ACM DL

Internet Technology (TOIT)

Menu

Search Issue
enter search term and/or author name

Archive


ACM Transactions on Internet Technology (TOIT), Volume 7 Issue 1, February 2007

Internet content filtering using isotonic separation on content category ratings
Varghese S. Jacob, Ramayya Krishnan, Young U. Ryu
Article No.: 1
DOI: 10.1145/1189740.1189741
The World Wide Web has enabled anybody with a low cost Internet connection to access vast information repositories. Some of these repositories contain information (e.g., hate speech and pornography) that is considered objectionable, especially for...

Model-driven development of context-aware Web applications
Stefano Ceri, Florian Daniel, Maristella Matera, Federico M. Facca
Article No.: 2
DOI: 10.1145/1189740.1189742
Context-aware, multi-channel Web applications are more and more gaining consensus among both content providers and consumers, but very few proposals exist for their conceptual modeling. This article illustrates a conceptual framework that provides...

Equipping smart devices with public key signatures
Xuhua Ding, Daniele Mazzocchi, Gene Tsudik
Article No.: 3
DOI: 10.1145/1189740.1189743
One of the major recent trends in computing has been towards so-called smart devices, such as PDAs, cell phones and sensors. Such devices tend to have a feature in common: limited computational capabilities and equally limited power, as most operate...

The Web as a graph: How far we are
Debora Donato, Luigi Laura, Stefano Leonardi, Stefano Millozzi
Article No.: 4
DOI: 10.1145/1189740.1189744
In this article we present an experimental study of the properties of webgraphs. We study a large crawl from 2001 of 200M pages and about 1.4 billion edges, made available by the WebBase project at Stanford, as well as several synthetic ones...

Defeating DDoS attacks by fixing the incentive chain
Yun Huang, Xianjun Geng, Andrew B. Whinston
Article No.: 5
DOI: 10.1145/1189740.1189745
Cooperative technological solutions for Distributed Denial-of-Service (DDoS) attacks are already available, yet organizations in the best position to implement them lack incentive to do so, and the victims of DDoS attacks cannot find effective...

Adapting Web information extraction knowledge via mining site-invariant and site-dependent features
Tak-Lam Wong, Wai Lam
Article No.: 6
DOI: 10.1145/1189740.1189746
We develop a novel framework that aims at automatically adapting previously learned information extraction knowledge from a source Web site to a new unseen target site in the same domain. Two kinds of features related to the text fragments from the...

Provisioning servers in the application tier for e-commerce systems
Daniel Villela, Prashant Pradhan, Dan Rubenstein
Article No.: 7
DOI: 10.1145/1189740.1189747
Server providers that support e-commerce applications as a service for multiple e-commerce Web sites traditionally use a tiered server architecture. This architecture includes an application tier to process requests for dynamically generated content....