The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
It is expected that there are a variety of energy resources to be jointly operated by the power system in the future. Through jointly operating all types of energy resources via the Internet, Energy Internet is a promising solution to increase energy efficiency. However, the increasing integration of energy resources inevitably imposes challenges in secure communication in the Energy Internet. Resourceful...
This article presents a survey of the factors that indicate evasion in distance education, as well as the data mining techniques that are being used in the detection of evasion. As a methodology, we have used the systematic review, analyzing the works published in the last five years. The result indicated that there are multiple factors that influence evasion, which were systematized in four dimensions,...
Defending against cache pollution attacks, highly detrimental attacks that are easy to implement in Named-Data Networking (NDN), currently suffers from the lack of coordination. Solving cache pollution attacks is a prerequisite for the deployment of NDN, which is widely considered to be the basis for the future Internet. We present CoMon++ to this end, a framework for lightweight coordination that...
Smart Grid uses the TCP/IP protocol stack for wide area communications. To ensure low latency end to end communications, the FREEDM project chooses UDP datagram as the preferred technique. However, when many devices are using the same network resources, congestion can happen on intermediate routers. Unlike TCP, which uses ECN as an approach for congestion control, UDP does not have a similar implementation...
The development of Information and Communication Technologies (ICT) and the widespread growth of Internet has revolutionized the way of performing commercial operations. Due to this the organizations must reconsider the use of systemic thinking and aim their business models towards more globalized tendencies. All this has helped many companies to see the electronic commerce as a new way of on-line...
In order to enable the development of smart services, many IoT platforms were proposed to securely and reliably connect IoT devices to the Internet and to each other. Examples are IoTivity from Open Connectivity Foundation (OCF), AllJoyn from AllSeen Alliance, Weave from Google and HomeKit from Apple. However, such fragmentation of IoT platforms has made the development of IoT applications very difficult...
With the development of Internet e-commerce, shopping online has become very popular. Online stores have the advantage of having more items in their catalogue without worrying about shop constraints. In this scenario, recommendation systems are useful as they can help users in identifying items that they might be interested in. After shopping users usually provide feedback in the form review and ratings...
The amount of information on the Internet is getting larger and larger, and the energy of the consumer and the ability to deal with information is limited. Electricity supplier enterprises in the development process to do are to use big data for personalized shopping guide. This paper analyzes the situation of the development of e-commerce industry in the background of big data, and puts forward the...
The purpose of this study was to explore the important factors that influence users’ continuance usage behavior toward mobile online group-buying. Based on the characteristics of the mobile Internet, an extension of the UTAUT model is introduced to verify the proposed hypotheses. The structural equation modeling method is used to analyze the empirical data which come from universities in China. The...
In the era of the Internet, people are active in multiple online services, and they usually have accounts on more than one online service. Each account is a virtual identity of the user. In order to trace individual's online behavior at any time and any places, linking virtual identities belonging to the same natural person across different online service domains is very important. Existing methods...
The growing of the internet use is proportional with the growing of IP address needs, but the increasing of the IP use is not equal with the number of available IPv4. Then, IPv6 was developed as a solution to overcome the limited amount of IPv4 address. Readiness of various aspects ranging from infrastructure to a service provider is required to implement IPv6. In order to improve the quality of IPv6...
Specifying a Management Plane for the Software-Defined Networking (SDN) architecture is essential for monitoring, configuring and handling computer networks. Diverse solutions have proposed it but they share some shortcomings: incomplete representations of SDN elements, few human readable languages for managing networks, no communication management aimed at Internet Engineering and absence of supporting...
Massively Multiplayer Online Games (MMOG), on which many users play simultaneously in a large scale virtual space on the Internet, have long been popular services. Most of MMOGs work based on Client / Server (C/S) model. Although C/S model is easy to manage games, it lacks scalability since the capacity of storages and the performance of servers that needs to be maintained by administrators increases...
In many Voting Advice Applications (VAAs) a supplementary question concerning the voting intention of a VAA user is included. The data that are collected through this question can serve a variety of purposes, election forecast being one of them. However, it appears that the majority of VAA users who answer this question select safe choices such as “I prefer not to say” and “I am undecided”. In this...
Faced with the unrelenting traffic growth and rising costs, access ISPs (Internet Service Providers) realize that their traditional revenue model of flat subscription fees is unsustainable. Regulatory concerns, e.g., about content-specific charging, constrain the ISPs' search for new revenue sources. This paper analyzes a revenue model where an access ISP acts as a publisher of ads to users who explicitly...
Autonomous vehicles must communicate with each other effectively and securely to make robust decisions. However, today's Internet falls short in supporting efficient data delivery and strong data security, especially in a mobile ad-hoc environment. Named Data Networking (NDN), a new data-centric Internet architecture, provides a better foundation for secure data sharing among autonomous vehicles....
User profiling is a typical big data service created and utilized by an increasing number of Internet venders, which maintains a customized model of interests or essential attributes of their existing users by looking for insights into their behaviors. The Internet industry's best practices indicate that user profiles can help venders much more sufficiently understand their customers. As a result,...
Word representations, which are critical to the performance of convolutional neural network, has attracted considerable attention from many researchers. Two popular categories of word representations for convolutional neural network are the pre-trained representation, which requires training on external web documents, and the internal presentation, which relies on the internal text features. Although...
The jackknife resampling procedure is a technique to reduce the bias of a statistic. As with other resampling techniques, the jackknife procedure is motivated by and is well understood in the i.i.d. regime. However, analysis of the procedure when samples have memory is limited, and is predominantly restricted to cases with strong mixing or memory constraints. In this paper, we analyze a natural jackknife...
Outage detection has been studied from different angles, such as active probing, analysis of background radiations, or control plane information. We approach outage detection from a new perspective. Disco is a detection technique that uses existing long-running TCP connections to identify bursts of disconnections. The benefits are considerable as we can monitor, without adding a single packet to the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.