Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,356,139 papers from all fields of science
Search
Sign In
Create Free Account
Reverse proxy
Known as:
Reverse proxies
, Surrogate
, Surrogate proxy
In computer networks, a reverse proxy is a type of proxy server that retrieves resources on behalf of a client from one or more servers. These…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
33 relations
A/B testing
Application Request Routing
Application firewall
Cherokee Web Server
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Abuse of Mobile Devices by Making Reverse Proxy Server
Dogukan Aydinli
,
E. Koroglu
,
Volkan Erol
2017
Corpus ID: 64739645
Mobile devices have become tools we spend our free time where we carry them with us every moment, they allow us to interact with…
Expand
2017
2017
Determining controllability of sepsis using genetic algorithms on a proxy agent-based model of systemic inflammation
Chase Cockrell
,
G. An
bioRxiv
2017
Corpus ID: 35662522
Sepsis, a manifestation of the body’s inflammatory response to injury and infection, has a mortality rate of between 28%-50% and…
Expand
2015
2015
A Distributed Recommendation Platform for Big Data
Daniel Valcarce
,
Javier Parapar
,
Álvaro Barreiro
Journal of universal computer science (Online)
2015
Corpus ID: 12593210
The vast amount of information that recommenders manage these days has reached a point where scalability has become a critical…
Expand
2013
2013
SPDY accelerator for improving Web access speed
G. Mineki
,
S. Uemura
,
T. Hasegawa
International Conference on Advanced…
2013
Corpus ID: 14850827
It was decided that the next-generation protocol SPDY proposed by Google would be used as a basis of the technical specification…
Expand
2010
2010
A framework for detecting anomalies in HTTP traffic using instance-based learning and k-nearest neighbor classification
Michael Kirchner
2nd International Workshop on Security and…
2010
Corpus ID: 18601114
Attacks against web applications and web-based services that use HTTP as a communication protocol pose a serious threat to today…
Expand
2009
2009
Empowering intermediary-based infrastructure for mobile service provisioning
T. Weerasinghe
,
I. Warren
IEEE Asia-Pacific Services Computing Conference
2009
Corpus ID: 12026305
There has been growing interest recently in transforming small mobile devices from simple service consumers into service…
Expand
2008
2008
Detection Method Based on Reverse Proxy against Web Flooding Attacks
Chu-Hsing Lin
,
Jung-Chun Liu
,
Chih-Chieh Lien
Eighth International Conference on Intelligent…
2008
Corpus ID: 6461584
Web servers face all kinds of users; some of them engage malicious activities to degrade or completely block network services…
Expand
2006
2006
An Adaptive Caching Mechanism for Web Services
Lei Li
,
Chunlei Niu
,
Haoran Zheng
,
Jun Wei
International Conference on Quality Software
2006
Corpus ID: 15349400
Web services, with an emphasis on open standards and flexibility, can provide benefits over existing capital markets integration…
Expand
2003
2003
Exploiting templates to scale consistency maintenance in edge database caches
Khalil Amiri
,
Sara Sprenkle
,
Renu Tewari
2003
Corpus ID: 3249382
Semantic database caching is a self-managing approach to dynamic materialization of “semantic” slices of back-end databases on…
Expand
1998
1998
Secure Web Tunneling
M. Abadi
,
A. Birrell
,
Raymie Stata
,
E. Wobber
Comput. Networks
1998
Corpus ID: 40458808
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE