Sciweavers

2084 search results - page 254 / 417
» Knowledge Exploitation from the Web
Sort
View
91
Voted
ACSAC
2001
IEEE
15 years 4 months ago
Practical Automated Filter Generation to Explicitly Enforce Implicit Input Assumptions
Vulnerabilities in distributed applications are being uncovered and exploited faster than software engineers can patch the security holes. All too often these weaknesses result fr...
Valentin Razmov, Daniel R. Simon
97
Voted
SEMWEB
2009
Springer
15 years 7 months ago
Produce and Consume Linked Data with Drupal!
Abstract. Currently a large number of Web sites are driven by Content Management Systems (CMS) which manage textual and multimedia content but also inherently - carry valuable info...
Stephane Corlosquet, Renaud Delbru, Tim Clark, Axe...
86
Voted
WWW
2006
ACM
16 years 1 months ago
Searching with context
Contextual search refers to proactively capturing the information need of a user by automatically augmenting the user query with information extracted from the search context; for...
Reiner Kraft, Chi-Chao Chang, Farzin Maghoul, Ravi...
108
Voted
LREC
2010
237views Education» more  LREC 2010»
15 years 2 months ago
Entity Mention Detection using a Combination of Redundancy-Driven Classifiers
We present an experimental framework for Entity Mention Detection in which two different classifiers are combined to exploit Data Redundancy attained through the annotation of a l...
Silvana Marianela Bernaola Biggio, Manuela Speranz...
125
Voted
WWW
2006
ACM
16 years 1 months ago
Time-dependent semantic similarity measure of queries using historical click-through data
It has become a promising direction to measure similarity of Web search queries by mining the increasing amount of clickthrough data logged by Web search engines, which record the...
Qiankun Zhao, Steven C. H. Hoi, Tie-Yan Liu, Soura...