Sciweavers

686 search results - page 127 / 138
» Empirical Studies in Reverse Engineering
Sort
View
80
Voted
WWW
2007
ACM
15 years 10 months ago
U-REST: an unsupervised record extraction system
In this paper, we describe a system that can extract record structures from web pages with no direct human supervision. Records are commonly occurring HTML-embedded data tuples th...
Yuan Kui Shen, David R. Karger
CBMS
2009
IEEE
15 years 4 months ago
On the storage, management and analysis of (multi) similarity for large scale protein structure datasets in the grid
Assessment of the (Multi) Similarity among a set of protein structures is achieved through an ensemble of protein structure comparison methods/algorithms. This leads to the genera...
Gianluigi Folino, Azhar Ali Shah, Natalio Krasnogo...
WSDM
2009
ACM
131views Data Mining» more  WSDM 2009»
15 years 4 months ago
Diversifying search results
We study the problem of answering ambiguous web queries in a setting where there exists a taxonomy of information, and that both queries and documents may belong to more than one ...
Rakesh Agrawal, Sreenivas Gollapudi, Alan Halverso...
FC
2009
Springer
106views Cryptology» more  FC 2009»
15 years 4 months ago
Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing
Attackers compromise web servers in order to host fraudulent content, such as malware and phishing websites. While the techniques used to compromise websites are widely discussed a...
Tyler Moore, Richard Clayton
GECCO
2009
Springer
191views Optimization» more  GECCO 2009»
15 years 4 months ago
Evolvable malware
The concept of artificial evolution has been applied to numerous real world applications in different domains. In this paper, we use this concept in the domain of virology to ev...
Sadia Noreen, Shafaq Murtaza, M. Zubair Shafiq, Mu...