Search results for "Computer network"
showing 10 items of 1634 documents
Guidelines proposal for a good and durable WEC design
2017
In this paper, preliminarily a proposal for design guidelines for a “good” design of wave energy converter is presented and successively a small scale prototype of a wave energy converter including the buoyant electrical generator, the power electronics equipment and a sea water electrolyzer is designed on the basis of these guidelines and presented.
Accessibility of the Italian institutional web pages: a survey on the compliance of the Italian public administration web pages to the Stanca Act and…
2014
Accessibility of the Italian public administration web pages is ruled by the Stanca Act and in particular the Decree of the Minister issued on July 8, 2005. In this paper, an objective test is performed on the official web pages of the Italian province and region chief towns to check their compliance to the 22 technical requirements defined by the Stanca Act. A sample of 976 web pages belonging to the websites of the Italian chief towns have been downloaded in the period October---December 2012. Such a data collection has been submitted to Achecker, the worldwide recognized syntax and accessibility validation service. Several accessibility and syntax errors have been found following the aut…
HTTP-level e-commerce data based on server access logs for an online store
2020
Abstract Web server logs have been extensively used as a source of data on the characteristics of Web traffic and users’ navigational patterns. In particular, Web bot detection and online purchase prediction using methods from artificial intelligence (AI) are currently key areas of research. However, in reality, it is hard to obtain logs from actual online stores and there is no common dataset that can be used across different studies. Moreover, there is a lack of studies exploring Web traffic over a longer period of time, due to the unavailability of long-term data from server logs. The need to develop reliable models of Web traffic, Web user navigation, and e-customer behaviour calls for …
Verification of Web traffic burstiness and self-similarity for multiple online stores
2017
Developing realistic Web traffic models is essential for a reliable Web server performance evaluation. Very significant Web traffic properties that have been identified so far include burstiness and self-similarity. Very few relevant studies have been devoted to e-commerce traffic, however. In this paper, we investigate burstiness and self-similarity factors for seven different online stores using their access log data. Our findings show that both features are present in all the analyzed e-commerce datasets. Furthermore, a strong correlation of the Hurst parameter with the average request arrival rate was discovered (0.94). Estimates of the Hurst parameter for the Web traffic in the online …
Data Stream Clustering for Application-Layer DDoS Detection in Encrypted Traffic
2018
Application-layer distributed denial-of-service attacks have become a serious threat to modern high-speed computer networks and systems. Unlike network-layer attacks, application-layer attacks can be performed using legitimate requests from legitimately connected network machines that make these attacks undetectable by signature-based intrusion detection systems. Moreover, the attacks may utilize protocols that encrypt the data of network connections in the application layer, making it even harder to detect an attacker’s activity without decrypting users’ network traffic, and therefore violating their privacy. In this paper, we present a method that allows us to detect various application-l…
Web Server Support for e-Customer Loyalty through QoS Differentiation
2013
The paper deals with the problem of offering predictive service in e-commerce Web server systems under overload. Due to unpredictability of Web accesses, such systems often fail to effectively handle peak traffic, which results in long delays and incomplete transactions. As a consequence, online retailers miss an opportunity to attract new customers, retain the loyalty of regular customers, and increase profits. We propose a method for priority-based admission control and scheduling of requests at the Web server system in order to differentiate Quality of Service (QoS) with regard to user-perceived delays, i.e., Web page response times provided by the system (as opposed to HTTP request resp…
WiSHFUL : enabling coordination solutions for managing heterogeneous wireless networks
2017
The paradigm shift toward the Internet of Things results in an increasing number of wireless applications being deployed. Since many of these applications contend for the same physical medium (i.e., the unlicensed ISM bands), there is a clear need for beyond-state-of-the-art solutions that coordinate medium access across heterogeneous wireless networks. Such solutions demand fine-grained control of each device and technology, which currently requires a substantial amount of effort given that the control APIs are different on each hardware platform, technology, and operating system. In this article an open architecture is proposed that overcomes this hurdle by providing unified programming i…
Parallel and Distributed Resource Allocation With Minimum Traffic Disruption for Network Virtualization
2017
Wireless network virtualization has been advocated as one of the most promising technologies to provide multifarious services and applications for the future Internet by enabling multiple isolated virtual wireless networks to coexist and share the same physical wireless resources. Based on the multiple concurrent virtual wireless networks running on the shared physical substrate, service providers can independently manage and deploy different end-users services. This paper proposes a new formulation for bandwidth allocation and routing problem for multiple virtual wireless networks that operate on top of a single substrate network to minimize the operation cost of the substrate network. We …
Energy-aware design for wireless mesh networks
2014
International audience; Wireless mesh networks (WMNs) are the next step in the development of the wireless architecture, delivering wireless services for a large variety of users in personal, local, campus, and metropolitan areas. Energy efficiency solutions are becoming more vital for both local access networks and wireless networks and Green IT has attracted a considerable attention. However, the application of green network for wireless mesh networks has seldom been described in the literature. However, WMNs infrastructure devices are always active. Thus, during lower traffic periods the energy consumption is the same as in busy hours, while it would be possible to save a large amount of…
An Efficient Retransmission Strategy for Data Gathering in Wireless Sensor Networks
2006
This paper introduces a new strategy for data gathering in wireless sensor networks that takes into account the need for both energy saving and for a reasonable tradeoff between robustness and efficiency. The proposed algorithm implements an efficient strategy for retransmission of lost packets by discovering alternative routes and making clever use of multiple paths when necessary; in order to do that we use duplicate and order insensitive aggregation functions, and by taking advantage of some intrinsic characteristics of the wireless sensor networks, we exploit implicit acknowledgment of reception and smart caching of the data.