The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The paper proposes a method for providing reliable Interest packet delivery in CCN. In window-based flow control mechanism for CCN, Interest packet is very informative. Loss of Interest packets due to congestion in the network pays a heavy price. We propose an ACK-based mechanism to recover the lost Interest packets as quickly as possible. Using actual implementation, we have been able to show how...
E-commerce gives customers the access to a vast quantity of products but, at the same time increases in a significant way the volume of information they need to deal in a buying decision process. Aggregators of information offer comparison shopping solutions to reduce the consumers' cognitive efforts overload by adding Decision Support Systems to aid consumers with their purchase decisions. Obviously,...
In order to know more about the rational factors in consumer irrational behavior, this paper analyzed 370 consumers' actual online shopping data with nonparametric test, trying to find out whether there are any risk aversion behavior discrepancies among consumers with different impulse buying tendency. Customers were automatically clustered into three categories, and the results show that high impulsiveness...
The Internet is playing an increasingly crucial role in both personal and business activities. Handling link failures is an important task in designing routing protocols. To enhance the network availability without incurring significant extra overhead, we propose a novel link protection algorithm, Hybrid Link Protection Scheme (HLP) to achieve failure resilient routing.
Named Data Networking (NDN) is a promising information-centric future Internet architecture. Its innovative concepts, like named content, name-based routing and in-network caching, particularly suit the requirements of the Internet of Things (IoT), interconnecting billions of heterogeneous constrained objects. NDN supports receiver-driven communications and can easily enable IoT pull-based applications,...
The evolution of the Internet has triggered a significant activity exploring new architectures among which the concept of Information-Centric-Networks (ICN) has emerged. Considering the various ICN solutions, Content-Centric Networking (CCN) is the one that received most attention. The design of CCN is progressing albeit many important issues still deserve a careful analysis and design. In this paper,...
Virtual connections in packet switched networks is increasing faster, in particular over the Internet, using MPLS and GMPLS evolution has produced a significant amount of studies on traffic engineering protocols, especially with regard to the different ways to provide quality of service over connections. This article presents a model to characterize the reliability of these types of networks, in computing...
In the internet, packets are classified by source and destination addresses, ports, and protocol type. Ternary content addressable memories (TCAMs) are often used to perform this operation. However, high-reliability packet classifiers in aerospace network applications require soft-error tolerant TCAMs to prevent system from errors caused by environmental factors such as high-energy radiations. This...
The purpose of this study is to explore Thai online customers' repurchase intention towards clothing. This study integrated Delone and Mclean's e-commerce success model to predict customers' repurchase intention to purchase clothing on the Internet. The data was collected using convenience sampling method with a survey of the customers in Thailand who had experienced purchasing clothing online. The...
In recent years, content-oriented networking has garnered extensive interest from both academia and industry as a potential direction for future Internet evolution. It is also a promising solution to address the challenging problem of on-time situational awareness for soldiers at the tactical edge, where network connectivity is often intermittent and limited in capacity. This paper presents the content-oriented...
Interactive online learning environment with audiovisual multimedia has improved significantly in increasing learning effectiveness. However, for hearing-impaired students who have difficulties in internet multimedia systems associated with audio and visual information require further design to overcome their limitation. To this end, the present study develops an interactive online learning environment...
Mapping an IP address to the Autonomous System announcing it is a key feature in network monitoring, and - as a consequence - in network management and research. An informed choice of the tool to use and of the database to query, is of extreme importance for the consistence of the obtained results. In this paper, we evaluate the reliability of the whois tool and the consistence of its results while...
In 6LoWPAN, all the nodes access the Internet through the gateways, which are on the border to legacy IP networks and handle ingress and egress data traffic. A gateway as the traffic center may easily become the congestion-concentrated point so that causes reliability problems and performance degradation. Gateway bottleneck is the dominant reason for network capacity and throughput constriction, since...
Given the current situation on the Internet, it is important to determine the trust of the communication routes between a client and server. Such determination can only be established by end terminals such as clients and servers, not by intermediate routers or network providers so far. The revelations regarding PRISM and other programs highlight the importance of this issue. In this paper, a method...
The long-term vision of an Internet of Things (IoT) is approaching reality and leading hardware vendors expect shipment of 50 billion devices in the near future. Emerging Internet standards will enable this huge number of embedded machines to interconnect and cooperate—and raise the challenge of building suitable software environments that provide scalability, reliability, and security at an efficient...
Wireless Mesh Network (WMN) is an emerging and practical wireless solution for metropolitan area networks to provide community broadband Internet access services by organizing and configuring nodes in the network efficiently and dynamically. In this survey, the concept of wireless mesh network has been described briefly as an emerging technology to provide Internet in large areas. Accordingly, the...
Chat-log data is a little used resource for analyzing human communication in social networks. Some statements in this data do not include the intended username of a receiver or any variant of it, and thus are termed “misaddressed statements”. Constructing social networks from such a semi-structured data and subsequent analyzing require a reliable process to make sure that the social network representation...
The Web technology particularly has made significant changes in the way health care is traditionally practiced. Studies showed that the Web is capable of delivering effective, efficient, interactive and tailored content to users. Considering the extensive access range and capabilities of this advanced technology, researchers in health behavior have used the technology to develop and deliver interactive...
With the development of economic and information technology, more and more people use mobile phone to surf the internet. The purpose of this paper is to examine the factors of mobile phone data flow service adoption. The Unified Theory of Acceptance and Use of Technology (UTAUT) is used as a theoretical framework, and survey data are collected from 537 Chinese nationals. The results from structural...
Mobile internet penetration is increasing significantly in Taiwan, but it also leads to more and more subscribers' complaints about mobile internet performance. The regulatory authority, National Communications Commission (NCC), authorizes Telecom Technology Center (TTC) to start the project named “Measure Taiwan Mobile Internet” since 2012. The project not only aims to comprehensively understand...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.