Sciweavers

1017 search results - page 139 / 204
» Grouping Web Users based on Query Log
Sort
View
POPL
2006
ACM
16 years 4 days ago
The essence of command injection attacks in web applications
Web applications typically interact with a back-end database to retrieve persistent data and then present the data to the user as dynamically generated output, such as HTML web pa...
Zhendong Su, Gary Wassermann
CIKM
2005
Springer
15 years 5 months ago
Person resolution in person search results: WebHawk
Finding information about people on the Web using a search engine is difficult because there is a many-to-many mapping between person names and specific persons (i.e. referents). ...
Xiaojun Wan, Jianfeng Gao, Mu Li, Binggong Ding
IIR
2010
14 years 10 months ago
Social Approach to Context-Aware Retrieval
In this paper we present a general purpose solution to Web content perusal by means of mobile devices, named Social Context-Aware Browser. This is a novel approach for the informa...
Luca Vassena
SASO
2008
IEEE
15 years 6 months ago
A Framework for Self-Protecting Cryptographic Key Management
Demands to match security with performance in Web applications where access to shared data needs to be controlled dynamically make self-protecting security schemes attractive. Yet...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl,...
RIAO
2004
15 years 1 months ago
Selective Combination of Evidence for Topic Distillation using Document and Aggregate-level Information
The combination of evidence for Information Retrieval has been studied extensively in order to increase effectiveness. In this paper, we study the selective application of differe...
Vassilis Plachouras, Iadh Ounis, Fidel Cacheda