Sciweavers

1943 search results - page 293 / 389
» Web application security engineering
Sort
View
133
Voted
SIGIR
2010
ACM
14 years 10 months ago
Efficient partial-duplicate detection based on sequence matching
With the ever-increasing growth of the Internet, numerous copies of documents become serious problem for search engine, opinion mining and many other web applications. Since parti...
Qi Zhang, Yue Zhang, Haomin Yu, Xuanjing Huang
ICWE
2011
Springer
14 years 7 months ago
Formal Modeling of RESTful Systems Using Finite-State Machines
Representational State Transfer (REST), as an architectural style for distributed hypermedia systems, enables scalable operation of the World Wide Web (WWW) and is the foundation f...
Ivan Zuzak, Ivan Budiselic, Goran Delac
138
Voted
WWW
2009
ACM
16 years 4 months ago
Using graphics processors for high performance IR query processing
Web search engines are facing formidable performance challenges as they need to process thousands of queries per second over billions of documents. To deal with this heavy workloa...
Shuai Ding, Jinru He, Hao Yan, Torsten Suel
IEEECIT
2009
IEEE
15 years 10 months ago
Applying Collective Intelligence for Search Improvement on Thai Herbal Information
— Knowledge about herbal medicine can be contributed from experts in several cultures. With the conventional techniques, it is hard to find the way which the experts can build a ...
Verayuth Lertnattee, Sinthop Chomya, Thanaruk Thee...
WER
2007
Springer
15 years 10 months ago
Evolving Use Case Maps as a Scenario and Workflow Description Language
Since 1996, the core Use Case Map (UCM) notation has remained remarkably stable. As the structure and intent of workflow and scenario languages are very similar, UCMs have been ap...
Gunter Mussbacher