scholarly journals Research and Application of Network Trusted Interconnection Technology

2021 ◽  
Vol 2079 (1) ◽  
pp. 012031
Author(s):  
Wenjia Xie ◽  
Zhe Wang ◽  
Ping Tang ◽  
Zhongmin Zhang ◽  
Longsheng Chen

Abstract In order to solve the problem of reliable information transmission between data centers and data sources, between data sources and between data centers, as well as the "network island" communication problem, a dynamic MPLS VPN method is proposed, the principle and steps of the method are introduced, and how to apply the method to the supporting platform is explained in detail.

Author(s):  
Diego Galar Pascual ◽  
Pasquale Daponte ◽  
Uday Kumar

2014 ◽  
Vol 644-650 ◽  
pp. 2124-2127
Author(s):  
Fen Liu

With the rapid development of Internet, the Internet has become the important resources of information transmission and share. The characteristics of Web data are semi-structured, heterogeneous and mass, making traditional data mining technology indirectly applied to Web data sources. Web data mining refers to extracting a potential, useful model from the Web documents or Web activities. Because of the structural and expansibility of XML, research on XML combined with Web data mining has also became popular.


2021 ◽  
Author(s):  
Julius Olufemi Ogunleye

Data mining is a technique for identifying patterns in large amounts of data and information. Databases, data centers, the internet, and other data storage formats; or data that is dynamically streaming into the network are examples of data sources. This paper provides an overview of the data mining process, as well as its benefits and drawbacks, as well as data mining methodologies and tasks. This study also discusses data mining techniques in terms of their features, benefits, drawbacks, and application areas.


Author(s):  
Sergiy Gogolenko ◽  
Derek Groen ◽  
Diana Suleimenova ◽  
Imran Mahmood ◽  
Marcin Lawenda ◽  
...  

2018 ◽  
Vol 115 (48) ◽  
pp. 12241-12246 ◽  
Author(s):  
Christian Hilbe ◽  
Laura Schmid ◽  
Josef Tkadlec ◽  
Krishnendu Chatterjee ◽  
Martin A. Nowak

Indirect reciprocity is a mechanism for cooperation based on shared moral systems and individual reputations. It assumes that members of a community routinely observe and assess each other and that they use this information to decide who is good or bad, and who deserves cooperation. When information is transmitted publicly, such that all community members agree on each other’s reputation, previous research has highlighted eight crucial moral systems. These “leading-eight” strategies can maintain cooperation and resist invasion by defectors. However, in real populations individuals often hold their own private views of others. Once two individuals disagree about their opinion of some third party, they may also see its subsequent actions in a different light. Their opinions may further diverge over time. Herein, we explore indirect reciprocity when information transmission is private and noisy. We find that in the presence of perception errors, most leading-eight strategies cease to be stable. Even if a leading-eight strategy evolves, cooperation rates may drop considerably when errors are common. Our research highlights the role of reliable information and synchronized reputations to maintain stable moral systems.


Sign in / Sign up

Export Citation Format

Share Document