The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This positional paper gives an overview of some critical issues concerning collective awareness platforms. It shows how collective awareness could reconcile asymmetric and conflicting relationships to pursue the improvement of structures within society. It also shows the opportunity for public administrations and policy makers to create conditions for collective participation. Collective intelligence...
This position paper introduces INSPECTOR a platform of integrated service for the creation of future and emerging management of research communities based on distributed system models, methods, techniques and algorithms having interaction support with the Internet. The distributed environment is required in both dimensions: storage and computation. The storage is the base for data aggregation and...
In recent decades with increasing of global economic competition, small and medium scale industrials (SMEs) have known as an economic growth engine and a tool for employment. Therefore, they have important role in growth and development of countries. In order that these firms can compete in the world and they use the advantages of information technology requires infrastructures which provides electronic...
The purpose of this paper is to describe a new emerging science: Internet science. This paper argues that current Internet is a direct by-product of Shannon's Information theory and its master thesis. After that I attempt a general and generic definition of a network and discuss the different alternatives. This discussion results in defining a network as a set of distributed actors cooperating for...
Compared to traditional channels, Internet transactions are intrinsically untrustworthy in nature. We investigate the impact of social identity and reciprocity on trusting and cooperative behavior in dynamic gift giving networks by means of an online laboratory experiment, with a main focus on value transfers among the users individually and directed towards the group. In this study, we display profile...
In the presence of communication network, we can access both the content-provider and utility-provider to reduce the congestion and traffic flow in the network analysis. In this paper, we propose the segmentation process to allow the file in the network without congestion and upload it to the server with minimum price [1]. If we upload the file to the server, it will segment into the file as ten parts...
New technology-based firms, particularly those that develop their business around a new technological platform, are likely to be impacted by globalization, in terms of both pace of innovation and pressure of competition. In practice strategic decisions concern each of these processes and address issues such as organizational boundaries, location of the operational activities, what activities to focus...
The Internet of Things (IoT) paradigm focuses on a network of objects, where devices communicate with human beings as well as other devices. This paper focuses on the identification of suitable metaphors and concepts for building IoT applications. It proposes an approach grounded on the contextualization of objects and their information in one or more spaces of things, defined according to different...
In the recent years the following two trends have been accelerated: on the one hand, as Content Services became at the center of Internet usages, OTTs strengthen their position. On the other hand, in several cases, Telcos are seeing their role shrinking to “dumb pipes” providers. This paper introduces advanced Telcos' positioning in future content distribution services. In particular, it focuses on...
This paper presents Halos Networks as an architectural paradigm for developing ubiquitous networking and computing services at the edge of the networks A Halos Network is like a wireless network spontaneously emerging through the interactions of distributed resources embedding wireless communication capabilities. Halos Networks are capable of delivering services and data virally through multiple devices,...
In this paper we present a new approach for the automatic identification of domain-relevant concepts and entities of a given domain using the category and page structures of the Wikipedia in a language independent way. By applying Markov random walk algorithm on the weighted Wikipedia link graph, our approach can identify large quantities of domain-relevant concepts and entities with very little human...
Currently, Network worm has become one of the major threats to internet, Contrary to the deficiencies in propagation model and defense technologies of Network worm. In order to improve the lack of propagation laws and propagation model of the existing network benign worm, proposed network benign worms model based on a hybrid mechanism, Established the mathematical model of communication, through analysis,...
In the last years one of the main concerns of the software industry has been to reengineer their legacy Web Applications (WAs) to take advantage of the benefits introduced by Rich Internet Applications (RIAs). In this context, Model Driven (MD) Web Engineering approaches have been extended with new modeling primitives to obtain the benefits provided by RIA features. However, during the last decade,...
The use of social networking sites, such as Twitter, for various purposes, continues to grown since its first appearance. This social net is a microblogging site to share short messages on a variety of topics. In particular, political elections are a very interesting field to exchange views using this platform. In this paper we have used Spanish elections to investigate the use of Twitter for this...
The ramping up of services in recent decades, coupled with technological development, has supported the emergence of virtual markets and stable with continued growth potential in Latin America and with high potential for developing the strategy of the organizations that can exploit this new opportunity. This study is an initial measurement of perceived service quality of internet shoppers, a scale...
This paper contains analysis and simulation of recent dynamic models, describing human emotion. The pharmacological discussions lead to a new model of drug taking, which also have a better performance for description of psychological and psychiatric phenomena. Studying the effects of the order of fractional model, obtains an advantage of the fractional order model over the integer order one.
Passing through ten more years of development, online travel agencies (OTAs) have grown up and attracted a big share of individual and business travelers, while travel websites have become the intuitive and effective information facility. However, with the fast scale expansion of domestic users and online suppliers, OTAs now have to face the fierce homogenized and price-oriented competition, which...
In this paper the uncertainties and the implied level of risk associated with next-generation network architectures is modelled using Monte Carlo simulation, aimed at understanding network economics evolution. A high number of network parameters - like incremental network deployment, data centre location, network architecture, service mix, traffic growth and subscriber take-up - are modelled. A wide...
A major problem facing the full deployment of business-to-consumer (B2C) electronic commerce (e-commerce) is the development of trust on the side of the consumer, particularly in developing countries. Differing characteristics of local environments and their cultures have created a significant level of variation in the acceptance and trust to e-commerce and e-transactions. Exploring influencing factors...
Many authentication schemes are being strategized which at least involves minimum two authentication procedures. For instance many multi Factor Based authentication implies that simply authentication mechanism is not sufficient, either serial or parallel implementation of few or best of them is necessary. However many authentication schemes become a success in one case may terribly fail in another...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.