The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Data of network forum is massive and instant. Topics are plentiful. So it challenges to compare the authority value of lots of users. There are many difference between academic paper rank and rank of users in network forum, such as scale in quality, usage, citation count, file length. Difference between user rank with web page is: clear link relation in web but not in network forum, mutual-reinforcement...
Network is the engineering discipline concerned with the communication between computer systems or devices. A computer network is any set of computers or devices connected to each other with the ability to exchange data. Computers on a network are sometimes called nodes. Networks can be broadly classified as using graphs. In the most common sense of the term, a graph is an ordered pair G = (V, E)...
Network education given in the universities and in the other education areas constitutes the backbone of computer science. This education is provided not only in theoretical form but also in the practical way. Since it is hard to settle some information of computer networks in learners' mind practices are the necessary activities of learning process. As the visuality increases, learners start learning...
A non-repudiation protocol aims to provide non-repudiation service. Non-repudiation service, one of the essential security services in computer networks, protects the parties involved in a transaction against the other party denying that a particular event or action took place. Non-repudiation protocols are a special type of fair exchange protocols, and fairness is a key property that must be respected...
This paper starts with the characteristics of computer network course of colleges and universities, combines with the current changes in demand for networking skills as well as the writer's long-term accumulation of practical experience of teaching, the writer provides teaching reform measures and proposals for this course in the aspects of curriculum content, the practical teaching, network teaching...
Many research on the WK-recursive network has been published during the past several years due to its favorite properties. In this paper, we consider the fault-tolerant hamiltonian connectivity of the WK-recursive network. We use K(d, t) to denote the WK-recursive network of level t, each of which basic modules is a d-vertex complete graph. The fault-tolerant hamiltonian connectivity is defined to...
Since the research capability has become a key requirement on computer science undergraduates for regional university in China, we explored ways in which to support students in involving in the computer research projects and enhancing their capability during their studies. In this paper we share our approach and experiences with heightening challenges and opportunities to undergraduate students as...
Computer networks have added new dimensions to the global communication. But intrusions and misuses have always threatened the secured data communication over networks. Consequently, network security has come into issue. Now-a-days intrusion detection systems play an important role in security infrastructures. Intrusions typically start with intruders infiltrating a network through a vulnerable host...
Computer networks are one of those unique gifts of modern science which enriched human life with the blessing of global connectivity. But as the network advanced, intrusions and misuses followed. Consequently, network security has come into issue. Now-a-days intrusion detection systems have become a standard component in security infrastructures. Intrusions typically start with intruders infiltrating...
With the progression of time, we have been blessed with the gifts of science. Computer networks are one of those gifts. But as the network proceeded, intrusions and misuses followed. Consequently, network security has come to the fore front and has become one of the most important issues. Now-a-days intrusion detection systems have become a standard component in security infrastructures. Intrusions...
This paper firstly introduced the concept of PBL and HXL which combines CBL and E-learning approaches. Secondly the features of courses related to computer science are analyzed. Thirdly this paper presents an approach to mix PBL and HXL in the design of course teaching of computer science, for example in computer network, and the concrete implementation on this course is displayed. Finally is the...
In this paper, it has been shown that computational jobs, such as encoding of input data and AND, OR operation, can work on the computers (by using computer databases and algorithms for the purpose of speeding up and enhancing biological research). By combining more complex functions, more complex molecular programs for gene analysis can be constructed. It is expected an in vivo (i.e. inside cellular...
The art of computer-based game production is an aspiring goal and a challenging task. It involves many different activities, expertise and skills into many different areas such as: game theory, programming skills, multimedia, 2D/3D graphics and animation, sound engineering, story writing, project design and management, physics, logic design, interface programming, artificial intelligence (AI) and...
Coding advantage refers to the potential for network coding to improve end-to-end throughput or reduce routing cost. How large can the coding advantage be? We investigate this fundamental question in the classic undirected network model. So far, all known networks where such potential exists are based on a special class of topologies known as combinatorial networks. We try to prove a rather small...
In this paper, we study the problem of anomaly detection in high-dimensional network streams. We have developed a new technique, called Stream Projected Outlier deTector (SPOT), to deal with the problem of anomaly detection from high-dimensional data streams. We conduct a case study of SPOT in this paper by deploying it on 1999 KDD Intrusion Detection application. Innovative approaches for training...
This paper presents a distributed fermat-point range estimation strategy, which is important in the moving sensor localization applications. The fermat-point is defined as a point which minimizes the sum of distances from three sensors inside a triangle. This point is indeed at the trianglepsilas center of gravity. We solve the problems of large errors and poor performance in the bounding box algorithm...
In this paper, we propose an adaptive pacing scheme at the link layer for IEEE 802.11 based multihop wireless networks. Our objective is to improve the performance of higher layer protocols without any modifications to them. Our adaptive pacing scheme estimates the four-hop transmission delay in the network path without incurring any additional overheads, and accordingly paces the packets to reduce...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.