2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content最新文献

筛选
英文 中文
The analysis of factors affecting the customers' satisfaction in BtoC E-commerce BtoC电子商务中影响顾客满意度的因素分析
2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content Pub Date : 2010-12-03 DOI: 10.1109/ICNIDC.2010.5657837
Dai Zhuo
{"title":"The analysis of factors affecting the customers' satisfaction in BtoC E-commerce","authors":"Dai Zhuo","doi":"10.1109/ICNIDC.2010.5657837","DOIUrl":"https://doi.org/10.1109/ICNIDC.2010.5657837","url":null,"abstract":"This paper studies the factors of affecting consumers' satisfaction in BtoC E-commerce. The factor model of satisfaction is constructed on the basis of theoretical research and china's reality. And the model is tested by LISREL8.7. This paper also puts forward the suggestions of promoting the consumers' satisfaction.","PeriodicalId":348778,"journal":{"name":"2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130290818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An experimentation testbed for scalable video coding on IMS-based IPTV 基于ims的IPTV可扩展视频编码实验测试平台
2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content Pub Date : 2010-12-03 DOI: 10.1109/ICNIDC.2010.5657896
Lipeng Du, I. Nugraha, H. Morita, Lin Zhang
{"title":"An experimentation testbed for scalable video coding on IMS-based IPTV","authors":"Lipeng Du, I. Nugraha, H. Morita, Lin Zhang","doi":"10.1109/ICNIDC.2010.5657896","DOIUrl":"https://doi.org/10.1109/ICNIDC.2010.5657896","url":null,"abstract":"Due to the lack of quality guarantees, it's very difficult to deploy IPTV services in the current internet, especially in a NGN network, the core IMS framework interconnects different access networks which have differing amounts of bandwidth available and varying client terminals. The ETSI TISPAN standards allow adaptation multimedia content by transcoding, however, it is computationally intensive. This paper focuses on introducing scalable video coding into TISPAN IMS-based IPTV architecture, allowing cost-effective efficient solutions both for residential users and providers (e.g., flexible support of heterogeneous devices, adaptive video quality based on device and/or network capabilities).","PeriodicalId":348778,"journal":{"name":"2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134441435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of the relationship between involvement and the Internet Word-of-Mouth 参与与网络口碑的关系分析
2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content Pub Date : 2010-12-03 DOI: 10.1109/ICNIDC.2010.5657951
Yaowen Zhang, Ting-jie Lv
{"title":"Analysis of the relationship between involvement and the Internet Word-of-Mouth","authors":"Yaowen Zhang, Ting-jie Lv","doi":"10.1109/ICNIDC.2010.5657951","DOIUrl":"https://doi.org/10.1109/ICNIDC.2010.5657951","url":null,"abstract":"With the development of network technology and the increasing popularity of the network, the Internet Word-of-Mouth is gradually replacing its traditional counterpart. People increasingly prefer to collect product information using the network exchange in order to make consumption decisions. Involvement theory plays an important role in the theory of consumer behavior; it explains why people sometimes did not follow the rational model-information collection, screening, and assessment to do purchase decision. Researching the role of involvement to IWOM is significant to the development of marketing theory and effective marketing communications. This paper regards college students as survey subjects, focuses on the impact of variables of involvement to IWOM, and conducts the demonstration to get conclusions so as to recommend appropriate management recommendations to help the corporation better carry out the publicity and marketing of product.","PeriodicalId":348778,"journal":{"name":"2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131281740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Blocking pornographic, illegal websites by internet host domain using FPGA and Bloom Filter 利用FPGA和Bloom滤波器对internet主机域的色情、非法网站进行屏蔽
2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content Pub Date : 2010-12-03 DOI: 10.1109/ICNIDC.2010.5657855
Hua Yu, Rong Cong, Luying Chen, Zhenming Lei
{"title":"Blocking pornographic, illegal websites by internet host domain using FPGA and Bloom Filter","authors":"Hua Yu, Rong Cong, Luying Chen, Zhenming Lei","doi":"10.1109/ICNIDC.2010.5657855","DOIUrl":"https://doi.org/10.1109/ICNIDC.2010.5657855","url":null,"abstract":"For blocking pornographic, illegal websites by Intenet host domain, now the majority of solutions are based on the identification and blocking by software. Basing on the analysis of Bloom Filter algorithm and combining with the feature of FPGA chip, this paper proposes an efficient, high-speed hardware-based Implementation of the host domain blocking","PeriodicalId":348778,"journal":{"name":"2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133783153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Spectrum assignment with spectrum hole classification in cognitive mobile telecommunication systems 认知移动通信系统中频谱空穴分类的频谱分配
2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content Pub Date : 2010-12-03 DOI: 10.1109/ICNIDC.2010.5657902
Weidong Wang, Fan Li, Yang Yu, Yinghai Zhang, Yongtao Wang
{"title":"Spectrum assignment with spectrum hole classification in cognitive mobile telecommunication systems","authors":"Weidong Wang, Fan Li, Yang Yu, Yinghai Zhang, Yongtao Wang","doi":"10.1109/ICNIDC.2010.5657902","DOIUrl":"https://doi.org/10.1109/ICNIDC.2010.5657902","url":null,"abstract":"The frequency resource of mobile communication systems is intensive and it needs to combine with cognitive radio technology. The mobile telecommunication system subscribers are sensitive to interference, making the interference problem need prompt solution. This paper analyzes the inter-system and intra-system interference and proposes the approach of utilizing spectrum holes classification. The spectrum assignment algorithm with spectrum hole classification is come out with and the simulation results prove that the proposed algorithm can eliminate the inter-system interference, decrease the drop ratio of primary users and weaken the intra-system interference.","PeriodicalId":348778,"journal":{"name":"2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124138005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multi-path routing based on link lifetime in mobile Ad Hoc networks 移动Ad Hoc网络中基于链路生存期的多路径路由
2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content Pub Date : 2010-12-03 DOI: 10.1109/ICNIDC.2010.5657862
Jiansong Miao, Muqing Wu, Feng Zheng, Heng Guo
{"title":"Multi-path routing based on link lifetime in mobile Ad Hoc networks","authors":"Jiansong Miao, Muqing Wu, Feng Zheng, Heng Guo","doi":"10.1109/ICNIDC.2010.5657862","DOIUrl":"https://doi.org/10.1109/ICNIDC.2010.5657862","url":null,"abstract":"In mobile Ad Hoc networks the established path is often disconnected because of nodes mobility, which results in communication discontinuity and adverse effects on real-time services, and a new multi-path routing algorithm based on link lifetime is proposed. This algorithm tries to find more than on stable and independent path to transport packets based on link lifetime. Simulations prove that can effectively improve the network performances, such as the packet success rate and time jitter and so on.","PeriodicalId":348778,"journal":{"name":"2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115108549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research for scan detection algorithm of high-speed links based on honeypot 基于蜜罐的高速链路扫描检测算法研究
2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content Pub Date : 2010-12-03 DOI: 10.1109/ICNIDC.2010.5657900
Xinliang Wang, Fang Liu, Luying Chen, Zhenming Lei
{"title":"Research for scan detection algorithm of high-speed links based on honeypot","authors":"Xinliang Wang, Fang Liu, Luying Chen, Zhenming Lei","doi":"10.1109/ICNIDC.2010.5657900","DOIUrl":"https://doi.org/10.1109/ICNIDC.2010.5657900","url":null,"abstract":"In order to effectively detect the scan attack on high-speed links, this paper improves the commonly used scan detection algorithm TRW (Threshold Random Walk) based on honeypot, and makes a detailed analysis on its performance. The analysis shows that the improved algorithm has better performance on the speed of identifying the scan source and can finish the real-time detection of high-speed link scan. Meanwhile, on the basis of selective system sample, this paper focuses on the analysis of the anomaly detection accuracy of three scan detection algorithms: Snort, TRW, TRWHP (Threshold Random Walk Based on Honeypot). The experimental results show that, at the same sampling ratio, the false positive rates of TRWHP and TRW algorithm are almost the same, however, the false negative rate of TRWHP algorithm can make a remarkable improvement and obtain the better detection performance.","PeriodicalId":348778,"journal":{"name":"2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128485588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Fingerprint reference point location based on multi-scale analysis of wavelet 基于小波多尺度分析的指纹参考点定位
2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content Pub Date : 2010-12-03 DOI: 10.1109/ICNIDC.2010.5657780
Haixia Jiang, Xiaojun Jing, Bo Zhang, Songlin Sun, Hai Huang
{"title":"Fingerprint reference point location based on multi-scale analysis of wavelet","authors":"Haixia Jiang, Xiaojun Jing, Bo Zhang, Songlin Sun, Hai Huang","doi":"10.1109/ICNIDC.2010.5657780","DOIUrl":"https://doi.org/10.1109/ICNIDC.2010.5657780","url":null,"abstract":"It is still difficult to locate reference point for low-quality fingerprints in fingerprint recognition. In this paper, a novel algorithm based on quadratic B-spline wavelet is proposed to deal with this problem. The main idea of the paper is to make a progressive analysis on the gradient-changing of the orientation field and combine the gradient information at different scales together. Due to multi-scale analysis and the adaptive process of improved A'trous algorithm, this method naturally possesses high location rate and simple operation, especially for low-quality fingerprints. The experimental results on the FVC2004 show the high effectiveness and practicability of the approach.","PeriodicalId":348778,"journal":{"name":"2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content","volume":"68 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128167906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis and porting of HBA driver on embedded Linux 嵌入式Linux下HBA卡驱动的分析与移植
2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content Pub Date : 2010-12-03 DOI: 10.1109/ICNIDC.2010.5657804
Dongxia Wang, Qi-Hu Li, Guo-qiang Ren
{"title":"Analysis and porting of HBA driver on embedded Linux","authors":"Dongxia Wang, Qi-Hu Li, Guo-qiang Ren","doi":"10.1109/ICNIDC.2010.5657804","DOIUrl":"https://doi.org/10.1109/ICNIDC.2010.5657804","url":null,"abstract":"PCI Express will serve as a general purpose I/O interconnect for a wide variety of future computing and communications platforms. While, SCSI(Small Computer Systems Interface) has emerged as a popular protocol in the storage world and like Linux, it is open source. Since the SCSI controller based on PCI Express bus has become increasingly important storage device today, the HBA(Host Bus Adapter) driver on Linux, especially embedded Linux, will be attached more and more importance to. This paper gives an introduction to the architecture of PCI Express and the Linux SCSI subsystem. It also analyses the driver porting of sata raid controller, a kind of SCSI HBA, based on embedded Linux, shows the actual steps that how to configure the card BIOS and how to compile the Linux kernel and combining with the result of porting and analysis, advances the aspects to be optimized of the SCSI HBA driver.","PeriodicalId":348778,"journal":{"name":"2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129540025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traffic identification method based on on-line density based spatial clustering algorithm 基于在线密度空间聚类算法的交通识别方法
2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content Pub Date : 2010-12-03 DOI: 10.1109/ICNIDC.2010.5657786
Jian Zhang, Zongjue Qian, Guochu Shou, Yihong Hu
{"title":"Traffic identification method based on on-line density based spatial clustering algorithm","authors":"Jian Zhang, Zongjue Qian, Guochu Shou, Yihong Hu","doi":"10.1109/ICNIDC.2010.5657786","DOIUrl":"https://doi.org/10.1109/ICNIDC.2010.5657786","url":null,"abstract":"Recently traffic identification based on Machine Learning (ML) techniques has attracted a great deal of interest. Two challenging issues for these methods are how to deal with encrypted flows and cope with the rapid growing number of new application types correctly and early. We propose a hybrid traffic identification method and a novel unsupervised clustering algorithm, On-Line Density Based Spatial Clustering (OLDBSC) algorithm, in which flows are automatically clustered based on sub-flow statistical features instead of full flows. We select Best-first features algorithm to find an optimal feature-sets, and then map the clusters to application types based on maximum probabilities applications in the clusters. The experiment results demonstrate that the proposed hybrid traffic identification method and OLDBSC algorithm is capable of identifying encrypted flows and potential new application types.","PeriodicalId":348778,"journal":{"name":"2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126996047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信