Sciweavers

216 search results - page 15 / 44
» www 2009
Sort
View
WWW
2009
ACM
15 years 10 months ago
A hybrid phish detection approach by identity discovery and keywords retrieval
Phishing is a significant security threat to the Internet, which causes tremendous economic loss every year. In this paper, we proposed a novel hybrid phish detection method based...
Guang Xiang, Jason I. Hong
WWW
2009
ACM
15 years 10 months ago
Crosslanguage blog mining and trend visualisation
People use weblogs to express thoughts, present ideas and share knowledge, therefore weblogs are extraordinarily valuable resources, amongs others, for trend analysis. Trends are ...
Andreas Juffinger, Elisabeth Lex
WWW
2009
ACM
15 years 10 months ago
Why is the web loosely coupled?: a multi-faceted metric for service design
Loose coupling is often quoted as a desirable property of systems architectures. One of the main goals of building systems using Web technologies is to achieve loose coupling. How...
Cesare Pautasso, Erik Wilde
WWW
2009
ACM
15 years 10 months ago
The effects of source credibility ratings in a cultural heritage information aggregator
State of the art web search applications allow the user to aggregate information from many sources. Because of this, users are confronted with having to assess the reliability of ...
Alia Amin, Junte Zhang, Henriette S. M. Cramer, Ly...
WWW
2009
ACM
15 years 10 months ago
A method of analyzing credibility based on LOD control of digital maps
Digital maps are widely used and appear on all types of platforms for integrating content. Users can change display region and scale by panning, zooming in, and zooming out on a d...
Daisuke Kitayama, Ryong Lee, Kazutoshi Sumiya