Sciweavers

1056 search results - page 108 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
WWW
2010
ACM
14 years 5 months ago
Scalable discovery of contradictions on the web
Our study addresses the problem of large-scale contradiction detection and management, from data extracted from the Web. We describe the first systematic solution to the problem,...
Mikalai Tsytsarau, Themis Palpanas, Kerstin Deneck...
ICDE
2010
IEEE
255views Database» more  ICDE 2010»
14 years 5 months ago
On supporting effective web extraction
— Commercial tuple extraction systems have enjoyed some success to extract tuples by regarding HTML pages as tree structures and exploiting XPath queries to find attributes of t...
Wook-Shin Han, Wooseong Kwak, Hwanjo Yu
SAC
2010
ACM
14 years 5 months ago
Botzilla: detecting the "phoning home" of malicious software
Hosts infected with malicious software, so called malware, are ubiquitous in today’s computer networks. The means whereby malware can infiltrate a network are manifold and rang...
Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorst...
EDBT
2010
ACM
180views Database» more  EDBT 2010»
14 years 5 months ago
BSkyTree: scalable skyline computation using a balanced pivot selection
Skyline queries have gained a lot of attention for multicriteria analysis in large-scale datasets. While existing skyline algorithms have focused mostly on exploiting data dominan...
Jongwuk Lee, Seung-won Hwang
SAC
2009
ACM
14 years 5 months ago
Open source vs. closed source software: towards measuring security
The increasing availability and deployment of open source software in personal and commercial environments makes open source software highly appealing for hackers, and others who ...
Guido Schryen, Rouven Kadura