Lomonosov Moscow State University

Displaying 1-9 of 9 results

  • White Papers // May 2013

    Mobile Services and Network Proximity

    This paper discusses several practical use cases for deploying network proximity in mobile services. The authors' research presents here mobile services oriented for either discovering new data for mobile subscribers or for delivering some customized information to them. All applications share the same approach and use the common platform, based...

    Provided By Lomonosov Moscow State University

  • White Papers // May 2013

    Local Messages for Smartphones

    This paper describes a new model for local messaging based on the network proximity. The authors present a novelty mobile mashup which combines Wi-Fi proximity measurements with Cloud Messaging. Their mobile mashup combines passive monitoring for smart phones and cloud based messaging for mobile operational systems. Passive monitoring can determine...

    Provided By Lomonosov Moscow State University

  • White Papers // May 2013

    Adaptive Security Event Visualization for Continuous Monitoring

    The field of information security routinely produces the need for a security information and event management system operator who would be capable of durable and extensive (e.g., workday-long) monitoring of the system in his control with well-timed decision making in emergencies. The obvious concern is that such continuous exertion is...

    Provided By Lomonosov Moscow State University

  • White Papers // Feb 2013

    Time Scales in Probabilistic Models of Wireless Sensor Networks

    For many years, distributed systems are a constant source of challenging research problems. Clock synchronization is one of the most well-known and widely discussed subjects. In distributed systems, there is no global clock. Clocks of different components tick at different rates. But to achieve an efficient parallelization in their common...

    Provided By Lomonosov Moscow State University

  • White Papers // Dec 2012

    Linkset-Based Data Integration System for LOD Space

    For the last few decades data integration has been one of the most actual problems of computer science. With the development of IT industry countless data sources emerged in the Internet. These data sources are heterogeneous in all possible ways. Effective usage of such data sources is impossible without automatical...

    Provided By Lomonosov Moscow State University

  • White Papers // May 2011

    Detecting Content Spam on the Web through Text Diversity Analysis

    Web spam is considered to be one of the greatest threats to modern search engines. Spammers use a wide range of content generation techniques known as content spam to fill search results with low quality pages. The authors argue that content spam must be tackled using a wide range of...

    Provided By Lomonosov Moscow State University

  • White Papers // Aug 2010

    Supplier-Retailer Relationships In The Strategy Of International Retailers: Empirical Evidence From Russia

    The purpose of the paper is to analyze the role of supplier-retailer relationships in the strategy of international retailers penetrating Russian market which is now one of the most attractive in the word. This is underlined by the second place of Russia on the 2009 Global Retail Development Index of...

    Provided By Lomonosov Moscow State University

  • White Papers // Aug 2010

    Antecedents Of Sales Peoples? Relationship Termination Competence

    To end business relationships, or to more actively terminate relationships, has long been acknowledged as part of customer relationship management. However, compared to other elements such as initiation and maintenance of relationships, little is known about the termination of business relationships as a managerial task. This paper contributes by developing...

    Provided By Lomonosov Moscow State University

  • White Papers // May 2009

    Network Traffic Analysis Optimization for Signature-Based Intrusion Detection Systems

    This paper proposes a method for signature matching optimization in the field of intrusion detection and prevention. Signature matching algorithm performance is one of the key factors in the overall quality of the IDS/IPS, especially in high-speed networks. Optimization method proposed in this paper relies on semantics of the signature...

    Provided By Lomonosov Moscow State University

  • White Papers // May 2013

    Local Messages for Smartphones

    This paper describes a new model for local messaging based on the network proximity. The authors present a novelty mobile mashup which combines Wi-Fi proximity measurements with Cloud Messaging. Their mobile mashup combines passive monitoring for smart phones and cloud based messaging for mobile operational systems. Passive monitoring can determine...

    Provided By Lomonosov Moscow State University

  • White Papers // Dec 2012

    Linkset-Based Data Integration System for LOD Space

    For the last few decades data integration has been one of the most actual problems of computer science. With the development of IT industry countless data sources emerged in the Internet. These data sources are heterogeneous in all possible ways. Effective usage of such data sources is impossible without automatical...

    Provided By Lomonosov Moscow State University

  • White Papers // May 2009

    Network Traffic Analysis Optimization for Signature-Based Intrusion Detection Systems

    This paper proposes a method for signature matching optimization in the field of intrusion detection and prevention. Signature matching algorithm performance is one of the key factors in the overall quality of the IDS/IPS, especially in high-speed networks. Optimization method proposed in this paper relies on semantics of the signature...

    Provided By Lomonosov Moscow State University

  • White Papers // Aug 2010

    Supplier-Retailer Relationships In The Strategy Of International Retailers: Empirical Evidence From Russia

    The purpose of the paper is to analyze the role of supplier-retailer relationships in the strategy of international retailers penetrating Russian market which is now one of the most attractive in the word. This is underlined by the second place of Russia on the 2009 Global Retail Development Index of...

    Provided By Lomonosov Moscow State University

  • White Papers // Aug 2010

    Antecedents Of Sales Peoples? Relationship Termination Competence

    To end business relationships, or to more actively terminate relationships, has long been acknowledged as part of customer relationship management. However, compared to other elements such as initiation and maintenance of relationships, little is known about the termination of business relationships as a managerial task. This paper contributes by developing...

    Provided By Lomonosov Moscow State University

  • White Papers // Feb 2013

    Time Scales in Probabilistic Models of Wireless Sensor Networks

    For many years, distributed systems are a constant source of challenging research problems. Clock synchronization is one of the most well-known and widely discussed subjects. In distributed systems, there is no global clock. Clocks of different components tick at different rates. But to achieve an efficient parallelization in their common...

    Provided By Lomonosov Moscow State University

  • White Papers // May 2013

    Mobile Services and Network Proximity

    This paper discusses several practical use cases for deploying network proximity in mobile services. The authors' research presents here mobile services oriented for either discovering new data for mobile subscribers or for delivering some customized information to them. All applications share the same approach and use the common platform, based...

    Provided By Lomonosov Moscow State University

  • White Papers // May 2013

    Adaptive Security Event Visualization for Continuous Monitoring

    The field of information security routinely produces the need for a security information and event management system operator who would be capable of durable and extensive (e.g., workday-long) monitoring of the system in his control with well-timed decision making in emergencies. The obvious concern is that such continuous exertion is...

    Provided By Lomonosov Moscow State University

  • White Papers // May 2011

    Detecting Content Spam on the Web through Text Diversity Analysis

    Web spam is considered to be one of the greatest threats to modern search engines. Spammers use a wide range of content generation techniques known as content spam to fill search results with low quality pages. The authors argue that content spam must be tackled using a wide range of...

    Provided By Lomonosov Moscow State University