Sciweavers

1348 search results - page 134 / 270
» From Informatics to Bioinformatics
Sort
View
ICSE
2008
IEEE-ACM
14 years 11 months ago
Static detection of cross-site scripting vulnerabilities
Web applications support many of our daily activities, but they often have security problems, and their accessibility makes them easy to exploit. In cross-site scripting (XSS), an...
Gary Wassermann, Zhendong Su
WWW
2009
ACM
14 years 10 months ago
Matchbox: large scale online bayesian recommendations
We present a probabilistic model for generating personalised recommendations of items to users of a web service. The Matchbox system makes use of content information in the form o...
David H. Stern, Ralf Herbrich, Thore Graepel
WSDM
2010
ACM
266views Data Mining» more  WSDM 2010»
14 years 7 months ago
Gathering and Ranking Photos of Named Entities with High Precision, High Recall, and Diversity
Knowledge-sharing communities like Wikipedia and automated extraction methods like those of DBpedia enable the construction of large machine-processible knowledge bases with relat...
Bilyana Taneva, Mouna Kacimi, Gerhard Weikum
CHI
2010
ACM
14 years 5 months ago
Bringing the field into focus: user-centered design of a patient expertise locator
Managing personal aspects of health is challenging for many patients, particularly those facing a serious condition such as cancer. Finding experienced patients, who can share the...
Andrea Civan-Hartzler, David W. McDonald, Chris Po...
DAMON
2009
Springer
14 years 4 months ago
Join processing for flash SSDs: remembering past lessons
Flash solid state drives (SSDs) provide an attractive alternative to traditional magnetic hard disk drives (HDDs) for DBMS applications. Naturally there is substantial interest in...
Jaeyoung Do, Jignesh M. Patel