Sciweavers

555 search results - page 77 / 111
» Anonymous Webs of Trust
Sort
View
ICSE
2008
IEEE-ACM
15 years 10 months ago
Static detection of cross-site scripting vulnerabilities
Web applications support many of our daily activities, but they often have security problems, and their accessibility makes them easy to exploit. In cross-site scripting (XSS), an...
Gary Wassermann, Zhendong Su
VLDB
2007
ACM
154views Database» more  VLDB 2007»
15 years 3 months ago
P2P Authority Analysis for Social Communities
PageRank-style authority analyses of Web graphs are of great importance for Web mining. Such authority analyses also apply to hot “Web 2.0” applications that exhibit a natural...
Josiane Xavier Parreira, Sebastian Michel, Matthia...
ICALT
2006
IEEE
15 years 3 months ago
Collaborative Questioning: A Case of Short Message Services (SMS) for Knowledge Sharing
Whenever a class is invited to ask questions, it is individual learners who ask and their questions do not often represent the questions of the whole class. The benefit to those p...
Dick Ng'ambi
AIRWEB
2008
Springer
14 years 11 months ago
Query-log mining for detecting spam
Every day millions of users search for information on the web via search engines, and provide implicit feedback to the results shown for their queries by clicking or not onto them...
Carlos Castillo, Claudio Corsi, Debora Donato, Pao...
SWAP
2008
14 years 11 months ago
Combining Statistical Techniques and Lexico-syntactic Patterns for Semantic Relations Extraction from Text
We describe here a methodology to combine two different techniques for Semantic Relation Extraction from texts. On the one hand, generic lexicosyntactic patterns are applied to the...
Emiliano Giovannetti, Simone Marchi, Simonetta Mon...