Information integration applications, such as mediators or mashups, that require access to information resources currently rely on users manually discovering and integrating them ...
Phishers are fraudsters that mimic legitimate websites to steal user’s credential information and exploit that information for identity theft and other criminal activities. Vari...
Eric Lin, Saul Greenberg, Eileah Trotter, David Ma...
Given a set of keywords, we find a maximum Web query (containing the most keywords possible) that respects userdefined bounds on the number of returned hits. We assume a real-world...
Accurate topical classification of user queries allows for increased effectiveness and efficiency in general-purpose web search systems. Such classification becomes critical if th...
Steven M. Beitzel, Eric C. Jensen, Ophir Frieder, ...
While much research has been performed on query logs collected for major Web search engines, query log analysis to enhance search on smaller and more focused collections has attrac...
Stephen Dignum, Udo Kruschwitz, Maria Fasli, Yunhy...