Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Administrative Role-Based Access Control (ARBAC) models deal with how to manage user-role assignments (URA), permission-role assignments (PRA), and role- role assignments (RRA). A wide-variety of approaches have been proposed in the literature for URA, PRA, and RRA. In this paper, we propose attribute-based administrative models that unify many prior approaches for URA and PRA. The motivating factor...
The number of Internet users in Indonesia in 2020 will increase up to 136.2 million users, while the Internet traffic will increase up to 2.1 Exabyte per month. However, 88% of internet traffic goes to international link and only 12% of traffic goes to domestic server. The problem is that the current capacity of Indonesian international links is only 20 Gbps, while the the required capacity is predicted...
Due to the widespread research on Smart Identifier NETwork (SINET), its security has received much attention recently. But most of those attempts consider SINET security from the specific attack perspective. To the best of our knowledge, none so far has paid attention to the security analysis and modeling of separation mechanisms in SINET. Therefore, this paper provides a different approach to security...
The rapid development of the Internet has brought great convenience to users, but it also brought a lot of troubles to the users' information privacy exposure. This study selects the basic information of 300 users on FACEBOOK social media to cluster analysis. The data sets of users are divided into five groups by experiment, and the clustering results are classified and then discussed. By the analysis...
To address the challenges raised by the Internet usage evolution over the last years, the Content-Centric Networking (CCN) has been proposed. One key feature provided by CCN to improve the efficiency of content delivery is the in-network caching, which has major impact on the system performance. In order to improve caching effectiveness in such systems, studying the functioning of CCN in-network storage...
With the explosive growth of information on the Internet, it becomes more and more important to improve the efficiency of information acquisition. Automatic text summarization provides a good means for quick acquisition of information through compression and refinement. While existing methods for automatic text summarization achieve elegant performance on short sequences, however, they are facing...
Word representations, which are critical to the performance of convolutional neural network, has attracted considerable attention from many researchers. Two popular categories of word representations for convolutional neural network are the pre-trained representation, which requires training on external web documents, and the internal presentation, which relies on the internal text features. Although...
with the development of Internet, many companies announced the stock information by various medium, and stock buyers comment that information as well as make rational investment strategies to maximize their profit. At present, many retail investors, who lack of channels to obtain real information, scarce professional knowledge of investment theory and easy to be affected by public opinion of Internet,...
Developing models to generate realistic graphs of communication networks often requires a deep understanding and extensive analysis of the underlying network structure. Since deployed communication networks are dynamic, the findings a generator is based on might lose validity. We alleviate the need for extensive analysis of graphs by estimating parameters of a probabilistic model. The model parameters...
The conceptual issues of conducting factor analysis of enterprise's marketing activity are being discussed, in the example of digital marketing communications. The general rules and the algorithm for conducting such analysis are proposed, and its purpose is justified. The questions of how to define the causal relationships of marketing costs and results, the ability to search for reserves and the...
We propose a plant modeling and simulation methodology for ad exchanges that supports systematic design of feedback controllers, and that enables analysis and simulation-based evaluation of candidate feedback controllers. The methodology is a bottom-up technique that considers the market clearing mechanism and is based on statistical modeling of performance, performance estimates, competitive bids,...
Caches are often employed to better manage the ever-growing amount of global Internet traffic. Particularly, reverse proxies are often used to free up congested peering links and reduce inter-domain traffic. In addition, caches place content close to the edge, leading to lower latency which can be beneficial for many applications. In an effort to bring content even closer to end devices, home routers...
Electronic commerce has been grown rapidly in the last decade with the support of the Internet. Consequently, it requires retailers to improve their ability to fulfill the needs of their customers to gain satisfaction. Due to the close connection with the customer satisfaction, service quality is considered as a critical factor for the success of the service providers. This study tried to assess the...
Topic evolution analysis can deeply identify and track the trend of changes in hot topics, which helps supply entire route of the topic evolution and reasonable advice to network public opinion monitoring. OLDA topic model is a commonly used tool for topic evolution analysis. But it has problems of old and new topics mixing and massive redundant words. Considering these problems, this paper proposes...
Computer and mobile phone based crimes have increased alarmingly in India. From the unauthorized dissemination, keeping information systems secure from tampering and from unauthorized removals are the need of the hour, otherwise, the incidents of hacking, data theft, cyber bullying and now cyber extortion as well has kept the cyber security team on its toes. For this a majority of the respondents...
The Internet is one of the most rapidly developing technologies. New protocols for the Internet are always developing. This article focuses on the way to simplify development process of new protocols and modeling of network devices. In this paper there is presented general solution architecture and main functional blocks are described. The main objective of this work was to create a general-purpose...
In these recent years, a new channel of tuition fee payment using Internet banking has been introduced to Indonesian students. However, based on obtained data field, payment method using Internet banking service has turned out to be not quite popular among the students. The development of this study is adapted from Chan and Lu [4] research model about Internet banking service adoption in Hong Kong...
The vast majority of Internet traffic is carried by content delivery networks. A high potential to bring content even closer to consumers and to reduce energy cost is achieved by the nano data center (NaDa) concept that has been proposed in recent work. In this approach the capacity available on small devices such as home gateways is used to support content delivery in an hierarchical caching system...
Critical infrastructures as water treatment, power distribution, or telecommunications, provide daily services essential to our lifestyle. Any service discontinuity can have a high impact into our society and even into our safety. Thus, security of these systems against intentional threats must be guaranteed. However, many of these systems are based on protocols initially designed to operate on closed,...
In-network content caching is an inherent capability of Content Centric Networking (CCN) architecture. Undoubtedly, efficient caching strategies can help CCN networks to achieve high performance content dissemination. In general, there are two types of caching strategies: collaborative and non-collaborative caching strategies. Compared with non-collaborative caching strategies, collaborative caching...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.