The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
When Web mining is applied in the real world of an e-commerce site it is perhaps axiomatic that the first thing to be done is to use a specific language to collect raw data and analyse that data by using those Web-mining techniques. It is therefore perhaps important to be able to understand the role and use of server-side languages and its relation with online database servers. Several server-side...
In this paper, we present our proposed method of incorporating metadata of Web pages to identify equivalent URLs in addition to the standard URL normalization methodology. The metadata considered are the page size and the body text of Web pages. These metadata can be obtained during HTML parsing in the process of crawling without incurring unnecessary cost. Our experiment shows an accuracy of up to...
The Internet is one of the fastest growing areas of intelligence gathering. During their navigation Web users leave many records of their activity. This huge amount of data can be a useful source of knowledge. Sophisticated mining processes are needed for this knowledge to be extracted, understood and used. Web Usage Mining (WUM) systems are specifically designed to carry out this task by analyzing...
Since the term ldquoWeb 2.0rdquo appears, a new generation of Web is coming. There are many technical articles referring to how to design a Web 2.0 website. However, the traditional Web 1.0 websites are still multitudinous currently. The developers of the traditional Web 1.0 website may not have adequate techniques to reconstruct the websites into Web 2.0 timely. Rebuilding a website often takes tremendous...
This paper proposes a software architecture for Web service programs. Rule-based languages allow programs to be easily described at a high and abstract level, however, they suffer from long execution times. A state transition model, one of a standard model for developing telecommunication services programs, can be used to simply describe Web services. To reduce the complexity of development, this...
Along with the rapid development of the Internet, Web has become most importmant resource of information. It is getting more difficult to fast and accurately find useful information from the gigantic amount of data provided by Web. The Web usage mining is the process inferring valuable knowledge by analyzing users' access information, which is of great significance for better managing Web sites and...
Malicious web pages that launch client-side attacks on web browsers have become an increasing problem in recent years. High-interaction client honeypots are security devices that can detect these malicious web pages on a network. However, high-interaction client honeypots are both resource-intensive and known to miss attacks. This paper presents a novel classification method for detecting malicious...
For distributed large commercial mirror sites, this paper presents a hybrid information filtering algorithm based on distributed web log mining. Based on multi-agent technology, this algorithm preprocesses the web logs of mirror sites, in which the web page's manual rating is replaced by user browsing preference, and then user access matrix is constructed and standardized. On this basis, this paper...
The vulnerability of home routers has been widely discussed, but there has been significant skepticism in many quarters about the viability of using them to perform damaging attacks. Others have argued that traditional malware prevention technologies will function for routers. In this paper we show how easily and effectively a home router can be repurposed to perform a mid-stream script injection...
With the development of multimedia Web sites and increasingly diversified services, there is a growing demand for different levels of quality of service (QoS) on scalable Web servers to meet changing resource availability and to satisfy different client requirement. Most Web servers in practical use a queuing policy based on the best effort model, which employs the first-come-first-service (FCFS)...
This paper presents an implementation of competitive data acquisition system based on wireless network. Adopting IEEE802.11b wireless communication standard, introducing the organization and operational mode of wireless network, and discussing the B/S design thought of data collector, data control and Web server, and show the operation results at last. This resolution support flexible organization...
Generally, a user will access a Web site with a certain interest. Mining Web users' interest access patterns has been an important research direction in Web usage mining. These patterns are a kind of the special interest association rules essentially. In this paper, we propose a new approach for mining such rules based on hidden Markov model (HMM). In our approach, pages' contents and Web server's...
The greatest benefit of Embedded Web server (EWS) is without a doubt the availability of a standard connection to non-Internet devices using the Internet. Since the use of Web server in ubiquitous computing opens new method for maintaining and supervising non-Internet devices, Web server has become a helpful tool for users to control and manage these non-Internet devices remotely. In this paper, we...
Malicious Web pages that launch drive-by-download attacks on Web browsers have increasingly become a problem in recent years. High-interaction client honeypots are security devices that can detect these malicious Web pages on a network. However, high-interaction client honeypots are both resource-intensive and unable to handle the increasing array of vulnerable clients. This paper presents a novel...
Web documents which stored in many existed Web servers include Web pages and many resource files such as audios, videos, photos, etc. They are easy to be modified or replaced without necessary secure mechanism. The paper emphasized on the research and implementation of integrity protection mechanism on Web pages by customized middleware which embedded in Web server. The middleware identified the Web...
Nowadays companies and home users use Web sites offering services ranging from Web sites up to complex Web applications. Often the ergonomics of these applications remains unconsidered and they turn out to be hard to use. In order to examine the usability from within the Web applications, information about the usage of the application is collected. The techniques that have been used in the past for...
A transformation-based Web site can keep the content of a Web site consistent by furnishing a single database and a set of transformation programs, each of which generates a Web page. However, when someone notices an error or stale content on a Web page in this style of Web site construction, the Web site maintainer must access a possibly huge database to update the corresponding content. This paper...
Great many Websites exist present. These Websites are developing various services to accommodate many customers. This time, several kinds of links exist to website. But, size of early service Web page increased as numbers of this service increase greatly. A lot of links give load to Web server. When several users approached for Web page, a lot of links can give decline in the service speed. We made...
Digital watermarking is the process of embedding information into a digital signal. If the signal is copied, then the information is also carried in the copy. Digital fingerprinting is a field of digital watermarking. That inserts unrecognized buyerpsilas information. In this paper, using a fingerprinting technique we insert information which is userpsilas IP. Thus, we present algorithm that can include...
WBISD is a tool that utilizes Eclipse plug-ins and other World Wide Web tools as a debugger to help Web-based interactive service developers debug the Web pages. The users of our system simply start debugging by interacting with the provided GUI environment of the tool. They can view the Web-based interactive service parameters encoded in URLs of dynamic Web pages obviously. WBISD can improve development...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.