Sciweavers

137 search results - page 2 / 28
» Advanced Techniques for Analyzing Web Server Logs
Sort
View
WWW
2011
ACM
13 years 7 days ago
Heat-seeking honeypots: design and experience
Many malicious activities on the Web today make use of compromised Web servers, because these servers often have high pageranks and provide free resources. Attackers are therefore...
John P. John, Fang Yu, Yinglian Xie, Arvind Krishn...
SIGECOM
2000
ACM
132views ECommerce» more  SIGECOM 2000»
13 years 9 months ago
What is actually taking place on web sites: e-commerce lessons from web server logs
A prime business concern is knowing your customer. One legacy carried into the present from the earliest NCSA web servers is web server logs. While there are more powerful user tr...
Mark Rosenstein
EDBT
2002
ACM
159views Database» more  EDBT 2002»
14 years 5 months ago
Cut-and-Pick Transactions for Proxy Log Mining
Web logs collected by proxy servers, referred to as proxy logs or proxy traces, contain information about Web document accesses by many users against many Web sites. This "man...
Wenwu Lou, Guimei Liu, Hongjun Lu, Qiang Yang
IPM
2007
137views more  IPM 2007»
13 years 5 months ago
Analyzing imbalance among homogeneous index servers in a web search system
The performance of parallel query processing in a cluster of index servers is crucial for modern web search systems. In such a scenario, the response time basically depends on the...
Claudine Santos Badue, Ricardo A. Baeza-Yates, Ber...
AICCSA
2006
IEEE
218views Hardware» more  AICCSA 2006»
13 years 11 months ago
Performance Comparison of Pattern Discovery Methods on Web Log Data
One of the popular trends in computer science has been development of intelligent web-based systems. Demand for such systems forces designers to make use of knowledge discovery te...
Murat Ali Bayir, Ismail H. Toroslu, Ahmet Cosar