نتایج جستجو برای: http

تعداد نتایج: 132199  

2011
Richi Nayak Christopher M. De Vries Sangeetha Kutty Shlomo Geva Ludovic Denoyer Patrick Gallinari

This report explains the objectives, datasets and evaluation criteria of both the clustering and classification tasks set in the INEX 2009 XML Mining track. The report also describes the approaches and results obtained by the different participants.

Journal: :World Wide Web Journal 1996
Anselm Lingnau Oswald Drobnik Peter Dömel

Abstract: Mobile agents are an emerging technology attracting interest from the fields of distributed systems, information retrieval, electronic commerce and artificial intelligence. We present an infrastructure for mobile agents based on the Hypertext Transfer Protocol (HTTP) which provides for agent mobility across heterogeneous networks as well as communications among agents. Our infrastruct...

Journal: :Computer Networks 1999
Edith Cohen Haim Kaplan Jeffrey D. Oldham

Hyper Text Transfer Protocol (HTTP) traffic dominates Internet traffic. The exchange of HTTP messages is implemented using the connection-oriented TCP. HTTP=1.0 establishes a new TCP connection for each HTTP request, resulting in many consecutive short-lived TCP connections. The emerging HTTP=1.1 reduces latencies and overhead from closing and re-establishing connections by supporting persisten...

Journal: :Computer Networks and ISDN Systems 1994
Eric Dean Katz Michelle Butler Robert McGrath

While the World Wide Web (www) may appear to be intrinsically scalable through the distribution of files across a series of decentralized servers, there are instances where this form of load distribution is both costly and resource intensive. In such cases it may be necessary to administer a centrally located and managed http server. Given the exponential growth of the internet in general, and ...

1994
Franz J. Hauck

The WorldWide Web (WWW) hypertext system uses TCP/IP connections for network-transparent access to hypertext documents. Documents often contain several inlined images which have to be transferred as individual documents from the server to the client. For each transfer a separate TCP/IP connection has to be established. A significant amount of the total response time is caused by the latency due...

Journal: :CoRR 2018
Johann Vierthaler Roman Kruszelnicki Julian Schütte

With malware detection techniques increasingly adopting machine learning approaches, the creation of precise training sets becomes more and more important. Large data sets of realistic web traffic, correctly classified as benign or malicious are needed, not only to train classic and deep learning algorithms, but also to serve as evaluation benchmarks for existing malware detection products. Int...

2007
Gregory Blajian Zornitza Genova Prodanoff

Atmospheric effects on radio frequency transmissions have been studied extensively since the advent of radio usage in military applications, yet the effects on shorter range transmissions have been less well covered. This study attempts to find correlations between atmospheric conditions and the transmission efficiency of IEEE 802.11g, using HTTP as the high level transport mechanism. This stud...

Journal: :RFC 1998
Koen Holtman Andrew H. Mutz

HTTP allows web site authors to put multiple versions of the same information under a single URL. Transparent content negotiation is a mechanism for automatically selecting the best version when the URL is accessed. A remote variant selection algorithm can be used to speed up the transparent negotiation process. This document defines the remote variant selection algorithm with the version numbe...

2006
John Jacob

Serum 25(OH)D levels are obtained when the disorder is suspected. Serum 1,25 (OH)D levels have no place in diagnosing the syndrome and will mislead the physician. Sunlight, artificial light, oral or parental vitamin D, or a combination, aimed at restoring circulating levels of 25(OH)D between 35 and 55 ng/ml is the treatment of choice. Controlled sunlight is the safest form of vitamin D repleti...

Journal: :Computers & Security 2014
Aditya Oza Kevin Ross Richard M. Low Mark Stamp

HTTP Attack Detection using N-gram Analysis by Adityaram Oza Previous research has shown that byte level analysis of HTTP traffic offers a practical solution to the problem of network intrusion detection and traffic analysis. Such an approach does not require any knowledge of applications running on web servers or any pre-processing of incoming data. In this project, we apply three ngram based ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید