Sciweavers

WWW
2008
ACM
15 years 6 days ago
Performance of compressed inverted list caching in search engines
Due to the rapid growth in the size of the web, web search engines are facing enormous performance challenges. The larger engines in particular have to be able to process tens of ...
Jiangong Zhang, Xiaohui Long, Torsten Suel
WWW
2008
ACM
15 years 6 days ago
Protecting web services from remote exploit code: a static analysis approach
We propose STILL, a signature-free remote exploit binary code injection attack blocker to protect web servers and web applications. STILL is robust to almost all anti-signature, a...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
WWW
2008
ACM
15 years 6 days ago
Why web 2.0 is good for learning and for research: principles and prototypes
The term "Web 2.0" is used to describe applications that distinguish themselves from previous generations of software by a number of principles. Existing work shows that...
Carsten Ullrich, Kerstin Borau, Heng Luo, Xiaohong...
WWW
2008
ACM
15 years 6 days ago
Extracting XML schema from multiple implicit xml documents based on inductive reasoning
We propose a method of classifying XML documents and extracting XML schema from XML by inductive inference based on constraint logic programming. The goal of this work is to type ...
Masaya Eki, Tadachika Ozono, Toramatsu Shintani
WWW
2008
ACM
15 years 6 days ago
Towards robust trust establishment in web-based social networks with socialtrust
We propose the SocialTrust framework for tamper-resilient trust establishment in online social networks. Two of the salient features of SocialTrust are its dynamic revision of tru...
James Caverlee, Ling Liu, Steve Webb
WWW
2008
ACM
15 years 6 days ago
Asymmetrical query recommendation method based on bipartite network resource allocation
This paper presents a new query recommendation method that generates recommended query list by mining large-scale user logs. Starting from the user logs of click-through data, we ...
Zhiyuan Liu, Maosong Sun
WWW
2008
ACM
15 years 6 days ago
Secure or insure?: a game-theoretic analysis of information security games
Despite general awareness of the importance of keeping one's system secure, and widespread availability of consumer security technologies, actual investment in security remai...
Jens Grossklags, Nicolas Christin, John Chuang
WWW
2008
ACM
15 years 6 days ago
Automatic web image selection with a probabilistic latent topic model
We propose a new method to select relevant images to the given keywords from images gathered from the Web based on the Probabilistic Latent Semantic Analysis (PLSA) model which is...
Keiji Yanai
WWW
2008
ACM
15 years 6 days ago
Larger is better: seed selection in link-based anti-spamming algorithms
Seed selection is of significant importance for the biased PageRank algorithms such as TrustRank to combat link spamming. Previous work usually uses a small seed set, which has a ...
Qiancheng Jiang, Lei Zhang, Yizhen Zhu, Yan Zhang
WWW
2008
ACM
15 years 6 days ago
Pivotbrowser: a tag-space image searching prototype
We propose a novel iterative searching and refining prototype for tagged images. This prototype, named PivotBrowser, captures semantically similar tag sets in a structure called p...
Xiaoyan Li, Lidan Shou, Gang Chen, Xiaolong Zhang,...