Overview
Ads (0)
PPC Keywords (0)
Organic Keywords (16)
Competitors (928)
Sub-Domains
issg.cs.duke.edu
Paid Keywords
Keywords found: 0
#Competitors: 0
#Ad Copies: N/A
 
Organic Keywords
Keywords found: 16
#Competitors: 947
Average Position: N/A
 
PPC Overview
No Results Found
Organic Listing Variations
1.
Epidemic Routing for Partially-Connected Ad Hoc Networks
File Format: PDF/Adobe Acrobat - View as HTML (vahdat,becker)@cs.duke.edu. Abstract. Mobile ad hoc routing protocols allow nodes with wireless adaptors to communicate with one an- ...
2.
25.2.6 Configuration Files
25.2.6 Configuration Files. The configuration files for the print service are kept in /etc/lp and the spooling directory is /var/spool/lp. ...
3.
Efficient Peer-to-Peer Keyword Searching
Efficient Peer-to-Peer Keyword Searching. Patrick Reynolds and Amin Vahdat. Patrick Reynolds and Amin Vahdat, "Efficient Peer-to-Peer Keyword Searching," ...
4.
TACT
One desirable feature of TACT is the ability to dynamically trade consistency for availability (and performance) in response to current system, network, ...
5.
TACT
One desirable feature of TACT is the ability to dynamically trade consistency for availability (and performance) in response to current system, network, ...
6.
Pip: Detecting the Unexpected in Distributed Systems
Pip finds structural and performance bugs in distributed systems by comparing actual system behavior to expected system behavior. Actual system behavior is ...
7.
Pip: Detecting the Unexpected in Distributed Systems
Pip finds structural and performance bugs in distributed systems by comparing actual system behavior to expected system behavior. Actual system behavior is ...
8.
Pip: Detecting the Unexpected in Distributed Systems
Pip finds structural and performance bugs in distributed systems by comparing actual system behavior to expected system behavior. Actual system behavior is ...
9.
Model-Based Resource Provisioning in a Web Service Utility
File Format: PDF/Adobe Acrobat - View as HTML This section outlines a resource provisioning algorithm that plans least-cost resource slices ...... strate the potential of model-based resource provision- ...
10.
Efficient Peer-to-Peer Keyword Searching
Where Web searching depends on crawlers to discover new or updated content, a peer-to-peer search system can take advantage of explicit insert operations to ...
 
View More »
      And   Or
                
Sometimes you don’t know exactly what you are looking for in a Research data. That’s when our searching options may come handy.
The Domain Search
This search allows you to enter the domain name of the site you want to analyze. For example, you may enter “amazon.com” in the KeywordSpy search bar.

The Keyword Search
This will let you enter terms and key phrases in the search bar such as “send flowers”, “cover letters”, “keyword software,” and even a single broad term like “chocolate”.

The Ad Copy Search
This allows you to enter any texts or content included in an ad copy, whether the ones in ad copy headline or the ones in description lines. For example: “sunglasses”.
The Destination URL Search
This search allows you to enter the destination URL of the site that you want to analyze.

The destination URL is the address where a searcher is taken when an advertisement copy in search engines is clicked. Please take note that the destination URL differs from the display URL which appears at the bottom of advertisement copies.

Please be reminded to always include http:// at the beginning of your Destination URL search. For example: “http://www.proflowers.com”.

In addition, if you want to find all the ads that KeywordSpy indexed for a specific affiliate network e.g. Hydra Network. You should search in Destination URL the string lynxtrack.com.
Loading
  Loading...