Sciweavers

971 search results - page 42 / 195
» Common Sense from the Web
Sort
View
121
Voted
ADC
2009
Springer
134views Database» more  ADC 2009»
15 years 10 months ago
Mobile Information Exchange and Integration: From Query to Application Layer
Due to the popularity of mobile devices, more and more commercial applications have been developed on these devices. While commercial applications are mostly backed by relational ...
Van T. K. Tran, Raymond K. Wong, William K. Cheung...
123
Voted
ACSAC
2006
IEEE
15 years 10 months ago
Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine
Performing sensitive online transactions using computers found in cybercaf´es and public libraries is risky. The untrusted nature of these machines creates a target rich environm...
Ravi Chandra Jammalamadaka, Timothy W. van der Hor...
WS
2008
ACM
15 years 3 months ago
Using the Semantic Web for linking and reusing data across Web 2.0 communities
Large volumes of content (bookmarks, reviews, videos, etc.) are currently being created on the "Social Web", i.e. on Web 2.0 community sites, and this content is being a...
Uldis Bojars, John G. Breslin, Aidan Finn, Stefan ...
IDEAS
2000
IEEE
98views Database» more  IDEAS 2000»
15 years 8 months ago
Keeping Web Pages Up-to-Date with SQL: 1999
From the beginnings of the World Wide Web (WWW or Web) and the definition of the Common Gateway Interface (CGI), Web site administrators have used dynamically generated HTML page...
Henrik Loeser
AIRWEB
2007
Springer
15 years 10 months ago
Extracting Link Spam using Biased Random Walks from Spam Seed Sets
Link spam deliberately manipulates hyperlinks between web pages in order to unduly boost the search engine ranking of one or more target pages. Link based ranking algorithms such ...
Baoning Wu, Kumar Chellapilla