Sciweavers

4288 search results - page 829 / 858
» Domesticating Computers and the Internet
Sort
View
MIDDLEWARE
2004
Springer
15 years 5 months ago
Guiding Queries to Information Sources with InfoBeacons
The Internet provides a wealth of useful information in a vast number of dynamic information sources, but it is difficult to determine which sources are useful for a given query. ...
Brian F. Cooper
RAID
2004
Springer
15 years 5 months ago
RheoStat: Real-Time Risk Management
As the frequency of attacks faced by the average host connected to the Internet increases, reliance on manual intervention for response is decreasingly tenable. Operating system an...
Ashish Gehani, Gershon Kedem
RULEML
2004
Springer
15 years 5 months ago
Rule Learning for Feature Values Extraction from HTML Product Information Sheets
The Web is now a huge information repository with a rich semantic structure that, however, is primarily addressed to human understanding rather than automated processing by a compu...
Costin Badica, Amelia Badica
WEBDB
2004
Springer
100views Database» more  WEBDB 2004»
15 years 5 months ago
Spam, Damn Spam, and Statistics: Using Statistical Analysis to Locate Spam Web Pages
The increasing importance of search engines to commercial web sites has given rise to a phenomenon we call “web spam”, that is, web pages that exist only to mislead search eng...
Dennis Fetterly, Mark Manasse, Marc Najork
ASAP
2003
IEEE
124views Hardware» more  ASAP 2003»
15 years 5 months ago
Arbitrary Bit Permutations in One or Two Cycles
Symmetric-key block ciphers encrypt data, providing data confidentiality over the public Internet. For inter-operability reasons, it is desirable to support a variety of symmetric...
Zhijie Shi, Xiao Yang, Ruby B. Lee