Sciweavers

2084 search results - page 269 / 417
» Knowledge Exploitation from the Web
Sort
View
JODI
2002
79views more  JODI 2002»
13 years 10 months ago
Linking in Context
This paper explores the idea of dynamically adding multidestination links to Web pages, based on the context of the pages and users, as a way of assisting Web users in their infor...
Samhaa R. El-Beltagy, Wendy Hall, David De Roure, ...
CIKM
2010
Springer
13 years 9 months ago
Challenges in personalized authority flow based ranking of social media
As the social interaction of Internet users increases, so does the need to effectively rank social media. We study the challenges of personalized ranking of blog posts. Web search...
Hassan Sayyadi, John Edmonds, Vagelis Hristidis, L...
USS
2010
13 years 8 months ago
Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context
Reverse Turing tests, or CAPTCHAs, have become an ubiquitous defense used to protect open Web resources from being exploited at scale. An effective CAPTCHA resists existing mechan...
Marti Motoyama, Kirill Levchenko, Chris Kanich, Da...
CCS
2011
ACM
12 years 10 months ago
How to break XML encryption
XML Encryption was standardized by W3C in 2002, and is implemented in XML frameworks of major commercial and open-source organizations like Apache, redhat, IBM, and Microsoft. It ...
Tibor Jager, Somorovsky Juraj
AINA
2009
IEEE
14 years 5 months ago
A SOA-Based Collaborative Environment for Clinical Trials on Neglected Diseases
—The WebInVivo project aims at providing automated support for clinical research on neglected diseases. It includes mechanisms for (a) sharing and reusing clinical trial assets, ...
Maria Beatriz Felgar de Toledo, Olga Nabuco, Marco...