Sciweavers

2084 search results - page 282 / 417
» Knowledge Exploitation from the Web
Sort
View
DMIN
2008
158views Data Mining» more  DMIN 2008»
14 years 6 days ago
Mining User Movement Behavior Patterns in a Mobile Service Environment
Abstract - The rapid advances of wireless and web technologies enable the mobile users to request various kinds of services via mobile devices at anytime and anywhere. To provide t...
Yen-Ssu Chou, Tzung-Shi Chen
ICTAI
2010
IEEE
13 years 8 months ago
The BioASP Library: ASP Solutions for Systems Biology
Abstract--Today's molecular biology is confronted with enormous amounts of data, generated by new high-throughput technologies, along with an increasing number of biological m...
Martin Gebser, Arne König, Torsten Schaub, Sv...
WWW
2007
ACM
14 years 11 months ago
Efficient search in large textual collections with redundancy
Current web search engines focus on searching only the most recent snapshot of the web. In some cases, however, it would be desirable to search over collections that include many ...
Jiangong Zhang, Torsten Suel
JCDL
2004
ACM
114views Education» more  JCDL 2004»
14 years 4 months ago
Translating unknown cross-lingual queries in digital libraries using a web-based approach
Users’ cross-lingual queries to a digital library system might be short and not included in a common translation dictionary (unknown terms). In this paper, we investigate the fe...
Jenq-Haur Wang, Jei-Wen Teng, Pu-Jen Cheng, Wen-Hs...
USS
2008
14 years 1 months ago
Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking
Cross-site scripting (XSS) and SQL injection errors are two prominent examples of taint-based vulnerabilities that have been responsible for a large number of security breaches in...
Michael C. Martin, Monica S. Lam