The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
People are suffering from a range of risks in the ubiquitous networks of current world, such as rumours spreading in social networks, computer viruses propagating throughout the Internet and unexpected failures happened in Smart grids. We usually monitor only a few users of detecting various risks due to the resource constraints and privacy protection. This leads to a critical problem to detect compromised...
Internet traffic destined to routable yet unallocated IP addresses is commonly referred to as telescope or darknet data. Such unsolicited traffic is frequently, abundantly and effectively exploited to generate various cyber threat intelligence related, but not limited to, scanning activities, distributed denial of service attacks and malware identification. However, such data typically contains a...
English Language teaching evaluation is the inner requirement of vocational college English teaching reform. This paper analyzes the present situation and the existing problems of classroom-based evaluation system of ELT in higher vocational college and accordingly puts forward five principles of establishing this evaluation system, constructs a multi-level evaluation index system of ELT in higher...
This paper briefly describes the Online and Computer Aided Assessment (OCAA) from the perspective of the security of the online evaluation process. Significant aspects of online evaluation have been discussed. The evaluation is considered to be a critical item in determining the Key Performance Indicators (KPI). This study contains a short description of offered online evaluation systems in particularly...
Efficient policies should be applied in order to decrease the document retrieval time on distributed systems, the network traffic, admission and content replacement for cache systems. Usually, proposed simulators that aim to select better policies have limitation. As an example, it's difficult to create scenarios with multiple cache systems. Besides, frequently those simulators present a lack of extensibility...
Run-time monitors are crucial to the development of workflow management systems, which are at the heart of several modern E-services. In this paper, we propose a new methodology to build run-time monitors capable of ensuring the successful termination of workflows subject to authorization constraints. The methodology is based on state-of-the-art Satisfiability Modulo Theories techniques.
This paper proposes a model to automatically extract Tibetan hot words. Through analysis the dynamic Tibetan webs 2012, we use a frequency-position weighing algorithm to compute weight of word. Meanwhile, we integrate with entropy, 3s criterion and variance to extract and track the Tibetan network hot words. Finally, the experimental results prove the model is effective.
Due to safety requirements, certain data or activities of a business process should be kept within the user premises, while others can be allocated to a cloud environment. This paper presents a generic approach to business processes decomposition taking into account the allocation of activities and data. We designed transformations to decompose business processes represented in WS-BPEL into sub-processes...
Recently, the advance of cloud computing services has attracted many customers to host their Internet applications in the cloud. Infrastructure as a Service (IaaS) is on top of these services where it gives more control over the provisioned resources. The control is based on online monitoring of specific metrics (e.g., CPU, Memory, and Network). Despite the fact that these metrics guide resources...
Given the new realities resulting from the territorial development of the network society, the article analyzes the relationship between Information and Communication Technologies (ICT) and planning. It seeks to essentially understand the impact of ICT on spatial planning, both as a working tool for professionals planning or as a vehicle for communication with the public and with public and private...
One of the objectives of College English Teaching and Learning Reform is to develop students' individualized and autonomous learning. As an integrated part of College English Teaching and Learning Reforms, a new computer-based teaching model should be established. So, to develop learner autonomy under CALL environment, teachers should reconsider their responsibilities and adjust their roles to guiding...
Web sites are often a mixture of static sites and programs that integrate relational databases as a back-end. As they evolve to meet ever-changing user needs, new versions of programs, interactions and functionalities may be added and existing ones may be removed or modified. Web sites require configuration and programming attention to assure security, confidentiality, and trust of the published information...
Recent advances in Internet and grid technologies have greatly enhanced scientific experiments' life cycle. In addition to compute- and data-intensive tasks, large-scale collaborations involving geographically distributed scientists and e-infrastructure are now possible. Scientific workflows, which encode the logic of experiments, are becoming valuable resources. Sharing these resources and letting...
This paper describes TCP/IP visualization tools for students who plan to become communication and computer engineers. TCP/IP protocols are fundamental for computer networks and the Internet. For this reason, communication and computer engineers have to learn the protocols. However, learning the protocols is difficult, because students cannot fully understand or gain experience with the protocols by...
Intrusion detection (ID) is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromise the confidentiality, integrity, availability, or to bypass the security mechanisms of a computer or network. Internet services, and the number of Internet users increases every day this makes networks as a window for...
The software on the internet called internet ware is increasing rapidly. The internet ware has the characteristics of self-adaptation, dynamic collaboration, open, online evolution and environment-awareness. As the composite element, autonomous component should have the self-decision capability to support self-management. This paper proposed an autonomous component entity by extending BDI agent model...
Resource Discovery and Resource Selection are the crucial tasks in grid scheduling and resource management. The goal of resource discovery and selection is to identify list of authenticated resources that are available in the grid for job submission and to choose the best node. Recently adaptive push-pull method was proposed for information dissemination of information for dynamic web data. In this...
After a brief analysis to the information spreading mode under internet-based micro-blog platform, it quickly classifies and audits the related mirco-blog content in the spreading process in this paper. Then, by analyzing the sender's mood tendency to some specific topics in the content of micro-blog message, it proposes a content audit model under the micro-blog service platform. Furthermore, by...
With the development of the Internet and network services, broadband user behavior tends to diversify. It is a rising challenge for the network operators to understand network user behavior. In this paper, we use the Postgres to sort the data records which are caught and extracted from the network monitoring equipment. Then we analyze the characteristics of the data by SPSS, such as login time, logout...
Cloud computing is a new form of technology, which infrastructure, developing platform, software, and storage can be delivered as a service in a pay as you use cost model. However, for critical business application and more sensitive information, cloud providers must be selected based on high level of trustworthiness. In this paper, we present a trust model to evaluate cloud services in order to help...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.