Sciweavers

361 search results - page 41 / 73
» On Mining Web Access Logs
Sort
View
JSW
2007
124views more  JSW 2007»
13 years 9 months ago
Shibboleth as a Tool for Authorized Access Control to the Subversion Repository System
—Shibboleth is an architecture and protocol for allowing users to authenticate and be authorized to use a remote resource by logging into the identity management system that is m...
Linh Ngo, Amy W. Apon
ICPADS
1998
IEEE
14 years 2 months ago
Probability Based Replacement Algorithm for WWW Server Arrays
This paper describes a scalable Web server array architecture which uses a caching policy called Probability Based Replacement (PBR) algorithm [5, 6]. The server array consists of...
K. H. Yeung, K. W. Suen
ACSC
2005
IEEE
14 years 3 months ago
A Delivery Framework for Health Data Mining and Analytics
The iHealth Explorer tool, developed by CSIRO and DoHA, delivers web services type data mining and analytic facilities over a web interface, providing desktop access to sophistica...
Damien McAullay, Graham J. Williams, Jie Chen, Hui...
WECWIS
2002
IEEE
133views ECommerce» more  WECWIS 2002»
14 years 2 months ago
SmartClick: An Enabler for Human-Centered Wireless Web Service
Recently wireless web services have been rapidly growing as a new way of information service. As the wireless Internet access grows, so do e-commerce opportunities through the wir...
Seong-ryong Kang, Hoh Peter In, Wei Zhao
WWW
2009
ACM
14 years 10 months ago
Unsupervised query categorization using automatically-built concept graphs
Automatic categorization of user queries is an important component of general purpose (Web) search engines, particularly for triggering rich, query-specific content and sponsored ...
Eustache Diemert, Gilles Vandelle