasing application based on Web, the comparatively backward Web printing technology lead so much inconvenience to the development of Web system and slowed the pace of Web application in enterprises. In this work, by making use of component programming ideas and EJB technology, a Web print components was developed which based on the analysis of PDF format. Thus, it provides a simple and...
Worldwide it is more and more common that the systems of the national governance, army, education etc. are retooled to open source systems - mainly because of the economical operation. The purpose of the article is to analyze and compare - in the aspects of security and performance - the abilities of the Web server ensured by the newest version of the most commonly spread closed source operation system...
In this paper we introduced an environment that provides remote access to a full equipped MHP laboratory. Its purpose is to allow any registered user to test remotely a MHP application from any device connected to the Internet. The laboratory is made by means of a head-end which inserts the received application into an object carousel which is broadcasted together with the television streaming. The...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.