The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Internet access may not be a reality in many scenarios such as poor communities and disaster-hit areas. A mesh network is a solution for such scenarios, where a wireless backbone will enable communication and needed services. In this paper we propose the design of a self-forming, self-healing infrastructure wireless mesh network architecture, composed using 802.11 based multi-radio network nodes...
This article first sets forth representative difficulties that most e-learners have been met with, and then proposes a method for structuring personalized concept map (PCM) based on the learners' current situation, thus their real-time curriculum level could be reflected accurately and dynamically. In succession according to the learners' personal study situation the PCM could be divided into three...
Content Centric Networking (CCN) has recently emerged as a promising architecture to deliver content at large-scale. It is based on named-data where a packet address names content and not its location. Then, the premise is to cache content on the network nodes along the delivery path. An important feature for CCN is therefore to manage the cache of the nodes. In this paper, we present Most Popular...
Internet traffic has been exponentially growing with the increasing demand of content dissemination. This explosive growth in traffic poses a significant challenge to the networks, especially backbones. To address the challenge, the emerging content-oriented Named Data Networking (NDN) has been proposed due to its attractive advantages, such as network load reduction, low dissemination latency and...
The Internet Autonomous System (AS) topology has important implications on end-to-end routing, network economics and security. Despite the significance of the AS topology research, it has not been possible to collect a complete map of the AS interconnections due to the difficulties involved in discovering peering links. The problem of topology incompleteness is amplified by the increasing popularity...
How do people use phone calls and text messages for their communication needs? Most studies so far study each mode of communication in isolation. Here, we study the interplay of multi-modal communications. We analyze more than a billion call and text records from a Chinese city and San Francisco Area between 2007 and 2011. First, we provide some definitions towards a framework for analyzing multi-modal...
The Internet Autonomous System (AS) topology has important implications on end-to-end routing, network economics and security. Despite the significance of the AS topology research, it has not been possible to collect a complete map of the AS inter-connections due to the difficulties involved in discovering peering links. The problem of topology incompleteness is amplified by the increasing popularity...
Wireless networks today are partially being formed by nodes (e.g. Internet access points, smartphones, femtocells)that are owned and carried by humans. In such scenarios where several strangers are expected to interact for the sake of robust data transmission, trust and reputation are of vital importance. As such, User Centric Networks require well-defined trust metrics in order to ensure the robustness...
In p2p marketplaces, users often have to decide if someone is trustworthy or not. Sometimes, this decision is based purely on faith, which is something not everyone is willing to do. For this reason, trust has been identified as one of the key factors for the success of the sharing economy. Over the years trust mechanisms have been developed on a per site basis (i.e. feedback, voting or reputation...
Recently, the advance of cloud computing services has attracted many customers to host their Internet applications in the cloud. Infrastructure as a Service (IaaS) is on top of these services where it gives more control over the provisioned resources. The control is based on online monitoring of specific metrics (e.g., CPU, Memory, and Network). Despite the fact that these metrics guide resources...
Autonomic Networking is seen as one of the hopes to improve the Quality of Service (QoS) provided to end users in the Internet. Especially in the context of Video on Demand (VOD), content and network providers have to deal with the dynamics of network and server loads which can severely impair the services provided to end users. Our recent research efforts seek to provide a remedy for this issue by...
Trust has become an important factor to restrict transactions between the network entities in e-commerce. How to judge the relationship of trust and measure the trust between the trading entities has become a serious problem. This article proposes a trust evaluation model based on fuzzy theory for the e-commerce, which solve the uncertainty and subjectivity of e-commerce entity during the processing...
Internet traffic monitoring and traffic characterization are essential for managing and optimizing network infrastructures. In general, the traffic classifier based on Machine Learning (ML) might not perform well for some cases such as imbalanced data sets. To address this issue, we propose an evaluation measure aiming for the case of imbalance multi-class network traffic classification based on the...
Cyberlockers have recently become a very popular means of distributing content. Today, cyberlocker traffic accounts for a non-negligible fraction of the total Internet traffic volume, and is forecasted to grow significantly in the future. The underlying protocol used in cyberlockers is HTTP, and increased usage of these services could drastically alter the characteristics of Web traffic. In light...
Content replication and placement is an area that has been well explored in the scope of Content Delivery Networks (CDNs), but has received relatively less attention from the research community when it comes to Wireless Mesh Networks (WMNs). There are a number of Replica Placement Algorithms (RPAs) that are specifically designed for CDNs. But they do not consider the special features of wireless networks...
The Internet ecosystem comprising of thousands of Autonomous Systems (ASes) now include Internet eXchange Points (IXPs) as another critical component in the infrastructure. With the growth of peering worldwide, IXPs are playing an increasing role not only in the topology evolution of the Internet but also inter-domain path routing. In this work, we first motivate the need to monitor popular exchange...
Botnets have become a vital part of underground economy and botherders are actively looking for new recruits to join their bot army. A lapse by an end user or an administrator in terms of not updating their software enables the botherder to achieve this objective. In this paper we will investigate the phenomenon of a machine infection from the perspective of a user update behavior. We also present...
The structure of the current Internet does not fully reflect the structure of human relationships in the real world. Human relationships are structured as various community networks, however IP-based network is essentially not structured in terms of information retrieval and sharing. In the communication style on the current network, end node can obtain information and contents from the whole of the...
In this paper, consideration is given to extending an existing on-line tutorial system in order to understand the user experience with the tutorial by including analysis of the tool use. The areas of web analytics and learning analytics will be considered and used. Reference to how web analytics tools are used and the features they provide will be made. Features of available analytics tools will be...
Understanding of the Internet evolution is important for many research topics, such as network planning, optimal routing design, etc. In this paper, we try to analyze CAIDA AS-level topology dataset from 2004 to 2010 to validate two conjectures on the Internet evolution, i.e., the Internet flattening trend and the preferential attachment rule. Our analysis shows that the evolvement of the Internet...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.