Sciweavers

1276 search results - page 153 / 256
» Vetting the links of the web
Sort
View
PKC
1999
Springer
91views Cryptology» more  PKC 1999»
15 years 2 months ago
A Secure Pay-per View Scheme for Web-Based Video Service
With the development of high speed computer networks, video service on the Web has huge market potential in that the video service can be provided to subscribers with greater time ...
Jianying Zhou, Kwok-Yan Lam
93
Voted
BPM
2007
Springer
124views Business» more  BPM 2007»
15 years 2 months ago
SAP WebFlow Made Configurable: Unifying Workflow Templates into a Configurable Model
To facilitate the implementation of workflows, enterprise and workflow system vendors typically provide sets of workflow templates for their software. Each of these templates depic...
Florian Gottschalk, Wil M. P. van der Aalst, Moniq...
86
Voted
LREC
2010
201views Education» more  LREC 2010»
14 years 11 months ago
Cultural Heritage: Knowledge Extraction from Web Documents
This article presents the use of NLP techniques (text mining, text analysis) to develop specific tools that allow to create linguistic resources related to the cultural heritage d...
Eva Sassolini, Alessandra Cinini
WWW
2007
ACM
15 years 11 months ago
Spam double-funnel: connecting web spammers with advertisers
Spammers use questionable search engine optimization (SEO) techniques to promote their spam links into top search results. In this paper, we focus on one prevalent type of spam ? ...
Yi-Min Wang, Ming Ma, Yuan Niu, Hao Chen
WWW
2005
ACM
15 years 11 months ago
Wireless SOAP: optimizations for mobile wireless web services
We propose a set of optimization techniques, collectively called Wireless SOAP (WSOAP), to compress SOAP messages transmitted across a wireless link. The Name Space Equivalency te...
Naresh Apte, Keith Deutsch, Ravi Jain