Sciweavers

15 search results - page 3 / 3
» Structure-Based Crawling in the Hidden Web
Sort
View
DIMVA
2010
13 years 7 months ago
Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners
Black-box web vulnerability scanners are a class of tools that can be used to identify security issues in web applications. These tools are often marketed as "point-and-click ...
Adam Doupé, Marco Cova, Giovanni Vigna
JCDL
2010
ACM
188views Education» more  JCDL 2010»
13 years 10 months ago
Exposing the hidden web for chemical digital libraries
In recent years, the vast amount of digitally available content has lead to the creation of many topic-centered digital libraries. Also in the domain of chemistry more and more di...
Sascha Tönnies, Benjamin Köhncke, Oliver...
MMS
2006
13 years 5 months ago
A probabilistic semantic model for image annotation and multi-modal image retrieval
This paper addresses automatic image annotation problem and its application to multi-modal image retrieval. The contribution of our work is three-fold. (1) We propose a probabilis...
Ruofei Zhang, Zhongfei (Mark) Zhang, Mingjing Li, ...
ICDM
2006
IEEE
164views Data Mining» more  ICDM 2006»
13 years 11 months ago
Unsupervised Learning of Tree Alignment Models for Information Extraction
We propose an algorithm for extracting fields from HTML search results. The output of the algorithm is a database table– a data structure that better lends itself to high-level...
Philip Zigoris, Damian Eads, Yi Zhang
WWW
2010
ACM
14 years 13 days ago
New-web search with microblog annotations
Web search engines discover indexable documents by recursively ‘crawling’ from a seed URL. Their rankings take into account link popularity. While this works well, it introduc...
Tom Rowlands, David Hawking, Ramesh Sankaranarayan...