The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Venue photos, as a new type of multimedia contents, are exploding on the Internet because users like to take photos and share with their friends in which venue they spent time and what impressed them there. Discovering a venue by a social photo is very useful for supplementing venue retrieval and recommendation. However, little research focused on fine-grained venue discovery by leveraging multimodal...
In this paper, we address the issue of profiling users over the Internet using meta-data logs derived from network flow data (hence preserving a high degree of privacy). In this broader context, we specifically aim to empirically demonstrate that Internet volume and time of usage of humans do exhibit repeatable behavior over time. In our experimental study, Internet usage statistics of octets and...
The current Internet architecture follows a hostcentric communication model, intended for machine to machine connection and message passing. Modern Internet users are mainly interested in accessing information by name, irrespective of physical location. Information centric networking (ICN) was developed to rethink Internet foundations. Innetwork caching is one of the main features of ICN. Studying...
This paper presents the current problematic of development a set of indicators user direction, informational direction and reputational direction to perform task of directions of the organization of life cycle of virtual community. The method of determination of possible variants of balancing indicators of virtual community is developed. These indicators based on the analysis of the subject area of...
In the era of the Internet, people are active in multiple online services, and they usually have accounts on more than one online service. Each account is a virtual identity of the user. In order to trace individual's online behavior at any time and any places, linking virtual identities belonging to the same natural person across different online service domains is very important. Existing methods...
This paper studies cross-lingual semantic similarity (CLSS) between five European languages (i.e. English, French, German, Spanish and Italian) via unsupervised word embeddings from a cross-lingual lexicon. The vocabulary in each language is projected onto a separate high-dimensional vector space, and these vector spaces are then compared using several different distance measures (i.e., correlation,...
Given a users query, traditional image search systems rank images according to its relevance to a single modality (e.g., image content or surrounding text). Nowadays, an increasing number of images on the Internet are available with associated meta data in rich modalities (e.g., titles, keywords, tags, etc.), which can be exploited for better similarity measure with queries. In this paper, we leverage...
Learning evaluation in larger online university courses has become a challenge, especially in those cases when learning focuses on the development of professional skills. The objective of this article is to analyze how "authentic Assessment" applied by students correlate with the judgment of the teaching team, in the framework of a course for business and administration students. The results...
Nowadays cross-media retrieval is an useful technology that helps people find expected information from the huge amount of multimodal data more efficiently. A common cross-media retrieval framework is first to map features of different modalities into an isomorphic semantic space so that the similarity between heterogeneous data can be measured. For most of semantic space based methods, the mapping...
The vision of cyber-physical systems (CPSs) considered the Internet as the future communication network for such systems. A challenge with this regard is to provide high communication reliability, especially, for CPSs applications in critical infrastructures. Examples include smart grid applications with reliability requirements between 99–99.9999% [2]. Even though the Internet is a cost effective...
This research aimed to analyze the impact of the competence, work ethic, professionalism and motivation of people (lecturer and staff) on their performance. The data taken from questionnaires to 317 respondents and interviewed the 12 respondents. Data were analyzed using multiple regression analysis. The results showed that the Competence, Work Ethics, Professionalism and Motivation on the lecturer...
The deceitful practice of Typosquatting involves deliberately registering Internet domain names containing typographical errors that primarily target popular domain names, in an effort to redirect users to unintended destinations or steal traffic for monetary gain. Typosquatting has existed for well over two decades and continues to be a credible threat to this day. While much of the prior work has...
The Internet is rapidly developing toward the next generation of the Internet of Things (IoT), which accelerates the emergence of interconnected network architectures even further. However, the way to design interconnected networks that can meet various changes in environment and service demands remains an important issue that has not been appropriately addressed yet. These interconnected networks...
In-network caching is an important feature of ICN (Information Centric Networking). There are prior arts focusing on designing a highly efficient caching strategy by exploiting either node data or content data respectively. However, simply exploiting these data itself is not enough to reduce the cost of network operation and increase the quality of user experience, as there is no consideration on...
This study was based on the validated Users' Information Security Awareness Questionnaire (UISAQ). Authors gathered information on risky behavior and security awareness among 355 pupils from three secondary schools: General program secondary school (Gymnasium), Business and administrative high school and Trade school. Aim of the study was to test adapted version of UISAQ questionnaire on secondary...
Critical networked services established between service providers and customers are expected to operate respecting Service Level Agreements (SLAs). An interesting possibility to monitor such SLAs is using active measurement mechanisms. However, these mechanisms are expensive in terms of network devices resource consumption and also increase the network load because of the injected traffic. In addition,...
Polymorphic malware belong to the class of host based threats which defy signature based detection mechanisms. Threat actors use various code obfuscation methods to hide the code details of the polymorphic malware and each dynamic iteration of the malware bears different and new signatures therefore makes its detection harder by signature based antimalware programs. Sandbox based detection systems...
With the development of the Internet, e-commerce industry rises rapidly. Online shopping becomes more and more convenient and fast. However it is very difficult for consumers to find satisfied commodity because of abundant and mixed commodity. Especially when people purchase the items which they are not familiar with or consume in a strange place. The study of the recommended system is to figure out...
The working principle of intelligent English translating search engine is discussed in this paper. Then the method of Meta search that is fused with acquired results of each search is analyzed in detail. In the research of fusion results we adopt the optimized scheme which integrates weight and quality method to extract the retrieval results of component search engine, and to perform purification...
Network operators need to assess the effects of routing policies and traffic engineering methods in order to guide planning and operational decisions related to peering. We propose a peering analysis framework based on the correlation of inferred AS paths and traffic flow information. We define the data sets needed and a four-step methodology designed to reduce network data dimensionality, determine...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.