Sciweavers

2084 search results - page 184 / 417
» Knowledge Exploitation from the Web
Sort
View
94
Voted
WWW
2011
ACM
14 years 7 months ago
OXPath: little language, little memory, great value
Data about everything is readily available on the web—but often only accessible through elaborate user interactions. For automated decision support, extracting that data is esse...
Andrew Jon Sellers, Tim Furche, Georg Gottlob, Gio...
ISSA
2004
15 years 2 months ago
On Privacy And The Web
Chor et al [3] show that when accessing a single public database, a user is only guaranteed safety from an administrator inferring the user's real intentions (an inference at...
Wesley Brandi
158
Voted
CORR
2011
Springer
193views Education» more  CORR 2011»
14 years 4 months ago
How Unique and Traceable are Usernames?
Abstract. Usernames are ubiquitously used for identification and authentication purposes on web services and the Internet at large, ranging from the local-part of email addresses ...
Daniele Perito, Claude Castelluccia, Mohamed Ali K...
95
Voted
IV
2003
IEEE
113views Visualization» more  IV 2003»
15 years 6 months ago
Visualisation of Ontological Inferences for User Control of Personal Web Agents
This paper describes a visualisation tool, VlUM, designed to support users in scrutinising models of their interests, preferences and knowledge. We also describe MECUREO, a tool f...
Trent Apted, Judy Kay, Andrew Lum, James Uther
AUSDM
2006
Springer
97views Data Mining» more  AUSDM 2006»
15 years 4 months ago
Tracking the Changes of Dynamic Web Pages in the Existence of URL Rewriting
Crawlers in a knowledge management system need to collect and archive documents from websites, and also track the change status of these documents. However, the existence of URL r...
Ping-Jer Yeh, Jie-Tsung Li, Shyan-Ming Yuan