Sciweavers

WWW
2009
ACM
15 years 6 days ago
Link based small sample learning for web spam detection
Robust statistical learning based web spam detection system often requires large amounts of labeled training data. However, labeled samples are more difficult, expensive and time ...
Guanggang Geng, Qiudan Li, Xinchang Zhang
WWW
2009
ACM
15 years 6 days ago
Combining global optimization with local selection for efficient QoS-aware service composition
The run-time binding of web services has been recently put forward in order to support rapid and dynamic web service compositions. With the growing number of alternative web servi...
Mohammad Alrifai, Thomas Risse
WWW
2009
ACM
15 years 6 days ago
A flight meta-search engine with metamorph
We demonstrate a flight meta-search engine that is based on the Metamorph framework. Metamorph provides mechanisms to model web forms together with the interactions which are need...
Bernhard Krüpl, Wolfgang Holzinger, Yansen Da...
WWW
2009
ACM
15 years 6 days ago
Why are moved web pages difficult to find?: the WISH approach
Atsuyuki Morishima, Akiyoshi Nakamizo, Toshinari I...
WWW
2009
ACM
15 years 6 days ago
Advertising keyword generation using active learning
This paper proposes an efficient relevance feedback based interactive model for keyword generation in sponsored search advertising. We formulate the ranking of relevant terms as a...
Hao Wu, Guang Qiu, Xiaofei He, Yuan Shi, Mingcheng...
WWW
2009
ACM
15 years 6 days ago
Automatic web service composition with abstraction and refinement
ion and Refinement Hyunyoung Kil Wonhong Nam Dongwon Lee The Pennsylvania State University, University Park, PA 16802, USA {hykil, wnam, dongwon}@psu.edu The behavioral descriptio...
Hyunyoung Kil, Wonhong Nam, Dongwon Lee
WWW
2009
ACM
15 years 6 days ago
All your contacts are belong to us: automated identity theft attacks on social networks
Social networking sites have been increasingly gaining popularity. Well-known sites such as Facebook have been reporting growth rates as high as 3% per week [5]. Many social netwo...
Leyla Bilge, Thorsten Strufe, Davide Balzarotti, E...
WWW
2009
ACM
15 years 6 days ago
An effective semantic search technique using ontology
In this paper, we present a semantic search technique considering the type of desired Web resources and the semantic relationships between the resources and the query keywords in ...
Jihyun Lee, Jun-Ki Min, Chin-Wan Chung
WWW
2009
ACM
15 years 6 days ago
RuralCafe: web search in the rural developing world
The majority of people in rural developing regions do not have access to the World Wide Web. Traditional network connectivity technologies have proven to be prohibitively expensiv...
Jay Chen, Lakshminarayanan Subramanian, Jinyang Li
WWW
2009
ACM
15 years 6 days ago
An axiomatic approach for result diversification
Understanding user intent is key to designing an effective ranking system in a search engine. In the absence of any explicit knowledge of user intent, search engines want to diver...
Sreenivas Gollapudi, Aneesh Sharma