Sciweavers

2084 search results - page 197 / 417
» Knowledge Exploitation from the Web
Sort
View
108
Voted
COOPIS
1998
IEEE
15 years 4 months ago
Wrapper Generation for Web Accessible Data Sources
There is an increase in the number of data sources that can be queried across the WWW. Such sources typically support HTML forms-based interfaces and search engines query collecti...
Jean-Robert Gruser, Louiqa Raschid, Maria-Esther V...
NDSS
2006
IEEE
15 years 6 months ago
Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks
The custom, ad hoc nature of web applications makes learning-based anomaly detection systems a suitable approach to provide early warning about the exploitation of novel vulnerabi...
William K. Robertson, Giovanni Vigna, Christopher ...
BNCOD
2007
236views Database» more  BNCOD 2007»
15 years 2 months ago
Wordrank: A Method for Ranking Web Pages Based on Content Similarity
This paper presents WordRank, a new page ranking system, which exploits similarity between interconnected pages. WordRank introduces the model of the ‘biased surfer’ which is ...
Apostolos Kritikopoulos, Martha Sideri, Iraklis Va...
96
Voted
ENTCS
2006
112views more  ENTCS 2006»
15 years 22 days ago
Modeling Web Applications by the Multiple Levels of Integrity Policy
We propose a formal method to validate the reliability of a web application, by modeling interactions among its constituent objects. Modeling exploits the recent "Multiple Le...
Gianluca Amato, Massimo Coppola, Stefania Gnesi, F...
88
Voted
CI
2004
115views more  CI 2004»
15 years 17 days ago
A Conversational Approach to the Interaction With Web Services
The emerging standards for the specification of Web Services support the publication of the static interfaces of the operations they may execute. However, little attention is paid...
Liliana Ardissono, Giovanna Petrone, Marino Segnan