Sciweavers

8479 search results - page 1599 / 1696
» Data Extraction from Web Data Sources
Sort
View
152
Voted
SIGIR
2009
ACM
15 years 9 months ago
Personalized tag recommendation using graph-based ranking on multi-type interrelated objects
Social tagging is becoming increasingly popular in many Web 2.0 applications where users can annotate resources (e.g. Web pages) with arbitrary keywords (i.e. tags). A tag recomme...
Ziyu Guan, Jiajun Bu, Qiaozhu Mei, Chun Chen, Can ...
139
Voted
CCS
2007
ACM
15 years 8 months ago
How much anonymity does network latency leak?
Low-latency anonymity systems such as Tor, AN.ON, Crowds, and Anonymizer.com aim to provide anonymous connections that are both untraceable by “local” adversaries who control ...
Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Ti...
146
Voted
GRID
2007
Springer
15 years 8 months ago
CIC portal: a collaborative and scalable integration platform for high availability grid operations
— EGEE, along with its sister project LCG, manages the world’s largest Grid production infrastructure which is spreading nowadays over 260 sites in more than 40 countries. Just...
Osman Aidel, Alessandro Cavalli, Hélè...
116
Voted
UIST
2005
ACM
15 years 8 months ago
A1: end-user programming for web-based system administration
System administrators work with many different tools to manage and fix complex hardware and software infrastructure in a rapidly paced work environment. Through extensive field st...
Eser Kandogan, Eben M. Haber, Rob Barrett, Allen C...
142
Voted
ESORICS
2009
Springer
15 years 6 months ago
An Effective Method for Combating Malicious Scripts Clickbots
Abstract. Online advertising has been suffering serious click fraud problem. Fraudulent publishers can generate false clicks using malicious scripts embedded in their web pages. Ev...
Yanlin Peng, Linfeng Zhang, J. Morris Chang, Yong ...
« Prev « First page 1599 / 1696 Last » Next »