Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Pending Interest Table (PIT) in Named Data Networking (NDN) architecture is complex in the forwarding operation in both upload of Interest packets and download of Data packets. PIT is considered useful for so many reasons in the centric-networking. These among other operations include: reducing bandwidth usage, communicating with no prior knowledge of publishers and subscribers, loop and packet loss...
In this study, a new academic event recommendation method is proposed. This method analyzes author interactions, academic event attendance records, research related, and textual descriptions from attended academic events to measure interaction strength between authors. Experiments on the DBLP dataset and Wiki Calls for Papers (WikiCFP) showed that the proposed method is helpful in improving the accuracy...
Traditional graph based sentence ranking approaches modeled the documents as a text graph where vertices represent sentences and edges represent pairwise similarity relationships between two sentences. Such modeling cannot capture complex group relationships shared among multiple sentences which can be useful for sentence ranking. In this paper, we propose two different group relationships (sentence-topic...
This workshop will explore integration of Web archiving and digital libraries, so the complete life cycle involved is covered: creation/authoring, uploading/publishing in the Web (2.0), (focused) crawling, indexing, exploration (searching, browsing), archiving (of events), etc. It will include particular coverage of current topics of interest, like: big data, mobile web archiving, and systems (e.g...
Extremist groups have turned to the Internet and social media sites as a means of sharing information amongst one another. This research study analyzes forum posts and finds people who show radical tendencies through the use of natural language processing and sentiment analysis. The forum data being used are from six Islamic forums on the Dark Web which are made available for security research. This...
Recent technological advancement in mobile technologies had changed the learning process for urban poor group in Malaysia. However, the main problem is lacking of understanding of the factors that drive urban poor to use m-learning. Thus, the main objectives of this exploratory research are (i) to identify the factors that drive urban poor to use m-learning and (ii) to provide recommendations to improve...
Living independently is of great importance to older adults, and technology is seen as a potential enabler of independent living. Nonetheless, factors related to ageing may contribute to difficulties in using technology. In particular, we are interested in online grocery shopping, for its potential to overcome some of the physical barriers to food shopping. One of the difficulties discussed in the...
This paper proposes route advertisement policies (RAP) for the Border Gateway Protocol (BGP) with provider aggregatable (PA) addressing. The proposed RAP takes the advantage of address aggregation opportunity. If multiple address spaces are allocated to each of autonomous systems (ASes) that are multihomed to multiple upper ASes, reduction of the Forwarding Information Base (FIB) and quick convergence...
India is presently witnessing substantial rise in investments especially industrial and infrastructural areas. This growth is further being augmented by the increase in power generation capacity and reliable power distribution and measurement network. In some developed countries like the United States smart meters are already deployed. Although some companies have introduced smart meters, many households...
Attack on privacy of the users on social media is a known phenomenon. A prominent example of this is the Facebook Beacon and the AOL search scandal. A social networking user is also prone to screen scrapping attack. Data Sanitization is the process of disguising sensitive information by overwriting it with realistic looking but false data of a similar type. We propose a system that will take user...
Written language is undoubtedly our primary means of communication, along with speech. The wealth of human knowledge accumulated through the ages is preserved in books. We are heavily reliant on written information for gaining and sharing knowledge. This has never been more so than after the birth of electronic media and the Internet, as a result of which whole libraries can be accessed from just...
Nowadays security is a major concern. Address resolution Protocol (ARP) is a most popular communication protocol in the LAN. ARP is mapping from IP address (32 bits) into MAC address (48 bits). ARP has some limitations like lack of states and authentication. So attacker can exploit these vulnerabilities and gain unauthorized access to one's sensitive data. There are some attacks against ARP like MAC...
Enormous quantity of information related to user accesses is clutched in web. Mining the information to expand understanding about web site, user visiting pattern and it usage, is referred to as web data mining. In India diversity of culture, has made the user preferences a necessity. It is important to study the user culture background for predicting use. This Paper has dealt with the approach to...
Developing technology threaten to the information security and privacy. Today, for data transfer in a private and secure environment, the use of encryption methods or cryptographic systems are inevitable. In this study WHT (Walsh-Hadamard Transform) that is used, one of the transforms that used image processing techniques such as attribute extraction on image files, text analysis, filtering, compression...
Software Defined Networks (SDN) is a new technology providing a programmable network by separating control and data planes of computer networks. SDN technology can provide an increase in the performance of Internet applications by implementing routing approaches specific to such applications. In this paper, we propose a server and end-to-end path selection approach for a content distribution network...
A Community Network is a bottom-up network created by a community of people with the goal of building a self-owned, self-managed communication infrastructure. Community Networks are blooming, they range from small ones (tens of nodes) to gigantic ones (tens of thousands of nodes), they are made primarily of wireless links but in some cases they mix wired and wireless technologies. People running a...
The Internet routing ecosystem is facing substantial scalability challenges on the data plane. Various “clean slate” architectures for representing forwarding tables (FIBs), such as IPv6, introduce additional constraints on efficient implementations from both lookup time and memory footprint perspectives due to significant classification width. In this work, we propose an abstraction layer able to...
The arrival of new electronic devices and high-speed Internet connections have provoked a revolution on the Web design, introducing new concepts as responsive web and OneWeb. Web developments should be able to adapt to any device. Applying these concepts it has been created a web application called "Formulas App", which is a perfect complement for enriching learning scenarios, mainly dictated...
The Internet eXchange Points (IXP) are essential for the Internet evolution as they empower high bandwidth low latency and inexpensive local traffic peering as opposed to transit traffic. On the other side, Software Defined Networking, or SDN for short (and its pre-dominant realization, the OpenFlow protocol) enables more dynamic network programmability to control network behaviour via open interfaces,...
The development and deployment of the Locator/ Identifier Separation Protocol (LISP), a paradigm introducing several benefits to the Internet architecture, is becoming widespread thanks to initiatives like the LISP-Lab project. Yet, LISP remains a relatively recent technology, hence, its actual performance when integrated with the current Internet remains still to be assessed. To tackle this issue...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.