Sciweavers

415 search results - page 56 / 83
» Identifying web spam with user behavior analysis
Sort
View
WWW
2009
ACM
14 years 9 months ago
Automated construction of web accessibility models from transaction click-streams
Screen readers, the dominant assistive technology used by visually impaired people to access the Web, function by speaking out the content of the screen serially. Using screen rea...
Jalal Mahmud, Yevgen Borodin, I. V. Ramakrishnan, ...
ACL
2006
13 years 10 months ago
A Collaborative Framework for Collecting Thai Unknown Words from the Web
We propose a collaborative framework for collecting Thai unknown words found on Web pages over the Internet. Our main goal is to design and construct a Webbased system which allow...
Choochart Haruechaiyasak, Chatchawal Sangkeettraka...
EDBT
2002
ACM
159views Database» more  EDBT 2002»
14 years 8 months ago
Cut-and-Pick Transactions for Proxy Log Mining
Web logs collected by proxy servers, referred to as proxy logs or proxy traces, contain information about Web document accesses by many users against many Web sites. This "man...
Wenwu Lou, Guimei Liu, Hongjun Lu, Qiang Yang
WWW
2004
ACM
14 years 9 months ago
Anti-aliasing on the web
It is increasingly common for users to interact with the web using a number of different aliases. This trend is a doubleedged sword. On one hand, it is a fundamental building bloc...
Jasmine Novak, Prabhakar Raghavan, Andrew Tomkins
AH
2006
Springer
14 years 2 months ago
Much to Know About History
Users often revisit pages while browsing the Web, yet little is known on the character of these revisits. In this paper we present an analysis of various revisit activities, based ...
Eelco Herder, Harald Weinreich, Hartmut Obendorf, ...