Sciweavers

1725 search results - page 110 / 345
» Kokono Search: A Location Based Search Engine
Sort
View
FC
2009
Springer
106views Cryptology» more  FC 2009»
15 years 8 months ago
Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing
Attackers compromise web servers in order to host fraudulent content, such as malware and phishing websites. While the techniques used to compromise websites are widely discussed a...
Tyler Moore, Richard Clayton
WINE
2007
Springer
151views Economy» more  WINE 2007»
15 years 7 months ago
Computing Optimal Bundles for Sponsored Search
A context in sponsored search is additional information about a query, such as the user’s age, gender or location, that can change an advertisement’s relevance or an advertise...
Arpita Ghosh, Hamid Nazerzadeh, Mukund Sundararaja...
WWW
2009
ACM
16 years 2 months ago
Exploiting web search to generate synonyms for entities
Tasks recognizing named entities such as products, people names, or locations from documents have recently received significant attention in the literature. Many solutions to thes...
Surajit Chaudhuri, Venkatesh Ganti, Dong Xin
131
Voted
CSE
2009
IEEE
15 years 8 months ago
Private Buddy Search: Enabling Private Spatial Queries in Social Networks
—With the abundance of location-aware portable devices such as cellphones and PDAs, a new emerging application is to use this pervasive computing platform to learn about the wher...
Ali Khoshgozaran, Cyrus Shahabi
GLOBECOM
2006
IEEE
15 years 7 months ago
Dynamic Search Algorithm in Unstructured Peer-to-Peer Networks
Flooding and random walk (RW) are the two typical search algorithms in unstructured peer-to-peer networks. The flooding algorithm searches the network aggressively. It covers the m...
Po-Chiang Lin, Tsungnan Lin, Hsinping Wang