The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Today, Internet has become an indispensable tool for everyone, Web usage mining correspondingly becomes a hotspot, which uses large amounts of data in the Web server log and other relevant data sets for mining analysis and gains valuable knowledge model about usage of relevant Web site. At present, a lot of works have to do with the positive association rules in Web usage mining, but negative association...
To measure the diversity of the user interests over the same query, this paper applies kappa coefficient as the indicator of the consistency of users' clicks for a given query. It compares three different settings of the Kappa parameters and shows the Kappa formula can be well adapted to the Query log analysis. Based on the further analysis of the Kappa results over Sogou Query LOG, it is revealed...
Rule extraction aims to ultimately improve business performance through an understanding of past and present search histories of customers. A challenging task is to determine interesting rules from their heterogeneous search histories of shopping in the Internet. For this purpose neural network (NN) and canonical correlation analysis (CCA) are used. Customers visit Web pages one after another and...
Online customization is one of powerful marketing strategies. However, customers' attitudes toward acceptance and their behavioral intentions to use play a critical success factor. Based on technology acceptance model (TAM) this study examined the relationships among consumer's beliefs, attitudes and behavioral intentions toward online customization of apparel. In this specific context we also explored...
A solution to evaluate network workload by data fusion is put forward, which can be for surveillance the traffic of interconnected communications network in order to keep the network working well by identifying potentially serious problems in the early stages and evaluating network performance. Through fusing the historic network traffic data and network online traffic data, which is based on least...
This paper investigates the scale-free characteristics of Chinese stock network which includes Shenzhen stock network and ShangHai stock network. We analyze characteristics of the growth and preferential attachment of stock networks. In particular, we study other three important properties of stock networks, such as the rapid communication, robustness and clustering. Through empirical theory and numerical...
The classification of network users is very important in user behavior analysis. The algorithm which was based entropy and latent Dirichlet allocation (LDA) was used in this paper. It is important but difficult to select an appropriate number of topics for a specific dataset. Entropy was first used to solve the problem. A concept named difference-entropy was built to determine the number of topics...
Router has acted as more and more important role in the large-scale network. In the meantime, the security of the router become more seriously. In this paper, we propose a new algorithm to decide a credential routing path from the start router to the end one based on the trust theory that considers the trustworthy of link, the cost of link and the trustworthy of router as the critical factors so as...
Along with the fast developing of network technology, the number of Web page and user of network search become very enormous. In order to solve the problem of inefficiency and low precision in the search that users have different demand and knowledge background, this paper presents a new text model called vocabulary semantic net which can be applied to build personalized search engine and tested with...
A standards-based infrastructure for sharing biomedical educational contents should apply standards which address the scope and functionality associated with learning objects from perspectives of all actors involved in their life-cycles. The ??learner?? actor is arguably the most important but also the most complex, heterogeneous and therefore problematic. This paper discusses impact of the latter...
Semantic similarity measures play an important role in the extraction of semantic relations. Semantic similarity measures are widely used in natural language processing (NLP) and information retrieval (IR). This paper presents a new Web-based method for measuring the semantic similarity between words. Different from other methods which are based on taxonomy or search engine in Internet, our method...
Query interface is used to formulate queries to receive needed data from web databases in deep web. In order to access domain-specific databases, the most important step is to construct an integration interface that allows uniform access to disparate relevant sources. Therefore, this paper proposes a novel method of integrating query interfaces based on ontology in deep web. Firstly, make full use...
Text classification categories Web documents in large collections into predefined classes based on their contents. Unfortunately, the classification process can be time-consuming and users are still required to spend considerable amount of time scanning through the classified Web documents to identify the ones that satisfy their information needs. In solving this problem, we first introduce CorSum,...
In this paper, we propose a method to identify and group together traces left on low interaction honeypots by machines belonging to the same botnet(s) without having any a priori information at our disposal regarding these botnets. In other terms, we offer a solution to detect new botnets thanks to very cheap and easily deployable solutions. The approach is validated thanks to several months of data...
The studies of citations are comprehensively carried out with the increasing electronically citation data on the Web. Most of the metrics observe scientific quality in a global view instead of in multiple fine-grained views. In this paper, we suggest to apply Topic Model and adaptive PageRank algorithm to assess the relative importance of scientific objects including articles, authors, conferences...
On Internet, the sender and receiver can not own the secure communication channel. Eavesdropping can attack the insecure channel to break the process of the signature scheme. Under an unsafe routing path, several attacks from Eve will be happened. In quantum cryptography, these physics properties such as no-cloning theorem, uncertainty principle and quantum teleportation can provide unconditionally...
Today, online stores collect a lot of customer feedback in the form of surveys, reviews, and comments. This feedback is categorized and in some cases responded to, but in general it is underutilized - even though customer satisfaction is essential to the success of their business. In this paper, we introduce several new techniques to interactively analyze customer comments and ratings to determine...
Most users retrieve and access resources in complex systems, like distributed virtual environments (DVE), or the Web by querying centralized search engines. Such systems normally compute their answers by estimating query-document similarities to rank the results, but also global ranks of the result pages by exploiting the hyperlink Web structure. User interests typically follow a sort of clustering...
As the spread of broadband Internet access, the online Internet video becomes popular in our daily life. The search engine is an important tool for users to access online video, resulting in considerable traffic on the video Websites. In this work, we statistically analyze the video access log provided by a large scale video search engine, and validate that the aggregated views of online video from...
In an empirical study of fourteen widely used open source PHP Web applications, we found that the vulnerability density of the aggregate code base decreased from 8.88 vulnerabilities/KLOC to 3.30 from Summer 2006 to Summer 2008. Individual web applications varied widely, with vulnerability densities ranging from 0 to 121.4 at the beginning of the study. While the total number of security problems...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.