Sciweavers

1335 search results - page 65 / 267
» Querying the World Wide Web
Sort
View
CCS
2003
ACM
14 years 27 days ago
Anomaly detection of web-based attacks
Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are ...
Christopher Krügel, Giovanni Vigna
CHI
1999
ACM
14 years 6 hour ago
The Tangled Web we Wove: A Taskonomy of WWW Use
A prerequisite to the effective design of user interfaces is an understanding of the tasks for which that interface will actually be used. Surprisingly little task analysis has ap...
Michael D. Byrne, Bonnie E. John, Neil S. Wehrle, ...
WWW
2007
ACM
14 years 8 months ago
Investigating behavioral variability in web search
Understanding the extent to which people'ssearch behaviors differ in terms of the interaction flow and information targeted is important in designing interfaces to help World...
Ryen W. White, Steven M. Drucker
WWW
2006
ACM
14 years 8 months ago
Robust web content extraction
We present an empirical evaluation and comparison of two content extraction methods in HTML: absolute XPath expressions and relative XPath expressions. We argue that the relative ...
Marek Kowalkiewicz, Maria E. Orlowska, Tomasz Kacz...
WWW
2004
ACM
14 years 8 months ago
Small world peer networks in distributed web search
In ongoing research, a collaborative peer network application is being proposed to address the scalability limitations of centralized search engines. Here we introduce a local ada...
Ruj Akavipat, Le-Shin Wu, Filippo Menczer