Sciweavers

543 search results - page 23 / 109
» Exploiting content redundancy for web information extraction
Sort
View
DASFAA
2007
IEEE
143views Database» more  DASFAA 2007»
14 years 3 months ago
Using Redundant Bit Vectors for Near-Duplicate Image Detection
Images are amongst the most widely proliferated form of digital information due to affordable imaging technologies and the Web. In such an environment, the use of digital watermar...
Jun Jie Foo, Ranjan Sinha
CIKM
2008
Springer
13 years 10 months ago
Using structured text for large-scale attribute extraction
We propose a weakly-supervised approach for extracting class attributes from structured text available within Web documents. The overall precision of the extracted attributes is a...
Sujith Ravi, Marius Pasca
WWW
2010
ACM
14 years 2 months ago
Reining in the web with content security policy
The last three years have seen a dramatic increase in both awareness and exploitation of Web Application Vulnerabilities. 2008 and 2009 saw dozens of high-profile attacks against...
Sid Stamm, Brandon Sterne, Gervase Markham
JMLR
2010
185views more  JMLR 2010»
13 years 3 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto
PAKDD
2010
ACM
167views Data Mining» more  PAKDD 2010»
14 years 5 days ago
Resource-Bounded Information Extraction: Acquiring Missing Feature Values on Demand
We present a general framework for the task of extracting specific information “on demand” from a large corpus such as the Web under resource-constraints. Given a database wit...
Pallika Kanani, Andrew McCallum, Shaohan Hu