The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
SCTP multi-streaming provides an aggregation mechanism to multiplex logically separate message streams to the same association. While the current SCTP creates streams only at the initial association establishment phase and afterwards the streams are not allowed to modify. When transmitting web objects concurrently with multi-streaming, it causes unnecessary waiting, as a result of large objects occupying...
Nowadays, companies and home users use websites offering services ranging from web sites up to complex web applications. The ergonomics of these applications often remain unconsidered and the applications turn out to be hard to use. In this paper, a tool is presented to facilitate the examination of usability. Web 2.0 applications in particular are supported, because they are more flexible and require...
Web crawlers facilitate the search engine's work by following the hyperlinks in Web pages to automatically download a partial snapshot of the Web. Crawling is the initial and also the most important step during the Web searching procedure. A prototype framework of a multi-threading Web crawler for E-commerce application is proposed, in relationship to the former research of search engine. And the...
Web usage mining has become popular in various business areas related with Web site development. In Web usage mining, commonly visited navigational paths are extracted in terms of Web page addresses from the Web server visit logs, and the patterns are used in various applications including recommendation. The semantic information of the Web page contents is generally not included in Web usage mining...
Data mining focuses on the techniques of non-trivial extraction of implicit, previously unknown, and potentially useful information from very large amounts of data. Web mining can be defined simply as the application of data mining techniques to Web data. Web usage mining (WUM) is an important category in Web mining. Web usage mining is an important and fast developing area of Web mining where a lot...
To improve Web site, we need to evaluate current usage of it. Web usage mining and statistical analysis are two ways to evaluate usage of Web site. The combination of Web usage mining and statistical analysis gives more accurate information about Web usage. Through Web usage mining methods, graph mining covers complex Web browsing behaviors such as parallel browsing. Through statistical analysis methods,...
By integrating network technology, virtual instrument technology, video image network transmission and Web page fusion technology, the network virtual electronic laboratory based on B/S mode was developed. The network structure of the system consists of the Web server, virtual instrument system, the network video monitoring system, the Web database and the remote clients. The key technical problem...
Nowadays Web users are facing the problems of information overload and drowning due to the significant and rapid growth in the amount of information and the number of users. As a result, how to provide Web users with more exactly needed information is becoming a critical issue in Web-based information retrieval and Web applications. In this work, we aim to address improving the performance of Web...
Uncertainty over future oil prices, concerns over and energy security and increasing agreement over an urgent need to reduce global greenhouse gas emissions to avoid unacceptable temperature increases and climate change have combined to generate strong interest in low emission energy supply options, including increased efficiency of energy use and renewable energy technologies. These energy options,...
As the Internet became a popular source of information, more and more people are using the Internet in their everyday life. Therefore, for the servers that maintain web page sites get a lot of transactions and to maintain a stable environment, a lot of web sites have more than one server for these transaction requests. A common architecture to balance the transactional load is by using a L7 switch...
Bare PC applications do not use an operating system or kernel. The bare PC architecture avoids buffer copying, minimizes interrupts, uses a single thread of execution for processing network packets, and incorporates novel scheduling to minimize CPU utilization. We design a bare PC Web server that can serve both dynamic and static content. Measurements of response time, connection time and throughput...
The most commonly used request processing model in multithreaded web servers is thread-per-request, in which an individual thread is bound to serve each web request. However, with the prevalence of using template techniques for generating dynamic contents in modern web servers, this conventional request processing model lags behind and cannot provide efficient resource management support for template-based...
To ensure the security of sensitive Web content, an organization must use TLS and do so correctly. However, little is known about how TLS is actually used on the Web. In this work, we perform large-scale Internet-wide measurements to determine if Web sites use TLS when needed and when they do, if they use it correctly. We find hundreds of thousands of pages where TLS is either not used when it should...
In open systems, certain unfavorable situations due to unanticipated user behavior may be seen, which results in a violation of cross-cutting policy. This paper proposes a runtime monitoring method to check such problems. Since there is a large gap, a certain link is needed between the policy and runtime execution method. We employ a two-step checking approach; an offline symptom checking and a runtime...
With the rapid growth of data, the need for archival storage is the increasing volume of material converted into the digital domain. The archival data is not removed rather closely referenced by its appliance, will only continue to grow; archival storage system with scalability and powerful search ability is desired. In this paper, a novel distributed archival storage based on CAS is brought. First,...
Tor has become one of the most popular overlay networks for anonymizing TCP traffic. A novel and effective flow multiplication attack against Tor is proposed in this paper, which exploits the fundamental vulnerability of anonymous Web browsing by using a man-in-the-middle attack on client's HTTP flow. In the flow multiplication attack, whenever a malicious exit onion router detects a Web request to...
In this paper, reclassification for the current classification through K-means would be implemented based on the feedback of Web usage mining in order to improve the accuracy of news recommendation and convergence of classification. It could extract most relative keywords and eliminate the disturbance of multi-vocal word in one category based on feedback of Web usage. The reclassification of news...
Considering the deficiencies of current Web site in adaptive ability, especially the lack of analysis to its own site topology, this paper, from the user's view, combines Web log mining with site topology analysis to present the concept of landmark coefficient to measure the significance of Web site nodes. Subsequently, the process for designing adaptive Web site is proposed based on landmark coefficient...
A monitoring system based on the embedded Internet technology for embedded devices is designed and implemented. The Browser/Server mode is adopted in this monitoring system and the realization technologies of an embedded Web server, which includes a thin TCP/IP stack, an embedded file system and a device gateway, are discussed in details. The way of embedding the Web server in the device makes it...
In this paper, we study Web cache prefetching with multiple Web pages. Four multi-prefetching models including the Top-m, Future-r, (Top-m)+(Future-r) and multi-dimensional matrix are introduced. The idea is based on examination of the probabilities on sequence request patterns. Simulation results on hit rate comparison are also presented. The algorithms generalize the previous work of two-dimensional...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.