Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








20,110 Hits in 5.3 sec

Measuring the Normality of Web Proxies' Behavior Based on Locality Principles [chapter]

Yi Xie, Shun-zheng Yu
2008 Lecture Notes in Computer Science  
This paper fills an void in this area by proposing a new server-side detection scheme based on the behavior characteristics of proxy-to-server Web traffic.  ...  Proxy's access behavior is extracted from the temporal locality and the bytes of the requested objects.  ...  In order to achieve this aim, we introduce a new way based on temporal locality to extract the access behavior of Web proxies.  ... 
doi:10.1007/978-3-540-88140-7_6 fatcat:ba2hoikd75dlfgidchkgqjw7pm

Autonomous SPY©: Intelligent Web proxy caching detection using neurocomputing and Particle Swarm Optimization

Sarina Sulaiman, Siti Mariyam Shamsuddin, Fadni Forkan, Ajith Abraham
2009 2009 6th International Symposium on Mechatronics and its Applications  
This tool is capable to self directed either to cache or not to cache the objects in a document based on the behavior of users' activities (number of object hits, script size of objects, and time to receive  ...  objects) in Internet based electronic services (e-services) for enhancing Web access.  ...  WEB PROXY CACHING Web proxy caches (also known as forward proxy caching) work on the same principle, but at larger scale.  ... 
doi:10.1109/isma.2009.5164846 fatcat:ggbbmsfonffebd5mxhs45qjasq

Using REST Web-Services Architecture for Distributed Simulation

Khaldoon Al-Zoubi, Gabriel Wainer
2009 2009 ACM/IEEE/SCS 23rd Workshop on Principles of Advanced and Distributed Simulation  
We present an overview of the principles, design and implementation of the RESTful-CD++ HTTP server and DCD++ simulation.  ...  In contrast, RPC-style SOAP-based Web Services use the Web as a transmission medium by exposing few URIs and many RPCs.  ...  SOAP-based WS are provided as Remote Procedure calls (RPC) on top of the Web (HTTP).  ... 
doi:10.1109/pads.2009.16 dblp:conf/pads/Al-ZoubiW09 fatcat:cvphboalwffb3jahmwzrwcf6jy

A Comprehensive Survey on Importance of Web Caching and Pre-Fetching

2016 International Journal of Science and Research (IJSR)  
This paper provide survey on some principles, standards and some current and existing web caching and prefetching approaches, discusses some studies that take into consideration of integrating both web  ...  This paper consists of a survey of the web page prefetching mechanism which is provided by some authors.  ...  Since the Web intermediary storing proxy caching exploits the temporary area and the web prefetching uses the spatial area of locality of the Web data objects, prefetching and Web proxy caching both complement  ... 
doi:10.21275/v5i6.nov164298 fatcat:y4djlwnowjbzff2mtvudvdpccu

Reducing the Energy Usage of Office Applications [chapter]

Jason Flinn, Eyal de Lara, Mahadev Satyanarayanan, Dan S. Wallach, Willy Zwaenepoel
2001 Lecture Notes in Computer Science  
In this paper, we demonstrate how component-based middleware can reduce the energy usage of closed-source applications.  ...  We first describe how the Puppeteer system exploits well-defined interfaces exported by applications to modify their behavior.  ...  The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the NSF, DARPA, USN, IBM  ... 
doi:10.1007/3-540-45518-3_14 fatcat:zwsf4qyxffgilbbpzyv5wga6me

Detecting ShadowsocksR User Based on Intelligence of Cyber Entities

Jiancong Zhang, Ping Dong, Minyu Jin, Yuting Tang, Jehad Ali
2022 Security and Communication Networks  
machine-learning-based approach is designed and implemented to provide suggestions for the automatic identification of SSR users based on the extracted feature vectors.  ...  To solve the problem of accurately and effectively discovering SSR users within an organization in a real traffic environment, in this paper, we propose an SSR user detection method based on network entity  ...  ., Ltd. e authors thank all the participants who took part in this study and enabled this research to be possible.  ... 
doi:10.1155/2022/8511258 fatcat:kvw7m56jsbb7zgzkyea5e7jk44

The dark side of the Web

Vivek S. Pai, Limin Wang, KyoungSoo Park, Ruoming Pang, Larry Peterson
2004 Computer communication review  
With the advent of large-scale, wide-area networking testbeds, researchers can deploy long-running services that interact with other resources on the Web.  ...  In effect, CoDeeN is one of the largest "open" proxy networks in the world, and therefore draws unwanted attention from malicious users.  ...  We also thank our anonymous reviewers for their valuable comments on improving this paper.  ... 
doi:10.1145/972374.972385 fatcat:b67qi27orrbndbp27lh36chdyq

Architectures for Inlining Security Monitors in Web Applications [chapter]

Jonas Magazinius, Daniel Hedin, Andrei Sabelfeld
2014 Lecture Notes in Computer Science  
We propose architectures for inlining security monitors for JavaScript: via browser extension, via web proxy, via suffix proxy (web service), and via integrator.  ...  We report on experiments that demonstrate successful deployment of a JavaScript information-flow monitor with the different architectures.  ...  This work was funded by the European Community under the ProSecuToR and WebSand projects and the Swedish agencies SSF and VR.  ... 
doi:10.1007/978-3-319-04897-0_10 fatcat:qypp4vnkzrfj5bgzocnf2ccvs4

Enhancing the Web's infrastructure: from caching to replication

M. Baentsch, L. Baum, G. Molter, S. Rothkugel, P. Sturm
1997 IEEE Internet Computing  
Insufficient bandwidth causing high latency are the order of the day. Caching is a standard solution for this type of problem, and it was applied to the Web early on for this reason.  ...  T he World Wide Web and the phrase "traffic jam" have become as linked in the minds of many computer users as are the urban superhighway and "rush hour" to the early morning commuter.  ...  Locality of reference and the Web Based on the logs of the main caching proxy of the University of Kaiserslautern from April 1996, we summed up the number of requests for each document.  ... 
doi:10.1109/4236.601083 fatcat:wq764yq7efbo3jdz6rmntgyrp4

Measurement, modeling, and analysis of a peer-to-peer file-sharing workload

Krishna P. Gummadi, Richard J. Dunn, Stefan Saroiu, Steven D. Gribble, Henry M. Levy, John Zahorjan
2003 Proceedings of the nineteenth ACM symposium on Operating systems principles - SOSP '03  
Unlike the Web, whose workload is driven by document change, we demonstrate that clients' fetch-at-mostonce behavior, the creation of new objects, and the addition of new clients to the system are the  ...  Moreover, we demonstrate that: (1) this "fetch-at-most-once" behavior causes the Kazaa popularity distribution to deviate substantially from Zipf curves we see for the Web, and (2) this deviation has significant  ...  at the University of Washington for their continued support.  ... 
doi:10.1145/945445.945475 dblp:conf/sosp/GummadiDSGLZ03 fatcat:qlbbye2xijbvjd53hbeouy23oi

Measurement, modeling, and analysis of a peer-to-peer file-sharing workload

Krishna P. Gummadi, Richard J. Dunn, Stefan Saroiu, Steven D. Gribble, Henry M. Levy, John Zahorjan
2003 Proceedings of the nineteenth ACM symposium on Operating systems principles - SOSP '03  
Unlike the Web, whose workload is driven by document change, we demonstrate that clients' fetch-at-mostonce behavior, the creation of new objects, and the addition of new clients to the system are the  ...  Moreover, we demonstrate that: (1) this "fetch-at-most-once" behavior causes the Kazaa popularity distribution to deviate substantially from Zipf curves we see for the Web, and (2) this deviation has significant  ...  at the University of Washington for their continued support.  ... 
doi:10.1145/945472.945475 fatcat:o5opp32irrao7pxwfqmr7zpize

Measurement on a Peer-to-Peer Package Management System for Linux Distributions

Jie Yu, Weihua Zhang, Xiaodong Tang, Shasha Li, Qiang Li, Qingtao Shen
2015 International Journal of Future Computer and Communication  
Then, we develop a crawler to record the information of a normal peer and a bootstrapping peer in apt-p2p network.  ...  In this paper, we first introduce the principle of a P2P package management system and a popular implementation named apt-p2p.  ...  based on apt-p2p V.  ... 
doi:10.7763/ijfcc.2015.v4.358 fatcat:yqwx4fi4dnfujcsnzfjtqypiv4

A Survey and Analysis of Techniques and Tools for Web Performance Optimization

Shailesh Shivakumar, P. V. Suresh
2018 Journal of Information Organization  
The performance of web applications is of paramount importance as it can impact end-user experience and the business revenue.  ...  In this paper we have conducted the survey of state of the art tools, techniques, methodologies of various aspects of web performance optimization.  ...  Normally the response times is measured at various user loads such as average load, peak load and such to measure the web site behavior.  ... 
doi:10.6025/jio/2018/8/2/31-57 fatcat:ejiz5kmusfcvjihk442pbarwd4

On the scale and performance of cooperative Web proxy caching

Alec Wolman, M. Voelker, Nitin Sharma, Neal Cardwell, Anna Karlin, Henry M. Levy
1999 Proceedings of the seventeenth ACM symposium on Operating systems principles - SOSP '99  
We also use our model to examine the implications of future trends in Web-access behavior and traffic.  ...  This paper uses both trace-based analysis and analytic modelling to show the potential advantages and drawbacks of inter-proxy cooperation.  ...  At the University of Washington, Steve Corbato, Art Dong, Corey Satten, and the other members of the Computing and Communications organization at UW supported our effort.  ... 
doi:10.1145/319151.319153 dblp:conf/sosp/WolmanVSCKL99 fatcat:qir6t5x2zbanpgd74eufq7iulm

The measurements, parameters and construction of Web proxy cache [article]

Dmitry Dolgikh, Andrei Sukhov
2003 arXiv   pre-print
The aim of this paper is an experimental study of cache systems in order to optimize proxy cache systems and to modernize construction principles.  ...  Our investigations lead to the criteria for the optimal use of storage capacity and allow the description of the basic effects of the ratio between construction parts, steady-state performance, optimal  ...  Our analysis is based on the model presented by Breslau et al. [2] and extended by Wolman et al. [11] to incorporate the steady-state behavior and documents' rate of change.  ... 
arXiv:cs/0303012v1 fatcat:tbdwzjd5ifh63ewn5gho2lm2ky
« Previous Showing results 1 — 15 out of 20,110 results