The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The conception of the pseudonondeterministic cryptography is considered. Multiplied data-driven pseudonondeterministic hash constructions, which provide infeasibility increasing against generic attacks based on the multicollision designing, were proposed. The estimations of the infeasibility increasing were presented. The instances of the data-driven pseudonondeterministic hashing methods, which could...
In this study, a new academic event recommendation method is proposed. This method analyzes author interactions, academic event attendance records, research related, and textual descriptions from attended academic events to measure interaction strength between authors. Experiments on the DBLP dataset and Wiki Calls for Papers (WikiCFP) showed that the proposed method is helpful in improving the accuracy...
Early detection of depression is important to improve human well-being. This paper proposes a new method to detect depression through time-frequency analysis of Internet behaviors. We recruited 728 postgraduate students and obtained their scores on a depression questionnaire (Zung Self-rating Depression Scale, SDS) and digital records of Internet behaviors. By time-frequency analysis, we built classification...
Content Delivery Network (CDN) services largely affect the delivery quality perceived by users. While those services were initially offered by independent entities, some large ISP now develop their own CDN activities to control costs and delivery quality. But this new activity is also a new source of revenues for those vertically integrated ISP-CDNs, which can sell those services to content providers...
In order to better understand the emergence of online social networks, researchers usually employ state of the art synthetic topological models which can replicate some of the observed real-world social network characteristics. However, these characteristics rely on the analysis of common graph metrics at a certain point in time, when the snapshot of the real-world data is obtained. In other words,...
Zero shot learning (ZSL) provides a solution to recognising unseen classes without class labelled data for model learning. Most ZSL methods aim to learn a mapping from a visual feature space to a semantic embedding space, e.g. attribute or word vector spaces. The use of word vector space is particularly attractive as compared to attribute, it offers vast auxiliary classes with free parts embedding...
The thousands of streaming data overwhelmingly provide for Internet users on Twitter every day, especially for those Twitter users with many friends. However, the useful tweets that users are really interested in personally could be covered by massive other uninformative and uninteresting information. Therefore, how to bring immediately the interesting tweets for users is always a challenging issue...
Mathematical Models Database (MMD) is an online repository of mathematical models that can be easily used for research purposes, in teaching or in performing comparative tests. In a single free-of-charge, freely accessible Internet service all the data from the database is available with an expected (in its final form) several ready-to-use models, either purely mathematical or physics-based. Apart...
Behavior-based recommendation algorithm is one class of the most important methods in recommendation systems. A variety of models are researched for a long time, such as collaborative filtering, graph-based models, matrix factorization and so on. Different characteristics in many aspects of these methods are also be analyzed. In this study, we design a new similarity measure from the perspective of...
This paper describes a linear programming (LP) approach for solving the network utility maximization problem. The developed approach is inspired by a convex relaxation technique from non-convex polynomial optimization methods. In contrast to most of the existing results where concavity of the network's utility function is often assumed, the proposed LP approach may still be used to solve the NUM problem...
Teaching in university engineering departments is currently facing a number of challenges, especially for those involved in the most innovative and dynamic areas of information and communication technology. Learning model developments that place greater weight on laboratory activities require investment in specific equipment that is often very expensive, difficult to manage, and soon obsolete. This...
In this paper we deal with the Internet Shopping Optimization Problem. An extended model that includes price sensitive discounts is considered. A set of algorithms to solve the Internet Shopping Optimization Problem with Price Sensitivity Discounts (ISOPwD) is introduced. The algorithms are designed to consider a different solution quality regarding computational time and results close to the optimum...
With the development of computer science and technology and the further progress of IC fabrication, GPU-accelerating computer systems are more and more widely used to provide higher performance on HPCs(High Performance Computers) and even regular desktop and laptop computers. Almost the same time, the Internet era and the rise of mobile Internet produced PBs of data. Bulk data are useless until carefully...
The lasting popularity of many social Q&A websites, such as Yahoo! Answers and ResearchGate, has become valuable knowledge repositories for people to search for answers to questions in various aspects in life. Finding the most relevant questions is often a non-trivial task, and a fine-grained classification system of questions will be an important aid. Existing work mainly focused on classifying...
Traditional enterprises should change their marketing strategy, business model, organizational structure and etc. to cope with the new market in the Internet age. Duo to the above requirement, the conception of Internet Thinking (IT) is created in China. Although many scholars have done a lot of research on this field about the company operating at the context of Internet and a few Chinese researchers...
Rumor propagation has become a major area of social network research. There are some existing models that combine rumor propagation and trust network, but the trust degree is constant in these models without considering the influence of rumor propagation on trust degree among nodes. This paper put forward a rumor propagation model (DTM) which is based on two-level-mixing SIR epidemic model [1] and...
In this paper, a method for the formation control of high-altitude balloons is developed. This method uses a distributed extremum seeking controller implemented at each balloon. The controller works to minimize a cost function based on the number of users connected to each balloon. This cost function is designed so that the balloons tend to spread themselves out evenly over Earth. The control approach...
We consider the problem of routing and resource allocation in a multi-layer network loaded by a combination of constant bit-rate (CBR) and variable bit-rate (VBR) traffic streams. One scalable heuristic method that addresses this problem is the multi-layer market algorithm (MMA). In this paper we focus on two validation benchmarks of MM A by Integer Linear Programming (ILP). The first is based on...
This article investigates how information diffuses in Douban, an online social network. First, we analyze properties of the user relationships in Douban, observing its degree distribution, network reciprocity, and degree of separation. Second, we propose a method that infers how the information diffuses through this network. Subsequently, using this method we rebuild possible information diffusion...
This paper discusses the need to include the IPv6 protocol in the curricula associated with Informatics and Computing Engineering. It provides a concrete example of how it was incorporated in Computer Engineering at Universidad Nacional de Tucumán. Presents a three-stage plan for the full articulation of the subject in the area of computer networks, and how this plan is currently being implemented...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.