The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Smart objects (SOs) have been utilized widely to transform the physical environment around us to a digital world using the Internet of things (IoT) vision. Integrating a huge number of these devices into the Internet presents a significant necessity for an efficient discovery mechanism with high capability of an autonomous configuration and detection for theses devices and their provided services...
Delay and Disruption tolerant networking (DTN) embraces the concepts of occasionally-connected networks that may suffer from frequent partitions and that may be comprised of more than one divergent set of protocols or protocol families. Since DTN was conceived to relax most of the assumptions associated with Internet protocols, the most important of which is the availability of an end-to-end path...
Service engineers often struggle to locate the relevant Web services needed to satisfy users' requests. The authors describe how service engineers can capitalize on Web services' interactions — namely, collaboration, substitution, and competition — to build social networks for service discovery. Through these networks, Web services identify those peers with which they'd like...
With the quick increase of web services on the Internet, how to discover proper services efficiently in a large number of web services becomes more and more difficult. Services discovery efficiency can be improved greatly after services have been classified well, so an algorithm of clustering services which uses graph theory and a corresponding algorithm of discover services are proposed in this paper...
In this paper, we analyze the problems of existing Service Computing model and propose a closed-loop mechanism for service evaluating and discovering on the Internet which is not only compatible with the basic principles of Service Computing--loosely coupled, protocol independent and location transparent, but also can rank, classify and recommend services based on their real-time performance. This...
With the rapid expanse of the web service over the internet, discovering relevant web services becomes a significant challenge. To tackle this problem, a service-discovering framework based on behavioral equivalence is proposed in this paper. First, pi-calculus as a formal tool is adopted to express service behavior, including the published services and the query services. Then, the reverse engineering...
The majority of virus, spam and malicious emails are sent through the use of a network of compromised computers, or botnet. The early discovery and identification of the botnet is an important aspect in the understanding of, and the development of responses to new threats aimed at email systems and their users. In this paper we present a novel technique for the automatic identification, analysis and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.