Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Weblog becomes an important channel among people in the digital society. How to operate a successful Weblog is a momentous task. A good or successful Weblog depends on many factors. This paper is to investigate and compare the different influence factors for an effective and successful Weblog. Firstly, a questionnaire with several design factors is going to be distributed and collected from experts...
The evolution of the World Wide Web has progressed from simple, classic Web pages with text and static images only to Web 2.0 pages with rich multimedia content, mashups and desktop-style applications. The cornerstone of Web 2.0 technologies is an API called XMLHttpRequest - an interface that allows network requests to be performed asynchronously without blocking the user interface of the Web browser...
The endless amount of information on the web, known as ldquolost-in-hyper-space syndromerdquo, easily overwhelms users. User profiles are used as a means to support extracting relevant information by indicating user interests. In this paper, we propose a new method to develop and maintain a user profile by analyzing user's web access behavior. We propose an ontology-based semantic similarity measure...
Grid computing integrates scattered clusters, servers, storages and networks in different geographic locations to form a virtual super-computer. Along with the development of grid computing, dealing with the data distribution requires a method which is faster and more effective for parallel applications in order to reduce data exchange between clusters. In this paper, we present two methods to reduce...
The usage of the operating system, web browsers and other software applications leave activity traces that can represent confidential (sensitive) data. Specialized software products can identify most of these sensitive areas, however they do not offer an open architecture that allows the user to define his own sensitive areas. This paper implements an open definition language, called Open Sensitive...
Traffic measurements from communication networks have shown that network traffic is exhibiting self similar as well as long range dependence properties. In telecommunication networks, congestion events tend to persist, producing large delays and packet loss resulting in performance degradation. In order to guarantee quality of service to diverse Internet services, congestion prediction became a fundamental...
In this work we define the term of phonebook centric-social networks, describe a graph model and study structural properties of this. The key difference between phonebook-centric social networks and usual social networks is allowing synchronization between the phonebook of the mobile phone and the network. By the synchronization the goal is to identify the persons listed in the phonebook and the network,...
Many techniques have been proposed by the research community to mitigate the effect of flooding denial of service (DoS) attacks. The effects of DoS attacks are aggravated by the ability of attackers to hide the source of the attack packets. A widely used class of solutions. (e.g. trace-back) is based on marking packets, from source to destination, by intermediate routers and selectively blocking packets...
In this paper, we propose a method to classify Web documents by genre (not by topic) based on features of words and HTML tags. For classification, we use SVM (support vector machine) and Naiumlve Bayes. In order to improve the accuracy of classification, we calculate discriminant efficiencies of each pair of a word and a HTML tag to find out HTML tags which are effective in classification. The experimental...
In recent years, the ubiquity of communication networks speed up the development of wireless network and the Internet applications. In addition to the common service provided by the telecommunication enterprise, how to connect some distinct users to form a network which allow them to deal with their own works is a popular topic that many scholars engage in. When constructing the network, the key management...
We carefully investigate humanity's intuitive understanding of trust and extract from it fundamental properties that succinctly synthesize how trust works. From this detailed characterization we propose a formal, complete and intuitive definition of trust.Using our new definition, we prove simple possibility and impossibility theorems that dispel common misconceptions, expose unexplored areas in the...
In the last few years, several works in the literature have addressed the problem of data extraction from Web pages. The importance of this problem derives from the fact that, once extracted, data can be handled in a way similar to instances of a traditional database, which in turn can facilitate application of Web data integration and various other domain specific problems. In this paper, we propose...
We propose a novel, passive, nonintrusive method to measure the one-way delay of all the packets flowing between customer sites connected by a provider backbone. Our approach does not sample traffic and requires the injection of a negligible amount of control packets, possibly none. This is obtained by deploying a Measurement Agent in each customer site and exploiting a covert channel to carry information...
The extensive dynamic capabilities of the browser allow for platforms of infinite extensibility and omni-functional power to be delivered via the Internet. This paper considers the possibilities of converting Web pages into an intelligent immersive omni-functional platform with special focus on calculations. Such standards-compliant documents with omni-functionalities (enhanced by calculations, but...
Nowadays the enterprise informatization is more and more important in the development of an enterprise. With the development of enterprises' informatization construction, more attention than ever before is paid to the security of information management RBAC, as a substitute of traditional access control mechanism Discretionary Access Control (DAC) and Mandatory Access Control (MAC), the concept can...
The respond of traditional Web application to user interface is slow and wasting bandwidth, which bring user a lot of inconvenience, while the emergence of Ajax has changed this situation. Ajax can maintain data without refreshing the page, which greatly reduce the time of waiting for a large number of exchanged data for user. The advantages of both is fully demonstrated by the support which Struts2...
Significant amount of text-based knowledge is created in collaborative Web-based environments in the context of education. In order to efficiently utilize all this information, there is a need to provide the users with an easy access to the information they are interested in. To achieve this, various methods of information retrieval (IR) can be used. We analyze six different algorithms for seeking...
Advances in the areas of embedded systems, computing, and networking are leading to an infrastructure composed of millions of heterogeneous devices. These devices will not simply convey information but process it in transit, connect peer to peer, and form advanced collaborations. This "Internet of Things'' infrastructure will be strongly integrated with the environment, and its integration with...
The revolution in information technology is making open sources more accessible, ubiquitous, and valuable. The International Intelligence Communities have seen open sources grow increasingly easier and cheaper to acquire in recent years. Up to 80% of electronic data is textual and most valuable information is often encoded in pages which are neither structured, nor classified. The process of accessing...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.