In most Internet applications, there is little control on how to protect the data content once it reaches the client. Implementing centralized control for data content delivered t...
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
Streaming audio and video applications are becoming increasingly popular on the Internet, and the lack of effective congestion control in such applications is now a cause for sign...
This paper describes the design and implementation of backward chained clustered RDFS reasoning in 4store. The system presented, called "4s-reasoner", adds no overhead t...
Manuel Salvadores, Gianluca Correndo, Tope Omitola...
— Web usage mining exploits data mining techniques to discover valuable information from navigation behavior of World Wide Web (WWW) users. The required information is captured b...
Murat Ali Bayir, Ismail Hakki Toroslu, Ahmet Cosar