Sciweavers

2718 search results - page 514 / 544
» Querying the deep web
Sort
View
CIKM
2009
Springer
15 years 4 months ago
Beyond hyperlinks: organizing information footprints in search logs to support effective browsing
While current search engines serve known-item search such as homepage finding very well, they generally cannot support exploratory search effectively. In exploratory search, user...
Xuanhui Wang, Bin Tan, Azadeh Shakery, ChengXiang ...
ASWEC
2006
IEEE
15 years 3 months ago
Preventing SQL Injection Attacks in Stored Procedures
An SQL injection attack targets interactive web applications that employ database services. These applications accept user inputs and use them to form SQL statements at runtime. D...
Ke Wei, Muthusrinivasan Muthuprasanna, Suraj Kotha...
MSR
2006
ACM
15 years 3 months ago
MAPO: mining API usages from open source repositories
To improve software productivity, when constructing new software systems, developers often reuse existing class libraries or frameworks by invoking their APIs. Those APIs, however...
Tao Xie, Jian Pei
SIGIR
2006
ACM
15 years 3 months ago
Semantic term matching in axiomatic approaches to information retrieval
A common limitation of many retrieval models, including the recently proposed axiomatic approaches, is that retrieval scores are solely based on exact (i.e., syntactic) matching o...
Hui Fang, ChengXiang Zhai
RULEML
2005
Springer
15 years 3 months ago
Extending the SweetDeal Approach for e-Procurement Using SweetRules and RuleML
We show the first detailed realistic e-business application scenario that uses and exploits capabilities of the SweetRules V2.1 toolset for e-contracting using the SweetDeal approa...
Sumit Bhansali, Benjamin N. Grosof