2,283 Hits in 4.7 sec

Web Customer Modeling for Automated Session Prioritization on High Traffic Sites [chapter]

Nicolas Poggi, Toni Moreno, Josep Lluis Berral, Ricard Gavaldà, Jordi Torres
Lecture Notes in Computer Science  
In the Web environment, user identification is becoming a major challenge for admission control systems on high traffic sites.  ...  We test our approach on access logs obtained from a high-traffic online travel agency, with promising results.  ...  Experiments The data for the experiment was provided by, a high traffic Spanish online travel agency, that makes use of the above mentioned state-of-the-art web technologies.  ... 
doi:10.1007/978-3-540-73078-1_63 fatcat:vwq67tk7frboxdv5xiwc3at5su

Self-adaptive utility-based web session management

Nicolas Poggi, Toni Moreno, Josep Lluis Berral, Ricard Gavaldà, Jordi Torres
2009 Computer Networks  
We test the AUGURES prototype on access logs from a high-traffic, online travel agency, obtaining promising results.  ...  When server resources are exceeded, session-based admission control systems allow maintaining a high throughput in terms of properly finished sessions and QoS for a limited number of sessions; however,  ...  For additional information about the authors, visit the Barcelona eDragon Research Group Web site [20].  ... 
doi:10.1016/j.comnet.2008.08.022 fatcat:4pqsg5mmgvdrdesxwndplhoxjq

The Path To Web Intelligence Maturity

Zeljko Panian
2010 Zenodo  
To become fully efficient, Web intelligence must reach a stage of a high-level maturity, passing throughout a process that involves five steps: (1) Web site analysis; (2) Web site and advertising optimization  ...  Web intelligence, if made personal, can fuel the process of building communications around the interests and preferences of each individual customer or prospect, by providing specific behavioral insights  ...  Average Time on Site: indicates how long did people stay on the Web site. Percent New Visits: shows how many sessions, interactions, were from people who visited the site for the first time.  ... 
doi:10.5281/zenodo.1330340 fatcat:usyvn5z56ndbthu4zuzy2w3vyq

A methodology for the evaluation of high response time on E-commerce users and sales

Nicolas Poggi, David Carrera, Ricard Gavaldà, Eduard Ayguadé, Jordi Torres
2012 Information Systems Frontiers  
Finally, we present our evaluation of high response time on users for popular applications found in the Web.  ...  The widespread adoption of high speed Internet access and it's usage for everyday tasks are causing profound changes in users' expectations in terms of Web site performance and reliability.  ...  Acknowledgements We would like to thank, who provided the experiment datasets and domain knowledge for this study.  ... 
doi:10.1007/s10796-012-9387-4 fatcat:cp3nrqllrbfnznpk6lfzmxvnpm

Personalizing the home network experience using cloud-based SDN

Hassan Habibi Gharakheili, Jacob Bass, Luke Exton, Vijay Sivaraman
2014 Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014  
In this paper we argue that SDN provides a way to automate self-customization by households, while cloud-based delivery simplifies subscriber management.  ...  prioritized over downloading).  ...  It runs as a standard HTML web-site, and is served by an off-site web-server run by the ISP.  ... 
doi:10.1109/wowmom.2014.6918984 dblp:conf/wowmom/GharakheiliBES14 fatcat:d7slrkq25fabdgzry4h2fhmigy

QoE Management for Future Networks [chapter]

Raimund Schatz, Susanna Schwarzmann, Thomas Zinner, Ognjen Dobrijevic, Eirini Liotou, Peter Pocta, Sabina Barakovic, Jasmina Barakovic Husic, Lea Skorin-Kapov
2018 Lecture Notes in Computer Science  
Finally, the chapter provides conclusions and an outlook on the future of QoE management with a focus on those key enablers (including cooperation, business models and key technologies) that are essential  ...  This chapter discusses prospects of QoE management for future networks and applications.  ...  of Web site, quality of Web site information, and Web site loading time.  ... 
doi:10.1007/978-3-319-90415-3_3 fatcat:dfj7obe3z5aspe65xvs6c3maq4

GIS&T and Civil Engineering

Rhonda Young
2018 Geographic Information Science & Technology Body of Knowledge  
automate workflows through a visual modeling environment.  ...  Spatial Analysis GIS provides tools for modeling information to support more intelligent, faster decisions; discover and characterize geographic patterns; optimize network and resource allocation; and  ...  ArcGIS is used as a front-end data loader for modeling and on the back end to show the modeling results.  ... 
doi:10.22224/gistbok/2018.1.8 fatcat:big7nwihe5drnh3njr3t6obt4e

Social snapshots

Markus Huber, Martin Mulazzani, Manuel Leithner, Sebastian Schrittwieser, Gilbert Wondracek, Edgar Weippl
2011 Proceedings of the 27th Annual Computer Security Applications Conference on - ACSAC '11  
Our approach uses a hybrid system that is based on a custom add-on for social networks in combination with a web crawling component.  ...  We show the feasibility and efficiency of our approach and its advantages in contrast to traditional techniques that rely on applicationspecific web crawling and parsing.  ...  The authors would also like to thank Barbara Weber and Robert Sablatnig for their advice and feedback in the creation of this paper.  ... 
doi:10.1145/2076732.2076748 dblp:conf/acsac/HuberMLSWW11 fatcat:urkjcri7inhg5kiyx2zfbd3biu

Web Testing for Reliability Improvement [chapter]

Jeff Tian, Li Ma
2006 Advances in Computers  
Using information about web accesses and related failures extracted from existing web server logs, we build testing models that focus on the high-usage, high-leverage subsets of web pages for effective  ...  Related data are also used to evaluate web site operational reliability in providing the requested pages as well as the potential for reliability growth under effective testing.  ...  the access logs for the KDE web site and deal with various data problems.  ... 
doi:10.1016/s0065-2458(05)67004-0 fatcat:ytgvrxj3ubbcrc3dsskppp5n2i

Characterizing resource usage for mobile web browsing

Feng Qian, Subhabrata Sen, Oliver Spatscheck
2014 Proceedings of the 12th annual international conference on Mobile systems, applications, and services - MobiSys '14  
Based on our findings, we developed novel recommendations and detailed best practice suggestions for mobile web content, browser, network protocol, and smartphone OS design, to make mobile web browsing  ...  Using a novel traffic collection and analysis tool, we examine a wide spectrum of important factors including protocol overhead, TCP connection management, web page content, traffic timing dynamics, caching  ...  ACKNOWLEDGEMENTS We would like to thank the anonymous reviewers and especially Sharad Agarwal for shepherding the paper.  ... 
doi:10.1145/2594368.2594372 dblp:conf/mobisys/QianSS14 fatcat:xgsgggna6je7pozwn76luaotge

A survey on performance management for internet applications

Jordi Guitart, Jordi Torres, Eduard Ayguadé
2010 Concurrency and Computation  
This paper makes a survey on the different proposals in the literature for managing Internet applications' performance.  ...  For this reason, recent research has comprehensively explored mechanisms for managing the performance of these applications, with special focus on dealing with overload situations and providing QoS guarantees  ...  The authors describe customers' sessions with a customer behavior model graph (CBMG) and then propose a priority scheme for scheduling requests at the user level based on the states of the users.  ... 
doi:10.1002/cpe.1470 fatcat:bxlovt3kf5hyvbu4hrjdpamvra

Intelligent Web Information Retrieval based on User Navigational Patterns

Anupama Prasanth, M. Hemalatha
2015 International Journal of Computer Applications  
This article is a review conducted in the field of web usage mining and its latest works for supporting the research on efficient information retrieval based on user access pattern.  ...  The goal of this survey is to find the best composition of features to be included in an efficient information retrieval model. Using those features a new retrieval model is then proposed.  ...  The synopsis of Web resources, sessions, and users are also discovered. In order to automate the construction of user models, the learning methods are applied.  ... 
doi:10.5120/19186-0673 fatcat:rfwuobcjnnhe7odyfyfb5dbqum

BitTorrent traffic from a caching perspective

Lesandro Ponciano, Nazareno Andrade, Francisco Brasileiro
2013 Journal of the Brazilian Computer Society  
This study addresses this gap with a comprehensive analysis of BitTorrent caching based on traces of user behavior in four popular BitTorrent sites.  ...  This has motivated research and development to explore caching and locality-aware neighbor selection mechanisms for costly traffic reduction.  ...  We conjecture that this happens because of the widespread use of automated download mechanisms by users of these sites.  ... 
doi:10.1007/s13173-013-0112-z fatcat:k3z7fropsvajtf6ns67cweuxga

Multi-faceted quality and defect measurement for web software and source contents

Zhao Li, Nasser Alaeddine, Jeff Tian
2010 Journal of Systems and Software  
We applied our approach to four diverse websites: one educational website, one open source software project website, one online catalog showroom for a small company, and one e-Commerce website for a large  ...  The different usages of our measurement framework by different stakeholders of web sites and web applications are also outlined and discussed.  ...  We thank Merlin Wilkerson and Dirk Mueller for their help in gathering and interpreting the web logs for the SMU/SEAS and the KDE websites respectively.  ... 
doi:10.1016/j.jss.2009.04.055 fatcat:byak6uhhhffi5i77fv2zh4pltm

Probabilistic Transition-Based Approach for Detecting Application-Layer DDoS Attacks in Encrypted Software-Defined Networks [chapter]

Elena Ivannikova, Mikhail Zolotukhin, Timo Hämäläinen
2017 Lecture Notes in Computer Science  
In this paper, we propose an approach for detecting application-layer DDoS attacks in cloud environment with SDN.  ...  The algorithm is applied to statistics extracted from network flows and, therefore, is suitable for detecting attacks that utilize encrypted protocols.  ...  along with a high risk of conflict with the web service users.  ... 
doi:10.1007/978-3-319-64701-2_40 fatcat:ultcek5ymna6ffonbirklvxy3y
« Previous Showing results 1 — 15 out of 2,283 results