The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We consider the economic and mathematical model of forming unified information Internet space for scientific and educational resources by integration of scientific and educational resources in certain “cloud”, based on the needs of consumers, the possibility of required generation in information sources and the availability of nodes (providers) in the network to organize the process of receiving,...
The Domain Name System (DNS) is a key part of the infrastructure of the Internet. Recent discussions have centered on the removal of the shared DNS resolver and the use of a local full-service resolver instead. From the viewpoint of the cache mechanism, these discussions involve removing the shared DNS cache from the Internet. Although the removal of unnecessary parts from a total system tends to...
The rapid development of e-commerce calls for an immediate need of an autonomous and robust agent system with market intelligence that can offer various types of services to both buyers and sellers. In this paper, Agent-Based General Environment with Market Mechanism (ABGEM) is proposed, with intention to provide a feasible solution to it. The key elements of ABGEM include an agent interaction model...
The arena of computer forensics investigation is a relatively new field of study. Many of the methods used in digital forensics have not been formally outlined. Digital Forensics is looked as part of art and part of science. This paper discussed breaking down the digital forensic investigation and their progression into an investigation development model so that an examiner can easily grip the problem...
In this paper an energy consumption model for enterprise applications is proposed. Based on the model, a commercially available application is chosen as a case study. The results show that the proposed model can correctly reflect the application¡¦s energy consumption. The study also shows when an organization¡¦s daily operations are highly depending on an application, the energy consumed by the application...
To understand the factors that encourage the deployment of a new networking technology, we must be able to model how such technology gets deployed. We investigate how network structure influences deployment with a simple deployment model and different network models through computer simulations. The results indicate that a realistic model of networking technology deployment should take network structure...
Cloud computing represents a new IT model for consumption and delivery of the services over the Internet. Cloud computing is a natural evolution of the widespread adoption of virtualization, service-oriented architecture and utility computing.
Portals are the central point of communication, customer services and commerce through networks. Most service provider portals don't have these facilities as the investors are focusing on experience rather than modern technologies. Portals are continuous projects and need updates time to time with new technologies and human expertise. The objective of this paper is to propose a complete service delivery...
In order to improve detection efficiency of on-line web news stream, we propose a new method to accomplish detection task with window-adding, named entity recognition and suffix tree clustering. In our method, we make full use of informative elements of news stream(such as date, place, person and so on) to help detection process, and this method decreases text similarity computation greatly. Experimental...
Recently the increasing use of IP networks, their applications and users requires an increasing amount of networking resources. Therefore, organizations require the guarantee of bandwidth transmission for critical applications for network users, i.e., a guaranteed quality of service. In this contribution we present a decision based model for networking that priors the critical data flow in an organization...
Geographically replicating the contents and executable objects of dynamic web applications is one of the most common technique to enhance the performance of web based applications. This work addresses the problem of delivering updates and maintaining data freshness efficiently for the distributed environment in which servers are organized in a hierarchical structure. In this paper, the cost of update...
Role based access control (RBAC) has difficulty in covering open and decentralized multi-centric systems, since it has focused on controlling access to digital resources within closed system environments and it only deals with previously known user's access which is not adequate in today's Internet world. In order to overcome the limitations in RBAC and meet the access requirements in multi-domain...
This work describes the main characteristics of Customer Relationship Management (CRM) and the new environment where the CRM has been in use from for several years now: Cloud Computing. In the rest of the work the specific features of cloud CRM are described, trends and predictions in its usage, a new trend in development of cloud CRM: the binding thread with social networking, weakness and selection...
As Cloud Computing begins to move beyond the pure hype stage and into the beginning of mainstream adoption, adopting cloud-based services or moving application services to the cloud brings a number of new risks, including: Cloud availability, Cloud security, Erosion of data integrity, and so on. However, for enterprise which require visibility, trust and control over cloud-based services. To maximize...
Describing social positions and roles is an important topic within social network analysis. One approach is to compute a suitable equivalence relation on the nodes of the target network. One relation that is often used for this purpose is regular equivalence, or bisimulation, as it is known within the field of computer science. In this paper we consider a relation from computer science called simulation...
The primary problem to be solved for Cloud Computing is the formation of resource cloud. Cloud formation is from small to large process and dynamic complex process that can be achieved well using a self-organizing method. A new resource management method for Cloud Computing, resource self-organizing model that can form self-government resource groups in the absence of centralized management control...
In order to solve software complexity crisis problem, policy-based method and agent-based system is combined to build autonomic computing system, where agent stands for autonomic element and policy stands for administrator's goal. Due to dynamic nature of administrator's goal, a mechanism must be provided to commit policy modification. This paper proposes an integrative framework where policy modification...
Many believe that Cloud will reshape the entire ICT industry as a revolution. In this paper, we aim to pinpoint the challenges and issues of Cloud computing. We first discuss two related computing paradigms - Service-Oriented Computing and Grid computing, and their relationships with Cloud computing. We then identify several challenges from the Cloud computing adoption perspective. Last, we will highlight...
Within the past fifty years, information and communication technologies (ICT) have radically altered the dynamics of doing business in modern societies. However, a lack of access to these ICT resources has stifled the participation of several developing and under-developed economies. Cloud computing, an emerging technology paradigm, has the potential to unleash new businesses and create markets in...
This paper aims to provide a formal abstraction of Volunteer computing system. At first, we identify three key roles of Volunteer resources. Then, a formal model and method concerning volunteers are introduced. We apply this model to describe Volunteer computing systems. Relationships among elements and relationship changes are also characterized, based on agent and components. All of the results...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.