Sciweavers

WWW
2005
ACM
15 years 3 days ago
Migrating web application sessions in mobile computing
The capability to change user agent while working is starting to appear in state of the art mobile computing due to the proliferation of different kinds of devices, ranging from p...
Gerardo Canfora, Giuseppe Di Santo, Gabriele Ventu...
WWW
2005
ACM
15 years 3 days ago
TotalRank: ranking without damping
PageRank is defined as the stationary state of a Markov chain obtained by perturbing the transition matrix of a web graph with a damping factor that spreads part of the rank. The...
Paolo Boldi
WWW
2006
ACM
15 years 3 days ago
A content and structure website mining model
We present a novel model for validating and improving the content and structure organization of a website. This model studies the website as a graph and evaluates its interconnect...
Barbara Poblete, Ricardo A. Baeza-Yates
WWW
2007
ACM
15 years 3 days ago
Towards automating regression test selection for web services
This paper reports a safe regression test selection (RTS) approach that is designed for verifying Web services in an end-to-end manner. The Safe RTS technique has been integrated ...
Michael Ruth, Shengru Tu
WWW
2007
ACM
15 years 3 days ago
Development of a semantic web based mobile local search system
This paper describes the development of a semantic web and ontology based local search system that can be used in wireless mobile communication services. Categories and Subject De...
Joo Seong Jeon, Gi Jeong Lee
WWW
2007
ACM
15 years 3 days ago
Generation, documentation and presentation of mathematical equations and symbolic scientific expressions using pure HTML and CSS
This paper describes a comprehensive method for presenting mathematical equations and expressions using only pure HTML and CSS. This method renders the equations portable and edit...
Kehinde Alabi
WWW
2007
ACM
15 years 3 days ago
On automated composition for web services
We develop a framework to compose services through discovery and orchestration for a given goal service. Tightening techniques are used in composition algorithms to achieve "...
Zhongnan Shen, Jianwen Su
WWW
2008
ACM
15 years 3 days ago
Representing a web page as sets of named entities of multiple types: a model and some preliminary applications
As opposed to representing a document as a "bag of words" in most information retrieval applications, we propose a model of representing a web page as sets of named enti...
Nan Di, Conglei Yao, Mengcheng Duan, Jonathan J. H...
WWW
2008
ACM
15 years 3 days ago
Mining tag clouds and emoticons behind community feedback
In this paper we describe our mining system which automatically mines tags from feedback text in an eCommerce scenario. It renders these tags in a visually appealing manner. Furth...
Kavita A. Ganesan, Neelakantan Sundaresan, Harshal...
WWW
2008
ACM
15 years 3 days ago
Protecting web services from remote exploit code: a static analysis approach
We propose STILL, a signature-free remote exploit binary code injection attack blocker to protect web servers and web applications. STILL is robust to almost all anti-signature, a...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu