Sciweavers

137 search results - page 12 / 28
» Advanced Techniques for Analyzing Web Server Logs
Sort
View
FC
2009
Springer
106views Cryptology» more  FC 2009»
14 years 3 months ago
Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing
Attackers compromise web servers in order to host fraudulent content, such as malware and phishing websites. While the techniques used to compromise websites are widely discussed a...
Tyler Moore, Richard Clayton
HT
2003
ACM
14 years 2 months ago
Extracting evolution of web communities from a series of web archives
Recent advances in storage technology make it possible to store a series of large Web archives. It is now an exciting challenge for us to observe evolution of the Web. In this pap...
Masashi Toyoda, Masaru Kitsuregawa
DSN
2005
IEEE
14 years 2 months ago
Effective Testing and Debugging Techniques for a Group Communication System
View-oriented group communication is an important and widely used building block for constructing highlyavailable fault-tolerant systems. Unfortunately, groupcommunication based s...
Eitan Farchi, Gabriel Kliot, Yoel Krasny, Alex Kri...
UM
2005
Springer
14 years 2 months ago
Exploiting Probabilistic Latent Information for the Construction of Community Web Directories
This paper improves a recently-presented approach to Web Personalization, named Community Web Directories, which applies personalization techniques to Web Directories. The Web dire...
Dimitrios Pierrakos, Georgios Paliouras
UM
2010
Springer
13 years 6 months ago
Mobile Web Profiling: A Study of Off-Portal Surfing Habits of Mobile Users
Abstract. The World Wide Web has provided users with the opportunity to access from any computer the largest set of information ever existing. Researchers have analyzed how such us...
Daniel Olmedilla, Enrique Frías-Martí...