Sciweavers

1241 search results - page 25 / 249
» Prolog Server Pages
Sort
View
ICST
2011
IEEE
14 years 6 months ago
Tailored Shielding and Bypass Testing of Web Applications
User input validation is a technique to counter attacks on web applications. In typical client-server architectures, this validation is performed on the client side. This is ineff...
Tejeddine Mouelhi, Yves Le Traon, Erwan Abgrall, B...
158
Voted
SIGMETRICS
2006
ACM
174views Hardware» more  SIGMETRICS 2006»
15 years 8 months ago
Understanding the management of client perceived response time
Understanding and managing the response time of web services is of key importance as dependence on the World Wide Web continues to grow. We present Remote Latency-based Management...
David P. Olshefski, Jason Nieh
118
Voted
WAIM
2007
Springer
15 years 8 months ago
Improvements of HITS Algorithms for Spam Links
The HITS algorithm proposed by Kleinberg is one of the representative methods of scoring Web pages by using hyperlinks. In the days when the algorithm was proposed, most of the pag...
Yasuhito Asano, Yu Tezuka, Takao Nishizeki
WIKIS
2006
ACM
15 years 8 months ago
SweetWiki: semantic web enabled technologies in Wiki
Wikis are social web sites enabling a potentially large number of participants to modify any page or create a new page using their web browser. As they grow, wikis may suffer from...
Michel Buffa, Fabien Gandon
121
Voted
AH
2004
Springer
15 years 8 months ago
Using SiteRank for Decentralized Computation of Web Document Ranking
Abstract. The PageRank algorithm demonstrates the significance of the computation of document ranking of general importance or authority in Web information retrieval. However, doi...
Jie Wu, Karl Aberer