Filters








5,079 Hits in 10.7 sec

Analyzing the browse patterns of mobile clients

Atul Adya, Paramvir Bahl, Lili Qiu
2001 Proceedings of the First ACM SIGCOMM Workshop on Internet Measurement - IMW '01  
Unlike most previous Web studies that have analyzed accesses seen by proxies and servers from clients connected via the wired network, we focus primarily on client accesses made over wireless channels  ...  We discuss the implications of our findings for techniques such as query caching, server scheduling, channel use and TCP optimization.  ...  In [7] , Kelly describes an alternative technique that measures Web client access patterns by modifying a proxy to intercept and serve all responses to clients marked as uncacheable. A.  ... 
doi:10.1145/505202.505226 dblp:conf/imw/AdyaBQ01 fatcat:mzfaoxrpo5eazm632zip47tuui

Analyzing the browse patterns of mobile clients

Atul Adya, Paramvir Bahl, Lili Qiu
2001 Proceedings of the First ACM SIGCOMM Workshop on Internet Measurement Workshop - IMW '01  
Unlike most previous Web studies that have analyzed accesses seen by proxies and servers from clients connected via the wired network, we focus primarily on client accesses made over wireless channels  ...  We discuss the implications of our findings for techniques such as query caching, server scheduling, channel use and TCP optimization.  ...  In [7] , Kelly describes an alternative technique that measures Web client access patterns by modifying a proxy to intercept and serve all responses to clients marked as uncacheable. A.  ... 
doi:10.1145/505222.505226 fatcat:rdz52k6enfeodlcq5rxpggijgm

Patterns of Mobile Interaction

Jörg Roth
2002 Personal and Ubiquitous Computing  
Two patterns are described in more detail with the help of our research platforms QuickStep and Pocket DreamTeam.  ...  They allow a designer to re-use design elements as building blocks in their own designs.  ...  As a second benefit, patterns come along with a list of implications and consequences. A designer knows the pros and cons of a specific pattern.  ... 
doi:10.1007/s007790200029 fatcat:xyc7mugc3fa7pok6fstyhpcd24

Analysis of user demand patterns and locality for YouTube traffic

Ake Arvidsson, Manxing Du, Andreas Aurelius, Maria Kihl
2013 Proceedings of the 2013 25th International Teletraffic Congress (ITC)  
In this paper, we analyse the user demand patterns for YouTube in two metropolitan access networks with more than 1 million requests over three consecutive weeks in the first network and more than 600,000  ...  The implications of these findings are that the benefits from large groups of users in terms of caching gain may be exaggerated, since users are different depending on where they live and what equipment  ...  ACKNOWLEDGMENTS The work in this paper has been partly funded by Vinnova in the CelticPlus project IPNQSIS and the project EFRAIM.  ... 
doi:10.1109/itc.2013.6662935 dblp:conf/teletraffic/ArvidssonDAK13 fatcat:czkh4bmmmnh5hbvb77ky2dnxxa

Extracting user web browsing patterns from non-content network traces: The online advertising case study

Gabriel Maciá-Fernández, Yong Wang, Rafael A. Rodrı´guez-Gómez, Aleksandar Kuzmanovic
2012 Computer Networks  
When such browsing features are correlated with information collected by independently crawling the Web, it becomes possible to recover the actual web pages accessed by clients.  ...  Second, we evaluate our system on the Internet and check that it can successfully recover user browsing patterns with high accuracy.  ...  Acknowledgments This work is supported by Spanish MEC project TEC2008-06663-C03-02 (70% FEDER funds), NSF CAREER Award No. 0746360, and China Scholarship Council.  ... 
doi:10.1016/j.comnet.2011.10.012 fatcat:gvrwrxvlrzbc3fw47v2pj7yblq

Patterns for Managing Internet-Technology Systems

Paul Dyson, Andy Longshaw
2003 European Conference on Pattern Languages of Programs  
The experience captured in these patterns has been gained over the implementation and review of a number of internet-based systems over the past four years.  ...  Another set of patterns from that language was presented in 'Patterns for High-Availability Internet Systems' presented at EuroPLoP 2002 [PIA].  ...  on two hardware servers (6 elements in total) • two data access servers, both software and hardware (4 elements in total) • two load balancers for each tier of servers, Web and application (4 elements  ... 
dblp:conf/europlop/DysonL03 fatcat:cjsbjivjofdtbfyw3oes5aerxy

Characterization Framework and Design Patterns for the Disadvantaged User

Fatma Dandashi, Aaron Griggs, Jeffrey Higginson, James Hughes, Wilson Narvaez, Marwan Sabbouh, Salim Semy, Beth Yost
2008 Fourth International Conference on Networking and Services (icns 2008)  
We also provide a set of design patterns that minimize technical constraints, and derive the infrastructure requirements needed to implement a selected design pattern. bandwidth (i.e., speed and capacity  ...  In this paper, we propose a method for capturing design patterns for the disadvantaged user using the common vocabulary of a characterization framework.  ...  Typically, systems on the DMZ require less protection than internal systems, as they can be accessed from the World Wide Web. 1.  ... 
doi:10.1109/icns.2008.11 dblp:conf/icns/DandashiGHHNSSY08 fatcat:rkov7pqj5vfivhauzlv76fg5uq

Patterns for Factoring Responsibilities when Working with Objects and Relational Databases

León Welicki
2007 European Conference on Pattern Languages of Programs  
Acknowledgements I would like to thank Marina Haase, my shepherd for EuroPLoP 2007, for her great help and support during the shepherding phase.  ...  lots of objects and since these objects properties change very often in the database, NHibernate's caching facilities are not very reliable nor useful.  ...  These implementations will be part of our data access framework or toolkit and will be used by client applications in place of DataReaders and DataSets.  ... 
dblp:conf/europlop/Welicki07 fatcat:hq4oucgjijaq5ef2unst3upm3e

Large scale analysis of web revisitation patterns

Eytan Adar, Jaime Teevan, Susan T. Dumais
2008 Proceeding of the twenty-sixth annual CHI conference on Human factors in computing systems - CHI '08  
Our analysis reveals four primary revisitation patterns, each with unique behavioral, content, and structural characteristics.  ...  Our work examines Web revisitation patterns. Everybody revisits Web pages, but their reasons for doing so can differ depending on the particular Web page, their topic of interest, and their intent.  ...  ACKNOWLEDGEMENTS The authors would like to thank Dan Liebling, Ronnie Chaiken, and Bill Ramsey for their data analysis help.  ... 
doi:10.1145/1357054.1357241 dblp:conf/chi/AdarTD08 fatcat:zrk5uxjicrdyrimts7if7giwla

Patterns and Interactions in Network Security [article]

Pamela Zave, Jennifer Rexford
2020 arXiv   pre-print
The second perspective comes from the observation that security mechanisms interact in important ways, with each other and with other aspects of networking, so each pattern includes a discussion of its  ...  Networks play a central role in cyber-security: networks deliver security attacks, suffer from them, defend against them, and sometimes even cause them.  ...  Quic is embedded in UDP, and also uses destination port 443. When a client accesses an https:// Web site for the first time, it should use TLS.  ... 
arXiv:1912.13371v2 fatcat:qfhdtj2pi5cmjk67h2gq53vzem

Pattern recognition and machine learning

1993 ChoiceReviews  
In this context, the state-of-the-art software RapidMiner already provides easy to use interfaces for developing and evaluating Pattern Recognition and Machine Learning applications.  ...  Kaiserslautern, im Mai 2010 Alexander Arimond Abstract Pattern Recognition and Machine Learning techniques usually involve data-and compute-intensive methods.  ...  computing environments.The characteristics of MapReduce and its applicability to Pattern Recognition andMachine Learning techniques are examined in this thesis.  ... 
doi:10.5860/choice.30-3308 fatcat:qunga7zxtfhjze2rmcvkhetp44

Pattern recognition and machine learning

2007 ChoiceReviews  
In this context, the state-of-the-art software RapidMiner already provides easy to use interfaces for developing and evaluating Pattern Recognition and Machine Learning applications.  ...  Kaiserslautern, im Mai 2010 Alexander Arimond Abstract Pattern Recognition and Machine Learning techniques usually involve data-and compute-intensive methods.  ...  computing environments.The characteristics of MapReduce and its applicability to Pattern Recognition andMachine Learning techniques are examined in this thesis.  ... 
doi:10.5860/choice.44-5091 fatcat:sz2zpdbqznee5dr45vrxk37nbi

Pattern Recognition and Machine Learning

2007 Journal of Electronic Imaging (JEI)  
In this context, the state-of-the-art software RapidMiner already provides easy to use interfaces for developing and evaluating Pattern Recognition and Machine Learning applications.  ...  Kaiserslautern, im Mai 2010 Alexander Arimond Abstract Pattern Recognition and Machine Learning techniques usually involve data-and compute-intensive methods.  ...  computing environments.The characteristics of MapReduce and its applicability to Pattern Recognition andMachine Learning techniques are examined in this thesis.  ... 
doi:10.1117/1.2819119 fatcat:5cp7aa2hyrg6hjyddqvvvws7di

On the uniqueness of Web browsing history patterns

Lukasz Olejnik, Claude Castelluccia, Artur Janc
2013 Annales des télécommunications  
50 web pages is enough to fingerprint 42% of users in our database, increasing to 70% with 500 web pages.  ...  We report a striking result that it is enough to test for a small number of pages in order to both enumerate users' interests and perform an efficient and unique behavioral fingerprint; we show that testing  ...  In general, it is not simple to change one's browsing habits -if Web browsing patterns were unique for a given user, history analysis can potentially identify the same user across multiple Web browsers  ... 
doi:10.1007/s12243-013-0392-5 fatcat:ufgrti6xtjgkxddvgo724nnzlu

Internet Web servers: workload characterization and performance implications

M.F. Arlitt, C.L. Williamson
1997 IEEE/ACM Transactions on Networking  
The paper concludes with a discussion of caching and performance issues, using the observed workload characteristics to suggest performance enhancements that seem promising for Internet Web servers.  ...  These data sets represent three different orders of magnitude in server activity, and two different orders of magnitude in time duration, ranging from one week of activity to one year.  ...  ACKNOWLEDGMENT The authors are grateful to the following people for making their Web server access logs availabIe for our study:  ... 
doi:10.1109/90.649565 fatcat:symt2x7ykfhahh3tnxhd5dcrga
« Previous Showing results 1 — 15 out of 5,079 results