Sciweavers

8468 search results - page 1508 / 1694
» The Technology of Data Stashing
Sort
View
WWW
2002
ACM
15 years 11 months ago
Protecting electronic commerce from distributed denial-of-service attacks
It is widely recognized that distributed denial-of-service (DDoS) attacks can disrupt electronic commerce and cause large revenue losses. However, effective defenses continue to b...
José Carlos Brustoloni
WWW
2002
ACM
15 years 11 months ago
Probabilistic query expansion using query logs
Query expansion has long been suggested as an effective way to resolve the short query and word mismatching problems. A number of query expansion methods have been proposed in tra...
Hang Cui, Ji-Rong Wen, Jian-Yun Nie, Wei-Ying Ma
WWW
2002
ACM
15 years 11 months ago
A web-based resource migration protocol using WebDAV
The web's hyperlinks are notoriously brittle, and break whenever a resource migrates. One solution to this problem is a transparent resource migration mechanism, which separa...
Michael P. Evans, Steven Furnell
WWW
2002
ACM
15 years 11 months ago
RQL: a declarative query language for RDF
Real-scale Semantic Web applications, such as Knowledge Portals and E-Marketplaces, require the managementof large volumes of metadata, i.e., information describing the available ...
Gregory Karvounarakis, Sofia Alexaki, Vassilis Chr...
WWW
2001
ACM
15 years 11 months ago
Engineering server-driven consistency for large scale dynamic Web services
Recent research has shown that server-driven protocols for achieving cache consistency in wide-area network services can perform significantly better than traditional consistency ...
Jian Yin, Lorenzo Alvisi, Michael Dahlin, Arun Iye...
« Prev « First page 1508 / 1694 Last » Next »