The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In P2P video streaming systems, the neighbor selection algorithm is one of the fundamental components that affects performance. Although a few neighbor selection methodologies have been proposed, none of them takes into consideration QoE metrics reported by peers as a parameter for decisions. In this work, we present a new metric that quantifies the QoE as a function of the number of absences of pieces...
Machine Translation (MT) has progressively evolved since 1940's. It is a topic of active research now a days as the results found so far from machine translation tools are very unrealistic as compared to the human translation. Many different new approaches and techniques have evolved along with the new advent in machine translation. There are different paradigm of machine translation including Statistics...
Automatic kinship verification from face images aims at verifying whether two persons have a kin relation or not by only comparing their visual facial similarities. This is an emerging topic in face analysis and computer vision. Automatic kinship verification is useful in many applications such as finding missing children, image annotation, and social media analysis. In the recent years, there has...
δ-Hyperbolicity is a graph parameter that shows how close to a tree a graph is metrically. In this work, we propose a method that reduces the size of the graph to only a subset that is responsible for maximizing its δ-hyperbolicity using the local dominance relationship between vertices. Furthermore, we empirically show that the hyperbolicity of a graph can be found in a set of vertices that are in...
The paper describes approach, practical solution and intermediate results for self-driven exploration of personal interests structure and nearest social environment for an individual in order to correct their own behavioral patterns and interactions with communication partners on social networks on the Internet.
Trolling describes a range of antisocial online behaviors that aim at disrupting the normal operation of online social networks and media. Combating trolling is an important problem in the online world. Existing approaches rely on human-based or automatic mechanisms for identifying trolls and troll posts. In this paper we take a novel approach to the trolling problem: our goal is to identify the targets...
This research aims to reveal factors that drive online shops owned by student of university in Bandung which utilize Instagram for marketing efforts. This research uses three theories stated by Morissan (2010), Joseph (2011) and Strauss and Frost (2009) then synthesis those factors and uses 21 factors to analyze with Factor Analysis methodology. The samples of respondents are online shops owned by...
The use of Search Engine enables the information seeker to seek information from a wide range of categories. Cultural information is one of the unique categories among the classes of information searched by users. This is because, there exists a significant relationship between a cultural keyword and its' originating society. Naturally, societies are supposed to be the highest authoritative body over...
The deployment of IP multicast protocols in each router in the path is needed to access the benefits of the multicast. IP multicast exists today mainly in LAN networks and in small areas of highly controlled interconnected networks. In fact, some companies started to offer tailored solutions to try to overcome these limitations. On the other hand, over the last decade, the multimedia applications...
After Internet routing was shown in a number of classic measurement papers to result in paths that are sub-optimal with respect to a number of metrics, routing overlays were proposed as a method for improving performance, without the need to re-engineer the underlying network. In this paper, we present SMART, a self-healing, self-optimizing and highly scalable routing overlay, which has a number of...
This paper presents a new method for selection between replicated servers distributed over a wide area, allowing application and network providers to trade-off costs with quality-of-service for their users. First, we create a novel utility framework that factors in quality of service metrics. Then we design a polynomial optimization algorithm to allocate user service requests to servers based on the...
Named Data Networking (NDN) is a new Internet architecture that replaces today's focus on where — addresses and hosts — with what — the content that users and applications care about. A unique advantage of NDN over IP is the adaptive forwarding plane, which, by observing the performance of Interest/Data exchange, can dynamically select the best performing forwarding path, detect and recover from failures,...
Measuring the instability of IP prefixes in BGP is critical for network operation and management. In particular, identifying and investigating the most active prefixes assist in detecting, analyzing, and understanding network problems. The traditional metric to assess the activeness of a prefix is the quantity of BGP update. However, this metric may be strongly affected by monitor-local events: the...
The topological structure of the Internet - the interconnection of routers and autonomous systems (ASes) - is large and complex. Frequently it is necessary to evaluate network protocols and applications on “Internet-like” graphs in order understand their security, resilience, and performance properties. A fundamental obstacle to emulation and simulation is creating realistic Internet-like topologies...
Inter-domain Traffic Engineering for multi-homed networks faces a scalability challenge, as the size of BGP routing table continue to grow. In this context, the choice of the best path must be made potentially for each destination prefix, requiring all available paths to be characterized (e.g., through measurements) and compared with each other. Fortunately, it is well-known that a few number of prefixes...
Maintaining communication among the population, during and in the aftermath of disasters, is key to the success of both response and recovery efforts. Evidently, the telecommunications infrastructure most often fails in these situations and thus adhoc solutions ought to be devised. However, unlike customary adhoc solutions that focus on the traditional end-to-end communication paradigm, in emergency...
The present article describes a possible method for the automatic discovery of a universal human semantic-affective hyperspatial approximation of the human subcognitive substrate – the associative network which French (1990) asserts is the ultimate foundation of the human ability to pass the Turing Test – that does not require a machine to have direct human experience or a physical human body. This...
Online Web Forum is one of the prime attribute of the of web 2.0 technology that has empowered users across the globe to raise their opinion on a virtual planet. The internet has become an essential part of our lives. But it comes with the risk that it is inadvertently used by many users as a model to share their ideologies in social media which may be positive or negative. As vehement Ideology is...
Online Social Networks have been adopted by political groups in order to improve the reachability of protest movements. As such, these networks give us a rich data source for estimating the impact and participation on these events. In some situations, though, the organizers employ the use of bots to inflate the real impact of the event. These bots promote ideas while being disconnected from the political...
In this work we investigate decentralized content exchange among tourists who are mostly strangers, depicts irregular movement patterns and most likely not to have any prior social relationship or difficult to establish any in a tourist spot. We incorporate user's interest, trustworthy online recommendations, and place-centric information to facilitate content exchange in such tourist destinations...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.