P2P is a complex system.Many researches on P2P architecture have been done.These researches have provided valuable references for the standardization of P2P technology.However,the standardization can not be achieved b...P2P is a complex system.Many researches on P2P architecture have been done.These researches have provided valuable references for the standardization of P2P technology.However,the standardization can not be achieved because there are still some problems in existing studies.This paper proposes a 5-layer reference model which clearly defines the functionalities of each layer,and distinctly describes the interface and the relationship between layers.This model is able to clearly show the internal structure of P2P system and the working process of data flow in P2P system.Validation shows that this model is general and rational.展开更多
may incur significant bandwidth for executing more com- plicated search queries such as multiple-attribute queries. In order to reduce query overhead, KSS (keyword-set search) by Gnawali partitions the index by a set ...may incur significant bandwidth for executing more com- plicated search queries such as multiple-attribute queries. In order to reduce query overhead, KSS (keyword-set search) by Gnawali partitions the index by a set of keywords. However, a KSS index is considerably larger than a standard inverted index, since there are more word sets than there are individual words. And the insert overhead and storage overhead are obviously un- acceptable for full-text search on a collection of documents even if KSS uses the distance window technology. In this paper, we extract the relationship information between query keywords from websites’ queries logs to improve performance of KSS system. Experiments results clearly demonstrated that the improved keyword-set search system based on keywords relationship (KRBKSS) is more efficient than KSS index in insert overhead and storage overhead, and a standard inverted index in terms of communication costs for query.展开更多
The open and dynamic environment of Internet computing demands new software reliability technologies.How to efficiently and effectively build highly reliable Internet applications becomes a critical research problem.T...The open and dynamic environment of Internet computing demands new software reliability technologies.How to efficiently and effectively build highly reliable Internet applications becomes a critical research problem.This paper proposes a research framework for predicting reliability of individual software entities as well as the whole Internet application.Characteristics of the Internet environment are comprehensively analyzed and several reliability prediction approaches are proposed.A prototype is implemented and practical use of the proposed framework is also demonstrated.展开更多
Interact traffic classification is vital to the areas of network operation and management. Traditional classification methods such as port mapping and payload analysis are becoming increasingly difficult as newly emer...Interact traffic classification is vital to the areas of network operation and management. Traditional classification methods such as port mapping and payload analysis are becoming increasingly difficult as newly emerged applications (e. g. Peer-to-Peer) using dynamic port numbers, masquerading techniques and encryption to avoid detection. This paper presents a machine learning (ML) based traffic classifica- tion scheme, which offers solutions to a variety of network activities and provides a platform of performance evaluation for the classifiers. The impact of dataset size, feature selection, number of application types and ML algorithm selection on classification performance is analyzed and demonstrated by the following experiments: (1) The genetic algorithm based feature selection can dramatically reduce the cost without diminishing classification accuracy. (2) The chosen ML algorithms can achieve high classification accuracy. Particularly, REPTree and C4.5 outperform the other ML algorithms when computational complexity and accuracy are both taken into account. (3) Larger dataset and fewer application types would result in better classification accuracy. Finally, early detection with only several initial packets is proposed for real-time network activity and it is proved to be feasible according to the preliminary results.展开更多
In the process of analyzing the large-scale network security situation,the data we faced are always flooded and messy,and the information is difficult to obtain with respond to the query timely.Online analytical proce...In the process of analyzing the large-scale network security situation,the data we faced are always flooded and messy,and the information is difficult to obtain with respond to the query timely.Online analytical processing which use the Data-cube as a data source directly,calculated all or part of the Data-cube in advance,and it can reduce the query response time significantly.This paper considers a class of queries,called the Partial-MAX/MIN query.We introduce Rank Decision Tree(RD-Tree) and it’s searching algorithm for efficient processing of the partial-max/min queries.Through experiments,we show our approach has an efficient processing capability for partial-max/min queries.展开更多
In Internet of Things(IoT), the devices or terminals are connected with each other, which can be very diverse over the wireless networks. Unfortunately, the current devices are not designed to communicate with the col...In Internet of Things(IoT), the devices or terminals are connected with each other, which can be very diverse over the wireless networks. Unfortunately, the current devices are not designed to communicate with the collocated devices which employ different communication technologies. Consequently, the communication between these devices will be realized only by using the gateway nodes. This will cause the inefficient use of wireless resources. Therefore, in this paper, a smart service system(SSS) architecture is proposed, which consists of smart service terminal(SST), and smart service network(SSN), to realize the Io T in a general environment with diverse communication networks, devices, and services. The proposed architecture has the following advantages: i) the devices in this architecture cover multiple types of terminals and sensor-actuator devices; ii) the communications network therein is a converged network, and will coordinate multiple kinds of existing and emerging networks. This converged network offers ubiquitous access for various sensors and terminals; iii) the architecture has services and applications covering all smart service areas. It also provides theadaptability to new services and applications. A SSS architecture-based smart campus system was developed and deployed. Evaluation experiments of the proposed smart campus system demonstrate the SSS's advantages over the existing counterparts, and verify the effectiveness of the proposed architecture.展开更多
In order to achieve the smart home system for remote management and wireless transmission function in the smart home networking system design, the article will combined with ARM technology and ZigBee wireless network ...In order to achieve the smart home system for remote management and wireless transmission function in the smart home networking system design, the article will combined with ARM technology and ZigBee wireless network technology based on samsung's $3C2440 chip and some related peripheral devices to form into home gateway of the system control platform, and the home control network using the internal ZigBee wireless network technologies. Practice has proved that the system is stable, is worth promoting.展开更多
Denial of Service Distributed Denial of Service (DOS) attack, especially (DDoS) attack, is one of the greatest threats to Internet. Much research has been done for it by now, however, it is always concentrated in ...Denial of Service Distributed Denial of Service (DOS) attack, especially (DDoS) attack, is one of the greatest threats to Internet. Much research has been done for it by now, however, it is always concentrated in the behaviors of the network and can not deal with the problem exactly. In this paper, we start from the security of the protocol, then we propose a novel theory for security protocol analysis of Denial of Service in order to deal with the DoS attack. We first introduce the conception of weighted graph to extend the strand space model, then we extend the penetrator model and define the goal of anti-DoS attack through the conception of the DoS-stop protocol, finally we propose two kinds of DoS test model and erect the novel formal theory for security protocol analysis of Denial of Service. Our new formal theory is applied in two example protocols. It is proved that the Internet key exchange (IKE) easily suffers from the DoS attacks, and the efficient DoS- resistant secure key exchange protocol (JFK) is resistant against DoS attack for the server, respectively.展开更多
In this paper, we conduct research on the O2O mode and corresponding influence on the online and offline Internet marketing. Precision marketing is on the basis of fully understanding of consumer information, accordin...In this paper, we conduct research on the O2O mode and corresponding influence on the online and offline Internet marketing. Precision marketing is on the basis of fully understanding of consumer information, according to its characteristics and primary preferences targeted to carry out the one-to-one marketing. Mobile Internet users are mostly fixed which can be the new network technology in-depth insight into consumer interest and demand, and to establish for each specific customer database. Based on the analysis of customer data, then according to the characteristics of the different customers and the preference information such as the precision marketing, at the same time which can also according to customer' s feedback information targeted adjustment of products and the marketing, in order to better meet the needs of customers. Our research combines the O2O concepts and the technique to propose the novel marketing paradigm which is of great importance.展开更多
After a long subway tunnel operators will produce cross-sectional deformation. Articles designed vehicle laser ranging device tbr continuous measurement of tunnel wall to test their defomaed state. The paper also desc...After a long subway tunnel operators will produce cross-sectional deformation. Articles designed vehicle laser ranging device tbr continuous measurement of tunnel wall to test their defomaed state. The paper also describes the tunnel cross-section deltbrmation measurement method, contour titting principles and error analysis and networking technology for wireless data transmission methods. The detection system is designed to achieve a tunnel section of the structural safety testing and deformation that may occur timely disaster warning, the safe operation of the subway tunnel to provide effective protection.展开更多
Click-through information is considered as a valuable source of users' implicit relevance feedback. As user behavior is usually influenced by a number of factors such as position, presentation style and site reputati...Click-through information is considered as a valuable source of users' implicit relevance feedback. As user behavior is usually influenced by a number of factors such as position, presentation style and site reputation, researchers have proposed a variety of assumptions to generate a reasonable estimation of result relevance. Therefore, many click models have been proposed to describe how user click action happens and to predict click probability (and search result relevance). This work builds upon many years of existing efforts from THUIR labs, summarizes the most recent advances and provides a series of practical click models. In this paper, we give an introduction of how to build an effective click model. We use two click models as specific examples to introduce the general procedures of building a click model. We also introduce common evaluation metrics for the comparison of different click models. Some useful datasets and tools are also introduced to help readers better understand and implement existing click models. The goal of this survey is to bring together current efforts in the area, summarize the research performed so far and give a view on building click models for web search.展开更多
Today's society has entered the Intemet era, the Internet technology has brought great changes to all walks of life.With the development of"Internet plus",traditional industry, service industry and business have to...Today's society has entered the Intemet era, the Internet technology has brought great changes to all walks of life.With the development of"Internet plus",traditional industry, service industry and business have to make the appropriate changes to meet the demand of the "Internet plus" era.Similarly,human resource management has to face new challenges in "Intemet plus" era.This paper expounds the characteristics of"Internet plus" era and the changes brought to the human resource management,put forward the idea that human resources management should make changes to meet the demand of the "Internet plus" era from three aspects:big data,decentration and staff self management,establishing a new talent incentive mechanism.展开更多
基金supported in part by National Basic Research Program of China ("973 Program") under contract No.2007CB311106in part by the Special Funds for Key Program of National Standardization Committee of China No.TC260-JCYJ-W1-2008042
文摘P2P is a complex system.Many researches on P2P architecture have been done.These researches have provided valuable references for the standardization of P2P technology.However,the standardization can not be achieved because there are still some problems in existing studies.This paper proposes a 5-layer reference model which clearly defines the functionalities of each layer,and distinctly describes the interface and the relationship between layers.This model is able to clearly show the internal structure of P2P system and the working process of data flow in P2P system.Validation shows that this model is general and rational.
基金Project supported by the National Natural Science Foundation of China (No. 60221120145) and Science & Technology Committee of Shanghai Municipality Key Project (No. 02DJ14045), China
文摘may incur significant bandwidth for executing more com- plicated search queries such as multiple-attribute queries. In order to reduce query overhead, KSS (keyword-set search) by Gnawali partitions the index by a set of keywords. However, a KSS index is considerably larger than a standard inverted index, since there are more word sets than there are individual words. And the insert overhead and storage overhead are obviously un- acceptable for full-text search on a collection of documents even if KSS uses the distance window technology. In this paper, we extract the relationship information between query keywords from websites’ queries logs to improve performance of KSS system. Experiments results clearly demonstrated that the improved keyword-set search system based on keywords relationship (KRBKSS) is more efficient than KSS index in insert overhead and storage overhead, and a standard inverted index in terms of communication costs for query.
基金supported by the National Natural Science Foundation of China(Project No.61472338,61332010)Guangdong Natural Science Foundation(Project No. 2014A030313151)+1 种基金the Fundamental Research Funds for the Central Universitiesthe Research Grants Council of the Hong Kong Special Administrative Region,China (No.415113)
文摘The open and dynamic environment of Internet computing demands new software reliability technologies.How to efficiently and effectively build highly reliable Internet applications becomes a critical research problem.This paper proposes a research framework for predicting reliability of individual software entities as well as the whole Internet application.Characteristics of the Internet environment are comprehensively analyzed and several reliability prediction approaches are proposed.A prototype is implemented and practical use of the proposed framework is also demonstrated.
基金Supported by the National High Technology Research and Development Programme of China (No. 2005AA121620, 2006AA01Z232)the Zhejiang Provincial Natural Science Foundation of China (No. Y1080935 )the Research Innovation Program for Graduate Students in Jiangsu Province (No. CX07B_ 110zF)
文摘Interact traffic classification is vital to the areas of network operation and management. Traditional classification methods such as port mapping and payload analysis are becoming increasingly difficult as newly emerged applications (e. g. Peer-to-Peer) using dynamic port numbers, masquerading techniques and encryption to avoid detection. This paper presents a machine learning (ML) based traffic classifica- tion scheme, which offers solutions to a variety of network activities and provides a platform of performance evaluation for the classifiers. The impact of dataset size, feature selection, number of application types and ML algorithm selection on classification performance is analyzed and demonstrated by the following experiments: (1) The genetic algorithm based feature selection can dramatically reduce the cost without diminishing classification accuracy. (2) The chosen ML algorithms can achieve high classification accuracy. Particularly, REPTree and C4.5 outperform the other ML algorithms when computational complexity and accuracy are both taken into account. (3) Larger dataset and fewer application types would result in better classification accuracy. Finally, early detection with only several initial packets is proposed for real-time network activity and it is proved to be feasible according to the preliminary results.
文摘In the process of analyzing the large-scale network security situation,the data we faced are always flooded and messy,and the information is difficult to obtain with respond to the query timely.Online analytical processing which use the Data-cube as a data source directly,calculated all or part of the Data-cube in advance,and it can reduce the query response time significantly.This paper considers a class of queries,called the Partial-MAX/MIN query.We introduce Rank Decision Tree(RD-Tree) and it’s searching algorithm for efficient processing of the partial-max/min queries.Through experiments,we show our approach has an efficient processing capability for partial-max/min queries.
基金supported by the national 973 project of China under Grants 2013CB329104the Natural Science Foundation of China under Grants 61372124, 61427801+1 种基金the Natural Science Foundation of the Jiangsu Higher Education Institutions (Grant No.13KJB520029)the Jiangsu Province colleges and universities graduate students scientific research and innovation program CXZZ13_0477,NUPTSF(Grant No.NY214033)
文摘In Internet of Things(IoT), the devices or terminals are connected with each other, which can be very diverse over the wireless networks. Unfortunately, the current devices are not designed to communicate with the collocated devices which employ different communication technologies. Consequently, the communication between these devices will be realized only by using the gateway nodes. This will cause the inefficient use of wireless resources. Therefore, in this paper, a smart service system(SSS) architecture is proposed, which consists of smart service terminal(SST), and smart service network(SSN), to realize the Io T in a general environment with diverse communication networks, devices, and services. The proposed architecture has the following advantages: i) the devices in this architecture cover multiple types of terminals and sensor-actuator devices; ii) the communications network therein is a converged network, and will coordinate multiple kinds of existing and emerging networks. This converged network offers ubiquitous access for various sensors and terminals; iii) the architecture has services and applications covering all smart service areas. It also provides theadaptability to new services and applications. A SSS architecture-based smart campus system was developed and deployed. Evaluation experiments of the proposed smart campus system demonstrate the SSS's advantages over the existing counterparts, and verify the effectiveness of the proposed architecture.
文摘In order to achieve the smart home system for remote management and wireless transmission function in the smart home networking system design, the article will combined with ARM technology and ZigBee wireless network technology based on samsung's $3C2440 chip and some related peripheral devices to form into home gateway of the system control platform, and the home control network using the internal ZigBee wireless network technologies. Practice has proved that the system is stable, is worth promoting.
基金This work is supported by National Natural Science Foundation of China under contract 60902008.
文摘Denial of Service Distributed Denial of Service (DOS) attack, especially (DDoS) attack, is one of the greatest threats to Internet. Much research has been done for it by now, however, it is always concentrated in the behaviors of the network and can not deal with the problem exactly. In this paper, we start from the security of the protocol, then we propose a novel theory for security protocol analysis of Denial of Service in order to deal with the DoS attack. We first introduce the conception of weighted graph to extend the strand space model, then we extend the penetrator model and define the goal of anti-DoS attack through the conception of the DoS-stop protocol, finally we propose two kinds of DoS test model and erect the novel formal theory for security protocol analysis of Denial of Service. Our new formal theory is applied in two example protocols. It is proved that the Internet key exchange (IKE) easily suffers from the DoS attacks, and the efficient DoS- resistant secure key exchange protocol (JFK) is resistant against DoS attack for the server, respectively.
文摘In this paper, we conduct research on the O2O mode and corresponding influence on the online and offline Internet marketing. Precision marketing is on the basis of fully understanding of consumer information, according to its characteristics and primary preferences targeted to carry out the one-to-one marketing. Mobile Internet users are mostly fixed which can be the new network technology in-depth insight into consumer interest and demand, and to establish for each specific customer database. Based on the analysis of customer data, then according to the characteristics of the different customers and the preference information such as the precision marketing, at the same time which can also according to customer' s feedback information targeted adjustment of products and the marketing, in order to better meet the needs of customers. Our research combines the O2O concepts and the technique to propose the novel marketing paradigm which is of great importance.
文摘After a long subway tunnel operators will produce cross-sectional deformation. Articles designed vehicle laser ranging device tbr continuous measurement of tunnel wall to test their defomaed state. The paper also describes the tunnel cross-section deltbrmation measurement method, contour titting principles and error analysis and networking technology for wireless data transmission methods. The detection system is designed to achieve a tunnel section of the structural safety testing and deformation that may occur timely disaster warning, the safe operation of the subway tunnel to provide effective protection.
文摘Click-through information is considered as a valuable source of users' implicit relevance feedback. As user behavior is usually influenced by a number of factors such as position, presentation style and site reputation, researchers have proposed a variety of assumptions to generate a reasonable estimation of result relevance. Therefore, many click models have been proposed to describe how user click action happens and to predict click probability (and search result relevance). This work builds upon many years of existing efforts from THUIR labs, summarizes the most recent advances and provides a series of practical click models. In this paper, we give an introduction of how to build an effective click model. We use two click models as specific examples to introduce the general procedures of building a click model. We also introduce common evaluation metrics for the comparison of different click models. Some useful datasets and tools are also introduced to help readers better understand and implement existing click models. The goal of this survey is to bring together current efforts in the area, summarize the research performed so far and give a view on building click models for web search.
文摘Today's society has entered the Intemet era, the Internet technology has brought great changes to all walks of life.With the development of"Internet plus",traditional industry, service industry and business have to make the appropriate changes to meet the demand of the "Internet plus" era.Similarly,human resource management has to face new challenges in "Intemet plus" era.This paper expounds the characteristics of"Internet plus" era and the changes brought to the human resource management,put forward the idea that human resources management should make changes to meet the demand of the "Internet plus" era from three aspects:big data,decentration and staff self management,establishing a new talent incentive mechanism.