Showing 3,261 - 3,280 results of 5,694 for search '"internet"', query time: 0.09s Refine Results
  1. 3261

    Research on the HTML5 Application Runtime Environment for Mobile Terminal by Gang Lu, Honghui Ou, Baiqing Liang, Rongrong Li

    Published 2013-05-01
    “…A new generation of Web HTML5 standard has become a general technical standard for mobile internet application platform in the future,and mobile Web application based on HTML5 is becoming a new form of application. …”
    Get full text
    Article
  2. 3262

    Políticas de seguridad informática by Ciro Antonio Dussan Clavijo

    Published 2006-01-01
    “…La globalización de la economía ha exigido que las empresas implementen plataformas tecnológicas que soporten la nueva forma de hacer negocios. El uso de Internet para este fin, conlleva a que se desarrollen proyectos de seguridad informática que garanticen la integridad, disponibilidad y accesibilidad de la información. …”
    Get full text
    Article
  3. 3263

    An Efficient Code-Based One-Time Blind Signature Scheme for Electronic Forensics by Haiyan Xiu, Fang Ren, Xinglong Xue, Dong Zheng

    Published 2024-01-01
    “…Our scheme can also be applied to electronic forensics of traffic accidents on the Internet of Vehicles, which can protect users’ privacy.…”
    Get full text
    Article
  4. 3264

    HoneyBow:an automated malware collection tool based on the high-interaction honeypot principle by ZHUGE Jian-wei1, HAN Xin-hui1, ZHOU Yong-lin2, SONG Cheng-yu1, GUO Jin-peng1, ZOU Wei1

    Published 2007-01-01
    “…Malware has become one of the severest threats to the public Internet.To deal with the malware breakout ef-fectively as early as possible,an automated malware collection solution must be implemented as a precondition.An automated malware collection tool was presented based on the high-interaction honeypot principle called HoneyBow.Comparing with the Nepenthes platform based on the low-interaction honeypot principle,HoneyBow has its advantages on wilder range of captured malware samples and the capability of collecting unknown malware samples,which are vali-dated by the experiment results from wild malware collection and the case of Mocbot dealment.…”
    Get full text
    Article
  5. 3265

    HitIct:Chinese corpus for the evaluation of lossless compression algorithms by CHANG Wei-ling1, YUN Xiao-chun2, FANG Bin-xing1, WANG Shu-peng2

    Published 2009-01-01
    “…HitIct, a Chinese corpus for the evaluation of lossless compression algorithms based on ANSI code, was proposed.In accordance with the principle of application representativeness, Complementary principle and openness principle, a large number of candidate files were obtained from the Internet, and then average compression ratio, average correlation coefficient, compression ratio correlation coefficient and standard deviation were used to select the files that give the most accurate indication of the overall performance of compression algorithms.Experimental results show that this collection has a good representativeness and stability, and can be used as the supplementary test set of the main benchmark for comparing compression methods.…”
    Get full text
    Article
  6. 3266

    Analysis of the ergonomics of interfaces of popular e-marketing tools by Weronika Studzińska

    Published 2023-12-01
    “…Three tools designed for Internet monitoring were analysed - Brand24, Mention and Awario. …”
    Get full text
    Article
  7. 3267

    Indoor sensing technology based on channel state information by Zhefu WU, Han WANG, Cheng CHEN, Zhongyou WANG, Wei HUANG

    Published 2019-10-01
    “…The wide spread wireless network has brought about tremendous development of mobile internet business services and has become one of the infrastructures of modern society.The basic principles and implementation methods of wireless sensing technology were expounded from the perspective of wireless channel state analysis.The technological innovation in the field of wireless sensing in recent years was discussed,especially channel state information based human body posture detecting and environmental monitoring.Finally,the future development trend of sensing technology based on wireless communication network was analyzed in order to provide reference for related research.…”
    Get full text
    Article
  8. 3268

    Enhanced-AAWP,a heterogeneous network oriented worm propagation model by LIU Bo, WANG Huai-min, XIAO Feng-tao, CHEN Xin

    Published 2011-01-01
    “…A logical worm propagation model contributes to the analysis of how exactly various worms spread in Internet.With the abstract of heterogeneous network environments,and considering the impact of infection time on worm propa-gation,a heterogeneous network oriented worm propagation model namely Enhanced-AAWP was derived using discrete time and deterministic approximation.Then,the worms which employed local preference scanning or random scanning were studied based on Enhanced-AAWP.As the simulation results show,the amount of NAT,the density of vulnerable hosts in NATs,and the probability of local preference scanning are influencing factors during the course of worm propa-gations in heterogeneous network environments.…”
    Get full text
    Article
  9. 3269

    Progress of automatic driving technology and future information service architecture evolution of telecom operators by Zhen YANG

    Published 2016-08-01
    “…The concept of artificial intelligence has been proposed for more than 60 years,with the development of internet of things and big data technology,more and more AI technology applications have been achieved.One of the most remarkable AI technology integration application is automatic driving technology.Firstly,the progress of automatic driving technology was studied.Secondly,key technologies of automatic driving were analyzed.Thirdly, the relationship between the telecom operator information service architecture and the requirements of automatic driving was analyzed.In the end,the technology breakthrough point of information service architecture with the core of application of artificial intelligence technology in the future were given.…”
    Get full text
    Article
  10. 3270

    Towards Accurate Node-Based Detection of P2P Botnets by Chunyong Yin

    Published 2014-01-01
    “…Botnets are a serious security threat to the current Internet infrastructure. In this paper, we propose a novel direction for P2P botnet detection called node-based detection. …”
    Get full text
    Article
  11. 3271

    ON INFORMATION COMPETENCE OF A MEDICAL STUDENT by Sergey A. Chernyad'yev, Marina A. Ufimtseva, Yuriy M. Bochkarev, Alla V. Getmanova

    Published 2016-12-01
    “…The authors consider the ability to search for an the expert knowledge, to analyze, select, sort and process the information obtained from outside sources via the Internet to be one of the necessary skills to assimilate into the professional environment. …”
    Get full text
    Article
  12. 3272

    A Survey of Content-Oriented Future Communication Network by Qian Hu, Muqing Wu, Song Guo

    Published 2012-09-01
    “…With the exposure of many shortcomings in nowadays internet, there have been lots of studies deeply in the future network around academic circles recent years. …”
    Get full text
    Article
  13. 3273

    Use of high-speed connectivity to global academic network for research and education in Central Asia by A. Kutanov

    Published 2017-10-01
    “…Today, the Central Asian Research and Education Network(CAREN) is upgrading ancient Silk Road to a 21st - century high-speed internet highway for research and educational institutions through the region. …”
    Get full text
    Article
  14. 3274

    Analyse de l’impact du conformisme social sur l’adoption de l’e-learning dans un pays en développement by Novice Patrick Bakehe, Jules Mandeng Ma Ntamack, Roukiya Hassan

    Published 2022-08-01
    “…Based on survey data conducted in 2015 on Cameroonian citizens and households, this paper analyzes the effects of social interaction on Internet use for researching information in relation to studies. …”
    Get full text
    Article
  15. 3275

    La valeur économique comme fait social : la preuve par les évaluations boursières by André Orléan

    Published 2015-12-01
    “…The explosion of the CDS during the period 2001-2007 and the Internet Bubble are illustrations of this hypothesis. …”
    Get full text
    Article
  16. 3276

    Le périple d’Edward Snowden by Timothée Giraud, Marta Severo

    Published 2013-10-01
    “…Facing the deluge of data available on the Internet, one of the most exciting research directions for the social scientist concerns the identification and analysis of social phenomena through this new data. …”
    Get full text
    Article
  17. 3277

    Simp czy sigma? Wizerunek Stanisława Wokulskiego w memach by Anna Lauks

    Published 2025-02-01
    “…The paper indicates that internet users usually refer two contemporary categories to describe certain episodes from the character’s life and the attitudes he displays: the simp and the sigma. …”
    Get full text
    Article
  18. 3278

    Thinking of the smart network development caused by collective motion:situational-section fitting network by Jiangxing WU, Yuxiang HU, Yufeng LI

    Published 2018-05-01
    “…Exploring the way of global coordinated controlling of internet resources for the consistency of user experience,is a difficult problem to be solved urgently in the development of smart network at present.Inspiration was got from the natural collective motion,and a coordinated fitting scheme of globe-domain resources based on node self perception,autonomous decision and automatic adjustment——situational-section fitting network (SiFiNet) was proposed.The basic concept of situational network was given,and the core mechanisms of scene perception modeling,scene fitting decision and service adaptive loading were discussed,which provided a possible solution for the development of smart network.…”
    Get full text
    Article
  19. 3279

    Development trend and application analysis of blockchain with 5G by Dandan XU, Yunyong ZHANG, Daolin ZHANG, Di ZHANG, Xiao WANG, Yixin CAI

    Published 2020-03-01
    “…Through the evolution from the information internet era of large connections and large collaborations to the era of strong trust and strong security,the blockchain has triggered a multi-wave technology wave with its characteristics of openness,transparency and decentralization,becoming the new generation of information technology development trends.Starting from the dimensions of technology,people's livelihood and industry,the infrastructure and evolution trends reveal that the blockchain was the essence of the reorganization and re-innovation of the existing technology.The applications were re-divided into the currency circle and chain ring from a technical perspective.By comparing the blockchain technology with 5G technology,the innovative application scenarios of the decoupling and cross-integration were explored that may be involved in the future of the blockchain.…”
    Get full text
    Article
  20. 3280

    Realization of Looking up Virtual Router's FIB Based on Set Partition by Ying Hu, Lei Zhuang

    Published 2014-10-01
    “…Virtual router is a core network device of future internet, which runs multiple virtual routers in parallel on a common physical router platform. …”
    Get full text
    Article