skip to main content
Bibliometrics
Skip Abstract Section
Abstract

The Hypertext Transfer Protocol (HTTP) is an application-level protocol for distributed, collaborative, hypermedia information systems. It is a generic, stateless, protocol which can be used for many tasks beyond its use for hypertext, such as name servers and distributed object management systems, through extension of its request methods, error codes and headers [47]. A feature of HTTP is the typing and negotiation of data representation, allowing systems to be built independently of the data being transferred.

RFC Downloads

Cited By

  1. Li Z, Xue K, Li J, Chen L, Li R, Wang Z, Yu N, Wei D, Sun Q and Lu J (2023). Entanglement-Assisted Quantum Networks: Mechanics, Enabling Technologies, Challenges, and Research Directions, IEEE Communications Surveys & Tutorials, 25:4, (2133-2189), Online publication date: 1-Oct-2023.
  2. ACM
    Chen X, Lu B, Sun R and Jiang M Honeypot Detection Method Based on Anomalous Requests Response Differences Proceedings of the 2023 6th International Conference on Electronics, Communications and Control Engineering, (109-117)
  3. ACM
    Raman R, Wang M, Dalek J, Mayer J and Ensafi R Network measurement methods for locating and examining censorship devices Proceedings of the 18th International Conference on emerging Networking EXperiments and Technologies, (18-34)
  4. Huang Q, Chiu M, Chen Y, Sun H and Yeh K (2022). Attacking Websites, Security and Communication Networks, 2022, Online publication date: 1-Jan-2022.
  5. ACM
    Wang S, Tu G, Lei X, Xie T, Li C, Chou P, Hsieh F, Hu Y, Xiao L and Peng C Insecurity of operational cellular IoT service Proceedings of the 27th Annual International Conference on Mobile Computing and Networking, (437-450)
  6. ACM
    Li Y, Pierce B and Zdancewic S Model-based testing of networked applications Proceedings of the 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, (529-539)
  7. Cheng Z, Cui B, Qi T, Yang W, Fu J and Liu Z (2021). An Improved Feature Extraction Approach for Web Anomaly Detection Based on Semantic Structure, Security and Communication Networks, 2021, Online publication date: 1-Jan-2021.
  8. ACM
    Safari Khatouni A, Trevisan M, Giordano D, Rajiullah M, Alfredsson S, Brunstrom A, Midoglu C and Alay Ö An Open Dataset of Operational Mobile Networks Proceedings of the 18th ACM Symposium on Mobility Management and Wireless Access, (83-90)
  9. Oest A, Safaei Y, Zhang P, Wardman B, Tyers K, Shoshitaishvili Y, Doupé A and Ahn G PhishTime Proceedings of the 29th USENIX Conference on Security Symposium, (379-396)
  10. Oest A, Zhang P, Wardman B, Nunes E, Burgis J, Zand A, Thomas K, Doupé A and Ahn G Sunrise to sunset Proceedings of the 29th USENIX Conference on Security Symposium, (361-377)
  11. ACM
    Nikravesh A, Guo Y, Zhu X, Qian F and Mao Z MP-H2 The 25th Annual International Conference on Mobile Computing and Networking, (1-16)
  12. Mareca M and Bordel B (2019). The educative model is changing: toward a student participative learning framework 3.0—editing Wikipedia in the higher education, Universal Access in the Information Society, 18:3, (689-701), Online publication date: 1-Aug-2019.
  13. Tumuluri R, Dahl D, Paternò F and Zancanaro M Standardized representations and markup languages for multimodal interaction The Handbook of Multimodal-Multisensor Interfaces, (347-392)
  14. ACM
    Shen J, Li Y, Zhou Y and Wang X Understanding I/O performance of IPFS storage Proceedings of the International Symposium on Quality of Service, (1-10)
  15. Fu X, Wang Z, Chen Y, Zhang Y and Wu H (2019). Bead Strand Model, Service Oriented Computing and Applications, 13:2, (95-103), Online publication date: 1-Jun-2019.
  16. ACM
    Rajiullah M, Lutu A, Khatouni A, Fida M, Mellia M, Brunstrom A, Alay O, Alfredsson S and Mancuso V Web Experience in Mobile Networks: Lessons from Two Million Page Visits The World Wide Web Conference, (1532-1543)
  17. ACM
    Nguyen H, Iacono L and Federrath H Mind the cache Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, (2497-2506)
  18. ACM
    Dizdarević J, Carpio F, Jukan A and Masip-Bruin X (2019). A Survey of Communication Protocols for Internet of Things and Related Challenges of Fog and Cloud Computing Integration, ACM Computing Surveys, 51:6, (1-29), Online publication date: 27-Feb-2019.
  19. Ayala I, Amor M, Fuentes L and Risi M (2019). An Energy Efficiency Study of Web-Based Communication in Android Phones, Scientific Programming, 2019, Online publication date: 1-Jan-2019.
  20. ACM
    Zhao Y, Wat P, Laser M and Medvidović N Empirically assessing opportunities for prefetching and caching in mobile apps Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, (554-564)
  21. Vetterl A and Clayton R Bitter harvest Proceedings of the 12th USENIX Conference on Offensive Technologies, (9-9)
  22. ACM
    Muła W and Lemire D (2018). Faster Base64 Encoding and Decoding Using AVX2 Instructions, ACM Transactions on the Web, 12:3, (1-26), Online publication date: 18-Jul-2018.
  23. Kohout J, Komrek T, ech P, Bodnr J and Loko J (2018). Learning communication patterns for malware discovery in HTTPs data, Expert Systems with Applications: An International Journal, 101:C, (129-142), Online publication date: 1-Jul-2018.
  24. ACM
    Seo D, Yoo B and Ko H Webizing collaborative interaction space for cross reality with various human interface devices Proceedings of the 23rd International ACM Conference on 3D Web Technology, (1-8)
  25. ACM
    Perera C, Qin Y, Estrella J, Reiff-Marganiec S and Vasilakos A (2017). Fog Computing for Sustainable Smart Cities, ACM Computing Surveys, 50:3, (1-43), Online publication date: 31-May-2018.
  26. ACM
    Chen C, Tian C, Duan Z and Zhao L RFC-directed differential testing of certificate validation in SSL/TLS implementations Proceedings of the 40th International Conference on Software Engineering, (859-870)
  27. ACM
    Liu C, Yang Z, Blasingame Z, Torres G and Bruska J Detecting Data Exploits Using Low-level Hardware Information Proceedings of the First Workshop on Radical and Experiential Security, (41-47)
  28. Kesavan S and Jayakumar J (2018). Effective client-driven three-level rate adaptation (TLRA) approach for adaptive HTTP streaming, Multimedia Tools and Applications, 77:7, (8081-8114), Online publication date: 1-Apr-2018.
  29. Rodriguez-Gil L, Orduña P, García-Zubia J and López-De-Ipiña D (2018). Interactive live-streaming technologies and approaches for web-based applications, Multimedia Tools and Applications, 77:6, (6471-6502), Online publication date: 1-Mar-2018.
  30. ACM
    Du S, Lee J and Kim K Proposal of GRPC as a New Northbound API for Application Layer Communication Efficiency in SDN Proceedings of the 12th International Conference on Ubiquitous Information Management and Communication, (1-6)
  31. Wang D, Zhang X, Ming J, Chen T, Wang C, Niu W and Liu X (2018). Resetting Your Password Is Vulnerable, Wireless Communications & Mobile Computing, 2018, Online publication date: 1-Jan-2018.
  32. Tripathi N and Hubballi N (2018). Slow rate denial of service attacks against HTTP/2 and detection, Computers and Security, 72:C, (255-272), Online publication date: 1-Jan-2018.
  33. ACM
    Guyang W, Shulin Y, Xuelei R and Bin W Research on WebSocket-Based Authentication System Proceedings of the 2017 VI International Conference on Network, Communication and Computing, (102-105)
  34. ACM
    Sabbir Hridoy M, Hossain M, Islam R and Andersson K A web based belief rule based expert system for assessing flood risk Proceedings of the 19th International Conference on Information Integration and Web-based Applications & Services, (434-440)
  35. ACM
    Taelman R and Verborgh R Declaratively Describing Responses of Hypermedia-Driven Web APIs Proceedings of the 9th Knowledge Capture Conference, (1-4)
  36. Antoniazzi F, Paolini G, Roffia L, Masotti D, Costanzo A and Cinotti T A Web of Things Approach for Indoor Position Monitoring of Elderly and Impaired People Proceedings of the 21st Conference of Open Innovations Association FRUCT, (51-56)
  37. Diogo P, Lopes N and Reis L (2017). An ideal IoT solution for real-time web monitoring, Cluster Computing, 20:3, (2193-2209), Online publication date: 1-Sep-2017.
  38. ACM
    Wilson J, Wahby R, Corrigan-Gibbs H, Boneh D, Levis P and Winstein K Trust but Verify Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services, (464-474)
  39. Barbaglia G, Murzilli S and Cudini S (2017). Definition of REST web services with JSON schema, Software—Practice & Experience, 47:6, (907-920), Online publication date: 1-Jun-2017.
  40. Vega C, Roquero P and Aracil J (2017). Multi-Gbps HTTP traffic analysis in commodity hardware based on local knowledge of TCP streams, Computer Networks: The International Journal of Computer and Telecommunications Networking, 113:C, (258-268), Online publication date: 11-Feb-2017.
  41. Kesavan S and Jayakumar J (2017). Improvement of adaptive HTTP streaming using advanced real-time rate adaptation, Computers and Electrical Engineering, 58:C, (49-66), Online publication date: 1-Feb-2017.
  42. ACM
    Mi X, Qian F and Wang X SMig Proceedings of the 12th International on Conference on emerging Networking EXperiments and Technologies, (121-128)
  43. ACM
    Nappa A, Munir R, Tanoli I, Kreibich C and Caballero J RevProbe Proceedings of the 32nd Annual Conference on Computer Security Applications, (101-112)
  44. ACM
    Anderson B and McGrew D Identifying Encrypted Malware Traffic with Contextual Flow Data Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, (35-46)
  45. ACM
    Chen J, Jiang J, Duan H, Weaver N, Wan T and Paxson V Host of Troubles Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, (1516-1527)
  46. ACM
    Bocovich C and Goldberg I Slitheen Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, (1702-1714)
  47. Quezada-Naquid M, Marcelín-Jiménez R and González-Compeán J (2016). Babel, International Journal of Web Services Research, 13:4, (36-53), Online publication date: 1-Oct-2016.
  48. Hwang J, Lee J and Yoo C (2016). Eliminating bandwidth estimation from adaptive video streaming in wireless networks, Image Communication, 47:C, (242-251), Online publication date: 1-Sep-2016.
  49. Zhuang E, Tian Z, Cui X, Li J and Wang Z ERI Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, (126-129)
  50. Lu Y, Motani M and Wong W (2016). A QoE-aware resource distribution framework incentivizing context sharing and moderate competition, IEEE/ACM Transactions on Networking, 24:3, (1364-1377), Online publication date: 1-Jun-2016.
  51. Banos V and Manolopoulos Y (2016). A quantitative approach to evaluate Website Archivability using the CLEAR+ method, International Journal on Digital Libraries, 17:2, (119-141), Online publication date: 1-Jun-2016.
  52. ACM
    Mundada Y, Feamster N and Krishnamurthy B Half-Baked Cookies Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, (675-685)
  53. Pérez Méndez A, Marín López R and López Millán G (2016). Providing efficient SSO to cloud service access in AAA-based identity federations, Future Generation Computer Systems, 58:C, (13-28), Online publication date: 1-May-2016.
  54. Lokoăź J, Kohout J, Čech P, Skopal T and Pevný T k-NN Classification of Malware in HTTPS Traffic Using the Metric Space Approach Proceedings of the 11th Pacific Asia Workshop on Intelligence and Security Informatics - Volume 9650, (131-145)
  55. Li Z, Wang W, Xu T, Zhong X, Li X, Liu Y, Wilson C and Zhao B Exploring cross-application cellular traffic optimization with Baidu TrafficGuard Proceedings of the 13th Usenix Conference on Networked Systems Design and Implementation, (61-76)
  56. ACM
    Pavkovic B, Batic M and Tomasevic N (2015). The Importance of Cross-layer Considerations in a Standardized WSN Protocol Stack Aiming for IoT, Ubiquity, 2015:December, (1-18), Online publication date: 11-Dec-2015.
  57. ACM
    Gelernter N, Grinstein Y and Herzberg A Cross-Site Framing Attacks Proceedings of the 31st Annual Computer Security Applications Conference, (161-170)
  58. ACM
    Prehofer C and Schinner D Generic Operations on RESTful Resources in Mashup Tools Proceedings of the 6th International Workshop on the Web of Things, (1-6)
  59. ACM
    Felsch D, Heiderich M, Schulz F and Schwenk J How Private is Your Private Cloud? Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, (5-16)
  60. ACM
    Van Goethem T, Joosen W and Nikiforakis N The Clock is Still Ticking Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, (1382-1393)
  61. ACM
    Moiseenko I, Wang L and Zhang L Consumer / Producer Communication with Application Level Framing in Named Data Networking Proceedings of the 2nd ACM Conference on Information-Centric Networking, (99-108)
  62. ACM
    Brynielsson J and Sharma R Detectability of Low-Rate HTTP Server DoS Attacks using Spectral Analysis Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015, (954-961)
  63. Zheng X, Jiang J, Liang J, Duan H, Chen S, Wan T and Weaver N Cookies lack integrity Proceedings of the 24th USENIX Conference on Security Symposium, (707-721)
  64. ACM
    Hothersall-Thomas C, Maffeis S and Novakovic C BrowserAudit: automated testing of browser security features Proceedings of the 2015 International Symposium on Software Testing and Analysis, (37-47)
  65. Hartig O and Pirrò G A Context-Based Semantics for SPARQL Property Paths Over the Web Proceedings of the 12th European Semantic Web Conference on The Semantic Web. Latest Advances and New Domains - Volume 9088, (71-87)
  66. ACM
    Vallina-Rodriguez N, Sundaresan S, Kreibich C, Weaver N and Paxson V Beyond the Radio Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services, (375-387)
  67. ACM
    Fertig T and Braun P Model-driven Testing of RESTful APIs Proceedings of the 24th International Conference on World Wide Web, (1497-1502)
  68. Bai W, Chen L, Chen K, Han D, Tian C and Wang H Information-agnostic flow scheduling for commodity data centers Proceedings of the 12th USENIX Conference on Networked Systems Design and Implementation, (455-468)
  69. Pieczul O and Foley S The Dark Side of the Code Revised Selected Papers of the 23rd International Workshop on Security Protocols XXIII - Volume 9379, (1-11)
  70. Shin Y, Myers S, Gupta M and Radivojac P (2015). A link graph-based approach to identify forum spam, Security and Communication Networks, 8:2, (176-188), Online publication date: 25-Jan-2015.
  71. ACM
    Gill P, Crete-Nishihata M, Dalek J, Goldberg S, Senft A and Wiseman G (2015). Characterizing Web Censorship Worldwide, ACM Transactions on the Web, 9:1, (1-29), Online publication date: 23-Jan-2015.
  72. Zohar E and Cassuto Y Automatic and dynamic configuration of data compression for web servers Proceedings of the 28th USENIX conference on Large Installation System Administration, (97-108)
  73. ACM
    Thomas P (2014). Using Interaction Data to Explain Difficulty Navigating Online, ACM Transactions on the Web, 8:4, (1-41), Online publication date: 6-Nov-2014.
  74. Brambilla G, Picone M, Cirani S, Amoretti M and Zanichelli F A simulation platform for large-scale internet of things scenarios in urban environments Proceedings of the First International Conference on IoT in Urban Space, (50-55)
  75. ACM
    Karmarkar A CAMP Proceedings of the 2014 Workshop on Eclipse Technology eXchange, (1-2)
  76. ACM
    Moiseenko I, Stapp M and Oran D Communication patterns for web interaction in named data networking Proceedings of the 1st ACM Conference on Information-Centric Networking, (87-96)
  77. ACM
    Imbrenda C, Muscariello L and Rossi D Analyzing cacheable traffic in isp access networks for micro cdn applications via content-centric networking Proceedings of the 1st ACM Conference on Information-Centric Networking, (57-66)
  78. Karapanos N and Capkun S On the effective prevention of TLS man-in-the-middle attacks in web applications Proceedings of the 23rd USENIX conference on Security Symposium, (671-686)
  79. ACM
    Sutter J, Sons K and Slusallek P Blast Proceedings of the 19th International ACM Conference on 3D Web Technologies, (45-52)
  80. Frey D, Goessens M and Kermarrec A Behave Proceedings of the 14th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems - Volume 8460, (89-103)
  81. ACM
    Qian F, Sen S and Spatscheck O Characterizing resource usage for mobile web browsing Proceedings of the 12th annual international conference on Mobile systems, applications, and services, (218-231)
  82. ACM
    Nederlof A, Mesbah A and Deursen A Software engineering for the web: the state of the practice Companion Proceedings of the 36th International Conference on Software Engineering, (4-13)
  83. ACM
    Gilad Y and Herzberg A (2014). Off-Path TCP Injection Attacks, ACM Transactions on Information and System Security, 16:4, (1-32), Online publication date: 1-Apr-2014.
  84. ACM
    Nazir S, Hossain Z, Secchi R, Broadbent M, Petlund A and Fairhurst G Performance Evaluation of Congestion Window Validation for DASH Transport Proceedings of Network and Operating System Support on Digital Audio and Video Workshop, (67-72)
  85. ACM
    Nazir S, Hossain Z, Secchi R, Broadbent M, Petlund A and Fairhurst G Performance Evaluation of Congestion Window Validation for DASH Transport Proceedings of Network and Operating System Support on Digital Audio and Video Workshop, (67-72)
  86. Flohr J and Charzinski J A Comparative Study of Traffic Properties for Web Pages Optimized for Mobile Hand-Held and Non-mobile Devices Proceedings of the 17th International GI/ITG Conference on Measurement, Modelling, and Evaluation of Computing Systems and Dependability and Fault Tolerance - Volume 8376, (29-42)
  87. Weaver N, Kreibich C, Dam M and Paxson V Here Be Web Proxies Proceedings of the 15th International Conference on Passive and Active Measurement - Volume 8362, (183-192)
  88. Gisbert J, Palau C, Uriarte M, Prieto G, Palazn J, Esteve M, Lpez O, Correas J, Lucas-Esta M, Gimnez P, Moyano A, Collantes L, Gozlvez J, Molina B, Lzaro O and Gonzlez A (2014). Integrated system for control and monitoring industrial wireless networks for labor risk prevention, Journal of Network and Computer Applications, 39:C, (233-252), Online publication date: 1-Mar-2014.
  89. Faria B, Korhonen J and Souto E (2014). A comparison study between the TLS-based security framework and IKEv2 when protecting DSMIPv6 signaling, Computer Standards & Interfaces, 36:3, (489-500), Online publication date: 1-Mar-2014.
  90. ACM
    Weiher M and Hirschfeld R (2013). Polymorphic identifiers, ACM SIGPLAN Notices, 49:2, (61-72), Online publication date: 5-Feb-2014.
  91. ACM
    Chen J and Subramanian L Interactive web caching for slow or intermittent networks Proceedings of the 4th Annual Symposium on Computing for Development, (1-10)
  92. ACM
    Bellido J, Alarcón R and Pautasso C (2013). Control-Flow Patterns for Decentralized RESTful Service Composition, ACM Transactions on the Web, 8:1, (1-30), Online publication date: 1-Dec-2013.
  93. ACM
    B S, R H and S S (2013). SHS-HTTPS enforcer, ACM SIGSOFT Software Engineering Notes, 38:6, (1-4), Online publication date: 11-Nov-2013.
  94. ACM
    Hühnlein D, Schwenk J, Wich T, Mladenov V, Feldmann F, Mayer A, Schmölz J, Bruegger B and Horsch M Options for integrating eID and SAML Proceedings of the 2013 ACM workshop on Digital identity management, (85-96)
  95. ACM
    Dyer K, Coull S, Ristenpart T and Shrimpton T Protocol misidentification made easy with format-transforming encryption Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, (61-72)
  96. ACM
    Weiher M and Hirschfeld R Polymorphic identifiers Proceedings of the 9th symposium on Dynamic languages, (61-72)
  97. ACM
    Xie Z, Van de Sompel H, Liu J, van Reenen J and Jordan R Archiving the relaxed consistency web Proceedings of the 22nd ACM international conference on Information & Knowledge Management, (2119-2128)
  98. Braun B, Pollak C and Posegga J A Survey on Control-Flow Integrity Means in Web Application Frameworks Proceedings of the 18th Nordic Conference on Secure IT Systems - Volume 8208, (231-246)
  99. ACM
    Kovatsch M CoAP for the web of things Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication, (1495-1504)
  100. ACM
    Zhang Y, Tan C and Qun L CacheKeeper Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing, (265-274)
  101. Zefferer T, Golser F and Lenz T Towards Mobile Government Proceedings of the Second Joint International Conference on Technology-Enabled Innovation for Democracy, Government and Governance - Volume 8061, (140-151)
  102. Polleres A, Hogan A, Delbru R and Umbrich J RDFS and OWL reasoning for linked data Proceedings of the 9th international conference on Reasoning Web: semantic technologies for intelligent data access, (91-149)
  103. Auer S, Lehmann J, Ngonga Ngomo A and Zaveri A Introduction to linked data and its lifecycle on the web Proceedings of the 9th international conference on Reasoning Web: semantic technologies for intelligent data access, (1-90)
  104. ACM
    Woo S, Jeong E, Park S, Lee J, Ihm S and Park K Comparison of caching strategies in modern cellular backhaul networks Proceeding of the 11th annual international conference on Mobile systems, applications, and services, (319-332)
  105. ACM
    Hallgren P, Mauritzson D and Sabelfeld A GlassTube Proceedings of the Eighth ACM SIGPLAN workshop on Programming languages and analysis for security, (71-82)
  106. ACM
    Gilad Y and Herzberg A When tolerance causes weakness Proceedings of the 22nd international conference on World Wide Web, (435-446)
  107. ACM
    Czeskis A, Moshchuk A, Kohno T and Wang H Lightweight server support for browser-based CSRF protection Proceedings of the 22nd international conference on World Wide Web, (273-284)
  108. ACM
    AlSum A, Nelson M, Sanderson R and Van de Sompel H Archival HTTP redirection retrieval policies Proceedings of the 22nd International Conference on World Wide Web, (1051-1058)
  109. ACM
    Le Hors A and Speicher S The linked data platform (LDP) Proceedings of the 22nd International Conference on World Wide Web, (1-2)
  110. ACM
    Gugelmann D, Schatzmann D and Lenders V Horizon extender Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, (499-504)
  111. Al-Zoubi K and Wainer G (2013). RISE, Journal of Parallel and Distributed Computing, 73:5, (580-594), Online publication date: 1-May-2013.
  112. ACM
    Costa-Pérez X, Festag A, Kolbe H, Quittek J, Schmid S, Stiemerling M, Swetina J and van der Veen H (2013). Latest trends in telecommunication standards, ACM SIGCOMM Computer Communication Review, 43:2, (64-71), Online publication date: 29-Apr-2013.
  113. ACM
    Zhang L, Zhou F, Mislove A and Sundaram R Maygh Proceedings of the 8th ACM European Conference on Computer Systems, (281-294)
  114. ACM
    Payet P, Doupé A, Kruegel C and Vigna G EARs in the wild Proceedings of the 28th Annual ACM Symposium on Applied Computing, (1792-1799)
  115. Qian F, Huang J, Erman J, Mao Z, Sen S and Spatscheck O How to reduce smartphone traffic volume by 30%? Proceedings of the 14th international conference on Passive and Active Measurement, (42-52)
  116. Järvinen I, Chemmagate B, Ding A, Daniel L, Isomäki M, Korhonen J and Kojo M Effect of competing TCP traffic on interactive real-time communication Proceedings of the 14th international conference on Passive and Active Measurement, (94-103)
  117. Cheng Y, Çetinkaya E and Sterbenz J Transactional traffic generator implementation in ns-3 Proceedings of the 6th International ICST Conference on Simulation Tools and Techniques, (182-189)
  118. Castronova A, Goodall J and Elag M (2013). Models as web services using the Open Geospatial Consortium (OGC) Web Processing Service (WPS) standard, Environmental Modelling & Software, 41, (72-83), Online publication date: 1-Mar-2013.
  119. ACM
    Lederer S, Mueller C, Timmerer C, Concolato C, Le Feuvre J and Fliegel K Distributed DASH dataset Proceedings of the 4th ACM Multimedia Systems Conference, (131-135)
  120. Braun B, Gemein P, Reiser H and Posegga J Control-Flow integrity in web applications Proceedings of the 5th international conference on Engineering Secure Software and Systems, (1-16)
  121. Granell C, Díaz L, Schade S, Ostländer N and Huerta J (2013). Enhancing integrated environmental modelling by designing resource-oriented interfaces, Environmental Modelling & Software, 39:C, (229-246), Online publication date: 1-Jan-2013.
  122. Villegas N and Müller H The smartercontext ontology and its application to the smart internet The Personal Web, (151-184)
  123. Berger L, Schwager A and Escudero-Garzás J (2013). Power line communications for smart grid applications, Journal of Electrical and Computer Engineering, 2013, (3-3), Online publication date: 1-Jan-2013.
  124. Dunn J and Crosby B What your CDN won't tell you Proceedings of the 26th international conference on Large Installation System Administration: strategies, tools, and techniques, (195-202)
  125. ACM
    Tyson G, Mauthe A, Kaune S, Grace P, Taweel A and Plagemann T (2012). Juno, ACM Transactions on Internet Technology, 12:2, (1-28), Online publication date: 1-Dec-2012.
  126. ACM
    Thomas B, Jurdak R and Atkinson I (2012). SPDYing up the web, Communications of the ACM, 55:12, (64-73), Online publication date: 1-Dec-2012.
  127. Renzel D, Schlebusch P and Klamma R Today's top "RESTful" services and why they are not restful Proceedings of the 13th international conference on Web Information Systems Engineering, (354-367)
  128. Thatmann D, Slawik M, Zickau S and Küpper A Towards a federated cloud ecosystem Proceedings of the 9th international conference on Economics of Grids, Clouds, Systems, and Services, (223-233)
  129. ACM
    Weinberg Z, Wang J, Yegneswaran V, Briesemeister L, Cheung S, Wang F and Boneh D StegoTorus Proceedings of the 2012 ACM conference on Computer and communications security, (109-120)
  130. ACM
    Paihama J, Williams K and Suleman H Assessing the design of web interoperability protocols Proceedings of the South African Institute for Computer Scientists and Information Technologists Conference, (353-362)
  131. ACM
    Dunn C, Gupta M, Gerber A and Spatscheck O Navigation characteristics of online social networks and search engines users Proceedings of the 2012 ACM workshop on Workshop on online social networks, (43-48)
  132. Gionta J, Ning P and Zhang X iHTTP Proceedings of the 10th international conference on Applied Cryptography and Network Security, (381-399)
  133. ACM
    Qian F, Quah K, Huang J, Erman J, Gerber A, Mao Z, Sen S and Spatscheck O Web caching on smartphones Proceedings of the 10th international conference on Mobile systems, applications, and services, (127-140)
  134. McCusker J, Lebo T, Graves A, Difranzo D, Pinheiro P and McGuinness D Functional requirements for information resource provenance on the web Proceedings of the 4th international conference on Provenance and Annotation of Data and Processes, (52-66)
  135. Yang C, Shih W and Huang C Implementation of a distributed data storage system with resource monitoring on cloud computing Proceedings of the 7th international conference on Advances in Grid and Pervasive Computing, (64-73)
  136. Tumin S and Encheva S A closer look at authentication and authorization mechanisms for web-based applications Proceedings of the 5th WSEAS congress on Applied Computing conference, and Proceedings of the 1st international conference on Biologically Inspired Computation, (100-105)
  137. Nowlan M, Tiwari N, Iyengar J, Aminy S and Fordy B Fitting square pegs through round pipes Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation, (28-28)
  138. ACM
    Verborgh R, Steiner T, Van Deursen D, Coppens S, Vallés J and Van de Walle R Functional descriptions as the bridge between hypermedia APIs and the Semantic Web Proceedings of the Third International Workshop on RESTful Design, (33-40)
  139. ACM
    Davis C What if the web were not RESTful? Proceedings of the Third International Workshop on RESTful Design, (3-10)
  140. ACM
    Singh K, Wang H, Moshchuk A, Jackson C and Lee W Practical end-to-end web content integrity Proceedings of the 21st international conference on World Wide Web, (659-668)
  141. ACM
    Rech D and Harth A Towards a decentralised hierarchical architecture for smart grids Proceedings of the 2012 Joint EDBT/ICDT Workshops, (111-115)
  142. Maggiorini D, Ripamonti L and Scambia A Videogame technology to support seniors Proceedings of the 5th International ICST Conference on Simulation Tools and Techniques, (270-277)
  143. Halvorson T, Szurdi J, Maier G, Felegyhazi M, Kreibich C, Weaver N, Levchenko K and Paxson V The BIZ top-level domain Proceedings of the 13th international conference on Passive and Active Measurement, (221-230)
  144. Kastaniotis G, Maragos E, Douligeris C and Despotis D (2012). Using data envelopment analysis to evaluate the efficiency of web caching object replacement strategies, Journal of Network and Computer Applications, 35:2, (803-817), Online publication date: 1-Mar-2012.
  145. Maciá-Fernández G, Wang Y, Rodrıguez-Gómez R and Kuzmanovic A (2012). Extracting user web browsing patterns from non-content network traces, Computer Networks: The International Journal of Computer and Telecommunications Networking, 56:2, (598-614), Online publication date: 1-Feb-2012.
  146. Yadav R, Likhar P and Rao M SecWEM Proceedings of the 7th international conference on Information Systems Security, (309-321)
  147. Salmon S and ElAarag H Simulation based experiments using EDNAS Proceedings of the Winter Simulation Conference, (3266-3277)
  148. Diallo S, Tolk A, Graff J and Barraco A Using the levels of conceptual interoperability model and model-based data engineering to develop a modular interoperability framework Proceedings of the Winter Simulation Conference, (2576-2586)
  149. ACM
    Pelizzi R and Sekar R A server- and browser-transparent CSRF defense for web 2.0 applications Proceedings of the 27th Annual Computer Security Applications Conference, (257-266)
  150. Hogan A, Harth A, Umbrich J, Kinsella S, Polleres A and Decker S (2011). Searching and browsing Linked Data with SWSE, Web Semantics: Science, Services and Agents on the World Wide Web, 9:4, (365-401), Online publication date: 1-Dec-2011.
  151. ACM
    Huba W, Yuan B, Johnson D and Lutz P A HTTP cookie covert channel Proceedings of the 4th international conference on Security of information and networks, (133-136)
  152. ACM
    Ihm S and Pai V Towards understanding modern web traffic Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, (295-312)
  153. François J, State R, Engel T and Festor O Enforcing security with behavioral fingerprinting Proceedings of the 7th International Conference on Network and Services Management, (64-72)
  154. Ell B, Vrandečic D and Simperl E Labels in the web of data Proceedings of the 10th international conference on The semantic web - Volume Part I, (162-176)
  155. Wendzel S and Keller J Low-attention forwarding for mobile network covert channels Proceedings of the 12th IFIP TC 6/TC 11 international conference on Communications and multimedia security, (122-133)
  156. ACM
    Doupé A, Boe B, Kruegel C and Vigna G Fear the EAR Proceedings of the 18th ACM conference on Computer and communications security, (251-262)
  157. ACM
    Panchenko A, Niessen L, Zinnen A and Engel T Website fingerprinting in onion routing based anonymization networks Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, (103-114)
  158. Zhou Y and Evans D Protecting private web content from embedded scripts Proceedings of the 16th European conference on Research in computer security, (60-79)
  159. Jarnikov D and Doumen J Watermarking for adaptive streaming protocols Proceedings of the 8th VLDB international conference on Secure data management, (101-113)
  160. Hogan A, Pan J, Polleres A and Ren Y Scalable OWL 2 reasoning for linked data Proceedings of the 7th international conference on Reasoning web: semantic technologies for the web of data, (250-325)
  161. Auer S, Lehmann J and Ngomo A Introduction to linked data and its lifecycle on the web Proceedings of the 7th international conference on Reasoning web: semantic technologies for the web of data, (1-75)
  162. ACM
    Ono K and Schulzrinne H Using cross-media relations to identify important communication requests Proceedings of the 5th International Conference on Principles, Systems and Applications of IP Telecommunications, (1-7)
  163. ACM
    Davids C, Johnston A, Singh K, Sinnreich H and Wimmreuter W SIP APIs for voice and video communications on the web Proceedings of the 5th International Conference on Principles, Systems and Applications of IP Telecommunications, (1-7)
  164. Ocaya R (2011). A framework for collaborative remote experimentation for a physical laboratory using a low cost embedded web server, Journal of Network and Computer Applications, 34:4, (1408-1415), Online publication date: 1-Jul-2011.
  165. ACM
    Qian F, Wang Z, Gerber A, Mao Z, Sen S and Spatscheck O Profiling resource usage for mobile applications Proceedings of the 9th international conference on Mobile systems, applications, and services, (321-334)
  166. ACM
    Marvie J, Gautron P, Lecocq P, Mocquard O and Gérard F Streaming and synchronization of multi-user worlds through HTTP/1.1 Proceedings of the 16th International Conference on 3D Web Technology, (111-120)
  167. ACM
    Hayes D, Welzl M, Armitage G and Rossi M Improving HTTP performance using "stateless" TCP Proceedings of the 21st international workshop on Network and operating systems support for digital audio and video, (57-62)
  168. ACM
    Johns M, Braun B, Schrank M and Posegga J Reliable protection against session fixation attacks Proceedings of the 2011 ACM Symposium on Applied Computing, (1531-1537)
  169. Westermann B and Kesdogan D Malice versus AN.ON Proceedings of the 15th international conference on Financial Cryptography and Data Security, (62-76)
  170. ACM
    Chan E, Luo X, Li W, Fok W and Chang R Measurement of loss pairs in network paths Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, (88-101)
  171. Li N, Xie T, Jin M and Liu C (2010). Perturbation-based user-input-validation testing of web applications, Journal of Systems and Software, 83:11, (2263-2274), Online publication date: 1-Nov-2010.
  172. Suoranta S, Heikkinen J and Silvekoski P Authentication session migration Proceedings of the 15th Nordic conference on Information Security Technology for Applications, (17-32)
  173. ACM
    Machulak M, Maler E, Catalano D and van Moorsel A User-managed access to web resources Proceedings of the 6th ACM workshop on Digital identity management, (35-44)
  174. ACM
    Schiefer A, Berndt R, Ullrich T, Settgast V and Fellner D Service-oriented scene graph manipulation Proceedings of the 15th International Conference on Web 3D Technology, (55-62)
  175. ACM
    Sacco O and Bothorel C Exploiting semantic web techniques for representing and utilising Folksonomies Proceedings of the International Workshop on Modeling Social Media, (1-8)
  176. ACM
    Boudol G, Luo Z, Rezk T and Serrano M Towards reasoning for web applications Proceedings of the 2010 Workshop on Analysis and Programming Languages for Web Applications and Cloud Applications, (3-14)
  177. Gruschka N and Iacono L Security for XML data binding Proceedings of the 11th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security, (53-63)
  178. ACM
    Yue C and Wang H (2010). BogusBiter, ACM Transactions on Internet Technology, 10:2, (1-31), Online publication date: 1-May-2010.
  179. ACM
    Al-Sinani H, Alrodhan W and Mitchell C CardSpace-liberty integration for CardSpace users Proceedings of the 9th Symposium on Identity and Trust on the Internet, (12-25)
  180. Haslhofer B and Schandl B (2010). Interweaving OAI-PMH data sources with the linked data cloud, International Journal of Metadata, Semantics and Ontologies, 5:1, (17-31), Online publication date: 1-Apr-2010.
  181. Salah K, Sattar K, Baig Z, Sqalli M and Calyam P (2010). Discovering last-matching rules in popular open-source and commercial firewalls, International Journal of Internet Protocol Technology, 5:1/2, (23-31), Online publication date: 1-Apr-2010.
  182. ACM
    Arlitt M, Farkas K, Iyer S, Kumaresan P and Rafaeli S (2010). Systematically improving the quality of IT utilization data, ACM SIGMETRICS Performance Evaluation Review, 37:4, (42-49), Online publication date: 27-Mar-2010.
  183. ACM
    Wee S and Liu H Client-side load balancer using cloud Proceedings of the 2010 ACM Symposium on Applied Computing, (399-405)
  184. Rieck K, Krueger T, Brefeld U and Müller K (2010). Approximate Tree Kernels, The Journal of Machine Learning Research, 11, (555-580), Online publication date: 1-Mar-2010.
  185. ACM
    Chakrabarti S and Rodriquez R Connectedness testing of RESTful web-services Proceedings of the 3rd India software engineering conference, (143-152)
  186. De Ryck P, Desmet L, Heyman T, Piessens F and Joosen W CsFire Proceedings of the Second international conference on Engineering Secure Software and Systems, (18-34)
  187. ACM
    Hopper N, Vasserman E and Chan-TIN E (2010). How much anonymity does network latency leak?, ACM Transactions on Information and System Security, 13:2, (1-28), Online publication date: 1-Feb-2010.
  188. ACM
    Huang T, Zeadally S, Chilamkurti N and Shieh C (2010). A programmable network address translator, ACM Transactions on Internet Technology, 10:1, (1-37), Online publication date: 1-Feb-2010.
  189. Kaspar D, Evensen K, Engelstad P, Hansen A, Halvorsen P and Griwodz C Enhancing video-on-demand playout over multiple heterogeneous access networks Proceedings of the 7th IEEE conference on Consumer communications and networking conference, (47-51)
  190. Bozzon A, Brambilla M, Ceri S, Corcoglioniti F and Gatti N Chapter 14 Search Computing, (268-290)
  191. Ruth M, Diakov V, Goldsby M and Sa T Macro-system model Winter Simulation Conference, (1555-1561)
  192. ACM
    Sharma A, Navda V, Ramjee R, Padmanabhan V and Belding E Cool-Tether Proceedings of the 5th international conference on Emerging networking experiments and technologies, (109-120)
  193. ACM
    Cohen R, Rawitz D and Raz D (2009). Time-dependent multi-scheduling of multicast, ACM Transactions on Algorithms, 6:1, (1-22), Online publication date: 1-Dec-2009.
  194. Bromberg Y, Réveillère L, Lawall J and Muller G Automatic generation of network protocol gateways Proceedings of the 10th ACM/IFIP/USENIX International Conference on Middleware, (1-20)
  195. ACM
    Benevenuto F, Pereira A, Rodrigues T, Almeida V, Almeida J and Gonçalves M Evaluation of users access and navigation profiles on web video sharing environments Proceedings of the XV Brazilian Symposium on Multimedia and the Web, (1-8)
  196. Adida B, Barth A and Jackson C Rootkits for JavaScript environments Proceedings of the 3rd USENIX conference on Offensive technologies, (4-4)
  197. Evans N, Dingledine R and Grothoff C A practical congestion attack on tor using long paths Proceedings of the 18th conference on USENIX security symposium, (33-50)
  198. Gajek S, Manulis M and Schwenk J (2009). User-aware provably secure protocols for browser-based mutual authentication, International Journal of Applied Cryptography, 1:4, (290-308), Online publication date: 1-Aug-2009.
  199. Olmedo V, Villagrá V, Konstanteli K, Burgos J and Berrocal J (2009). Network mobility support for Web Service-based Grids through the Session Initiation Protocol, Future Generation Computer Systems, 25:7, (758-767), Online publication date: 1-Jul-2009.
  200. ACM
    Deshpande P, Kashyap A, Sung C and Das S Predictive methods for improved vehicular WiFi access Proceedings of the 7th international conference on Mobile systems, applications, and services, (263-276)
  201. ACM
    Li D and Anand M MaJaB Proceedings of the 7th international conference on Mobile systems, applications, and services, (95-108)
  202. Yue C, Chu Z and Wang H RCB Proceedings of the 2009 conference on USENIX Annual technical conference, (29-29)
  203. Luo X, Chan E and Chang R Design and implementation of TCP data probes for reliable and metric-rich network path monitoring Proceedings of the 2009 conference on USENIX Annual technical conference, (4-4)
  204. Agarwal Y, Hodges S, Chandra R, Scott J, Bahl P and Gupta R Somniloquy Proceedings of the 6th USENIX symposium on Networked systems design and implementation, (365-380)
  205. ACM
    Djalaliev P and Brustoloni J Secure web-based retrieval of documents with usage controls Proceedings of the 2009 ACM symposium on Applied Computing, (2062-2069)
  206. ACM
    Jackson C, Barth A, Bortz A, Shao W and Boneh D (2009). Protecting browsers from DNS rebinding attacks, ACM Transactions on the Web, 3:1, (1-26), Online publication date: 1-Jan-2009.
  207. ACM
    Peltotalo J, Harju J, Saukko M, Väätämöinen L, Bouazizi I and Curcio I Personal mobile broadcasting based on the 3GPP MBMS system Proceedings of the 6th International Conference on Advances in Mobile Computing and Multimedia, (156-162)
  208. ACM
    Cirani S, Fedotova N and Veltri L A resilient architecture for DHT-based distributed collaborative environments Proceedings of the 2008 RISE/EFTS Joint International Workshop on Software Engineering for Resilient Systems, (1-8)
  209. ACM
    Priyantha N, Kansal A, Goraczko M and Zhao F Tiny web services Proceedings of the 6th ACM conference on Embedded network sensor systems, (253-266)
  210. ACM
    Cui W, Peinado M, Chen K, Wang H and Irun-Briz L Tupni Proceedings of the 15th ACM conference on Computer and communications security, (391-402)
  211. ACM
    Webb S, Caverlee J and Pu C Predicting web spam with HTTP session information Proceedings of the 17th ACM conference on Information and knowledge management, (339-348)
  212. ACM
    Shieh A, Myers A and Sirer E (2008). A stateless approach to connection-oriented protocols, ACM Transactions on Computer Systems, 26:3, (1-50), Online publication date: 1-Sep-2008.
  213. Zander S and Murdoch S An improved clock-skew measurement technique for revealing hidden services Proceedings of the 17th conference on Security symposium, (211-225)
  214. ACM
    Dunne C, Candebat T and Gray D A three-party architecture and protocol that supports users with multiple identities for use with location based services Proceedings of the 5th international conference on Pervasive services, (1-10)
  215. Chi C, Chua C and Song W A novel ownership scheme to maintain web content consistency Proceedings of the 3rd international conference on Advances in grid and pervasive computing, (352-363)
  216. Szymaniak M, Presotto D, Pierre G and van Steen M (2008). Practical large-scale latency estimation, Computer Networks: The International Journal of Computer and Telecommunications Networking, 52:7, (1343-1364), Online publication date: 1-May-2008.
  217. Schneider F, Agarwal S, Alpcan T and Feldmann A The new web Proceedings of the 9th international conference on Passive and active network measurement, (31-40)
  218. ACM
    Adida B Sessionlock Proceedings of the 17th international conference on World Wide Web, (517-524)
  219. Patterson M, Sassaman L and Chaum D Freezing more than bits Proceedings of the 1st Conference on Usability, Psychology, and Security, (1-5)
  220. ACM
    Vosloo I and Kourie D (2008). Server-centric Web frameworks, ACM Computing Surveys, 40:2, (1-33), Online publication date: 1-Apr-2008.
  221. Vazquez J and Lopez-De-Ipina D Social devices Proceedings of the 1st international conference on The internet of things, (308-324)
  222. ACM
    Gajek S, Manulis M, Sadeghi A and Schwenk J Provably secure browser-based user-aware mutual authentication over TLS Proceedings of the 2008 ACM symposium on Information, computer and communications security, (300-311)
  223. Billington J and Han B (2007). Formalising TCP's Data Transfer Service Language: A Symbolic Automaton and its Properties, Fundamenta Informaticae, 80:1-3, (49-74), Online publication date: 1-Mar-2008.
  224. ACM
    Jin S, Gyeong G and Eom Y Design and implementation of VoIP device management scheme in SOHO environments Proceedings of the 2nd international conference on Ubiquitous information management and communication, (580-584)
  225. ACM
    Adeyeye M and Ventura N Extending web browsers architectures to support HTTP session mobility Proceedings of the 2007 ACM CoNEXT conference, (1-2)
  226. ACM
    Kadavasal M, Dhara K, Wu X and Krishnaswamy V Mixed reality for enhancing business communications using virtual worlds Proceedings of the 2007 ACM symposium on Virtual reality software and technology, (233-234)
  227. ACM
    Jackson C, Barth A, Bortz A, Shao W and Boneh D Protecting browsers from dns rebinding attacks Proceedings of the 14th ACM conference on Computer and communications security, (421-431)
  228. ACM
    Hopper N, Vasserman E and Chan-Tin E How much anonymity does network latency leak? Proceedings of the 14th ACM conference on Computer and communications security, (82-91)
  229. Boteanu D, Fernandez J, McHugh J and Mullins J Queue management as a DoS counter-measure? Proceedings of the 10th international conference on Information Security, (263-280)
  230. Ravid G, Bar-Ilan J, Baruchson-Arbib S and Rafaeli S (2007). Popularity and findability through log analysis of search terms and queries, Journal of Information Science, 33:5, (567-583), Online publication date: 1-Oct-2007.
  231. ACM
    Ford B (2007). Structured streams, ACM SIGCOMM Computer Communication Review, 37:4, (361-372), Online publication date: 1-Oct-2007.
  232. ACM
    Koponen T, Chawla M, Chun B, Ermolinskiy A, Kim K, Shenker S and Stoica I (2007). A data-oriented (and beyond) network architecture, ACM SIGCOMM Computer Communication Review, 37:4, (181-192), Online publication date: 1-Oct-2007.
  233. ACM
    Choe Y, Schuff D, Dyaberi J and Pai V Improving VoD server efficiency with bittorrent Proceedings of the 15th ACM international conference on Multimedia, (117-126)
  234. Curbera F, Duftler M, Khalaf R and Lovell D Bite Proceedings of the 5th international conference on Service-Oriented Computing, (94-106)
  235. Jorissen P, Di Fiore F, Vansichem G and Lamotte W A virtual interactive community platform supporting education for long-term sick children Proceedings of the 4th international conference on Cooperative design, visualization, and engineering, (58-69)
  236. Ingham K and Inoue H Comparing anomaly detection techniques for HTTP Proceedings of the 10th international conference on Recent advances in intrusion detection, (42-62)
  237. ACM
    Adamczyk P, Hafiz M, Balaguer F and Robinson C Network congestion control at the application layer Proceedings of the 14th Conference on Pattern Languages of Programs, (1-15)
  238. ACM
    Ford B Structured streams Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications, (361-372)
  239. ACM
    Koponen T, Chawla M, Chun B, Ermolinskiy A, Kim K, Shenker S and Stoica I A data-oriented (and beyond) network architecture Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications, (181-192)
  240. Brumley D, Caballero J, Liang Z, Newsome J and Song D Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, (1-16)
  241. Lufei H and Shi W (2007). Energy-aware QoS for application sessions across multiple protocol domains in mobile computing, Computer Networks: The International Journal of Computer and Telecommunications Networking, 51:11, (3125-3141), Online publication date: 1-Aug-2007.
  242. ACM
    Zhang G, Ehlert S, Magedanz T and Sisalem D Denial of service attack and prevention on SIP VoIP infrastructures using DNS flooding Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications, (57-66)
  243. Chadwick D and Anthony S Using WebDAV for improved certificate revocation and publication Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice, (265-279)
  244. ACM
    Oliver I, Getchell K, Miller A and Allison C (2007). Using disruptive technology for explorative learning, ACM SIGCSE Bulletin, 39:3, (96-100), Online publication date: 25-Jun-2007.
  245. ACM
    Oliver I, Getchell K, Miller A and Allison C Using disruptive technology for explorative learning Proceedings of the 12th annual SIGCSE conference on Innovation and technology in computer science education, (96-100)
  246. ACM
    Ananthanarayanan G, Padmanabhan V, Ravindranath L and Thekkath C COMBINE Proceedings of the 5th international conference on Mobile systems, applications and services, (286-298)
  247. Chan K and Chu X Design of a Fuzzy PI Controller to Guarantee Proportional Delay Differentiation on Web Servers Proceedings of the 3rd international conference on Algorithmic Aspects in Information and Management, (389-398)
  248. Cheng R and Lin H (2007). Protecting TCP from a misbehaving receiver, International Journal of Network Management, 17:3, (209-218), Online publication date: 1-Jun-2007.
  249. ACM
    Chellapilla K and Maykov A A taxonomy of JavaScript redirection spam Proceedings of the 3rd international workshop on Adversarial information retrieval on the web, (81-88)
  250. Mondal A and Kuzmanovic A When TCP Friendliness Becomes Harmful Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (152-160)
  251. Casado M and Freedman M Peering through the shroud Proceedings of the 4th USENIX conference on Networked systems design & implementation, (13-13)
  252. Cvrk L, Vrba V and Molnar K Advanced autonomous access control system for web-based server applications Proceedings of the third conference on IASTED International Conference: Advances in Computer Science and Technology, (84-89)
  253. Ingham K, Somayaji A, Burge J and Forrest S (2007). Learning DFA representations of HTTP for protecting web applications, Computer Networks: The International Journal of Computer and Telecommunications Networking, 51:5, (1239-1255), Online publication date: 1-Apr-2007.
  254. Billington J and Han B (2007). Formalising TCP's Data Transfer Service Language: A Symbolic Automaton and its Properties, Fundamenta Informaticae, 80:1-3, (49-74), Online publication date: 1-Jan-2007.
  255. ACM
    Padmanabhan V, Ramabhadran S, Agarwal S and Padhye J A study of end-to-end web access failures Proceedings of the 2006 ACM CoNEXT conference, (1-13)
  256. ACM
    Faber A, Gupta M and Viecco C Revisiting web server workload invariants in the context of scientific web sites Proceedings of the 2006 ACM/IEEE conference on Supercomputing, (110-es)
  257. ACM
    Schandl B and King R The SemDAV project Proceedings of the 1st international workshop on Contextualized attention metadata: collecting, managing and exploiting of rich usage information, (27-32)
  258. ACM
    Desmet L, Piessens F, Joosen W and Verbaeten P Bridging the gap between web application firewalls and web applications Proceedings of the fourth ACM workshop on Formal methods in security, (67-77)
  259. Yeh P, Li J and Yuan S Tracking the changes of dynamic web pages in the existence of URL rewriting Proceedings of the fifth Australasian conference on Data mining and analystics - Volume 61, (169-176)
  260. ACM
    Rubin S, Jha S and Miller B Protomatching network traffic for high throughputnetwork intrusion detection Proceedings of the 13th ACM conference on Computer and communications security, (47-58)
  261. ACM
    Pang R, Paxson V, Sommer R and Peterson L binpac Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, (289-300)
  262. Koukis D, Antonatos S and Anagnostakis K On the privacy risks of publishing anonymized IP network traces Proceedings of the 10th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security, (22-32)
  263. Marquis S, Dean T and Knight S Packet decoding using context sensitive parsing Proceedings of the 2006 conference of the Center for Advanced Studies on Collaborative research, (20-es)
  264. Cerny R Topincs Proceedings of the 2nd international conference on Topic maps research and applications, (175-183)
  265. Gonzalez-Barahona J, Dimitrova V, Chaparro D, Tebb C, Romera T, Canas L, Matravers J and Kleanthous S Towards community-driven development of educational materials Proceedings of the First European conference on Technology Enhanced Learning: innovative Approaches for Learning and Knowledge Sharing, (125-139)
  266. Yoo S, Ju H and Hong J Performance improvement methods for NETCONF-Based configuration management Proceedings of the 9th Asia-Pacific international conference on Network Operations and Management: management of Convergence Networks and Services, (242-252)
  267. Gonzalez J and Paxson V Enhancing network intrusion detection with integrated sampling and filtering Proceedings of the 9th international conference on Recent Advances in Intrusion Detection, (272-289)
  268. Lu C, Lu Y, Abdelzaher T, Stankovic J and Son S (2006). Feedback Control Architecture and Design Methodology for Service Delay Guarantees in Web Servers, IEEE Transactions on Parallel and Distributed Systems, 17:9, (1014-1027), Online publication date: 1-Sep-2006.
  269. Wei Y, Lin C, Chu X and Voigt T (2006). Fuzzy control for guaranteeing absolute delays in web servers, International Journal of High Performance Computing and Networking, 4:5/6, (338-346), Online publication date: 11-Aug-2006.
  270. Chi C, Liu L and Yu X Data integrity related markup language and HTTP protocol support for web intermediaries Proceedings of the 2006 international conference on Embedded and Ubiquitous Computing, (328-335)
  271. Øverlier L and Syverson P Valet services Proceedings of the 6th international conference on Privacy Enhancing Technologies, (223-244)
  272. Benedyczak K, Nowiński A, Nowiński K and Bała P Unigrids streaming framework Proceedings of the 8th international conference on Applied parallel computing: state of the art in scientific computing, (809-818)
  273. ACM
    Rotiroti D Strong authentication in web proxies Proceedings of the 15th international conference on World Wide Web, (915-916)
  274. ACM
    Kannan N and Hussain T Live URLs Proceedings of the 15th international conference on World Wide Web, (879-880)
  275. ACM
    Natarajan P, Iyengar J, Amer P and Stewart R SCTP Proceedings of the 15th international conference on World Wide Web, (615-624)
  276. Ali A Zero footprint secure internet authentication using network smart card Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications, (91-104)
  277. Bry F and Eckert M Twelve theses on reactive rules for the web Proceedings of the 2006 international conference on Current Trends in Database Technology, (842-854)
  278. Sun H, Fang B and Zhang H User-Perceived web qos measurement and evaluation system Proceedings of the 8th Asia-Pacific Web conference on Frontiers of WWW Research and Development, (157-165)
  279. Miyamoto D, Hazeyama H and Kadobayashi Y SPS Proceedings of the First Asian Internet Engineering conference on Technologies for Advanced Heterogeneous Networks, (195-209)
  280. Sugiki A, Kono K and Iwasaki H A practical approach to automatic parameter-tuning of web servers Proceedings of the 10th Asian Computing Science conference on Advances in computer science: data management on the web, (146-159)
  281. ACM
    Backes M and Groβ T Tailoring the Dolev-Yao abstraction to web services realities Proceedings of the 2005 workshop on Secure web services, (65-74)
  282. ACM
    Groβ T, Pfitzmann B and Sadeghi A Proving a WS-federation passive requestor profile with a browser model Proceedings of the 2005 workshop on Secure web services, (54-64)
  283. Arlitt M, Krishnamurthy B and Mogul J Predicting short-transfer latency from TCP arcana Proceedings of the 5th ACM SIGCOMM conference on Internet measurement, (19-19)
  284. Pang R, Allman M, Bennett M, Lee J, Paxson V and Tierney B A first look at modern enterprise traffic Proceedings of the 5th ACM SIGCOMM conference on Internet measurement, (2-2)
  285. Savorić M, Karl H, Schläger M, Poschwatta T and Wolisz A (2005). Analysis and performance evaluation of the EFCM common congestion controller for TCP connections, Computer Networks: The International Journal of Computer and Telecommunications Networking, 49:2, (269-294), Online publication date: 5-Oct-2005.
  286. Bahat O and Makowski A (2005). Measuring consistency in TTL-based caches, Performance Evaluation, 62:1-4, (439-455), Online publication date: 1-Oct-2005.
  287. Groß T, Pfitzmann B and Sadeghi A Browser model for security analysis of browser-based protocols Proceedings of the 10th European conference on Research in Computer Security, (489-508)
  288. ACM
    Bry F and Eckert M Processing link structures and linkbases in the web's open world linking Proceedings of the sixteenth ACM conference on Hypertext and hypermedia, (135-144)
  289. Alanen M and Porres I Model Interchange Using OMG Standards Proceedings of the 31st EUROMICRO Conference on Software Engineering and Advanced Applications, (450-459)
  290. Tomonaga K, Ohta M and Araki K Privacy-aware location dependent services over wireless internet with anycast Proceedings of the 3rd international conference on Human Society@Internet: web and Communication Technologies and Internet-Related Social Issues, (311-321)
  291. Yuan J, Chi C and Sun Q Exploiting fine grained parallelism for acceleration of web retrieval Proceedings of the 3rd international conference on Human Society@Internet: web and Communication Technologies and Internet-Related Social Issues, (125-134)
  292. ACM
    Bender M, Farach-Colton M, He S, Kuszmaul B and Leiserson C Adversarial contention resolution for simple channels Proceedings of the seventeenth annual ACM symposium on Parallelism in algorithms and architectures, (325-332)
  293. Sayre R (2005). Atom, IEEE Internet Computing, 9:4, (71-78), Online publication date: 1-Jul-2005.
  294. Straub T, Ginkel T and Buchmann J A multipurpose delegation proxy for WWW credentials Proceedings of the Second European conference on Public Key Infrastructure, (1-21)
  295. Sun Y, Yan C and Chen M Content-Aware automatic qos provisioning for upnp AV-Based multimedia services over wireless LANs Proceedings of the 5th international conference on Computational Science - Volume Part II, (444-452)
  296. Elovici Y, Shapira B, Last M, Zaafrany O, Friedman M, Schneider M and Kandel A Content-Based detection of terrorists browsing the web using an advanced terror detection system (ATDS) Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics, (244-255)
  297. ACM
    Xia H and Brustoloni J Hardening Web browsers against man-in-the-middle and eavesdropping attacks Proceedings of the 14th international conference on World Wide Web, (489-498)
  298. Shieh A, Myers A and Sirer E Trickles Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2, (175-188)
  299. Carrera E and Bianchini R (2005). PRESS, IEEE Transactions on Parallel and Distributed Systems, 16:5, (385-395), Online publication date: 1-May-2005.
  300. Younis O and Fahmy S (2005). FlowMate, IEEE/ACM Transactions on Networking, 13:2, (288-301), Online publication date: 1-Apr-2005.
  301. Park J and Chong K An implementation of the client-based distributed web caching system Proceedings of the 7th Asia-Pacific web conference on Web Technologies Research and Development, (759-770)
  302. ACM
    Saito Y and Shapiro M (2005). Optimistic replication, ACM Computing Surveys, 37:1, (42-81), Online publication date: 1-Mar-2005.
  303. Cohen E, Halperin E and Kaplan H (2005). Performance aspects of distributed caches using, TTL-based consistency, Theoretical Computer Science, 331:1, (73-96), Online publication date: 15-Feb-2005.
  304. ACM
    Thiemann P (2005). An embedded domain-specific language for type-safe server-side web scripting, ACM Transactions on Internet Technology, 5:1, (1-46), Online publication date: 1-Feb-2005.
  305. Debar H and Viinikka J Intrusion detection Foundations of Security Analysis and Design III, (207-236)
  306. Margasiński I and Szczypiorski K VAST Enhanced methods in computer security, biometric and artificial intelligence systems, (71-82)
  307. Olshefski D, Nieh J and Nahum E ksniffer Proceedings of the 6th conference on Symposium on Operating Systems Design & Implementation - Volume 6, (23-23)
  308. Park J, Jin H and Kim D Intrusion detection system for securing geographical information system web servers Proceedings of the 4th international conference on Web and Wireless Geographical Information Systems, (110-119)
  309. ACM
    Borders K and Prakash A Web tap Proceedings of the 11th ACM conference on Computer and communications security, (110-120)
  310. Nayate A, Dahlin M and Iyengar A Transparent information dissemination Proceedings of the 5th ACM/IFIP/USENIX international conference on Middleware, (212-231)
  311. ACM
    Kalden R and Ekström H (2004). Searching for mobile mice and elephants in GPRS networks, ACM SIGMOBILE Mobile Computing and Communications Review, 8:4, (37-46), Online publication date: 1-Oct-2004.
  312. ACM
    Chakravorty R, Banerjee S, Rodriguez P, Chesterfield J and Pratt I Performance optimizations for wireless wide-area networks Proceedings of the 10th annual international conference on Mobile computing and networking, (159-173)
  313. ACM
    Wang H, Guo C, Simon D and Zugenmaier A (2004). Shield, ACM SIGCOMM Computer Communication Review, 34:4, (193-204), Online publication date: 30-Aug-2004.
  314. ACM
    Wang H, Guo C, Simon D and Zugenmaier A Shield Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications, (193-204)
  315. Zugenmaier A FLASCHE – a mechanism providing anonymity for mobile users Proceedings of the 4th international conference on Privacy Enhancing Technologies, (121-141)
  316. Khare R and Taylor R Extending the Representational State Transfer (REST) Architectural Style for Decentralized Systems Proceedings of the 26th International Conference on Software Engineering, (428-437)
  317. ACM
    Shadgar B and Holyer I Adapting databases and WebDAV protocol Proceedings of the 13th international conference on World Wide Web, (612-620)
  318. ACM
    Bar-Yossef Z, Broder A, Kumar R and Tomkins A Sic transit gloria telae Proceedings of the 13th international conference on World Wide Web, (328-337)
  319. Bavier A, Bowman M, Chun B, Culler D, Karlin S, Muir S, Peterson L, Roscoe T, Spalink T and Wawrzoniak M Operating system support for planetary-scale network services Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation - Volume 1, (19-19)
  320. Mogul J, Chan Y and Kelly T Design, implementation, and evaluation of duplicate transfer detection in HTTP Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation - Volume 1, (4-4)
  321. Funasaka J, Nagayasu K and Ishida K Improvements on Block Size Control Method for Adaptive Parallel Downloading Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) - Volume 7, (648-653)
  322. Kawash J Consistency models for Internet caching Proceedings of the winter international synposium on Information and communication technologies, (1-6)
  323. Billington J and Han B Closed form expressions for the state space of TCP's Data Transfer Service operating over unbounded channels Proceedings of the 27th Australasian conference on Computer science - Volume 26, (31-39)
  324. Hexel R, Johnson C, Kummerfeld B and Quigley A "Powerpoint to the people" Proceedings of the fifth conference on Australasian user interface - Volume 28, (49-56)
  325. References Grid resource management, (507-566)
  326. Craswell N, Crimmins F, Hawking D and Moffat A Performance and cost tradeoffs in Web search Proceedings of the 15th Australasian database conference - Volume 27, (161-169)
  327. ACM
    Iwerks G and Samet H The internet spatial spreadsheet Proceedings of the 11th ACM international symposium on Advances in geographic information systems, (154-160)
  328. ACM
    Kruegel C and Vigna G Anomaly detection of web-based attacks Proceedings of the 10th ACM conference on Computer and communications security, (251-261)
  329. ACM
    Kulvatunyou B, Ivezic N, Martin M and Jones A A business-to-business interoperability testbed Proceedings of the 5th international conference on Electronic commerce, (195-204)
  330. ACM
    Turau V (2003). HTTPExplorer, ACM SIGCSE Bulletin, 35:3, (198-201), Online publication date: 1-Sep-2003.
  331. Wu C and Jan R (2003). System integration of WAP and SMS for home network system, Computer Networks: The International Journal of Computer and Telecommunications Networking, 42:4, (493-502), Online publication date: 15-Jul-2003.
  332. ACM
    Pan J, Cranefield S and Carter D A lightweight ontology repository Proceedings of the second international joint conference on Autonomous agents and multiagent systems, (632-638)
  333. ACM
    Turau V HTTPExplorer Proceedings of the 8th annual conference on Innovation and technology in computer science education, (198-201)
  334. Yuan J and Chi C Web caching performance Proceedings of the 2nd international conference on Human.society@internet, (23-33)
  335. Delicato F, Pires P, Pirmez L and da Costa Carmo L A flexible middleware system for wireless sensor networks Proceedings of the ACM/IFIP/USENIX 2003 International Conference on Middleware, (474-492)
  336. Fiedler U and Plattner B Using latency quantiles to engineer QoS guarantees for web services Proceedings of the 11th international conference on Quality of service, (345-362)
  337. Anderson M, Altas I and Fellows G Web personalisation with the cover coefficient algorithm Proceedings of the 2003 international conference on Computational science: PartIII, (422-431)
  338. ACM
    Hess A and Seamons K An access control model for dynamic client-side content Proceedings of the eighth ACM symposium on Access control models and technologies, (207-216)
  339. ACM
    Mikhailov M and Wills C Evaluating a new approach to strong web cache consistency with snapshots of collected content Proceedings of the 12th international conference on World Wide Web, (599-608)
  340. ACM
    Barton J, Kindberg T, Dai H, Priyantha N and Al-bin-ali F Sensor-enhanced mobile web clients Proceedings of the 12th international conference on World Wide Web, (80-89)
  341. Park K and Ryou H Anomaly detection scheme using data mining in mobile environment Proceedings of the 2003 international conference on Computational science and its applications: PartII, (21-30)
  342. Charzinski J (2003). Observed performance of elastic Internet applications, Computer Communications, 26:8, (914-925), Online publication date: 1-May-2003.
  343. Cardellini V, Colajanni M and Yu P (2003). Request Redirection Algorithms for Distributed Web Systems, IEEE Transactions on Parallel and Distributed Systems, 14:4, (355-368), Online publication date: 1-Apr-2003.
  344. VanderMeer D, Datta A, Dutta K, Ramamritham K and Navathe S (2003). Mobile User Recovery in the Context of Internet Transactions, IEEE Transactions on Mobile Computing, 2:2, (132-146), Online publication date: 1-Apr-2003.
  345. Di Nitto E, Sassaroli G and Zuccalà M Adaptation of Web Contents and Services to Terminals Capabilities Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
  346. Savorić M, Karl H and Wolisz A (2003). The TCP control block interdependence in fixed networks-new performance results, Computer Communications, 26:4, (366-375), Online publication date: 1-Mar-2003.
  347. Curcio I Multimedia streaming over mobile networks Wireless internet handbook, (77-104)
  348. Wong J, Mirlas L, Kou W and Lin X Credit card-based secure online payment Payment technologies for E-commerce, (227-243)
  349. ACM
    Kim H, Pai V and Rixner S (2002). Increasing web server throughput with network interface data caching, ACM SIGOPS Operating Systems Review, 36:5, (239-250), Online publication date: 1-Dec-2002.
  350. ACM
    Kim H, Pai V and Rixner S (2002). Increasing web server throughput with network interface data caching, ACM SIGARCH Computer Architecture News, 30:5, (239-250), Online publication date: 1-Dec-2002.
  351. Hoschek W The Web Service Discovery Architecture Proceedings of the 2002 ACM/IEEE conference on Supercomputing, (1-15)
  352. ACM
    Kim H, Pai V and Rixner S Increasing web server throughput with network interface data caching Proceedings of the 10th international conference on Architectural support for programming languages and operating systems, (239-250)
  353. ACM
    Kim H, Pai V and Rixner S (2002). Increasing web server throughput with network interface data caching, ACM SIGPLAN Notices, 37:10, (239-250), Online publication date: 1-Oct-2002.
  354. Wang J, Min R, Zhu Y and Hu Y (2002). UCFS-A Novel User-Space, High Performance, Customized File System for Web Proxy Servers, IEEE Transactions on Computers, 51:9, (1056-1073), Online publication date: 1-Sep-2002.
  355. Libman L and Orda A (2002). Optimal retrial and timeout strategies for accessing network resources, IEEE/ACM Transactions on Networking, 10:4, (551-564), Online publication date: 1-Aug-2002.
  356. ACM
    Davison B Predicting web actions from HTML content Proceedings of the thirteenth ACM conference on Hypertext and hypermedia, (159-168)
  357. Fu Y, Vahdat A, Cherkasova L and Tang W EtE Proceedings of the General Track of the annual conference on USENIX Annual Technical Conference, (115-130)
  358. ACM
    Yoshimura T, Yonemoto Y, Ohya T, Etoh M and Wee S Mobile streaming media CDN enabled by dynamic SMIL Proceedings of the 11th international conference on World Wide Web, (651-661)
  359. ACM
    Bayardo Jr. R, Agrawal R, Gruhl D and Somani A YouServ Proceedings of the 11th international conference on World Wide Web, (345-354)
  360. ACM
    Kelly T and Mogul J Aliasing on the world wide web Proceedings of the 11th international conference on World Wide Web, (281-292)
  361. ACM
    Evans M and Furnell S A web-based resource migration protocol using WebDAV Proceedings of the 11th international conference on World Wide Web, (263-271)
  362. ACM
    Mogul J Clarifying the fundamentals of HTTP Proceedings of the 11th international conference on World Wide Web, (25-36)
  363. ACM
    Nakano T, Harumoto K, Shimojo S and Nishio S User adaptive content delivery mechanism on the world wide web Proceedings of the 2002 ACM symposium on Applied computing, (1140-1146)
  364. ACM
    Luo M, Yang C and Tseng C Content management on server farm with layer-7 routing Proceedings of the 2002 ACM symposium on Applied computing, (1134-1139)
  365. ACM
    Zdun U Dynamically generating web application fragments from page templates Proceedings of the 2002 ACM symposium on Applied computing, (1113-1120)
  366. ACM
    Stockinger H and Hanushevsky A HTTP redirection for replica catalogue lookups in data grids Proceedings of the 2002 ACM symposium on Applied computing, (882-889)
  367. Colajanni M and Yu P (2002). A Performance Study of Robust Load Sharing Strategies for Distributed Heterogeneous Web Server Systems, IEEE Transactions on Knowledge and Data Engineering, 14:2, (398-414), Online publication date: 1-Mar-2002.
  368. ACM
    Chen B and Nishita T Multiresolution streaming mesh with shape preserving and QoS-like controlling Proceedings of the seventh international conference on 3D Web technology, (35-42)
  369. Graunke P, Findler R, Krishnamurthi S and Felleisen M Automatically Restructuring Programs for the Web Proceedings of the 16th IEEE international conference on Automated software engineering
  370. ACM
    Mao Y, Chen K, Wang D and Zheng W Cluster-based online monitoring system of web traffic Proceedings of the 3rd international workshop on Web information and data management, (47-53)
  371. Wong J, Evans D and Kwok M On staleness and the delivery of web pages Proceedings of the 2001 conference of the Centre for Advanced Studies on Collaborative research
  372. ACM
    Gigandet S, Sudarsanam A and Aggarwal A The Inktomi climate lab Proceedings of the 1st ACM SIGCOMM Workshop on Internet measurement, (183-187)
  373. ACM
    Cohen E and Kaplan H (2001). Aging through cascaded caches, ACM SIGCOMM Computer Communication Review, 31:4, (41-53), Online publication date: 1-Oct-2001.
  374. ACM
    Deshpande S and Zeng W Scalable streaming of JPEG2000 images using hypertext transfer protocol Proceedings of the ninth ACM international conference on Multimedia, (372-381)
  375. ACM
    Dalal A and Jordan S (2001). An optimal service ordering for a world wide web server, ACM SIGMETRICS Performance Evaluation Review, 29:2, (8-13), Online publication date: 1-Sep-2001.
  376. Plank J, Bassi A, Beck M, Moore T, Swany D and Wolski R (2001). Managing Data Storage in the Network, IEEE Internet Computing, 5:5, (50-58), Online publication date: 1-Sep-2001.
  377. ACM
    Cohen E and Kaplan H Aging through cascaded caches Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, (41-53)
  378. Fu K, Sit E, Smith K and Feamster N Dos and don'ts of client authentication on the web Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
  379. Regan J and Jensen C Capability file names Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
  380. ACM
    Kahan J and Koivunen M Annotea Proceedings of the 10th international conference on World Wide Web, (623-632)
  381. ACM
    Wills C, Mikhailov M and Shang H N for the price of 1 Proceedings of the 10th international conference on World Wide Web, (257-265)
  382. Ghandeharizadeh S Alternative Approaches to Distribute An E-Commerce Document Management System Proceedings of the 11th International Workshop on research Issues in Data Engineering
  383. ACM
    Nakano T, Harumoto K, Shimojo S and Nishio S Extending hypertext streaming protocol to realize effective web page transmission via a caching proxy Proceedings of the 2001 ACM symposium on Applied computing, (440-445)
  384. ACM
    Heimbigner D Adapting publish/subscribe middleware to achieve Gnutella-like functionality Proceedings of the 2001 ACM symposium on Applied computing, (176-181)
  385. Ju H, Choi M and Hong J (2001). EWS-Based Management Application Interface and Integration Mechanisms for Web-Based Element Management, Journal of Network and Systems Management, 9:1, (31-50), Online publication date: 1-Mar-2001.
  386. ACM
    Park J, Sandhu R and Ahn G (2001). Role-based access control on the web, ACM Transactions on Information and System Security, 4:1, (37-71), Online publication date: 1-Feb-2001.
  387. Henricksen K and Indulska J Adapting the web interface Proceedings of the 2nd Australasian conference on User interface, (21-28)
  388. Henricksen K and Indulska J (2001). Adapting the web interface, Australian Computer Science Communications, 23:5, (21-28), Online publication date: 25-Jan-2001.
  389. Saif U, Gordon D and Greaves D (2001). Internet Access to a Home Area Network, IEEE Internet Computing, 5:1, (54-63), Online publication date: 1-Jan-2001.
  390. Bianchini R and Carrera E (2000). Analytical and experimental evaluation of cluster-based network servers, World Wide Web, 3:4, (215-229), Online publication date: 1-Dec-2000.
  391. Yang C and Luo M Realizing fault resilience in Web-server cluster Proceedings of the 2000 ACM/IEEE conference on Supercomputing, (21-es)
  392. ACM
    Rosenstein M What is actually taking place on web sites Proceedings of the 2nd ACM conference on Electronic commerce, (38-43)
  393. ACM
    Spring N and Wetherall D (2000). A protocol-independent technique for eliminating redundant network traffic, ACM SIGCOMM Computer Communication Review, 30:4, (87-95), Online publication date: 1-Oct-2000.
  394. ACM
    Spring N and Wetherall D A protocol-independent technique for eliminating redundant network traffic Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, (87-95)
  395. Yang C and Luo M Building an Adaptable, Fault Tolerant, and Highly Manageable Web Server on Clusters of Non-Dedicated Workstations Proceedings of the Proceedings of the 2000 International Conference on Parallel Processing
  396. Curtin M Shibboleth Proceedings of the 9th conference on USENIX Security Symposium - Volume 9, (20-20)
  397. ACM
    Feise J Posties Proceedings of the eleventh ACM on Hypertext and hypermedia, (228-229)
  398. ACM
    Hochheiser H Indirect threats to freedom and privacy Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions, (249-254)
  399. ACM
    Nakano T, Harumoto K, Shimojo S and Nishio S Controlling transmission order of inline objects for effective Web page publishing Proceedings of the 2000 ACM symposium on Applied computing - Volume 2, (942-947)
  400. Smith B, Acharya A, Yang T and Zhu H Exploiting result equivalence in caching dynamic web content Proceedings of the 2nd conference on USENIX Symposium on Internet Technologies and Systems - Volume 2, (19-19)
  401. ACM
    Savage S, Cardwell N, Wetherall D and Anderson T (1999). TCP congestion control with a misbehaving receiver, ACM SIGCOMM Computer Communication Review, 29:5, (71-78), Online publication date: 5-Oct-1999.
  402. ACM
    Youngblood G (1999). Web hunting, XRDS: Crossroads, The ACM Magazine for Students, 5:4, (26-32), Online publication date: 1-Jun-1999.
  403. ACM
    Cohen E, Krishnamurthy B and Rexford J (1998). Improving end-to-end performance of the Web using server volumes and proxy filters, ACM SIGCOMM Computer Communication Review, 28:4, (241-253), Online publication date: 1-Oct-1998.
  404. ACM
    Cohen E, Krishnamurthy B and Rexford J Improving end-to-end performance of the Web using server volumes and proxy filters Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication, (241-253)
  405. Krannig A Towards web security using PLASMA Proceedings of the 7th conference on USENIX Security Symposium - Volume 7, (14-14)
Contributors
  • Google LLC
  • Palo Alto Research Center Incorporated

Recommendations