Sciweavers

2084 search results - page 235 / 417
» Knowledge Exploitation from the Web
Sort
View
DEXA
2009
Springer
166views Database» more  DEXA 2009»
15 years 7 months ago
Tags4Tags: Using Tagging to Consolidate Tags
Tagging has become increasingly popular and useful across various social networks and applications. It allows users to classify and organize resources for improving the retrieval p...
Leyla Jael García-Castro, Martin Hepp, Alex...
125
Voted
ICSE
2008
IEEE-ACM
16 years 1 months ago
Static detection of cross-site scripting vulnerabilities
Web applications support many of our daily activities, but they often have security problems, and their accessibility makes them easy to exploit. In cross-site scripting (XSS), an...
Gary Wassermann, Zhendong Su
IJWBC
2010
126views more  IJWBC 2010»
14 years 11 months ago
Self-supportive virtual communities
Learning Communities in healthcare is one approach in supporting practitioners and nurses to improve skills and knowledge and consequently support patients more efficiently. Web b...
Iraklis Varlamis, Ioannis Apostolakis
KDD
2012
ACM
271views Data Mining» more  KDD 2012»
13 years 3 months ago
GigaTensor: scaling tensor analysis up by 100 times - algorithms and discoveries
Many data are modeled as tensors, or multi dimensional arrays. Examples include the predicates (subject, verb, object) in knowledge bases, hyperlinks and anchor texts in the Web g...
U. Kang, Evangelos E. Papalexakis, Abhay Harpale, ...
117
Voted
RIAO
2000
15 years 1 months ago
Assisting requirements engineering with semantic document analysis
Requirements engineering is the first stage in the software life-cycle and is concerned with discovering and managing a software system's services, constraints and goals. Req...
Paul Rayson, Roger Garside, Peter Sawyer