Sciweavers

28888 search results - page 5653 / 5778
» Computability and complexity in analysis
Sort
View
WWW
2009
ACM
14 years 10 months ago
Characterizing insecure javascript practices on the web
JavaScript is an interpreted programming language most often used for enhancing webpage interactivity and functionality. It has powerful capabilities to interact with webpage docu...
Chuan Yue, Haining Wang
WWW
2009
ACM
14 years 10 months ago
How much can behavioral targeting help online advertising?
Behavioral Targeting (BT) is a technique used by online advertisers to increase the effectiveness of their campaigns, and is playing an increasingly important role in the online a...
Jun Yan, Ning Liu, Gang Wang, Wen Zhang, Yun Jiang...
WWW
2008
ACM
14 years 10 months ago
Graph theoretical framework for simultaneously integrating visual and textual features for efficient web image clustering
With the explosive growth of Web and the recent development in digital media technology, the number of images on the Web has grown tremendously. Consequently, Web image clustering...
Manjeet Rege, Ming Dong, Jing Hua
WWW
2008
ACM
14 years 10 months ago
Knowledge sharing and yahoo answers: everyone knows something
Yahoo Answers (YA) is a large and diverse question-answer forum, acting not only as a medium for sharing technical knowledge, but as a place where one can seek advice, gather opin...
Lada A. Adamic, Jun Zhang, Eytan Bakshy, Mark S. A...
WWW
2008
ACM
14 years 10 months ago
Detecting image spam using visual features and near duplicate detection
Email spam is a much studied topic, but even though current email spam detecting software has been gaining a competitive edge against text based email spam, new advances in spam g...
Bhaskar Mehta, Saurabh Nangia, Manish Gupta 0002, ...
« Prev « First page 5653 / 5778 Last » Next »