The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The objective of Malicious Remote Code Execution Exploits is to remotely execute code transparently to the user, and without relying on user interaction, in order to infect targeted machines. This comparative study examines the effectiveness of different proactive exploit mitigation technologies included in popular endpoint security products and specialized anti-exploit tools. The study focuses on...
The exploding volume of network traffic and expanding Quality of Service (QoS) requirements from emerging multimedia and interactive applications in the last decade demand improved internet traffic engineering techniques. In particular, traffic classification and packet marking became essential components for end-to-end QoS assurance of different traffic classes. In this paper we present WekaTIE,...
The Multifunctional Gateway Sensor Node is an extension of the Gateway sensor node of Wireless Sensor Network having multiple functionalities. Addendum of functionalities comprise different types of technologies which are LCD Color display, keypad to operate Gateway Node, AVR camera and solar panel for additional power support. The node itself also acts as a weather station based on Fuzzy AHP for...
Widespread adoption of Internet of Things (IoT) applications assumes a sustainable ecosystem of firms creating, distributing, and using these applications. Such an ecosystem often forms around a platform that implements commonly used functionality and offers it to the members of the ecosystem for creating applications and services. In IoT, such a platform may be materialized in a form of a cloud platform...
YATIRI is the Tourist Information Platform of region Puno for mobile devices, which provides timely and updated information about the tourist attractions of the region Puno, for local and foreign tourists who visit this tourism destiny. This information is shown on mobile devices (mobile phone, smartphone, Tablets, PDAs, etc.), instead of the classical manuals and printed paper tourism guides (Handbooks)...
In the context of the new technologies and applications of Future Internet, computer networks skills are greatly valued and an increased number of qualified specialists is required. Cisco Networking Academy, the world's largest classroom and a major player in the communication network area, offers its students a powerful network simulator - Packet Tracer. Instructor and students can practice, test...
Online Word-of-mouth has become one of most important information sources when a consumer is making a purchase decision. Most researchers focus on the direct relationship between consumer reviews and sales performance rather than exploring their interaction with other factors. To bridge this gap, we conducted an empirical study in the hospitality field to investigate the impact of online consumer...
The hyponymy hierarchy is an essential part of domain knowledge, which is widely used in many applications. With the development of the Internet, the World Wide Web is now an invaluable resource of hyponymy discovering. However, acquiring domain hyponymy hierarchy from the web is still a low efficient work, because the hyponymy acquiring process is often disturbed by numerous irrelevant terms. In...
The emergence of low cost hap tic devices and the evolution of technologies for developing virtual reality environments for web have motivated the development of tools that allow the use of hap tic systems together with applications and web browsers. The availability of web hap tic systems results on the possibility of multisensory experiences for internet users. This paper analyzes technologies for...
Xlets are Java applets that are developed for interactive digital television broadcasting. In this paper, I will explain the methods that I used for the creation of Xlet-based applications which utilize online data processing in the IDTV broadcasting environment. The themes that I chose for these Xlets are the Earthquake and Tsunami Early Warning application, the Recent Seismic Activity Report application,...
Du et al. put forward a solution to solve the slow access to the campus network. This solution offered a novel approach to complete NAT Traversal of the second export of the campus network and a good idea based on virtual private network (VPN) to realize the outer network can rapidly access the campus network with any application layer protocols, e.g., HTTP, FTP. A VPN solution based on UDP tunnel...
In this paper, a remote control system of a mobile robot which used RSNP has been developed. RSNP is a communication protocol which developed as a standard protocol to control a service robot. In order to evaluate this system, basic experiments have been carried out and clarified the validity and the issue of RSNP. In the experiments, several functions were evaluated which support the operator.
Autonomic Networking is seen as one of the hopes to improve the Quality of Service (QoS) provided to end users in the Internet. Especially in the context of Video on Demand (VOD), content and network providers have to deal with the dynamics of network and server loads which can severely impair the services provided to end users. Our recent research efforts seek to provide a remedy for this issue by...
Structured artifact repositories, such as Java's Maven Central Repository, provide developers with the ability to easily locate and manage their programs' external dependencies. Unfortunately, these artifact repositories are often missing popular libraries, dramatically decreasing their usefulness. Our investigation of the scope of the Maven Central Repository showed that it is missing over 60% of...
Today, Internet services are utilized as major service platforms to provide business services. Web-based Internet applications that follow the multi-tier architecture are a well-accepted computation model when providing Internet services. Such a model suffers from interruption caused by software failures, hardware errors or software maintenance. The interruption may incur significant financial loss...
In the last years one of the main concerns of the software industry has been to reengineer their legacy Web Applications (WAs) to take advantage of the benefits introduced by Rich Internet Applications (RIAs). In this context, Model Driven (MD) Web Engineering approaches have been extended with new modeling primitives to obtain the benefits provided by RIA features. However, during the last decade,...
A Machine-to-Machine (M2M) system, which uses Arduino, Android, and Wiki software, is discussed. ["proposed"?] This system consists of mobile terminals and web sites with wiki software. A mobile terminal of the system consists of an Android terminal and an Arduino board with sensors and actuators. The mobile terminal reads data from the sensors in the Arduino board and sends the data to...
The Middleware is a piece of software lying between the operating system and the application layer. Distributed applications are gaining popularity with the widespread of reliable communication services. It is affordable to have data accessible 24/7 from almost anywhere, thanks to the well-developed mobile technology and handheld devices. Healthcare domain is one of the very demanding application...
Classic approaches to test input generation -- such as dynamic symbolic execution and search-based testing -- are commonly driven by a test adequacy criterion such as branch coverage. However, there is no guarantee that these techniques will generate meaningful and realistic inputs, particularly in the case of string test data. Also, these techniques have trouble handling path conditions involving...
A casual network security monitoring system is proposed in this paper. The system is easy to deploy without reconfiguring the central network infrastructure, the firewall, and the intrusion detector system (IDS) of an organization. A virus-infected host, which is hidden by the network address translator (NAT) of a sub LAN, can be identified easily by using this monitoring system with the IDS. This...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.