Sciweavers

140 search results - page 13 / 28
» TAJ: effective taint analysis of web applications
Sort
View
WWW
2004
ACM
14 years 7 months ago
Sic transit gloria telae: towards an understanding of the web's decay
The rapid growth of the web has been noted and tracked extensively. Recent studies have however documented the dual phenomenon: web pages have small half lives, and thus the web e...
Ziv Bar-Yossef, Andrei Z. Broder, Ravi Kumar, Andr...
ICDM
2009
IEEE
98views Data Mining» more  ICDM 2009»
14 years 1 months ago
Topic Distributions over Links on Web
—It is well known that Web users create links with different intentions. However, a key question, which is not well studied, is how to categorize the links and how to quantify th...
Jie Tang, Jing Zhang, Jeffrey Xu Yu, Zi Yang, Keke...
COMPSAC
2010
IEEE
13 years 4 months ago
Representing and Reasoning about Web Access Control Policies
The advent of emerging technologies such as Web services, service-oriented architecture, and cloud computing has enabled us to perform business services more efficiently and effect...
Gail-Joon Ahn, Hongxin Hu, Joohyung Lee, Yunsong M...
ICDE
2002
IEEE
146views Database» more  ICDE 2002»
14 years 8 months ago
Streaming-Data Algorithms for High-Quality Clustering
Streaming data analysis has recently attracted attention in numerous applications including telephone records, web documents and clickstreams. For such analysis, single-pass algor...
Liadan O'Callaghan, Adam Meyerson, Rajeev Motwani,...
KDD
2001
ACM
231views Data Mining» more  KDD 2001»
14 years 7 months ago
A Framework for Efficient and Anonymous Web Usage Mining Based on Client-Side Tracking
Web Usage Mining (WUM), a natural application of data mining techniques to the data collected from user interactions with the web, has greatly concerned both academia and industry ...
Cyrus Shahabi, Farnoush Banaei Kashani