Sciweavers

1145 search results - page 136 / 229
» Open Information Extraction from the Web
Sort
View
CCS
2010
ACM
13 years 8 months ago
Symbolic security analysis of ruby-on-rails web applications
Many of today's web applications are built on frameworks that include sophisticated defenses against malicious adversaries. However, mistakes in the way developers deploy tho...
Avik Chaudhuri, Jeffrey S. Foster
WWW
2004
ACM
14 years 8 months ago
Automatically collecting, monitoring, and mining japanese weblogs
We present a system that tries to automatically collect and monitor Japanese blog collections that include not only ones made with blog softwares but also ones written as normal w...
Tomoyuki Nanno, Toshiaki Fujiki, Yasuhiro Suzuki, ...
SIGIR
2004
ACM
14 years 1 months ago
Block-level link analysis
Link Analysis has shown great potential in improving the performance of web search. PageRank and HITS are two of the most popular algorithms. Most of the existing link analysis al...
Deng Cai, Xiaofei He, Ji-Rong Wen, Wei-Ying Ma
ETS
2000
IEEE
220views Hardware» more  ETS 2000»
13 years 8 months ago
Law On-Line: A Collaborative, Web-Based Journey in the Law and Social Sciences
During Spring 1998, we embarked on pedagogical journey into unknown terrains -- the terrains of collaborative teaching and World Wide Web instruction. In this paper we present a j...
Cynthia L. Cates, Wayne V. McIntosh
AGENTS
2000
Springer
14 years 13 days ago
Dataflow plan execution for software agents
Recent research has made it possible to build information agents that retrieve and integrate information from the World Wide Web. Although there now exist solutions for modeling W...
Greg Barish, Dan DiPasquo, Craig A. Knoblock, Stev...