Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
The authentication of users in legacy web sites via mobile devices is still a challenging problem. Users are required to provide passwords, introducing several vulnerabilities: since strong passwords are hard to memorize, users often use weak passwords that are easy to break, and passwords can be intercepted by malware and stolen. In this paper we propose a novel architecture, named BioALeg, to support...
When dealing with eventually consistent systems, application developers are often required to write their own conflict resolution algorithms. The aim of this work is to provide an abstraction layer for an eventually consistent database, namely CouchDB, and its client side implementation, PouchDB in a manner which makes it easier for software developers to use. This is achieved through a JavaScript...
It is significant for an Internet Service Provider (ISP) or an Internet Content Provider (ICP) to obtain the user experience of the web service that is one of the most widely used Internet services. Mining data from the network systems to measure the web service has become one of the research hot spots recently. In this paper, we propose a novel method to obtain the user experience of the web service,...
Advertisement became the basic revenue source of online publishers. Clients are disturbed of the exaggeration of posting unrelated advertisement. Developers found a smart solution that solved their problem, the ad blocker, which stops the serving of advertisement. Because the number of ad block users is increasing fast, publishers find the impossibility of maintaining businesses on the Internet. A...
Although many different community detection algorithms have been proposed to detect community structures in complex networks, how to effectively detect community structures is still a great challenge. Seed-centric methods is one of the most effective solutions for community detection. To more, in this paper, we propose a novel density-based seed expansion algorithm, namely, DenSeC, which can easily...
In the case of natural disaster, there is a need for an integrated information presentation system. The increasing number of public display could be used as a medium for that system. But currently, public display is developed as a closed system. Where only display owner could post content on it. It needs to move to a more open system that allows people contribution beyond display owner. In this paper,...
Nowadays one-way communications such as video streaming are easier to be used. One of service which eases those communications is Internet Protocol Television. By easiness of service packet-based that has entered in the whole of world made simplifies access of IPTV services. This research simultaneously uses 2 types of attacks. Those are Distributed Denial-of-Service and Heartbleed bug, with hacker...
Visualization of geographic data finds enormous applications in location finding, disaster management, resource allocation, mobility pattern detection etc. In this Big Data era, location information is embedded in most of the available data. While many general purpose visualization tools available today fail to scale when handling big data and also lack visually appealing output, this paper aims to...
This paper aims at the main problem of existing online teaching platform about lack of interaction and explores the construction and application of the SPOC (Small Private Online Course) online learning platform. The design and implementation of the SPOC platform based on Tencent Cloud are introduced from the technical level. On this basis, teaching practice and exploration in SPOC mode including...
In 2014 over 70% of people in Great Britain accessed the Internet every day. This resource is an optimal vector for malicious attackers to penetrate home computers and as such compromised pages have been increasing in both number and complexity. This paper presents X-Secure, a novel browser plug-in designed to present and raise the awareness of inexperienced users by analysing web-pages before malicious...
Lately, Twitter has grown to be one of the most favored ways of disseminating information to people around the globe. However, the main challenge faced by the users is how to assess the credibility of information posted through this social network in real time. In this paper, we present a real-time content credibility assessment system named CredFinder, which is capable of measuring the trustworthiness...
This paper describes the development of a Cloud-based solid cutting simulation service system for 3D toolpath verification before it is to be uploaded to a CNC machine tool for machining operation. A user can access the system through common WWW browsers such as Internet Explorer and/or Google Chrome in either a PC running Microsoft Windows, a smart phone running Android, or an iPad running iOS. The...
This paper presents a restructuring approach to relocating web page composition from servers to browsers for Java web applications. The objective is to reduce redundant manipulation and transfer of code/data that are shared by web pages. The reduction is carried out through a restructuring algorithm, effectively keeping consistency between source and target applications from the perspective of the...
The internet is growing rapidly and interconnected different wired and wireless networks with each other. By using a client server architecture computing devices which are located at different geographical locations all around the world connect to the World Wide Web. Client can access information from the web server through the web browser. Web server fetches data from the database server. Malicious...
Big data technology plays a role in promoting the development of Internet video, and data has become an important carrier for users and network video platform to dig the effect of video communication, guide the video production, and master the user's behavior habits. This system establishes the conceptual process from data acquisition, data processing, data visualization. This article makes analysis...
C has always been a preferred language for students entering programming domain. Thus C compiler is an essential utility to be present in a system. As we many times work with cross platform or mobility constraints, traditional C compilers fail to work along. “Cross Platform C Compiler (CPCC)” is a Web-based application which aims to overcome these limitations. Unlike other online compilers, CPCC uses...
With the prevalence of JavaScript, Cross-site Scripting based on Document Object Model (DOM-based XSS) has become one of critical threats to client-side Web applications. To detect DOM-based XSS vulnerabilities, a variety of tools have been developed, providing different features and abilities. Both for developers and tool users, the benchmark plays an important role in evaluating the effectiveness...
Identifying users and user devices is as important in web applications as in many other contexts. In web applications, user identification usually involves an authentication process, e.g., providing a username and a password. Identification is also possible without explicit authentication using cookies or device fingerprints. Device fingerprinting is also useful for other purposes, e.g., to serve...
X.509v3 certificates are the current standard of verifiable associating an entity with a public key, and are widely used in different networking applications: from HTTPS in browsers, SSH connections, to e-mail, PDF and code signing. This wide usage also necessitates the existence of a robust, reliable way to detect and deal with compromised or otherwise invalid certificates. Certificate Revocation...
The wireless signal needs to constantly test to discover and correct signal problem since its planning and construction. Currently, most of the existing wireless signal testing equipment are testing on the road, and there are many shortcomings. The real-time wireless signal testing and analyzing system based on websocket has realized the mobile, networked and real-time road test for the wireless signal,...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.