Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
The article discusses the use of the diffusion approximation in transient analysis of queueing models applied to investigate some aspects of Internet transmissions. In classical queuing theory, the analysis of transient states is complex and practically does not go far beyond M/M/1 queue and its modifications. However, the time dependent flows in computer networks and especially in Internet focus...
Nowadays, the E-Commerce plays a very important role in peoples' life; many people like to shop on Internet. At the same time, people left so much information in Internet, which include the privacy information. Malicious users in Internet can get users' privacy information with directly or indirectly way. Traditional way is to protect the directly privacy. In this paper, we proposed a schema to prevent...
Agrega is a federation of Scorm 2004 learning object repositories, with nodes situated in each of the Autonomous Regions of Spain. Each repository offers a group of services for managing and using the learning objects that it stores. The operations performed on the objects are based on the metadata described in an XML document called imsmanifest which every object has. Together with Agrega, a set...
Some network anomalous events caused by same reason (e.g., DDoS, link failure) tend to present similar unusual change on multiple traffic observations, and this part of traffic usually exhibits anomalous features either on time or frequency domain. Motivated by this fact, this paper introduces a multidimensional traffic anomaly detection method based on independent component analysis (ICA). Considering...
In recent years, the proliferation of the world wide web has lead toan increase in the number of public auctions on the internet. One ofthe characteristics of online auctions is that a successfulimplementation requires a high volume of buyers and sellers at itswebsite. Consequently, auction sites which have a high volume oftraffic have an advantage over those in which the volume is limited.This results...
Nowadays, the e-commerce plays a very important role in peoplespsila life; many people like to shop on internet. At the same time, people left so much information in Internet, which include the privacy information. Malicious users in internet can get userspsila privacy information with directly or indirectly way. Traditional way is to protect the directly privacy. In this paper, we proposed a schema...
Internet browsers, technologies, languages and applications have evolved dramatically over the last two decades. Markup languages like DHTML/XML, scripting languages like Javascript/VBScript, vector languages like VML/SVG, embedded logic with Java/Flash and server-side dynamism with Ruby/Java/C#/C++ have expanded the functionality of Internet Browsers beyond just presentation and into a data-driven...
In this paper, we develop a Web-based distributed power flow simulator (WDPFS) for a power distribution system undergoing conversion to a strategic business unit (SBU) operation for the division of the power distribution business sectors in South Korea. In the SBU, the distributed power flow algorithm should be changed as the system is divided so that each sector then needs its own operational system...
Modern telecommunication networks and classical roles of operators are subject to fundamental change.Many network operators are currently seeking for new sources to generate revenue by exposing network capabilities to 3rd party service providers. At the same time we can observe that applications on the World Wide Web (WWW) are adding more and more (real-time) communication features, mostly without...
As an important part of requirement management, managing requirement change plays a key role in controlling project schedule and costs at early stage. Effective requirement impact analysis would give proper assessment on the effect of certain requirement changes on the whole system, and provide useful information for making trade-off decisions on future system design and implementation. In this paper...
Phishing is an attempt to fraudulently acquire userspsila sensitive information, such as passwords or financial information, by masquerading as a trustworthy entity in online transactions. Recently, a number of researchers have proposed using external online resources like the Google Page Rank system to assist phishing detection. The advantage of such an approach is that the detection capability will...
This paper describes Web personalization, the essence of personalization is the adaptability of information systems to the needs of the adaptability of information system to the needs of their users. This issue is becoming increasing important on the Web, as non-expert users are overwhelmed by the quantity of information available online. The proposed approach aims to mine a reduced set of effective...
Based on the analysis of the current hybrid recommender systems, this paper proposes a new recommender system framework to overcome the disadvantage of these hybridization technologies. In the new system, various Web personalized recommending methods are integrated into a market model. It is capable of producing recommendations for the unregistered users. And a finely reasonable auction process is...
PhoneFactortrade is a token-less two-factor authentication service for user remote logons. This allows users of an organization to be authenticated through an automated phone call to the user's phone before access is allowed. In this paper, we present the service management architecture of PhoneFactor that depends on both the Internet and the public switched telephone network (PSTN), and we identify...
In order to quickly and accurately using mass information in the deep Web database. According to the characteristics of the deep Web: large-scale, dynamic and heterogeneity, One new query method was put forward based on the document divergence for the first time. The experiment adopted testing data of TREC show the method can avoid the repeat of query document in effect, especially for a great deal...
Enabling the automated deployment and maintenance of current and future services over the Internet is a difficult task and requires self-aware functions that can adapt the services offered by the network to changing customer demand, business goals, and/or environmental conditions using policies. This paper describes a process to realise static and dynamic service deployment, given an understanding...
Monitoring of Service Level Objectives (SLOs) determines an essential part of Service Level Agreement (SLA) management, since customers are to be reimbursed, if a provider fails to fulfil them. By automating this process, a timely detection of a violation is possible. The compliance approach must be flexible to adapt to potential changes, must be scalable with respect to the amount of data, and has...
With the growing number of service application, need for service platform has appeared. Various solutions were proposed to serve the applications through the existing physical network. Service overlay network is one of the solutions that provide application adaptations and service reliabilities. With this solution, we propose an architecture that composes a service overlay network dynamically to adapt...
In the paper, a new method of extracting HTML Tree from web pages is proposed. Its main idea is that the parts of web pages which are not easy to parse including tags and attributes should be handled previously, then the remaining parts are tidied and parsed, and then both the two former extracted parts are deposited in the tree. As integrated the tidying process and the parsing process, the new method...
This paper proposes a novel traffic engineering method using on-chip diorama network that consists of virtual nodes and virtual links. The diorama network is implemented on reconfigurable processor DAPDNA-2. In these years, traffic engineering has widely researched to guarantee QoS (quality of service). The proposal is an experimental solution with the on-chip diorama network, where virtual links...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.