enter search term and/or author name
Topic Distillation with Query-Dependent Link Connections and Page Characteristics
Mingfang Wu, Falk Scholer, Andrew Turpin
Article No.: 6
Searchers on the Web often aim to find key resources about a topic. Finding such results is called topic distillation. Previous research has shown that the use of sources of evidence such as page indegree and URL structure can significantly...
Host-Based P2P Flow Identification and Use in Real-Time
John Hurley, Emi Garcia-Palacios, Sakir Sezer
Article No.: 7
Data identification and classification is a key task for any Internet Service Provider (ISP) or network administrator. As port fluctuation and encryption become more common in P2P applications wishing to avoid identification, new strategies must...
Video sharing services that allow ordinary Web users to upload video clips of their choice and watch video clips uploaded by others have recently become very popular. This article identifies invariants in video sharing workloads, through...
Cost-Aware Strategies for Query Result Caching in Web Search Engines
Rifat Ozcan, Ismail Sengor Altingovde, Özgür Ulusoy
Article No.: 9
Search engines and large-scale IR systems need to cache query results for efficiency and scalability purposes. Static and dynamic caching techniques (as well as their combinations) are employed to effectively cache query results. In this study, we...
A Survey of Requirements Specification in Model-Driven Development of Web Applications
Pedro Valderas, Vicente Pelechano
Article No.: 10
Model-driven development has become more and more important in the last few years. In the context of web application development, many web Engineering methods that propose model-driven development processes have appeared. However, earlier stages...
Designing and Implementing the OP and OP2 Web Browsers
Chris Grier, Shuo Tang, Samuel T. King
Article No.: 11
Current web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems via browser-based attacks. Browser security efforts that retrofit existing browsers have had limited success because the design of modern...