Sciweavers

2084 search results - page 389 / 417
» Knowledge Exploitation from the Web
Sort
View
ICDE
2008
IEEE
152views Database» more  ICDE 2008»
14 years 10 months ago
Ontology-Aware Search on XML-based Electronic Medical Records
As the use of Electronic Medical Records (EMRs) becomes more widespread, so does the need for effective information discovery on them. Recently proposed EMR standards are XML-based...
Anand Ranganathan, Fernando Farfán, Redmond...
WSDM
2010
ACM
261views Data Mining» more  WSDM 2010»
14 years 6 months ago
Learning Similarity Metrics for Event Identification in Social Media
Social media sites (e.g., Flickr, YouTube, and Facebook) are a popular distribution outlet for users looking to share their experiences and interests on the Web. These sites host ...
Hila Becker, Mor Naaman, Luis Gravano
SP
2009
IEEE
106views Security Privacy» more  SP 2009»
14 years 3 months ago
Pretty-Bad-Proxy: An Overlooked Adversary in Browsers' HTTPS Deployments
– HTTPS is designed to provide secure web communications over insecure networks. The protocol itself has been rigorously designed and evaluated by assuming the network as an adve...
Shuo Chen, Ziqing Mao, Yi-Min Wang, Ming Zhang
CIKM
2009
Springer
14 years 3 months ago
A general markov framework for page importance computation
We propose a General Markov Framework for computing page importance. Under the framework, a Markov Skeleton Process is used to model the random walk conducted by the web surfer on...
Bin Gao, Tie-Yan Liu, Zhiming Ma, Taifeng Wang, Ha...
ICC
2007
IEEE
148views Communications» more  ICC 2007»
14 years 3 months ago
HSDPA Performance in Live Networks
—The first HSDPA (High-Speed Downlink Packet Access) networks have been recently deployed for operational use. We evaluate and compare live HSDPA operational network performance ...
Marko Jurvansuu, Jarmo Prokkola, Mikko Hanski, Pek...