Filters








70 Hits in 3.0 sec

Probabilistic Visitor Stitching on Cross-Device Web Logs

Sungchul Kim, Nikhil Kini, Jay Pujara, Eunyee Koh, Lise Getoor
2017 Proceedings of the 26th International Conference on World Wide Web - WWW '17  
However, the independence assumption of the browser features needs to be carefully handled [8] . Dasgupta et al. [8] introduced an alternate clustering method to address the cookie churn problem.  ...  Since a cookie is unique to a browser instance (until it gets churned), it does not possess a signal to stitch multiple web logs from the same user.  ... 
doi:10.1145/3038912.3052711 dblp:conf/www/KimKPKG17 fatcat:4l44ewhv7ncnpc5mravpe6pna4

Tracking and Personalization [chapter]

Rahat Masood, Shlomo Berkovsky, Mohamed Ali Kaafar
2021 Modern Socio-Technical Perspectives on Privacy  
Further, they discussed the implications of cookie-churn on privacy and security, along with the utilization of host fingerprinting for improving security.  ...  For this reason, LSOs are used to store copies of browser cookies or other unique identifiers.  ... 
doi:10.1007/978-3-030-82786-1_9 fatcat:au7bgwajqzeffb2cvtgn3ytasy

Digital Paywall Design: Implications for Content Demand and Subscriptions

Sinan Aral, Paramveer S. Dhillon
2020 Management science  
cookies, allowing them to consume content as a new user.  ...  cookies and consuming content as new users at a higher rate than an average user.  ... 
doi:10.1287/mnsc.2020.3650 fatcat:3gzu2npfw5ei5aqb4dnqhf4eni

Clicktok: Click Fraud Detection using Traffic Analysis [article]

Shishir Nagaraja, Ryan Shah
2019 arXiv   pre-print
Defenses have matured to overcome some forms of click fraud but are inadequate against the threat of organic click fraud attacks.  ...  Thus we can isolate fake-clicks by detecting patterns of click-reuse within ad-network clickstreams with historical behaviour serving as a baseline.  ...  Cookies can help address churn issues where a pool of source IP addresses are cycled among many users.  ... 
arXiv:1903.00733v2 fatcat:erdstadsqfeavol75li5baciue

Clicktok

Shishir Nagaraja, Ryan Shah
2019 Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks - WiSec '19  
Modern defences have matured to overcome some forms of click fraud but measurement studies have reported that a third of clicks supplied by ad networks could be clickspam.  ...  We propose two defences, mimicry and bait-click, which provide clickspam detection with substantially improved results over current approaches.  ...  Cookies can help address churn issues where a pool of source IP addresses are cycled among many users.  ... 
doi:10.1145/3317549.3323407 dblp:conf/wisec/NagarajaS19 fatcat:omfr4yeqwncitdyevna2meapeu

Business Intelligence: Achieving Fineness through Data, Text and Web Mining

Jitendra Singh
2015 International Journal of Computer Applications  
 Web structure mining WSM -Analyze the traffic flow and site maps of certain sites to explore the movement of the users.  Web usage mining WUM -collects browser history, bookmarks, site logs, cookies  ...  TM process helps in clustering historical data into predefined semantic categories [11] .  ... 
doi:10.5120/ijca2015906691 fatcat:2kmzbvfxizh2fdc4f5szyvypvm

Data, Text and Web Mining for Business Intelligence : A Survey

Abdul-Aziz Rashid Al-Azmi
2013 International Journal of Data Mining & Knowledge Management Process  
The Information and Communication Technologies revolution brought a digital world with huge amounts of data available.  ...  Finally, WUM, which is the mining of log files of web servers, browser generated logs, cookies, bookmarks and scrolls.  ...  Finally, WM intended for WUM can collect logs, cookies, bookmarks, and even browsers history and metadata of targeted users. WUM is also used for mining social networks, namely online blogs [33] .  ... 
doi:10.5121/ijdkp.2013.3201 fatcat:urjcxelt7vbvzfmt2ynmenlc5u

Vibes: A Platform-Centric Approach to Building Recommender Systems

Biswadeep Nag
2008 IEEE Data Engineering Bulletin  
Finally the serving infrastructure uses REST based web services APIs to provide quick and easy integration with other Yahoo! properties.  ...  Introduction Research into recommendation systems goes back more than a decade with several important classes of algorithms proposed [1] .  ...  cookie sent by the browser.  ... 
dblp:journals/debu/Nag08 fatcat:pbrns55inffu3dkkszfthujnve

Preserving Privacy in Web Recommender Systems [chapter]

Ranieri Baraglia, Claudio Lucchese, Salvatore Orlando, Raffaele Perego, Fabrizio Silvestri
2010 Chapman & Hall/CRC Data Mining and Knowledge Discovery Series  
Such techniques range from cookies-related stuff to methods aimed at masking or scrambling the client IP address 1 .  ...  The two-tier architecture of πSUGGEST makes it possible to overcome both these two kinds of risks.  ... 
doi:10.1201/b10373-22 fatcat:ja73n4duv5gx5m3zsndo33kgvi

Maygh

Liang Zhang, Fangfei Zhou, Alan Mislove, Ravi Sundaram
2013 Proceedings of the 8th ACM European Conference on Computer Systems - EuroSys '13  
In this paper, we present Maygh, a system that builds a content distribution network from client web browsers, without the need for additional plug-ins or client-side software.  ...  Previous approaches to offloading some of the distribution costs onto end users have relied on client-side software or web browser plug-ins, providing poor user incentives and dramatically limiting their  ...  We also thank Avleen Vig for his assistance with the Etsy traces, David Blank-Edelman and Rajiv Shridhar for their assistance with the Northeastern traces, Bimal Viswanath for the use of MPI-SWS servers  ... 
doi:10.1145/2465351.2465379 dblp:conf/eurosys/ZhangZMS13 fatcat:envhzpqzxbddherljxnotyhbni

Web Runner 2049: Evaluating Third-Party Anti-bot Services [chapter]

Babak Amin Azad, Oleksii Starov, Pierre Laperdrix, Nick Nikiforakis
2020 Lecture Notes in Computer Science  
On the positive side, our results show that by relying on browser fingerprinting, more than 75% of protected websites in our dataset, successfully defend against attacks by basic bots built with Python  ...  We have responsibly disclosed our findings with the anti-bot service providers.  ...  Another obstacle that we had to overcome is that, due to the churn of clients of the anti-bot services, we had to often repeat experiments with new randomly sampled websites, as some websites stopped being  ... 
doi:10.1007/978-3-030-52683-2_7 fatcat:mx47co33zvfyhchram4knsskta

HyRec

Antoine Boutet, Davide Frey, Rachid Guerraoui, Anne-Marie Kermarrec, Rhicheek Patra
2014 Proceedings of the 15th International Middleware Conference on - Middleware '14  
HyRec offloads recommendation tasks onto the web browsers of users, while a server orchestrates the process and manages the relationships between user profiles.  ...  We convey the ability of HyRec to reduce the operation costs of content providers by nearly 50% and to provide a 100-fold improvement in scalability with respect to a centralized (or cloud-based recommender  ...  We measure the time spent by the widget within a browser with a profile size set to 100.  ... 
doi:10.1145/2663165.2663315 dblp:conf/middleware/BoutetFGKP14 fatcat:rm7h7fbehzcp5iazy5bqitlw7q

Marketing Information, Analytics, and Intelligence

2021 International Journal of Business Strategy and Automation  
Companies use cookies and records of website usage stored on personal browsers to gather information about customers.  ...  Companies turn to customer relationship management (CRM) to overcome such problems.  ... 
doi:10.4018/ijbsa.287618 fatcat:hhb3tlayn5ezdpdnhj3v57arqu

An Assessment of Overt Malicious Activity Manifest in Residential Networks [chapter]

Gregor Maier, Anja Feldmann, Vern Paxson, Robin Sommer, Matthias Vallentin
2011 Lecture Notes in Computer Science  
We find that hygiene has little correlation with observed behavior, but risky behavior-which is quite prevalent-more than doubles the likelihood that a system will manifest security issues.  ...  Acknowledgments We would like to thank Yahel Ben-David of AirJaldi for helping us with the AirJaldi network and the anonymous reviewers for their valuable comments.  ...  However, due to the high IP address churn we experience (for example, due to DSL lines frequently changing their IP address [11] ), such blacklists do not provide us with a reliable metric.  ... 
doi:10.1007/978-3-642-22424-9_9 fatcat:sktncsua4ffr3ao4dlllunlc4m

Improving the sensitivity of online controlled experiments by utilizing pre-experiment data

Alex Deng, Ya Xu, Ron Kohavi, Toby Walker
2013 Proceedings of the sixth ACM international conference on Web search and data mining - WSDM '13  
The results on Bing's experimentation system are very successful: we can reduce variance by about 50%, effectively achieving the same statistical power with only half of the users, or half the duration  ...  With thousands of experiments being run annually, improving the sensitivity of experiments allows for more precise assessment of value, or equivalently running the experiments on smaller populations (supporting  ...  In addition, users are identified by cookies, which are unreliable and can "churn" (i.e. change due to users clearing their cookies).  ... 
doi:10.1145/2433396.2433413 dblp:conf/wsdm/DengXKW13 fatcat:bwjxty2obzee5powz7lkjmxe3u
« Previous Showing results 1 — 15 out of 70 results