The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We present a new tool to help students make use of video recordings of traditional chalkboard and whiteboard lectures. Our tool provides a compact summary of a chalkboard lecture in the form of a set of slides, and an interactive environment for electronic note-taking in real time while watching a lecture in class or during review. Key to the processing of a chalkboard video by our system is the removal...
Modern electronic healthcare (e-health) systems constitute collaborative environments in which patients' private health data are shared across multiple domains. In such environments, patients' privacy can be violated through the linkability of different user access sessions over patient health data. Therefore, enforcing anonymous as well as multi-session unlinkable access for the users in e-health...
It is expected that there are a variety of energy resources to be jointly operated by the power system in the future. Through jointly operating all types of energy resources via the Internet, Energy Internet is a promising solution to increase energy efficiency. However, the increasing integration of energy resources inevitably imposes challenges in secure communication in the Energy Internet. Resourceful...
Administrative Role-Based Access Control (ARBAC) models deal with how to manage user-role assignments (URA), permission-role assignments (PRA), and role- role assignments (RRA). A wide-variety of approaches have been proposed in the literature for URA, PRA, and RRA. In this paper, we propose attribute-based administrative models that unify many prior approaches for URA and PRA. The motivating factor...
With the advance of mobile technologies, virtual reality (VR) is coming to every corner of our life. The technology presents a major opportunity for retailers as they lure fickle shoppers to visit their virtual stores, particularly since modern consumers have shifted more of their buying habits online. Currently, merchants face the challenge to weed out malicious software from legitimate users to...
The aim of this study is to propose an information system that should help boost cooperation between business and academia and their innovativeness. Its novelty relies on introducing such a system architecture and business processes that allow implementing the paradigm of open innovation easily. More specifically, the proposed system: (i) automatically acquires data from the Internet and extracts...
Traditional medical model is more emphasis on sitting, with the popularity of mobile Internet, mobile smart medical system is got the attention by more and more people. In this paper, the use of pre-safety assessment and testing, the overall consideration of the Internet area within the business area security needs, after the security incident analysis and response to the security platform for continuous...
The rapid growth in the use of social networks has led the generation of multiple discussions about its relation to political concerns. The idea of analyzing social networks arises from the logic of understanding them as a new form of political participation, therefore, as a new form of communication and organization of citizens. This paper focuses on the use of a research technique called Content...
The number of Brazilians who are enrolled in educational distance courses has increased significantly in recent years. This type of education has as great ally, the Internet. Unfortunately, in Brazil the majority of the population has no access to the Internet in their home, which is an obstacle for those who want to take a distance education course. The present work explored the features offered...
This article relates the experience of a training process on Teaching Programming for vulnerable children and adolescents at social risk, who attend community eaters in neighborhoods on the outskirts of the city of La Plata. In these organizations, in addition to breakfast and lunch, they are offered school attendance in different subjects using the computer as a tool. Since 2007, advanced student...
This article presents a survey of the factors that indicate evasion in distance education, as well as the data mining techniques that are being used in the detection of evasion. As a methodology, we have used the systematic review, analyzing the works published in the last five years. The result indicated that there are multiple factors that influence evasion, which were systematized in four dimensions,...
The Internet of Things(IoT) has been developing rapidly since the past decade. It is becoming a crucial part of everyday life. It is becoming a way of living in which machines perform activities on their own by communicating with each other, without the need for human beings to instruct them. In such a scenario, which concerns daily life, privacy, and secrecy should be of at most priority. Since in...
Ad-Hoc and Delay-Tolerant Networks (AHDTNs) can be very useful in environments where more traditional networking technologies fail. Determining the practical effectiveness of AHDTNs can however be challenging. We review design considerations and practical experience with a novel mechanism for monitoring and analyzing the performance of AHDTNs. This new mechanism, AllNet Trace, somewhat resembles a...
Information-Centric Networking (ICN) introduces a paradigm shift from a host centric communication model for Future Internet architectures. It supports the retrieval of a particular content regardless of the physical location of the content. Emergency network in a disaster scenario or disruptive network presents a significant challenge to the ICN deployment. In this paper, we present a Content dIstribution...
The original design of the Internet was a resilient, distributed system, that may be able to route around (and therefore recover from) massive disruption—up to and including nuclear war. However, network routing effects and business decisions cause traffic to often be routed through a relatively small set of Autonomous Systems (ASes). This is not merely an academic issue; it has practical...
We consider the economic and mathematical model of forming unified information Internet space for scientific and educational resources by integration of scientific and educational resources in certain “cloud”, based on the needs of consumers, the possibility of required generation in information sources and the availability of nodes (providers) in the network to organize the process of receiving,...
Current approaches to Information-Centric Networking (ICN) facilitate the publication and retrieval of content in a network through a variety of discovery, caching and forwarding approaches, thus defining an equivalent of the data plane in the current Internet infrastructure. However, in contrast to the current Internet, ICN lacks a definition of the control plane for the management of the operation...
Adult video content is considered to be responsible for a major portion of the Internet traffic. We present a preliminary characterization study of one of the largest and popular adult streaming service, xHamster. While there have been extensive analysis of mainstream user generated content sharing services such as YouTube, adult streaming services have been an underappreciated field of study for...
Defending against cache pollution attacks, highly detrimental attacks that are easy to implement in Named-Data Networking (NDN), currently suffers from the lack of coordination. Solving cache pollution attacks is a prerequisite for the deployment of NDN, which is widely considered to be the basis for the future Internet. We present CoMon++ to this end, a framework for lightweight coordination that...
Content-Centric Networking (CCN) is a candidate next-generation Internet architecture that offers an alternative to the current IP-based model. CCN emphasizes scalable and efficient content distribution by making content explicitly named and addressable. It also offers some appealing privacy features, such as lack of source and destination addresses in packets. However, to be considered a fully viable...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.