The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The IEEE Computer Society's Guide to the Software Engineering Body of Knowledge (SWEBoK) has been an authoritative basis for software engineering since 2004. It also has served as a foundation for other developments including curriculum development, training, software engineering competence definitions, and licensing and certification. SWEBoK is current being updated through the SWEBoK Evolution effort...
We consider the economic and mathematical model of forming unified information Internet space for scientific and educational resources by integration of scientific and educational resources in certain “cloud”, based on the needs of consumers, the possibility of required generation in information sources and the availability of nodes (providers) in the network to organize the process of receiving,...
Web browsing response times are affected by the heterogeneous nature of Internet: links with disparate bandwidth, servers and routers with diverse specifications and network segments with particular traffic shaping policies. Also, on a daily basis, several new information systems get connected to the Internet consequently increasing traffic. Aiming to reduce response times, prefetching systems predict...
In order to meet the needs of China higher education of training students with strong foundation ability and innovation in the filed computer science, in recent years, the computer basic teaching team of Beijing Jiaotong University has carried out a series of scientific and effective educational reforms research and practice: 1. Carrying out “MOOC + SPOC + Flipped classroom” practice; 2. Construction...
In our country, type and quantity of network attacks have continued to grow, China's network infrastructure and the important information system is also facing serious security challenges. A variety of network attacks and other network security incidents have become the bottleneck in the development of our national economy, and even endanger the social stability and national security of the important...
We present a comprehension-based framework for measuring semantic similarity between documents of text. In various situations, vector-based similarity measures fail to capture deep semantic relations between terms. Our computational comprehension model processes textual content in a way that resembles human readers, paying attention to context, location, and acquisition time of semantic concepts....
Timely and accurate traffic classification and application characterization are becoming increasingly important with many applications in wired and wireless networks, e.g., traffic engineering, security monitoring, and quality of service (QoS). In particular, Software Defined Networking (SDN) is a new networking paradigm that has great impact on future IP networks and 5G wireless networks. In SDN...
This paper deals with the problem of properly simulating the Internet of Things (loT). Simulating an loT allows evaluating strategies that can be employed to deploy smart services over different kinds of territories. However, the heterogeneity of scenarios seriously complicates this task. This imposes the use of sophisticated modeling and simulation techniques. We discuss novel approaches for the...
The current network architecture is built on a host-centric communication model that is suitable for early network information transmission needs. However, with the emergence and rapid growth of network applications and services, the adaptability, flexibility, scalability and other defects have become increasingly prominent, and the current network architecture can't dynamically provide the required...
An improved KNN text classification algorithm based on Simhash has been proposed by introducing Simhash and the average Hamming distance of adjacent texts as a unit, which solves the problems caused by data imbalance and the large computational overhead in the traditional KNN text classification algorithms. Experimental results demonstrate that the proposed algorithm performs a higher precision, a...
The Domain Name System (DNS) is a key part of the infrastructure of the Internet. Recent discussions have centered on the removal of the shared DNS resolver and the use of a local full-service resolver instead. From the viewpoint of the cache mechanism, these discussions involve removing the shared DNS cache from the Internet. Although the removal of unnecessary parts from a total system tends to...
Faced with the unrelenting traffic growth and rising costs, access ISPs (Internet Service Providers) realize that their traditional revenue model of flat subscription fees is unsustainable. Regulatory concerns, e.g., about content-specific charging, constrain the ISPs' search for new revenue sources. This paper analyzes a revenue model where an access ISP acts as a publisher of ads to users who explicitly...
Word representations, which are critical to the performance of convolutional neural network, has attracted considerable attention from many researchers. Two popular categories of word representations for convolutional neural network are the pre-trained representation, which requires training on external web documents, and the internal presentation, which relies on the internal text features. Although...
The objective of this study was to verify if a development model of Units of Learning (UoLs), supported by UoLs authoring tools, that meet the usability criteria and abstract advanced knowledge in programming language by the developers, effectively provides the use and implementation of such resources by teachers in all areas of high school (in this first phase of the research) with few skills with...
In the age of big data, information sharing paradigm has been fundamentally changed: Data collection and consumption are increasingly decentralized (partly due to the advent of personal computing devices), and sharing personal data over the Internet becomes a prominent paradigm for new applications. One of these applications is Health Information Exchange (or HIE) where a patient's electronic medical...
We present NetCheck, a network policy language for verifying large-scale networked infrastructures. NetCheck is expressive enough to capture basic network properties such as reachability and maintenance, as well as more complex behaviours such as end-to-end connectivity, traffic isolation or tunnel invariance. NetCheck is fully-automated, and does not require any intervention on the network under...
People are suffering from a range of risks in the ubiquitous networks of current world, such as rumours spreading in social networks, computer viruses propagating throughout the Internet and unexpected failures happened in Smart grids. We usually monitor only a few users of detecting various risks due to the resource constraints and privacy protection. This leads to a critical problem to detect compromised...
Social networks are the major routes for most individuals to exchange their opinions about new products, social trends and political issues via their interactions. It is often of significant importance to figure out who initially diffuses the information, i.e., finding a rumor source or a trend setter. It is known that such a task is highly challenging and the source detection probability cannot be...
The issue of traffic congestion on single complex networks has been extensively studied in the past decade. Recently, interconnected network models have been developed to model the interactions between real-world systems. In interconnected networks, the coupling preference, i.e., the way to add coupling links, has great impact on the overall traffic performance. In this paper, we employ a simulated...
Given the mice-elephant phenomenon (where 80% of flows in number contribute to only 20% of traffic in volume) of TCP traffic, TCP's slow-start algorithm plays an important role in today's Internet. Designed to slowly probe the network for available bandwidth, the current standard mandates TCP flows to start with an initial window (IW) size of at most ten segments. Given the speed of the today's networks,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.