The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Machine learning has become one of the go-to methods for solving problems in the field of networking. This development is driven by data availability in large-scale networks and the commodification of machine learning frameworks. While this makes it easier for researchers to implement and deploy machine learning solutions on networks quickly, there are a number of vital factors to account for when...
This study presents an empirical evidence of benefit of narrative video clips in embedded virtual reality (VR) websites of hotels for relieving travel security concern. Even though it was proven that VR functions do provide some relief in travel security concern, a stronger VR website can be built when narrative video clips that show video clips with narration about important aspects of the hotel...
This paper reports on ongoing work on SWAT, a new toolkit for security workflow analysis. SWAT provides a platform for the realization and testing of well-founded methods to detect information leaks in workflows, both for the workflow certification and for audit based upon the execution traces. Besides presenting the SWAT's functionality and high-level architecture, an example illustrates its operation.
Starting with discussing the relationship between perceived value dimensions and satisfactory of female online purchasing, this paper formulates the model based on the relationship between the perceived value dimensions and satisfaction of female online purchasing, which is validated through a questionnaire survey with the cosmetics as the research object, the results as followed : (1) the perceived...
In order to solve the pixel divergence problem brought by print and scan process, propose the algorithm that applying stretching contrast grade to adjust image pixel divergence. The parameter setting of this adjusting method uses peak signal noise ratio as standard of measurement, even though using different printer and scanner, we can also get good adjusting image. Simulation results show that the...
This paper proposes a methodology for quantitative evaluation of software reliability in updated COTS or Open Source components. The model combines static analysis of existing source code modules, limited testing with execution path capture, and a series of Bayesian Belief Networks. Static analysis is used to detect faults within the source code which may lead to failure. Code coverage is used to...
New definitions are proposed for the security of Transient-Key Cryptography (a variant on Public-Key Cryptography) that account for the possibility of super-polynomial-time, Monte Carlo cryptanalytic attacks. The basic question we address is: how can one relate the amount of time a cryptanalyst is willing to spend decoding cryptograms to his likelihood of success? This question and others are partially...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.