Sciweavers

3628 search results - page 706 / 726
» Approaching the Physical Limits of Computing
Sort
View
WWW
2008
ACM
14 years 9 months ago
Detecting image spam using visual features and near duplicate detection
Email spam is a much studied topic, but even though current email spam detecting software has been gaining a competitive edge against text based email spam, new advances in spam g...
Bhaskar Mehta, Saurabh Nangia, Manish Gupta 0002, ...
WWW
2007
ACM
14 years 9 months ago
Measuring semantic similarity between words using web search engines
Semantic similarity measures play important roles in information retrieval and Natural Language Processing. Previous work in semantic web-related applications such as community mi...
Danushka Bollegala, Yutaka Matsuo, Mitsuru Ishizuk...
WWW
2007
ACM
14 years 9 months ago
Detectives: detecting coalition hit inflation attacks in advertising networks streams
Click fraud is jeopardizing the industry of Internet advertising. Internet advertising is crucial for the thriving of the entire Internet, since it allows producers to advertise t...
Ahmed Metwally, Divyakant Agrawal, Amr El Abbadi
WWW
2006
ACM
14 years 9 months ago
Relaxed: on the way towards true validation of compound documents
To maintain interoperability in the Web environment it is necessary to comply with Web standards. Current specifications of HTML and XHTML languages define conformance conditions ...
Jirka Kosek, Petr Nálevka
KDD
2009
ACM
156views Data Mining» more  KDD 2009»
14 years 9 months ago
Turning down the noise in the blogosphere
In recent years, the blogosphere has experienced a substantial increase in the number of posts published daily, forcing users to cope with information overload. The task of guidin...
Khalid El-Arini, Gaurav Veda, Dafna Shahaf, Carlos...