首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 49 毫秒
1.
The sprout, a tree growing in real time is introduced. The sprout is a generalization and an embedding in time of the standard recursive tree. The sprout is proposed as a model for the growth of the Internet. The tree size is analyzed via an associated two-color stochastic process (the sprout process), which is a special case of the Pólya process. Owing to its potential as a modeling tool, the more general Pólya process is analyzed on average. In addition to the usage of the Pólya process in evaluating sprouts, we also give a heuristic interpretation of the result for Pólya urns, which might be a first step toward understanding several nonclassic urn models, as those with nonconstant row sum and those with multiple eigenvalues.Received: 23 September 2002, Revised: 6 March 2004, Published online: 14 October 2004  相似文献   

2.
Aim of the present study was to examine whether the personality correlates sensitivity to reward and to punishment, and impulsivity predict compulsive internet use (CIU). Furthermore, the predictive value of these personality correlates was compared to the predictive value of factors relating to psychosocial wellbeing. The results showed that particularly rash spontaneous impulsivity predicts CIU and that this personality factor is more important than psychosocial wellbeing factors. Sensitivity to reward, which is supposed to play a role in craving processes associated with substance abuse and eating disorders, could not be related to CIU. The data suggest that internet users who are characterized by an impulsive personality feature, are less able to control their use of the internet, which makes them more vulnerable to develop CIU.  相似文献   

3.
The increasing popularity of online and multiplayer games has meant that for many, social interaction and cooperation are vital components of the gaming experience. Previous research has suggested that not only has this made gaming more attractive to socially oriented people but also that it may be socially beneficial in terms of social capital and prosocial behaviors. However, for problematic video game players (those showing signs of compulsive or detrimental video game use), this may not be the case, and a number of theories hold deficiencies in socializing in real life as central to the development of this issue. In the present study, an online questionnaire completed by 416 participants assessed problematic video game use, extraversion, trait empathy, online and offline social capital and prosocial tendencies. Contrary to hypotheses, non-problematic, problematic and non-gamers did not differ in empathy, extraversion or prosocial tendencies. Problematic video game play was, however, associated with significantly higher online social capital and lower offline social capital whereas non-problematic players demonstrated only higher online capital than non-players. This highlights the importance of social support but suggests personality is not an influential factor.  相似文献   

4.

Business model innovation (BMI) describes the efforts made by the business in finding new business logic or new ways of value creation. Technological change is deemed to be the main driver of BMI. This study focused on the emergence of the internet of things (IoT) as a technological driver of BMI in internet service providers’ (ISPs) business context, in the scope of wired access (WA) and fixed wireless access (FWA) providers, and addressed new ways of value creation for ISPs driven by IoT. To this end, a four-stage BMI process, including; initiation, ideation, integration, and evaluation, was used. In the implementation of the BMI process, we used the data extracted from the literature of IoT, BMI, and ISP business, as well as those obtained through interviews with experts. As a result of the process implementation, we identified possible ideas for the value creation of ISPs in the IoT domain, based on connectivity service providing, cloud service providing, technical solution providing, and business solution providing. Then, we proposed ISPs’ business models in the IoT domain, in accordance with the identified ideas, based on Hedman and Kalling’s ontology. To boost the validity of the proposed business models, the stress testing approach was recruited at the final stage of the BMI process. Implementing BMI, driven by IoT, in the ISPs’ context, reduces constraints imposed by the paucity of knowledge in both BMI and IoT, helps ISPs’ managers to anticipate and identify the IoT-based opportunities, and provides a starting point for further studies on new ways of value creation in other businesses in the telecom industry.

  相似文献   

5.
Next generation heterogeneous wireless networks are expected to interwork with Internet Protocol (IP)-based infrastructures. Conventional network services operate like silos in that a specific set of services are offered over a specific type of access network. It is desirable for users to be able to roam between fixed and mobile networks that employ different access technologies. Therefore, mobility management with quality of service (QoS) support is of particular importance and one of the driving forces of convergence. Since service providers often provide more than one service to their subscribers, it is important to facilitate convergence of network charging architecture through a common charging framework. One of the main issues of IP-based convergence is security and privacy. This requires coordination of different security policies in diverse networks that have different security levels and capabilities. The business case for migration to an IP-based platform motivates operators to deliver more powerful services for customers as well as a better user experience. This paper provides an overview of converged mobile Internet architectures and their implications on QoS, charging/billing and security, as well as emerging business models for telecommunication services.  相似文献   

6.
Mobile agent has shown its promise as a powerful means to complement and enhance existing technology in various application areas. In particular, existing work has demonstrated that MA can simplify the development and improve the performance of certain classes of distributed applications, especially for those running on a wide-area, heterogeneous, and dynamic networking environment like the Internet. In our previous work, we extended the application of MA to the design of distributed control functions, which require the maintenance of logical relationship among and/or coordination of proc- essing entities in a distributed system. A novel framework is presented for structuring and building distributed systems, which use cooperating mobile agents as an aid to carry out coordination and cooperation tasks in distributed systems. The framework has been used for designing various distributed control functions such as load balancing and mutual ex- clusion in our previous work. In this paper, we use the framework to propose a novel ap- proach to detecting deadlocks in distributed system by using mobile agents, which dem- onstrates the advantage of being adaptive and flexible of mobile agents. We first describe the MAEDD (Mobile Agent Enabled Deadlock Detection) scheme, in which mobile agents are dispatched to collect and analyze deadlock information distributed across the network sites and, based on the analysis, to detect and resolve deadlocks. Then the design of an adaptive hybrid algorithm derived from the framework is presented. The algorithm can dynamically adapt itself to the changes in system state by using different deadlock detec- tion strategies. The performance of the proposed algorithm has been evaluated using simulations. The results show that the algorithm can outperform existing algorithms that use a fixed deadlock detection strategy.  相似文献   

7.
纳斯达克、中国概念股、网络应用、电子商务与网络效应五项曲线,是测度互联网发展状况的最核心的五个指标。2000年底的这个时候,我们之所以把五项曲线同时进行比较,只不过为了说明一个非常简单的事实:资本市场在跌,.com公司在萎缩,但是互联网在长。上网人数也好,信息流、物流、资本流向网络的大规模迁移也好,电子商务的加速成长也好,无不说明一个趋势:网络化正在加速进行,互联网的边际效应正在逐步显现,我们有充足的理由相信:internet的价值不是负的。  相似文献   

8.
This study investigated whether the Internet reduced gender bias in U.S. car price quotes. Previous research has shown that when buying identical cars, women were often quoted significantly higher prices than their male counterparts in traditional on-site transactions. A sample of 114 California car dealership websites was used to examine if gender bias persisted in the online sales channels. Price quotes were requested online by one male and one female persona whose demographic profiles differed only by gender. While no statistically significant difference in the price offered to the male and female was found, the female persona received more price quotes, and a lower average price than the male. These results suggest that when females are in the car buying market, utilizing the Internet can result in more equitable pricing. This not only informs e-commerce pricing and theory development, but consumers and industry representatives interested in internet sales.  相似文献   

9.
本文介绍利用internet技术,采用客户/服务器模式将客户端的测试命令传输到数控机床端,由数控系统调用并执行控制程序,控制机床的数控系统、液压系统、电气系统、机械系统等部件按命令要求工作,检测元件检测机床的工作参数,通过数控系统的采集和处理,最后传输到客户端进行分析,远程了解机床的工作状态。  相似文献   

10.
Different from past online shopping research which focuses on exploring the cognitive and attitudinal aspects of online consumption behaviors, this study focuses on examining how online shopping motivation and product type affect the searching and spending behavior in an online website. In particular, the interactive effect between online shopping motivation and product type are explored in the study. A 2 × 2 between-subjects factorial experiment with two shopping motivations (i.e., goal-oriented and experiential) and two product types (i.e., hedonic and utilitarian product) was conducted. In addition to the main effects of online shopping motivation and product type, the results show that there is an interactive effect between online shopping motivation and product type on budget control. Participants conducted the loosest budget control when purchasing hedonic products in a goal-oriented online shopping trip because the shopping motivation provides a good justification for online shoppers to purchase hedonic goods without guilt or regret.  相似文献   

11.

In the domain of web security, websites strive to prevent themselves from data gathering performed by automatic programs called bots. In that way, crawler traps are an efficient brake against this kind of programs. By creating similar pages or random content dynamically, crawler traps give fake information to the bot and resulting by wasting time and resources. Nowadays, there is no available bots able to detect the presence of a crawler trap. Our aim was to find a generic solution to escape any type of crawler trap. Since the random generation is potentially endless, the only way to perform crawler trap detection is on the fly. Using machine learning, it is possible to compute the comparison between datasets of webpages extracted from regular websites from those generated by crawler traps. Since machine learning requires to use distances, we designed our system using information theory. We considered widely used distances compared to a new one designed to take into account heterogeneous data. Indeed, two pages does not have necessary the same words and it is operationally impossible to know all possible words by advance. To solve our problematic, our new distance compares two webpages and the results showed that our distance is more accurate than other tested distances. By extension, we can say that our distance has a much larger potential range than just crawler traps detection. This opens many new possibilities in the scope of data classification and data mining.

  相似文献   

12.
This research particularly aims to investigate how the individual differences in gender, age, and internet experience influence citizens’ trust in e-government’s adoption. The findings of the study revealed that females are confident and have a more positive evaluation of online services compared to males. Interestingly, this study found that old people display greater trust in e-government as compared to the levels of trust reported by younger people. The results also show that internet experience influences citizens’ trust positively.  相似文献   

13.
In this paper, we explore some characteristics of the Information Superhighway and the World Wide Web metaphors in the light of the current developments in information technology. We propose that these characteristics constitute a form of conceptual slippage (often in the form of lexical leakage), which helps us detect and predict the tacit impact that the currently available information delivery systems are having on human cognition. We argue that the particular language associated with these systems evolves as a direct result of human cognitive adaptation to the demands, resources, and constraints of highly technological environments. It reflects a growing alienation of the users of computerized systems from the physical aspects of the natural environment in which the disseminated information was originally grounded. We believe that a careful investigation of the pragmatic phenomena which are operative when the information media jargon is used is appropriate to the aims of Cognitive Technology. The role of metaphor as a vehicle for self-expression, as mediated by criteria of relevance, is discussed from this perspective.  相似文献   

14.
HTTPS enables secure access to web content and web-based services. Although supported by many content and service providers, HTTPS is oftentimes not enabled by default, as pointed out in an open letter sent to Google by security experts. In this article, we discuss if and how web users can protect themselves by using HTTPS instead of HTTP. We show that many websites allow for accessing content by HTTPS instead of HTTP. However, HTTPS access must be manually configured or requested by the user, or is impossible at all, e.g., for embedded objects. For this reason, we explore how to protect users transparently by automatically using HTTPS whenever possible. In order to enable this approach, one needs to determine whether using HTTPS yields the same content as using HTTP, even in the presence of dynamic websites incorporating advertisements and news. We show that this decision is possible for entire websites like amazon.com in short time by combining a fast content comparison algorithm, result caching, and observations on the structure of the website. Besides the concrete HTTP use case considered in this article, our results are of independent interest for any setting in which content can be accessed by various means. Finally, we present and discuss different approaches for implementing automated protection of HTTP connections.  相似文献   

15.
This study employed an online survey of politically interested Internet users during the two weeks before and the two weeks after the 2004 presidential election to compare how they judge five components of the Internet in terms of credibility for political information. Blogs were judged as the most credible with issue-oriented Web sites also judged as highly credible. Candidate Web sites and bulletin boards were only judged moderately credible while chat rooms were rated not very credible. This study also explored whether reliance on the Internet resource or motivations for visiting the source significantly predict Internet component credibility after controlling for demographic and political variables.  相似文献   

16.
白山气象局作为公共服务部门,在日常工作中,除气象内部专用局域网外,许多科室的业务需要接入internet网。本文作者在单位只有一部电话线adsl接入外网的条件下,最终实现了单位内部各个科室上网的需要。  相似文献   

17.
《计算机与网络》2012,(2):46-47
网络访问究竟是要速度,还是保安全?这样的问题,一直以来都困扰着网络管理员。事实上,在局域网工作环境中,那些没有存储重要数据信息以及文件资料的普通工作站在通过局域网网络访问Internet网络时,可以尝试使用UPnP功能、虚拟转发、DMZ功能、触发端口等多种技术来让Internet网络访问兼顾速度与安全。通过这样的技术,我们既能保证局域网中的普通工作站可  相似文献   

18.
随着国民经济的快速发展,Internet已成为人们生活中必不可少的一部分,并逐渐成熟,企业级计算机信息集成系统逐步向网络化的方向发展,并且向高度集成化系统的方向发展。本文通过分析信息集成的基本理论、实现手段及采取的技术构架,详细分析了基于J2EE技术的企业级计算机信息集成系统,为信息的高度集成提供依据。  相似文献   

19.
We present the results of the user experience studies conducted as part of the European SEE TV-WEB project activities. The SEE TV-WEB project aims to use the free digital terrestrial television (DTT) broadcasting frequency spectrum capacities for transmitting selected Internet content and ensuring at least some Internet experience via TV devices to the certain less advantaged segments of the population, or those in rural areas without broadband access. Five different test study cases are presented, four in Slovenia and one in Austria, each with different specific target user groups and their own dynamics. According to the project disposition goals the focus was on the elderly. Methods, such as think-aloud protocol in combination with a guided interview and observation of verbal as well as of non-verbal responses, were used. To ensure the repeatability of tests and to help guide the process, a special questionnaire was developed. The research questions focused on: the navigation and interaction concept, the content, the readability, and the overall acceptance and the perception of value of the TV-WEB service. More than 74 users participated in the user experience studies, 27 of them 65 years old or older. The results indicate that the presented navigation and interaction concept is indeed intuitive and simple enough to be used by most users with no or little effort. This is especially proven by the results from studies at both elderly citizens homes, where the majority of participants were 65 years old or older.  相似文献   

20.
主要介绍用无线网和WBT实现企业internet接入,一方面能满足单位和企业员工的要求,实现internet接入,另一方面,由于无线网和WBT终端的特有属性,很容易做到物理隔离,投入较少的资金即可满足要求,实现internet的接入。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号