Sciweavers

2084 search results - page 164 / 417
» Knowledge Exploitation from the Web
Sort
View
130
Voted
MIDDLEWARE
2007
Springer
15 years 7 months ago
Dynamic multi-process information flow tracking for web application security
Although there is a large body of research on detection and prevention of such memory corruption attacks as buffer overflow, integer overflow, and format string attacks, the web...
Susanta Nanda, Lap-Chung Lam, Tzi-cker Chiueh
94
Voted
VLDB
2001
ACM
102views Database» more  VLDB 2001»
15 years 5 months ago
Form-Based Proxy Caching for Database-Backed Web Sites
We explore a new proxy-caching framework that exploits the query semantics of HTML forms. We identify a common class of form-based queries, and study two representative caching sc...
Qiong Luo, Jeffrey F. Naughton
WWW
2007
ACM
16 years 1 months ago
Compare&contrast: using the web to discover comparable cases for news stories
Comparing and contrasting is an important strategy people employ to understand new situations and create solutions for new problems. Similar events can provide hints for problem s...
Jiahui Liu, Earl Wagner, Larry Birnbaum
125
Voted
LISA
2003
15 years 2 months ago
DryDock: A Document Firewall
Auditing a web site’s content is an arduous task. For any given page on a web server, system administrators are often ill-equipped to determine who created the document, why itâ...
Deepak Giridharagopal
93
Voted
GECCO
2003
Springer
322views Optimization» more  GECCO 2003»
15 years 6 months ago
AntClust: Ant Clustering and Web Usage Mining
Abstract. In this paper, we propose a new ant-based clustering algorithm called AntClust. It is inspired from the chemical recognition system of ants. In this system, the continuou...
Nicolas Labroche, Nicolas Monmarché, Gilles...