The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Most flows in the Internet run over TCP and most flows in the Internet are short. These TCP flows are predominantly disadvantaged in networks due to their short time to react to the environment along the flow path. There are arguments proposing TCP to favor short flows to counter such imbalance. It would improve user experience, reduce energy consumption of wireless devices and bring economic benefits...
CUBIC TPC is a congestion control algorithm for TCP. It is the current default TCP algorithm in Linux. Because many Internet servers, such as web servers, are running on Linux operating system, keeping throughput obtained with this TCP algorithm enough is quite important. Then, many performance studies have been published. However, most of these studies were based on network simulators. Thus, evaluations...
In Internet of Things (IoT), both physical things (such as devices, gateways and commodities etc.) and virtual things (like multimedia content and application software) are assigned unique IoT identifiers (IoT ID), which are similar to the domain name used for locating online resources in Internet. However, until now the format of IoT ID is not globally unified due to all kinds of reasons and thus...
Archiving of Internet traffic is essential for analyzing network events in the field of network security. Currently, bitmap indexing is used to accelerate the indexing and search queries for archival traffic data. However, the generation of bitmap index needs large storage space, which makes bitmap index compression is a must-have function. In this paper, we propose a new bitmap index encoding algorithm...
The host cardinality refers to the number of different peers that an Internet host communicates with. Stealthy superpoint is a host that its cardinality is between two thresholds during a measurement period. Detecting stealthy superpoints helps intrusion systems identify potential attackers. However, stealthy superpoints may perform scanning deliberately at a low rate, and they can easily evade the...
“Tell Me What” is smart phone based image recognition system, and it is also an automatic pipeline for generating image recognition systems to recognize an arbitrary set of entities. For any given set of entities, “Tell Me What” backend system automatically fetches related image data from the Internet for each entity, and then run a comprehensive data cleaning process to purify the data. A multi-class...
O2O E-commerce is booming. The consumer trust is important to the development of O2O, so this paper studies the related factors of consumer trust degree of O2O in four dimensions, including customer factor, vendor factor, website platform factor and transaction environment factor. We set up a comprehensive evaluation method based on Analytical Hierarchy Process and the fuzzy analysis. Empirical analysis...
Organizational patterns are known as the basis for Agile software development movement. Patterns usually form a network having relationships among them to support users understand and utilize patterns efficiently and effectively. However little is known about the nature of pattern networks, such as how are organizational patterns different from other patterns from the viewpoint of centrality. To clarify...
In contrast to conventional cyber attacks such as mass infection malware, targeted attacks take a long time to complete their mission. By using a dedicated malware for evading detection at the initial attack, an attacker quietly succeeds in setting up a front-line base in the target organization. Communication between the attacker and the base adopts popular protocols to hide its existence. Because...
Since adversaries may spoof their source IPs in their attacks, traceback schemes have been proposed to identify the attack source. Among these methods, Hybrid IP traceback schemes fuse packet marking and packet logging, using only one packet for traceback and reducing the storage requirements during packet logging. However, if a hybrid traceback scheme logs a packet's digests on a router, the router's...
Online Social Networks (OSNs) provide users with an easy way to share content, communicate, and update others about their activities. They also play an increasingly fundamental role in coordinating and amplifying grassroots movements, as demonstrated by recent uprisings in, e.g., Egypt, Tunisia, and Turkey. At the same time, OSNs have become primary targets of tracking, profiling, as well as censorship...
Pirated software used to be distributed through physical exchange. The Internet, however, is increasingly being used to distributed pirate software. P2P networks, one-click hosting site, and bit-torrent indexing site are typical examples. To block illegal distribution of software through the Internet, we must identify software stored and distributed on such sites. In this paper, we propose a new scheme...
Reducing the energy footprint of warehouse-scale computer (WSC) systems is key to their affordability, yet difficult to achieve in practice. The lack of energy proportionality of typical WSC hardware and the fact that important workloads (such as search) require all servers to remain up regardless of traffic intensity renders existing power management techniques ineffective at reducing WSC energy...
This study compared the quality of e-commerce of rail ticket reservation system among one government-owned and two privately-owned agencies in Indonesia. The best two private agencies were chosen based on popularity and award won. There is lack of research interest in the transportation domain, particularly in developing countries, even though some studies existWe applied WebQual method as website...
Due to the tremendous growth of mobile data traffic, some technologies from small cell deployment are still ongoing as nominated solutions. Without enlarged wired backhaul capacity, however, the performance of small cell techniques are inevitably degraded. The approach employing the storage capacity in order to off-load the backhaul capacity, as known as femto-caching, has been proposed to minimize...
With the swift progress of information and technology, the notion of e-Government and e-Society has occupied a substantial contour which is now acting as one of the main drivers to reform the prevailing society in different countries of the world. More and more governments around the world chase this phenomenon anticipating to lessen costs, develop services and upturn effectiveness and proficiency...
Designing an efficient search algorithm is a key challenge in unstructured peer-to-peer networks in order to reduce redundant messages in the search process. Addressing the problem, in this paper, a path tracking search algorithm based on the credibility of node service ability(CNSA) is proposed. we utilize the credibility of node service ability as heuristic information to probabilistically guide...
Information and Communications Technologies (ICT) has become an essential tool for development worldwide. As several literature studies confirm, the development of the ICT industry and the massification of internet use conveys important social and economical benefits. Research, development and innovation (R&D&i) activities are crucial for countries in order to improve the social welfare, and...
Wireless Community Networks in the developing world satisfy the basic needs of remote users to information access. However, community networks in developing regions usually rely on low-bandwidth backhaul links that are shared amongst a large user base, driving these links to sub-packet regimes where the per-flow throughput is less than one packet per RTT. TCP performance significantly degrades in...
As usage of information technologies developed, governments decided to provide some of their services through these technologies for increasing their efficiency and productivity. Islamic Republic of Iran's government like other countries try to progress in this way. In this paper we try to evaluate the progress of e-government in Iran by using variety of sources and find strength and weaknesses of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.