Sciweavers

2084 search results - page 169 / 417
» Knowledge Exploitation from the Web
Sort
View
119
Voted
WWW
2010
ACM
15 years 9 months ago
Reining in the web with content security policy
The last three years have seen a dramatic increase in both awareness and exploitation of Web Application Vulnerabilities. 2008 and 2009 saw dozens of high-profile attacks against...
Sid Stamm, Brandon Sterne, Gervase Markham
154
Voted
HCI
2009
15 years 1 months ago
UbiSOA Dashboard: Integrating the Physical and Digital Domains through Mashups
Abstract. The current Web 2.0 stage of the Internet provided the basis for web-based communities and services aimed at collaboration and information sharing. Furthermore, Internet ...
Edgardo Avilés-López, J. Antonio Gar...
137
Voted
DEBU
2000
101views more  DEBU 2000»
15 years 3 months ago
Learning to Understand the Web
In a traditional information retrieval system, it is assumed that queries can be posed about any topic. In reality, a large fraction of web queries are posed about a relatively sm...
William W. Cohen, Andrew McCallum, Dallan Quass
132
Voted
SEMWEB
2007
Springer
15 years 9 months ago
Discovering Simple Mappings Between Relational Database Schemas and Ontologies
Ontologies proliferate with the growth of the Semantic Web. However, most of data on the Web are still stored in relational databases. Therefore, it is important to establish inter...
Wei Hu, Yuzhong Qu
116
Voted
MOBIQUITOUS
2005
IEEE
15 years 9 months ago
Proxy-based Hand-off of Web Sessions for User Mobility
The proliferation of different kinds of mobile devices, ranging from personal wireless devices, such as PDAs and smart phones, to small notebooks, is enabling ubiquitous personal ...
Gerardo Canfora, Giuseppe Di Santo, Gabriele Ventu...