Sciweavers

956 search results - page 110 / 192
» Data Mining Techniques for Security of Web Services
Sort
View
IJDSST
2010
163views more  IJDSST 2010»
14 years 7 months ago
User's Behaviour inside a Digital Library
Abstract: CASPUR allows many academic Italian institutions located in the CentreSouth of Italy to access more than 7 million of articles through a digital library platform. We anal...
Marco Scarnò
APWEB
2010
Springer
15 years 2 months ago
Optimizing Query Processing for the Hidden Web
Abstract. The term Deep Web (sometimes also called Hidden Web) refers to the data content that is created dynamically as the result of a specific search on the Web. In this respec...
Andrea Calì, Davide Martinenghi
WSDM
2010
ACM
204views Data Mining» more  WSDM 2010»
15 years 4 months ago
Learning URL patterns for webpage de-duplication
Presence of duplicate documents in the World Wide Web adversely affects crawling, indexing and relevance, which are the core building blocks of web search. In this paper, we pres...
Hema Swetha Koppula, Krishna P. Leela, Amit Agarwa...
ADC
2006
Springer
188views Database» more  ADC 2006»
15 years 3 months ago
Discovering task-oriented usage pattern for web recommendation
Web transaction data usually convey user task-oriented behaviour pattern. Web usage mining technique is able to capture such informative knowledge about user task pattern from usa...
Guandong Xu, Yanchun Zhang, Xiaofang Zhou
COLCOM
2007
IEEE
15 years 1 months ago
A structure preserving approach for securing XML documents
With the widespread adoption of XML as the message format to disseminate content over distributed systems including Web Services and Publish-Subscribe systems, different methods ha...
Mohamed Nabeel, Elisa Bertino