scispace - formally typeset
Search or ask a question
Topic

Proxy (statistics)

About: Proxy (statistics) is a research topic. Over the lifetime, 5257 publications have been published within this topic receiving 94504 citations. The topic is also known as: proxy variable & proxy measurement.


Papers
More filters
Patent
Bryan L. Sullivan1
30 Dec 2009
TL;DR: In this paper, an HTTP proxy server compares information of a request by HTTP client logic with a known pattern of information for the client logic, when the information of the request matches the known pattern, and causes content and/or software to be communicated to the client in response to the request.
Abstract: An apparatus such as an HTTP proxy server compares information of a request by HTTP client logic with a known pattern of information for the client logic. When the information of the request matches the known pattern, the HTTP proxy server causes content and/or software to be communicated to the client in response to the request. Depending upon the results of the comparison, the HTTP proxy may also validate or invalidate the request before communicating it to the server.

33 citations

Patent
Chandrajit G. Joshi1, Romil J. Shah1
29 Jul 2008
TL;DR: In this paper, a system for servicing a request from a client includes at least two proxy servers, each having a corresponding proxy server configured as a buddy proxy server, and being adapted to act as a primary proxy server for servicing the request and to forward the request to a backend server.
Abstract: A system for servicing a request from a client includes at least two proxy servers, each having a corresponding proxy server configured as a buddy proxy server, and being adapted to act as a primary proxy server for servicing the request and to forward the request to a backend server. The system includes a load balancer adapted to: forward the request to a primary proxy server; forward the request to a failover proxy server in the event of failure of the primary proxy server; and forward a response from the primary proxy server or the failover proxy server to the client. The system includes a backend server adapted to receive a request from a proxy server and to send a response to the proxy server. The failover proxy server is adapted to process the request depending on a status of a matching previously stored request.

33 citations

Patent
13 Jun 2000
TL;DR: In this article, the authors propose a proxy class dynamically generated at runtime that implements a list of interfaces specified at runtime such that a method invocation through an interface on an instance of the class is encoded and dispatched uniformly to an object that performs the invocation of the requested method.
Abstract: In an object-oriented data processing system, methods and systems in accordance with the present invention provide a proxy class dynamically generated at runtime that implements a list of interfaces specified at runtime such that a method invocation through an interface on an instance of the class is encoded and dispatched uniformly to an object that performs the invocation of the requested method. The generation of the proxy class at runtime and the specification at runtime of the list of interfaces implemented by the proxy class allow the interfaces to be used to be chosen at runtime before generation of the proxy class. Since the proxy class does not need to be created before compile time, the interface list implemented by the proxy class does not need to be known at the time the source code is written.

33 citations

Journal ArticleDOI
TL;DR: This paper proposes two secure nonrepudiable proxy multi-signature schemes that can withstand public key substitution attack and have some other advantages such as proxy signature key generation and updating using insecure channels.
Abstract: The concept of proxy signature introduced by Mambo, Usuda, and Okamoto allows a designated person, called a proxy signer, to sign on behalf of an original signer. However, most existing proxy signature schemes do not support nonrepudiation. In this paper, two secure nonrepudiable proxy multi-signature schemes are proposed that overcome disadvantages of the existing schemes. The proposed schemes can withstand public key substitution attack. In addition, the new schemes have some other advantages such as proxy signature key generation and updating using insecure channels. This approach can also be applied to other ElGamal-like proxy signature schemes.

33 citations

Journal ArticleDOI
TL;DR: In this article, the authors proposed a formal linkage between the two indicators by introducing a factor termed the "activity correction" (AC) effect, and discussed the significance and policy implications of the AC effect.

33 citations


Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20231,242
20222,473
2021334
2020262
2019250
2018282