A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Measuring the Normality of Web Proxies' Behavior Based on Locality Principles
[chapter]
2008
Lecture Notes in Computer Science
This paper fills an void in this area by proposing a new server-side detection scheme based on the behavior characteristics of proxy-to-server Web traffic. ...
Proxy's access behavior is extracted from the temporal locality and the bytes of the requested objects. ...
In order to achieve this aim, we introduce a new way based on temporal locality to extract the access behavior of Web proxies. ...
doi:10.1007/978-3-540-88140-7_6
fatcat:ba2hoikd75dlfgidchkgqjw7pm
Autonomous SPY©: Intelligent Web proxy caching detection using neurocomputing and Particle Swarm Optimization
2009
2009 6th International Symposium on Mechatronics and its Applications
This tool is capable to self directed either to cache or not to cache the objects in a document based on the behavior of users' activities (number of object hits, script size of objects, and time to receive ...
objects) in Internet based electronic services (e-services) for enhancing Web access. ...
WEB PROXY CACHING Web proxy caches (also known as forward proxy caching) work on the same principle, but at larger scale. ...
doi:10.1109/isma.2009.5164846
fatcat:ggbbmsfonffebd5mxhs45qjasq
Using REST Web-Services Architecture for Distributed Simulation
2009
2009 ACM/IEEE/SCS 23rd Workshop on Principles of Advanced and Distributed Simulation
We present an overview of the principles, design and implementation of the RESTful-CD++ HTTP server and DCD++ simulation. ...
In contrast, RPC-style SOAP-based Web Services use the Web as a transmission medium by exposing few URIs and many RPCs. ...
SOAP-based WS are provided as Remote Procedure calls (RPC) on top of the Web (HTTP). ...
doi:10.1109/pads.2009.16
dblp:conf/pads/Al-ZoubiW09
fatcat:cvphboalwffb3jahmwzrwcf6jy
A Comprehensive Survey on Importance of Web Caching and Pre-Fetching
2016
International Journal of Science and Research (IJSR)
This paper provide survey on some principles, standards and some current and existing web caching and prefetching approaches, discusses some studies that take into consideration of integrating both web ...
This paper consists of a survey of the web page prefetching mechanism which is provided by some authors. ...
Since the Web intermediary storing proxy caching exploits the temporary area and the web prefetching uses the spatial area of locality of the Web data objects, prefetching and Web proxy caching both complement ...
doi:10.21275/v5i6.nov164298
fatcat:y4djlwnowjbzff2mtvudvdpccu
Reducing the Energy Usage of Office Applications
[chapter]
2001
Lecture Notes in Computer Science
In this paper, we demonstrate how component-based middleware can reduce the energy usage of closed-source applications. ...
We first describe how the Puppeteer system exploits well-defined interfaces exported by applications to modify their behavior. ...
The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the NSF, DARPA, USN, IBM ...
doi:10.1007/3-540-45518-3_14
fatcat:zwsf4qyxffgilbbpzyv5wga6me
Detecting ShadowsocksR User Based on Intelligence of Cyber Entities
2022
Security and Communication Networks
machine-learning-based approach is designed and implemented to provide suggestions for the automatic identification of SSR users based on the extracted feature vectors. ...
To solve the problem of accurately and effectively discovering SSR users within an organization in a real traffic environment, in this paper, we propose an SSR user detection method based on network entity ...
., Ltd. e authors thank all the participants who took part in this study and enabled this research to be possible. ...
doi:10.1155/2022/8511258
fatcat:kvw7m56jsbb7zgzkyea5e7jk44
The dark side of the Web
2004
Computer communication review
With the advent of large-scale, wide-area networking testbeds, researchers can deploy long-running services that interact with other resources on the Web. ...
In effect, CoDeeN is one of the largest "open" proxy networks in the world, and therefore draws unwanted attention from malicious users. ...
We also thank our anonymous reviewers for their valuable comments on improving this paper. ...
doi:10.1145/972374.972385
fatcat:b67qi27orrbndbp27lh36chdyq
Architectures for Inlining Security Monitors in Web Applications
[chapter]
2014
Lecture Notes in Computer Science
We propose architectures for inlining security monitors for JavaScript: via browser extension, via web proxy, via suffix proxy (web service), and via integrator. ...
We report on experiments that demonstrate successful deployment of a JavaScript information-flow monitor with the different architectures. ...
This work was funded by the European Community under the ProSecuToR and WebSand projects and the Swedish agencies SSF and VR. ...
doi:10.1007/978-3-319-04897-0_10
fatcat:qypp4vnkzrfj5bgzocnf2ccvs4
Enhancing the Web's infrastructure: from caching to replication
1997
IEEE Internet Computing
Insufficient bandwidth causing high latency are the order of the day. Caching is a standard solution for this type of problem, and it was applied to the Web early on for this reason. ...
T he World Wide Web and the phrase "traffic jam" have become as linked in the minds of many computer users as are the urban superhighway and "rush hour" to the early morning commuter. ...
Locality of reference and the Web Based on the logs of the main caching proxy of the University of Kaiserslautern from April 1996, we summed up the number of requests for each document. ...
doi:10.1109/4236.601083
fatcat:wq764yq7efbo3jdz6rmntgyrp4
Measurement, modeling, and analysis of a peer-to-peer file-sharing workload
2003
Proceedings of the nineteenth ACM symposium on Operating systems principles - SOSP '03
Unlike the Web, whose workload is driven by document change, we demonstrate that clients' fetch-at-mostonce behavior, the creation of new objects, and the addition of new clients to the system are the ...
Moreover, we demonstrate that: (1) this "fetch-at-most-once" behavior causes the Kazaa popularity distribution to deviate substantially from Zipf curves we see for the Web, and (2) this deviation has significant ...
at the University of Washington for their continued support. ...
doi:10.1145/945445.945475
dblp:conf/sosp/GummadiDSGLZ03
fatcat:qlbbye2xijbvjd53hbeouy23oi
Measurement, modeling, and analysis of a peer-to-peer file-sharing workload
2003
Proceedings of the nineteenth ACM symposium on Operating systems principles - SOSP '03
Unlike the Web, whose workload is driven by document change, we demonstrate that clients' fetch-at-mostonce behavior, the creation of new objects, and the addition of new clients to the system are the ...
Moreover, we demonstrate that: (1) this "fetch-at-most-once" behavior causes the Kazaa popularity distribution to deviate substantially from Zipf curves we see for the Web, and (2) this deviation has significant ...
at the University of Washington for their continued support. ...
doi:10.1145/945472.945475
fatcat:o5opp32irrao7pxwfqmr7zpize
Measurement on a Peer-to-Peer Package Management System for Linux Distributions
2015
International Journal of Future Computer and Communication
Then, we develop a crawler to record the information of a normal peer and a bootstrapping peer in apt-p2p network. ...
In this paper, we first introduce the principle of a P2P package management system and a popular implementation named apt-p2p. ...
based on apt-p2p V. ...
doi:10.7763/ijfcc.2015.v4.358
fatcat:yqwx4fi4dnfujcsnzfjtqypiv4
A Survey and Analysis of Techniques and Tools for Web Performance Optimization
2018
Journal of Information Organization
The performance of web applications is of paramount importance as it can impact end-user experience and the business revenue. ...
In this paper we have conducted the survey of state of the art tools, techniques, methodologies of various aspects of web performance optimization. ...
Normally the response times is measured at various user loads such as average load, peak load and such to measure the web site behavior. ...
doi:10.6025/jio/2018/8/2/31-57
fatcat:ejiz5kmusfcvjihk442pbarwd4
On the scale and performance of cooperative Web proxy caching
1999
Proceedings of the seventeenth ACM symposium on Operating systems principles - SOSP '99
We also use our model to examine the implications of future trends in Web-access behavior and traffic. ...
This paper uses both trace-based analysis and analytic modelling to show the potential advantages and drawbacks of inter-proxy cooperation. ...
At the University of Washington, Steve Corbato, Art Dong, Corey Satten, and the other members of the Computing and Communications organization at UW supported our effort. ...
doi:10.1145/319151.319153
dblp:conf/sosp/WolmanVSCKL99
fatcat:qir6t5x2zbanpgd74eufq7iulm
The measurements, parameters and construction of Web proxy cache
[article]
2003
arXiv
pre-print
The aim of this paper is an experimental study of cache systems in order to optimize proxy cache systems and to modernize construction principles. ...
Our investigations lead to the criteria for the optimal use of storage capacity and allow the description of the basic effects of the ratio between construction parts, steady-state performance, optimal ...
Our analysis is based on the model presented by Breslau et al. [2] and extended by Wolman et al. [11] to incorporate the steady-state behavior and documents' rate of change. ...
arXiv:cs/0303012v1
fatcat:tbdwzjd5ifh63ewn5gho2lm2ky
« Previous
Showing results 1 — 15 out of 20,110 results