The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Amazon.com is among the largest bookstores on the Internet. It provides the sales rank of each book. Our hypothesis is as follows: if a book has low sales rank (i.e., it is well-sold), the related book also has a low sales rank. In the small world principle, if a network is connected, any two nodes are connected with relatively small number of links. If this hypothesis is true, any book can link to...
Chant and cantillation research is particularly interesting as it explores the transition from oral to written transmission of music. The goal of this work to create Web-based computational tools that can assist the study of how diverse recitation traditions, having their origin in primarily non-notated melodies, later became codified. One of the authors is a musicologist and music theorist who has...
Web-based workflow systems have emerged in almost every business because they can support dynamic business processes over heterogeneous computing systems which is the requirement of a modern business. At the same time security and flexibility have become the two most important aspects in those systems. Role-based access control has been injected to Web-based workflow systems to control access (without...
Prior research found that the majority of blogs are personal and relational in nature where bloggers reveal intimate information about themselves and target their public posts to their off-line social networks. These personal-journal style blogs expose their authors to potential privacy risks. Bloggers may choose to conceal their identities to mitigate the privacy concerns or disclose their identities...
As an important type of social media, the political Web forum has become a major communication channel for people to discuss and debate political, cultural and social issues. Although the Internet has a male-dominated history, more and more women have started to share their concerns and express opinions through online discussion boards and Web forums. This paper presents an automated approach to gender...
Designing massive, parallel applications, for the Grid,poses a totally different and unique set of challenges for the grid application developers. This paper describes Gridhra, , a dasiagrid-awarepsila parallel debugger designed to cater to the grid specific challenges in debugging. The remote parallel debugger is Web based and is deployed using the Web Launch architecture. Gridhra supports debugging...
Peer sampling - the capability of obtaining a random sample from a large population of peers - is a basic building block for the gossip paradigm. Current peer sampling services have been designed for ''first-class'' citizens of the Internet: peers that are able to accept incoming, sporadic connections. Unfortunately, the vast majority of peers do not belong to this class, as they are behind firewalls...
Research in the area of peer-to-peer systems is mainly focused on structuring the overlay network. Little attention is paid to the process of setting up and joining a peer-to-peer overlay network, i.e. the bootstrapping of peer-to-peer networks. The major challenge is to get hold of one peer that is already in the overlay. Otherwise, the first peer must be able to detect that the overlay is currently...
Though plenty of research has been conducted to improve Internet P2P streaming quality perceived by end-users, little has been known about the upper bounds of achievable performance with available resources so that different designs could compare against. On the other hand, the current practice has shown increasing demand of server capacities in P2P-assisted streaming systems in order to maintain...
In recent years, there are substantial demands to reduce packet loss in the Internet. Among the schemes proposed, finding backup paths in advance is considered to be an effective method to reduce the reaction time. Very commonly, a backup path is chosen to be a most disjoint path from the primary path, or in the network level, backup paths are computed for all links (e.g., IPRFF). The validity of...
Emerging virtualization technologies are making ubiquitous access to on-demand computing, network and storage resources to deliver various applications over public Internet. In this paper we present how the telecom operation support systems (OSS) that provide enterprise to enterprise (E2E) transactions, switching management, on-demand service management and scalability have evolved to provide next...
The ever growing request for digital information raises the need for content distribution architectures providing high storage capacity, data availability and good performance. While many simple solutions for scalable distribution of quasi-static content exist, there are still no approaches that can ensure both scalability and consistency for the case of highly dynamic content, such as the data managed...
The Google search engine employs the so-called PageRank algorithm for ranking the search results. This algorithm quantifies the importance of each Web page based on the link structure of the Web. In this paper, we continue our recent work on distributed randomized computation of PageRank, where the pages locally determine their values by communicating with linked pages. In particular, we propose a...
Rank aggregation is the problem of generating a single consensus ranking for a given set of rankings. Rough set based Rank aggregation is a user feedback based technique for rank aggregation, which learns ranking rules using rough set theory. In this paper, we discuss an improved version of the rough set based rank aggregation technique, which is more suitable for aggregation of different Web search...
Recent endeavors in addressing the challenges of the current and future Internet pursue a clean slate design methodology. Simultaneously, it is argued that the Internet is unlikely to be changed in one fell swoop and that its next generation requires an evolutionary design approach. Recognizing both positions, we claim that cleanness and evolution are not mutually exclusive, but rather complementary...
In recent years many approaches into Web-content development methods can be observed. In spite of many similarities in their description and formats; as in Dublin Core or LOM (learning object metadata), the characteristic features of these descriptors have not been strictly defined yet. What is more complexity of the available standards brings the user with difficulties to use them. The paper introduces...
A bloom filter is a simple space-efficient randomized data structure for representing a set in order to support membership queries. Bloom filters and their generalizations, weighted bloom filters and compressed bloom filters have been suggested as a means for sharing Web cache information. In this paper, a summary about the current research and application on bloom filter is first given, and then...
We consider networks offering tiered services and corresponding price structures, a model that has become prevalent in practice. We develop an economic model for such networks and make contributions in two important areas. First, we formulate the problem of selecting the service tiers and present an approximate yet accurate and efficient solution approach for tackling this nonlinear programming problem...
We have implemented the CID(Caller Identification) system based on the web Internet. The system can connect a wire or wireless phone to the computer. A transmitting signal of the phone before starting the voice communication be displayed on PC, and connects with the GPS. Here the GPS signal informs the position information of an object with a satellite. Then the CID presents several information of...
Digital rights management (DRM) is a popular tool used to protect digital contents with cryptographic technology. But there are many different DRM encryption formats that are adopted by different content providers, causing consumers canpsilat play their contents on devices with different DRM format even though they bought it legally. In this paper, we employ identity-based encryption to allow a conversion...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.