Sciweavers

WWW
2008
ACM
15 years 6 days ago
Forcehttps: protecting high-security web sites from network attacks
As wireless networks proliferate, web browsers operate in an increasingly hostile network environment. The HTTPS protocol has the potential to protect web users from network attac...
Collin Jackson, Adam Barth
WWW
2008
ACM
15 years 6 days ago
Representing a web page as sets of named entities of multiple types: a model and some preliminary applications
As opposed to representing a document as a "bag of words" in most information retrieval applications, we propose a model of representing a web page as sets of named enti...
Nan Di, Conglei Yao, Mengcheng Duan, Jonathan J. H...
WWW
2008
ACM
15 years 6 days ago
Web video topic discovery and tracking via bipartite graph reinforcement model
Automatic topic discovery and tracking on web-shared videos can greatly benefit both web service providers and end users. Most of current solutions of topic detection and tracking...
Lu Liu, Lifeng Sun, Yong Rui, Yao Shi, Shiqiang Ya...
WWW
2008
ACM
15 years 6 days ago
Algorithm for stochastic multiple-choice knapsack problem and application to keywords bidding
We model budget-constrained keyword bidding in sponsored search auctions as a stochastic multiple-choice knapsack problem (S-MCKP) and design an algorithm to solve S-MCKP and the ...
Yunhong Zhou, Victor Naroditskiy
WWW
2008
ACM
15 years 6 days ago
Organizing the unorganized - employing IT to empower the under-privileged
Various sectors in developing countries are typically dominated by the presence of a large number of small and microbusinesses that operate in an informal, unorganized manner. Man...
Arun Kumar, Nitendra Rajput, Sheetal K. Agarwal, D...
WWW
2008
ACM
15 years 6 days ago
Extending the compatibility notion for abstract WS-BPEL processes
WS-BPEL Processes Dieter K?nig IBM B?blingen Laboratory Sch?naicher Stra?e 220, 71032 B?blingen, Germany dieterkoenig@de.ibm.com Niels Lohmann Universit?t Rostock, Institut f?r Inf...
Dieter König, Niels Lohmann, Simon Moser, Chr...
WWW
2008
ACM
15 years 6 days ago
Optimal marketing strategies over social networks
We discuss the use of social networks in implementing viral marketing strategies. While influence maximization has been studied in this context (see Chapter 24 of [10]), we study ...
Jason D. Hartline, Vahab S. Mirrokni, Mukund Sunda...
WWW
2008
ACM
15 years 6 days ago
Model bloggers' interests based on forgetting mechanism
Blogs have been expanded at an incredible speed in recent years. Plentiful personal information makes blogs a popular way mining user profiles. In this paper, we propose a novel b...
Yuan Cheng, Guang Qiu, Jiajun Bu, Kangmiao Liu, Ye...
WWW
2008
ACM
15 years 6 days ago
Using the wisdom of the crowds for keyword generation
In the sponsored search model, search engines are paid by businesses that are interested in displaying ads for their site alongside the search results. Businesses bid for keywords...
Ariel Fuxman, Panayiotis Tsaparas, Kannan Achan, R...
WWW
2008
ACM
15 years 6 days ago
Wiki content templating
Wiki content templating enables reuse of content structures among wiki pages. In this paper we present a thorough study of this widespread feature, showing how its two state of th...
Angelo Di Iorio, Fabio Vitali, Stefano Zacchiroli