Sciweavers

363 search results - page 55 / 73
» Using Web Service Technologies to Create an Information Brok...
Sort
View
WWW
2005
ACM
14 years 9 months ago
Detection of phishing webpages based on visual similarity
An approach to detection of phishing webpages based on visual similarity is proposed, which can be utilized as a part of an enterprise solution for anti-phishing. A legitimate web...
Liu Wenyin, Guanglin Huang, Liu Xiaoyue, Zhang Min...
SIGUCCS
2000
ACM
14 years 1 months ago
Remedial Help Desk 101 at Florida State University
The User Services division of the Office of Technology Integration is the "safety net" for computer support at Florida State University (FSU). Areas of support include t...
Diana Orrick, Jeff Bauer, Ernest McDuffie
SIGIR
2009
ACM
14 years 3 months ago
Learning to rank for quantity consensus queries
Web search is increasingly exploiting named entities like persons, places, businesses, addresses and dates. Entity ranking is also of current interest at INEX and TREC. Numerical ...
Somnath Banerjee, Soumen Chakrabarti, Ganesh Ramak...
HT
2006
ACM
14 years 2 months ago
Evaluation of crawling policies for a web-repository crawler
We have developed a web-repository crawler that is used for reconstructing websites when backups are unavailable. Our crawler retrieves web resources from the Internet Archive, Go...
Frank McCown, Michael L. Nelson
SIGIR
2005
ACM
14 years 2 months ago
Indexing emails and email threads for retrieval
Electronic mail poses a number of unusual challenges for the design of information retrieval systems and test collections, including informal expression, conversational structure,...
Yejun Wu, Douglas W. Oard