The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a novel approach of overlapping communities generation for online support forums. Different from traditional online forums that provide the most similar or relevant information to respond to a user query, the approach proposed in this paper manages online forums and provides user support based on overlapping communities. Inspired by natural societies, a forum is deemed as a complex...
This paper developed a conceptual model through a survey of literature on e-service, and then it has a demonstration analysis of the world's largest online bookstore in China Dangdang.com. The study measured the impact of four dimensions on e-satisfaction and funds the relationship between e-satisfaction and e-loyalty. According to their relationship, it will give a hand to the online bookstore manager...
In order to improve the efficiency and accuracy of deep Web interface matching, a method based on the existing dual correlation mining (DCM) method using association mining and semantic clustering was presented in this paper. While digging group attributes by using correlation algorithm, a new correlation measure based on mutual information was introduced and realized by matrix to resolve the inefficiency...
The immense popularity of new-age ??Web 2.0?? applications such as YouTube, Flickr, and Facebook, and non-Web applications such as peer-to-peer (P2P) file sharing, voice over IP, online games, and media streaming have significantly altered the composition of Internet traffic with respect to what it was a few years ago. In light of these changes, this paper revisits Internet traffic characteristics...
Based on the researches of the perceived risks in the Web, we construct a model to deal with the perception how to influence customers to buy in the field of C2C . Then, get 192 effective questionnaires through Internet survey. It is proved store risk, product risk, and delivery risk are 3 dimensions of C2C consumers' risk perception. The effects of product risk influence consumers' purchasing intention...
In the age of cloud, Grid, P2P, and volunteer distributed computing, large-scale systems with tens of thousands of unreliable hosts are increasingly common. Invariably, these systems are composed of heterogeneous hosts whose individual availability often exhibit different statistical properties (for example stationary versus non-stationary behavior) and fit different models (for example Exponential,...
During recent years, information technology has made several fundamental changes in different business areas. For instance, the learning methods have been completely changed. The use of digital material in education, business life and government has risen significantly in recent years. As e-learning environments are becoming increasingly popular, the need and call for digital content is also expanding...
This paper regards Web as a semantic lexicon and alleviates the problem of bilingual lexical knowledge acquiring. Based on mix-language Web page counts, four Web bilingual relatedness (WBR) measurements are built. WBR measurements are evaluated by a modified Miller-Charles' dataset and it is found that the measurement based on point-wise mutual information achieves the best performance. Furthermore,...
This paper proposes a novel method on Chinese low-frequency word similarity computation. It adopts a combinational strategy to compute word similarity, which exploits dictionary Hownet and constructed corpus retrieved from Internet. It has 3 steps: (1) If both of two words exist in Hownet, the similarity between them is computed based on Hownet. (2) If either of two words a and b doesn't exist in...
Traffic measurements from communication networks have shown that network traffic is exhibiting self similar as well as long range dependence properties. In telecommunication networks, congestion events tend to persist, producing large delays and packet loss resulting in performance degradation. In order to guarantee quality of service to diverse Internet services, congestion prediction became a fundamental...
Several kinds of values have been employed with respect to the diversification of individuality in the market. Some of these values are currently supported by only a few people, who are referred to as a ldquominority grouprdquo. However, there is the possibility that such groups will grow into majority groups with changes in historical background or people's sensitivity. It is both important and effective...
With the rapid development of network, traditional music charts do not work well with the popularity of musical recordings. The search charts of music do pretty well with that. However, there are many new questions with search charts need to be concerned and solved. In this paper, we choose the special keywords on music search charts to study. The keywords of music search charts are special thanks...
As one of the richest human languages in terms of words constructions and diversity of meanings, judging similarity amongst statements in Arabic documents is complex. In this paper, we present a mechanism for gauging similarity of Arabic documents using fuzzy IR model. Similarity degree of two documents is the averaged similarity among statements treated as equal although they have been restructured...
This study aimed to explore the relationship between three kinds of risk characteristics, anxiety, controllability and predictability respectively, and their effects on total risk perception, and their relationship with risk-coping behaviors in e-commerce transactions. 174 individual suppliers participated in the survey. Results indicated that: a) the correlation between controllability and predictability...
We analyze a segment of the user click log with 53.7 m clicks through a large scale video search engine. We find, with the help of search engine, users visit a large number of online videos for a general idea, and visit a lot of Web sites to view a large number of duplications for a popular video content. By studying the relationship between the number of video that a Web site owns and the number...
This paper criticises the notion that long-range dependence is an important contributor to the queuing behaviour of real Internet traffic. The idea is questioned in two different ways. Firstly, a class of models used to simulate Internet traffic is shown to have important theoretical flaws. It is shown that this behaviour is inconsistent with the behaviour of real traffic traces. Secondly, the notion...
TCP round trip time is an important subject of network measurement research. And it is widely utilized in congestion control and network tomography. Compared with active methods to measure round trip time, passive ones are superior for low cost and not injecting traffic into networks. However, all present passive measurement methods have deficiencies. Some of them are not accurate enough, some others...
The virtual unity of real social relationship is not original. Recently, some online games based on social relationship are more and more popular. Thanks to the real social relationship, those special games are interesting and amazing. We took the online games of ldquokaixin-netrdquo (www.kaixin001.com) as an example to study. Those special games are able to turn the real relations of friends to a...
In the last few years, social networking sites (SNSs) have grown rapidly as a new media used by people to create and maintain relationship. Ironically, social network sites are also used to do deviant behaviors, i.e. pornography, racism, predators, and fake profiles. A need then emerges to reduce those deviances. This research tries to recognize the deviants based on their characteristics. Descriptive...
To access the research methods and data analysis procedures employed by research studies investigating the applications of computer-assisted language learning (CALL) to enhance second/foreign language learning, the study made extensive search for scholarly articles published from 2000 to 2008. The contributions of quantitative research on computer-assisted second/foreign language learning were reviewed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.