Sciweavers

2469 search results - page 136 / 494
» Self-Protection of Web Content
Sort
View
DSS
2007
111views more  DSS 2007»
14 years 10 months ago
Applying question answering technology to locating malevolent online content
We have empirically compared two classes of technologies capable of locating potentially malevolent online content: 1) popular keyword searching, currently widely used by law enfo...
Dmitri Roussinov, Jose Antonio Robles-Flores
JUCS
2010
116views more  JUCS 2010»
14 years 8 months ago
Content Recommendation in APOSDLE using the Associative Network
: One of the success factors of Work Integrated Learning (WIL) is to provide the appropriate content to the users, both suitable for the topics they are currently working on, and t...
Hermann Stern, Rene Kaiser, Philip Hofmair, Peter ...
PVLDB
2008
124views more  PVLDB 2008»
14 years 9 months ago
Google's Deep Web crawl
The Deep Web, i.e., content hidden behind HTML forms, has long been acknowledged as a significant gap in search engine coverage. Since it represents a large portion of the structu...
Jayant Madhavan, David Ko, Lucja Kot, Vignesh Gana...
EDBT
2006
ACM
112views Database» more  EDBT 2006»
15 years 10 months ago
Indexing Shared Content in Information Retrieval Systems
Abstract. Modern document collections often contain groups of documents with overlapping or shared content. However, most information retrieval systems process each document separa...
Andrei Z. Broder, Nadav Eiron, Marcus Fontoura, Mi...
NDSS
2002
IEEE
15 years 3 months ago
Detecting Steganographic Content on the Internet
Steganography is used to hide the occurrence of communication. Recent suggestions in US newspapers indicate that terrorists use steganography to communicate in secret with their a...
Niels Provos, Peter Honeyman