Sciweavers

2084 search results - page 27 / 417
» Knowledge Exploitation from the Web
Sort
View
ACSAC
1998
IEEE
14 years 2 months ago
Protecting Web Servers from Security Holes in Server-Side Includes
This paper first investigates and analyzes security holes concerning the use of Server-Side Includes (SSI) in some of the most used Web server software packages. We show that, by ...
Jared Karro, Jie Wang
ICCBR
2007
Springer
14 years 4 months ago
Mining Large-Scale Knowledge Sources for Case Adaptation Knowledge
Abstract. Making case adaptation practical is a longstanding challenge for casebased reasoning. One of the impediments to widespread use of automated case adaptation is the adaptat...
David B. Leake, Jay H. Powell
CCS
2011
ACM
12 years 10 months ago
Fashion crimes: trending-term exploitation on the web
Online service providers are engaged in constant conflict with miscreants who try to siphon a portion of legitimate traffic to make illicit profits. We study the abuse of “tr...
Tyler Moore, Nektarios Leontiadis, Nicolas Christi...
WIDM
1998
ACM
14 years 2 months ago
WebML: Querying the World-Wide Web for Resources and Knowledge
There is a massive increase of information available on electronic networks. This profusion of resources on the WorldWide Web gave rise to considerable interest in the research co...
Osmar R. Zaïane, Jiawei Han
KES
2007
Springer
14 years 4 months ago
A Hierarchical Clustering Method for Semantic Knowledge Bases
Abstract. This work presents a clustering method which can be applied to relational knowledge bases. Namely, it can be used to discover interesting groupings of semantically annota...
Nicola Fanizzi, Claudia d'Amato