Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Prior solutions for routing to multi-instantiated destinations (e.g., Internet multicasting and any casting, and routing in information centric networks) simply adapt existing routing algorithms designed for single-instance destinations, or rely on flooding techniques. As a result, they are unnecessarily complex and incur excessive overhead. A new approach for routing to multi-instantiated destinations...
The electrical engineering approach to cache coherence is defined not only by the study of IPv7, but also by the natural need for A search 12. In fact, few cyberneticists would disagree with the valuation of write-back caches. Grafter, our new algorithm for cacheable configurations, is the solution to all of these problems.
With the rapid growth of the Internet, the importance of application traffic analysis increases for efficient network management. The statistical information in traffic flows, can be efficiently utilized for application traffic identification. However, the packet out-of-order and retransmission generated at the traffic collection point reduce the performance of the statistics-based traffic analysis...
Many scholars would agree that, had it not been for the partition table, the visualization of journaling file syste ms might never have occurred. In this work, we confirm the typical unification of Internet QoS and red-black trees, whi ch embodies the typical principles of hardware and architecture. This at first glance seems counterintuitive but is buffetted by prior work in the field. In order to...
The analysis on text emotional has attracted much attention as the explosive growth in data on the Internet. This paper proposed a method of sentence sentiment orientation based on syntactic construction which is quite different with the traditional methods of classification. It takes full account of logical relationship in sentences and establishes a sentence model of three layers according to the...
Recently, with wide use of computer systems, internet, and rapid growth of computer networks, the problem of intrusion detection in network security has become an important issue of concern. In this regard, various intrusion detection systems have been developed for using misuse detection and anomaly detection methodologies. These systems try to improve detection rates of variation in attack types...
As the smartphone market increasingly gains its prosperity nowadays, Internet traffic generated by mobile terminals is also booming. The detailed traffic flow data is helpful to discover association relationship of applications and user behavior patterns. In this paper, we study the correlation of mobile apps based on a mobile network traffic dataset from a data mining perspective. This dataset is...
Withstanding multiple false identities, also known as a Sybil attack, is one of the main challenges in securing structured peer-to-peer networks. Poisoning routing tables through these identities may make the routing process, needed for storing and retrieving resources within a DHT (Distributed Hash Table), extremely difficult and time consuming. We investigate current possible countermeasures and...
The SICH Project specific objective is to develop new strategic tools and assessment techniques, based on semantic analysis on texts, to support the dynamic mapping and the automatic identification of illegal content over the Net. Xenophobia/Racism, illegal online Gambling and Novel Psychoactive Substances (NPS) are the main areas of reference. In this paper the authors present a systems based on...
The reliability of a communication network is important, as the Internet is an important social infrastructure. However, especially in a large network, it is difficult to avoid the failures due to various factors. It is necessary to design a network that keeps communication among nodes even during failures. However, in many actual networks, there exists the risk of telecommunication blackout by a...
In this work, the performance of 5 representative caching replacement policies was investigated and compared for caching Internet video-on-demand (VoD) in local access networks. Two measured traces of end-user requests were used in the analyses for two typical VoD services: TV-on-demand and user generated content represented by YouTube. The studied policies range from simple least recently used (LRU)...
Opinion leaders are core users in online communities, who can guide the direction of the public opinion. With the rapid development of microblog, identification of the microblog opinion leaders has become a significant task. In this paper, we propose a hybrid data mining approach based on user feature and interaction network, which includes three parts: a way to analyze users' authority, activity...
Recently, large contents in the Internet have increased loads of contents servers, networks and data centers, which may degrade the quality of services. To overcome this problem, some mirror servers providing the same contents are located on a network and a request is navigated to one of the mirror servers. A user must access to one of the servers and the hop length of a path from a user to a server...
Search engines have become the main way for people to get expected information, most of them are based on keyword search. However, keyword search is based on computing the similarity of letters of the keywords, instead of semantic meaning, therefore the searching results often include irrelevant information to user intention. This paper aims to find a way on improving keyword search efficiency. Using...
In this study, the discrete-time performance of BLUE algorithms under bursty and correlated traffics is analyzed using two-state Markov-modulated Bernoulli arrival process (BLUE-MMBP-2). A two-dimensional discrete-time Markov chain is used to model the BLUE algorithm for two traffic classes, in which each dimension corresponds to a traffic class and the parameters of that traffic class. The MMBP is...
At present, researches on user preferences are becoming increasingly widespread. Traditional researches use simple cosine similarity algorithm to calculate the similarity between users and just focus on one factor. So this paper study a more complete preferences research method and consider more factors of network to analyze data. This paper gives content-based recommendation algorithm based on the...
In the past few years, the network is an essential part in human's life. More and more people choose shopping, chatting and video online. All the online activities produce tons of data which contain our behavior characteristics. Traditional data analyses just focus on one kind of feature, while they neglect the behavior information generated by merging multiple features. Based on the basic data set,...
Energy saving in the Internet has become important since the massive new applications are increasing tremendously, along with their energy consumption. In this paper we propose an energy efficient algorithm based on multi-topology routing. Since traffic flow dynamically changed in actual IP network scenarios, the proposed algorithm has to adapt the network energy consumption to daily traffic scenarios...
The host cardinality refers to the number of different peers that an Internet host communicates with. Stealthy superpoint is a host that its cardinality is between two thresholds during a measurement period. Detecting stealthy superpoints helps intrusion systems identify potential attackers. However, stealthy superpoints may perform scanning deliberately at a low rate, and they can easily evade the...
Detecting anomalous traffic with low false alarm rates is of primary interest in IP networks management. In this paper we propose a novel anomaly detection system, based on a combined use of sketches and of a novel bivariate non-parametric detection method. The latter allows us to simultaneously analyse two different traffic features so as to improve the performance of the "classical" detection...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.