Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In 2009, researchers released details of a vulnerability in the SSL and TLS protocols that could allow Man-in-the-Middle attacks to be carried out. IETF published countermeasures with unprecedented speed as RFC5746, however server-side implementations are not deployed because of problems in business such as the loss of opportunities and backward compatibilities. An efficient DOS attack tool using...
In recent years, much attention has been paid to wide area distributed storages to backup data remotely and ensure that business processes can continue in terms of disaster recovery. In the 'distcloud' project, authors have been involved in the research of wide area distributed storage by clustering many computer resources located in geographically distributed areas, where the number of sites is more...
A network delay predictive modeling method based on system identification is proposed to match the latency between two agents of networked control systems(NCSs).With the prediction, historical and estimated data compose a time-related series to describe the future network delays as explicit time-related function. By the proposed model, how to optimize the transmission path among multi-agents is converted...
Cloud computing is a revolutionary computing paradigm which enables flexible, on-demand and low-cost usage of computing resources. Those advantages are the causes of security and privacy problems, which emerge because the data owned by different users are stored in some cloud servers instead of under their own control. How to protect the data privacy is the most important in cloud computing. In this...
FTP protocol is the application layer protocol which is to control two-way transmission of files between two computers on the Internet, It's a common approach to copy the file from the client to server within the enterprise network. However, traditional audit work is facing enormous challenges, though FTP protocol brings convenience to the operator, it may exist ultravires during the operation and...
Network security is being payed more and more attention nowadays, especially in the protection of enterprise intranet security has become the current research focus. This paper provides a method of monitoring illegal extra-connection of enterprise terminal devices based on flexible policy configuration, in the process, all the terminals that access to corporate intranet hosts and other devices will...
Cloud services must upgrade continuously in order to maintain competitive. However, a large body of empirical evidence suggests that, upgrade procedures used in practice are failure-prone and often cause planned or unplanned downtime. In this paper, we first define what is cloud service online upgrade, and then we analyze the shortcomings of current mainstream cloud service online upgrade mechanisms...
Both in daily classrooms and at enterprises conferences, timely feedback from the audience and students are very important for chairmen or teachers. This will improve chairmen's or teachers' working and teaching efficiency in the interaction, because they can promptly know their audience's ideas and comprehension about the contents which they are describing. In this paper, we present software that...
Software-as-a-Service (SaaS) is a delivery model whose basic idea is to provide applications to the customer on demand over the Internet. Thereby, SaaS promotes multi-tenancy as a tool to exploit economies of scale. A major drawback of SaaS is the customers' hesitation of sharing infrastructure, application code, or data with other tenants. The common way in research to address this problem is to...
The Internet-based Electrical Engineering Lab (iEELab) of Zhejiang University is a hybrid network laboratory which provides users with both physical and virtual experimental mode. For the further integration of iEELab's platform resources, a management system is designed to unify the physical and virtual experiment platforms. The management system is structured in a layered pattern, and implemented...
Clustering, as a part of the Data Mining field, has been in the center of the research attention for the last decade. It is the task of finding subsets of data that are sharing the same type of attributes. Text Clustering becomes one of the most critical and important solutions in data mining to discover knowledge from fast grow up web data and log files. There are many challenges, algorithms needs...
To deal with problems of after-sale maintenance service of belt conveyor manufacturers, the service-oriented belt conveyor remote auxiliary repair system is presented. The system network architecture and functional architecture of service-oriented system based on J2EE is presented here. Under this architecture, Auxiliary Repair service of combination of remote expert services and knowledge services...
This paper is a study of staff issues at the bank, ICBC China. Due to extra and imbalanced staff, the system was idle most of the time. By using the qualitative approach, M/M/s queuing model and discrete event simulation, the staff was sub-optimized. First, observation of the system was conducted and recorded using the existing operations system used by the bank. Arrival time of customers, service...
An important question related to seismic data is the need to have access to them quickly and easily. In this context, this paper presents the webSISBRA, a Geographic Information System on the web, comprising the geographic database servers and interactive maps, with the aim of assisting in the recovery and presentation of seismological data. The system was designed and implemented for data analysis...
“Movement of Enhancing Opportunities and Improving Technology”, abbreviated as Fatih, is among the most important educational projects in Turkey, in which students and teachers can use their tablet PCs to obtain educational data (text, images, media, etc.) stored in cloud services. However, the limited network bandwidth and increase in both the number of users and their educational data sizes degrade...
Customer switching behavior refers to the action of a customer switching from one supplier of a product or service to another one. Among competing facilities, this behavior can be described as a customer switching from a facility, providing a certain kind of service, to a similar facility. In reality, customers in congested facilities are more prone to switch. Competitive location model presented...
We consider a three-step three-player complete information Colonel Blotto game in this paper, in which the first two players fight against a common adversary. Each player is endowed with a certain amount of resources at the beginning of the game, and the number of battlefields on which a player and the adversary fights is specified. The first two players are allowed to form a coalition if it improves...
The system design and development in this paper set target of modern distance education development requirement and it attempts to establish an information platform for school, students and parents, for effective communication and interaction. By means of this platform and through real-name registration and check, the parents, students and teachers can exchange information in time and consult within...
In this paper, we present an analysis of a new class of domain names: disposable domains. We observe that popular web applications, along with other Internet services, systematically use this new class of domain names. Disposable domains are likely generated automatically, characterized by a "one-time use" pattern, and appear to be used as a way of "signaling" via DNS queries....
In Web applications, it is often needed to upload a file to the server. With current file upload methods, it is difficult to deal with large file uploaded and user experience is also bad. This paper introduces the principles and methods of files upload in the IIS environment and Java EE environment in detail. The FileList interface, Blob interface, File interface and FileReader interface in HTML5...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.