Sciweavers

2084 search results - page 169 / 417
» Knowledge Exploitation from the Web
Sort
View
WWW
2010
ACM
15 years 6 months ago
Reining in the web with content security policy
The last three years have seen a dramatic increase in both awareness and exploitation of Web Application Vulnerabilities. 2008 and 2009 saw dozens of high-profile attacks against...
Sid Stamm, Brandon Sterne, Gervase Markham
HCI
2009
14 years 10 months ago
UbiSOA Dashboard: Integrating the Physical and Digital Domains through Mashups
Abstract. The current Web 2.0 stage of the Internet provided the basis for web-based communities and services aimed at collaboration and information sharing. Furthermore, Internet ...
Edgardo Avilés-López, J. Antonio Gar...
108
Voted
DEBU
2000
101views more  DEBU 2000»
15 years 19 days ago
Learning to Understand the Web
In a traditional information retrieval system, it is assumed that queries can be posed about any topic. In reality, a large fraction of web queries are posed about a relatively sm...
William W. Cohen, Andrew McCallum, Dallan Quass
SEMWEB
2007
Springer
15 years 7 months ago
Discovering Simple Mappings Between Relational Database Schemas and Ontologies
Ontologies proliferate with the growth of the Semantic Web. However, most of data on the Web are still stored in relational databases. Therefore, it is important to establish inter...
Wei Hu, Yuzhong Qu
95
Voted
MOBIQUITOUS
2005
IEEE
15 years 6 months ago
Proxy-based Hand-off of Web Sessions for User Mobility
The proliferation of different kinds of mobile devices, ranging from personal wireless devices, such as PDAs and smart phones, to small notebooks, is enabling ubiquitous personal ...
Gerardo Canfora, Giuseppe Di Santo, Gabriele Ventu...