Sciweavers

WWW
2010
ACM
13 years 10 months ago
Competing for users' attention: on the interplay between organic and sponsored search results
Queries on major Web search engines produce complex result pages, primarily composed of two types of information: organic results, that is, short descriptions and links to relevan...
Cristian Danescu-Niculescu-Mizil, Andrei Z. Broder...
WWW
2010
ACM
13 years 10 months ago
Large-scale bot detection for search engines
In this paper, we propose a semi-supervised learning approach for classifying program (bot) generated web search traffic from that of genuine human users. The work is motivated by...
Hongwen Kang, Kuansan Wang, David Soukal, Fritz Be...
WWW
2010
ACM
13 years 10 months ago
Atomate it! end-user context-sensitive automation using heterogeneous information sources on the web
The transition of personal information management (PIM) tools off the desktop to the Web presents an opportunity to augment these tools with capabilities provided by the wealth o...
Max Van Kleek, Brennan Moore, David R. Karger, Pau...
WWW
2010
ACM
13 years 10 months ago
Automated object persistence for JavaScript
Traditionally web applications have required an internet connection in order to work with data. Browsers have lacked any mechanisms to allow web applications to operate offline wi...
Brett Cannon, Eric Wohlstadter
WWW
2010
ACM
13 years 10 months ago
The paths more taken: matching DOM trees to search logs for accurate webpage clustering
An unsupervised clustering of the webpages on a website is a primary requirement for most wrapper induction and automated data extraction methods. Since page content can vary dras...
Deepayan Chakrabarti, Rupesh R. Mehta
WWW
2010
ACM
13 years 10 months ago
Fine-grained privilege separation for web applications
We present a programming model for building web applications with security properties that can be confidently verified during a security review. In our model, applications are d...
Akshay Krishnamurthy, Adrian Mettler, David Wagner
WWW
2010
ACM
13 years 10 months ago
Detection and analysis of drive-by-download attacks and malicious JavaScript code
JavaScript is a browser scripting language that allows developers to create sophisticated client-side interfaces for web applications. However, JavaScript code is also used to car...
Marco Cova, Christopher Krügel, Giovanni Vign...
WWW
2010
ACM
13 years 10 months ago
Sig.ma: live views on the web of data
Abstract. We demonstrate Sig.ma, both a service and an end user application to browse and perform tasks leveraging data coming from dozens of distributed and unrelated sources on t...
Giovanni Tummarello, Richard Cyganiak, Michele Cat...
WWW
2010
ACM
13 years 10 months ago
Sync kit: a persistent client-side database caching toolkit for data intensive websites
We introduce a client-server toolkit called Sync Kit that demonstrates how client-side database storage can improve the performance of data intensive websites. Sync Kit is designe...
Edward Benson, Adam Marcus 0002, David R. Karger, ...
WWW
2010
ACM
13 years 10 months ago
Facetedpedia: dynamic generation of query-dependent faceted interfaces for wikipedia
We propose Facetedpedia, a faceted retrieval system for information discovery and exploration in Wikipedia. Given the set of Wikipedia articles resulting from a keyword query, Fac...
Chengkai Li, Ning Yan, Senjuti Basu Roy, Lekhendro...