Sciweavers

2084 search results - page 267 / 417
» Knowledge Exploitation from the Web
Sort
View
CCS
2010
ACM
13 years 11 months ago
BLADE: an attack-agnostic approach for preventing drive-by malware infections
Web-based surreptitious malware infections (i.e., drive-by downloads) have become the primary method used to deliver malicious software onto computers across the Internet. To addr...
Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wen...
CIKM
2010
Springer
13 years 9 months ago
Using Wikipedia categories for compact representations of chemical documents
Today, Web pages are usually accessed using text search engines, whereas documents stored in the deep Web are accessed through domain-specific Web portals. These portals rely on e...
Benjamin Köhncke, Wolf-Tilo Balke
WWW
2009
ACM
14 years 5 months ago
News article extraction with template-independent wrapper
We consider the problem of template-independent news extraction. The state-of-the-art news extraction method is based on template-level wrapper induction, which has two serious li...
Junfeng Wang, Xiaofei He, Can Wang, Jian Pei, Jiaj...
WWW
2001
ACM
14 years 11 months ago
Mixed-initiative, multi-source information assistants
While the information resources on the Web are vast, the sources are often hard to find, painful to use, and difficult to integrate. We have developed the Heracles framework for b...
Craig A. Knoblock, Steven Minton, José Luis...
EDBT
2008
ACM
194views Database» more  EDBT 2008»
14 years 11 months ago
XCraft: boosting the performance of active XML materialization
An active XML (AXML) document contains tags representing calls to Web services. Therefore, retrieving its contents consists in materializing its data elements by invoking the embe...
Gabriela Ruberg, Marta Mattoso