The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Despite recent advances in joint processing of images, sometimes it may not be as effective as single image processing for object discovery problems. In this paper while aiming for common object detection, we attempt to address this problem by proposing a novel QCCE: Quality Constrained Co-saliency Estimation method. The approach here is to iteratively update the saliency maps through co-saliency...
After several years of research towards sophisticated QoS measurement tools and methods, the results given to endusers by most commonly used on-line speed measurement tools are still far from being precise. In order to define a reliable Internet speed measurement methodology for endusers, the impact that the static and dynamic constraints of network nodes and TCP/IP implementations could impose must...
Adaptive security can take dynamic trade-off decisions autonomously at runtime and is considered a key desirable attribute in the Internet of Things (IoT). However, there is no clear evidence that it can handle these trade-offs optimally to add value to such a complex and dynamic network. We present a scenario-based approach to recognize and evaluate typical security trade-off situations in the IoT...
Broadband network performance is multi-faceted: it varies by ISP, by content source, by household connection, and by time-of-day. Daily or monthly averages, as published by content providers such as Netflix and Google, do not convey the full picture. In this paper we leverage M-Lab, the world's largest open measurement platform, to characterize broadband performance across Australian households. Our...
In this article we present Miuz, a robustness index for complex networks. Miuz measures the impact of disconnecting a node from the network while comparing the sizes of the remaining connected components. Strictly speaking, Miuz for a node is defined as the inverse of the size of the largest connected component divided by the sum of the sizes of the remaining ones. We tested our index in attack strategies...
In this work, we present the Klout Score, an influence scoring system that assigns scores to 750 million users across 9 different social networks on a daily basis. We propose a hierarchical framework for generating an influence score for each user, by incorporating information for the user from multiple networks and communities. Over 3600 features that capture signals of influential interactions are...
Previously dominating research on the Internet Quality of Service (QoS), focused on network performance, has now been shifted towards the customer experience. This paper addresses Quality of Experience (QoE) management issues in the future Internet. We provide a brief overview of QoE metrics and assessment methodologies, and discuss potential relationships between the QoE and network performance parameters...
Internet connectivity in most rural African areas has been viewed as a major challenge due to lack of reliable power, scarcity of network expertise and expensive installation of network equipment. With the rapid development of wireless technologies, Wireless Mesh Network (WMN) has emerged as a promising networking infrastructure, bridging the digital divide between the urban and rural areas. However,...
Evolving complex networks are abundant in the real world, i.e., Networks with different sizes (number of nodes) may originate from the same evolving system. In this paper, we use some typical evolving models of complex networks to evaluate the performances of graph spectra. The experimental results verify that the normalized Laplacian spectrum is a good indicator to distinguish between different evolving...
The paper is devoted to the issues of automated categorization of textual information which can be applied in the systems intended to block inappropriate content. The approach used for feature selection and construction is proposed. The text mining methods used for research (Decision Tree classifiers) are analyzed. Besides that, the techniques of Web sites analysis that provide information in different...
The paper concerns credibility of construction methods for affect-annotated lexicons, specifically a web questionnaire is explored and evaluated. Web-based surveys are susceptible to some risks, which might influence credibility of the results, as some participants might perform random clicks or intentionally falsify the responses. The paper explores the risks and proposes some strategies to reduce...
This Paper summarizes literature domestic and abroad about the vulnerability evaluation and analyzes the shortcomings of previous evaluation approaches. A novel method based on program dependence graph is presented to implement multi-dimension evaluation on vulnerability. Compared with the previous evaluation models, the new method can access the influence scope and patch fixed situation, which makes...
There is risk when doing experiments on real world systems and making real world measurements. In a theoretical system, a simulation, or a test bed, we can make assumptions about real world behaviors and gloss over potential problems. In a real world system, however, we have to solve those problems to get science done. Sometimes these are technical problems, like making sure a tool chain is consistent...
Evaluating the accuracy of vulnerability security risk metrics is important because incorrectly assessing a vulnerability to be more critical could lead to a waste of limited resources available and ignoring a vulnerability incorrectly assessed as not critical could lead to a breach with a high impact. In this paper, we compare and evaluate the performance of the CVSS Base metrics and Microsoft Rating...
Nowadays the plagiarism constitutes a complex problem, due several factors as the incorrect use of new technologies to access and share the information, the different forms and areas where can be present plagiarism (texts, code, images, self-plagiarism, etc.) or the lack of respect to ideas and contributions of other persons. On those grounds, in this paper we present a novel ecosystem to provide...
Peer-to-Peer (P2P) traffic shows a rapid growth in recent times. For efficient malware detection and network traffic management P2P network traffic classification is essential. The existing P2P traffic classification methods includes port-based, signature-based, pattern-based, and statistics based methods. However, none of these methods proved to be effective for the traffic classification in terms...
The transition period which should have brought the end of the IPv4 era has no clear end in sight. With about 3% worldwide deployment rate, IPv6 still looks like a promise and the IPv6 transition like an ongoing struggle. Among the many challenges introduced by this transition process to the Internet community, one of the most difficult is to ensure a scalable network design when using IPv6 transition...
In this paper, we present a framework for evaluating the QoE of a service that includes functional and non-functional service requirements. Non-functional requirements are classified into objective, subjective, and business parameters that affect Quality of Service (QoS), Quality of Experience (QoE), and Quality of Business (QoBiz), correspondingly. As those metrics have a strong dependency between...
AS-level end-to-end paths are of great value for ISPs and a variety of network applications. Although tools like traceroute may reveal AS paths, they require the permission to access source hosts and introduce additional probing traffic, which is not feasible in many applications. In contrast, AS path inference based on BGP control plane data and AS relationship information is a more practical and...
Software Defined Networking (SDN) is attracting many researchers in networking area, especially in the field of network operations and managements. A fine-grained network management that controls traffic dynamically by the unit of flows is one of the key challenges towards a resilient network for the future Internet. To this end, the network is required to re-configure timely, adaptively and dynamically...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.