Sciweavers

1825 search results - page 304 / 365
» From exploratory search to web search and back
Sort
View
IJDE
2006
95views more  IJDE 2006»
14 years 12 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
WWW
2009
ACM
16 years 16 days ago
Efficient overlap and content reuse detection in blogs and online news articles
The use of blogs to track and comment on real world (political, news, entertainment) events is growing. Similarly, as more individuals start relying on the Web as their primary in...
Jong Wook Kim, Jun'ichi Tatemura, K. Selçuk...
120
Voted
WWW
2005
ACM
16 years 16 days ago
Browsing fatigue in handhelds: semantic bookmarking spells relief
Focused Web browsing activities such as periodically looking up headline news, weather reports, etc., which require only selective fragments of particular Web pages, can be made m...
Saikat Mukherjee, I. V. Ramakrishnan
KCAP
2011
ACM
14 years 2 months ago
Multipedia: enriching DBpedia with multimedia information
Enriching knowledge bases with multimedia information makes it possible to complement textual descriptions with visual and audio information. Such complementary information can he...
Andrés García-Silva, Max Jakob, Pabl...
SEMWEB
2009
Springer
15 years 6 months ago
Produce and Consume Linked Data with Drupal!
Abstract. Currently a large number of Web sites are driven by Content Management Systems (CMS) which manage textual and multimedia content but also inherently - carry valuable info...
Stephane Corlosquet, Renaud Delbru, Tim Clark, Axe...