Sciweavers

8479 search results - page 1577 / 1696
» Data Extraction from Web Data Sources
Sort
View
WISE
2002
Springer
15 years 8 months ago
Log Mining to Improve the Performance of Site Search
Despite of the popularity of global search engines, people still suffer from low accuracy of site search. The primary reason lies in the difference of link structures and data sca...
Gui-Rong Xue, Hua-Jun Zeng, Zheng Chen, Wei-Ying M...
HICSS
1999
IEEE
98views Biometrics» more  HICSS 1999»
15 years 7 months ago
Retrieval of Volatile Database Output through Hypermedia Applications
This paper reports on research on the generation of hypermedia (Web) applications for querying multimedia databases. In [5] we have proposed a heuristic algorithm for generating n...
Geert-Jan Houben, Paul De Bra
CSCW
1996
ACM
15 years 7 months ago
Supporting Multi-User, Multi-Applet Workspaces in CBE
Our experience with Internet-based scientific collaboratories indicates that they need to be user-extensible, allow users to add tools and objects dynamically to shared workspaces...
Jang Ho Lee, Atul Prakash, Trent Jaeger, Gwobaw Wu
CIKM
2009
Springer
15 years 7 months ago
Ensembles in adversarial classification for spam
The standard method for combating spam, either in email or on the web, is to train a classifier on manually labeled instances. As the spammers change their tactics, the performanc...
Deepak Chinavle, Pranam Kolari, Tim Oates, Tim Fin...
SP
2010
IEEE
157views Security Privacy» more  SP 2010»
15 years 7 months ago
Bootstrapping Trust in Commodity Computers
Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer’s state. We examine research ...
Bryan Parno, Jonathan M. McCune, Adrian Perrig
« Prev « First page 1577 / 1696 Last » Next »