Loading...
  • Home
  • Search Results
269-270 of 4327 Papers

WEB LOG MINING: AN ENHANCEMENT TO SERVER PERFORMANCE AND SIGHT NAVIGATION

Published In: INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, COMMUNICATION AND NETWORKS
Author(s): HEENA GOYAL , N.N.DAS , NIDHI , SHILPAYADAV

Abstract: The aim of discovering frequent patterns in Web log data is to obtain information about the navigational behavior of the users. Web Server register a log entry for every single access they get. A huge number of accesses are registered and collected in an ever growing web log. In this paper, we study how an efficient web log mining contributes to enhance server performance, improve web site navigation and system design of web applications.

  • Publication Date: 03-Jun-2011
  • DOI: 10.15224/978-981-07-1847-3-1027
  • Views: 0
  • Downloads: 0

CRYPTOGRAPHY AND NETWORK SECURITY

Published In: INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, COMMUNICATION AND NETWORKS
Author(s): BHAGYASHRI KUMBHARE , DIPAK JHA , PALLAVI DONGRE , PARITOSH SARDARE , SUJATA S. KHOBRAGADE

Abstract: \"SECURITY\"in this contemporary scenarios has become a more sensible issue either it may be in the ―REAL WORLD‖ or in the ―CYBER WORLD‖. In the real world as opposed to the cyber world an attack is often preceded by information gathering. Movie gangsters ―case the joint‖; soldiers ―scout the area‖. This is also true in the cyber world. Here the ―bad guys‖ are referred to as intruders, eavesdroppers, hackers, hijackers, etc. Today the illicit activities of the hackers are growing by leaps and bounds, viz. ., ―THE RECENT ATTACK ON THE DNS SERVERS HAS CAUSED A LOT OF HULLABALOO ALL OVER THE WORLD‖. However, fortunately, the antagonists reacted promptly and resurrected the Internet world from the brink of prostration. Since the inception of conglomerating Computers with Networks the consequence of which shrunk the communication world, hitherto, umpteen ilk of security breaches took their origin. Tersely quoting some security ditherers – Eavesdropping, Hacking, Hijacking, Mapping, Packet

  • Publication Date: 03-Jun-2011
  • DOI: 10.15224/978-981-07-1847-3-1027
  • Views: 0
  • Downloads: 0