Sciweavers

WWW
2006
ACM
15 years 6 days ago
Generating query substitutions
We introduce the notion of query substitution, that is, generating a new query to replace a user's original search query. Our technique uses modifications based on typical su...
Rosie Jones, Benjamin Rey, Omid Madani, Wiley Grei...
WWW
2006
ACM
15 years 6 days ago
Examining the content and privacy of web browsing incidental information
This research examines the privacy comfort levels of participants if others can view traces of their web browsing activity. During a week-long field study, participants used an el...
Kirstie Hawkey, Kori M. Inkpen
WWW
2006
ACM
15 years 6 days ago
Efficient search for peer-to-peer information retrieval using semantic small world
This paper proposes a semantic overlay based on the small world phenomenon that facilitates efficient search for information retrieval in unstructured P2P systems. In the semantic...
Hai Jin, Xiaomin Ning, Hanhua Chen
WWW
2006
ACM
15 years 6 days ago
Learning and inferencing in user ontology for personalized semantic web services
Domain ontology has been used in many Semantic Web applications. However, few applications explore the use of ontology for personalized services. This paper proposes an ontology b...
Xing Jiang, Ah-Hwee Tan
WWW
2006
ACM
15 years 6 days ago
Using graph matching techniques to wrap data from PDF documents
Wrapping is the process of navigating a data source, semiautomatically extracting data and transforming it into a form suitable for data processing applications. There are current...
Tamir Hassan, Robert Baumgartner
WWW
2006
ACM
15 years 6 days ago
Graphical representation of RDF queries
In this poster we discuss a graphical notation for representing queries for semistructured data. We try to strike a balance between expressiveness of the query language and simpli...
Andreas Harth, Sebastian Ryszard Kruk, Stefan Deck...
WWW
2006
ACM
15 years 6 days ago
A browser for browsing the past web
We describe a browser for the past web. It can retrieve data from multiple past web resources and features a passive browsing style based on change detection and presentation. The...
Adam Jatowt, Yukiko Kawai, Satoshi Nakamura, Yutak...
WWW
2006
ACM
15 years 6 days ago
Invasive browser sniffing and countermeasures
We describe the detrimental effects of browser cache/history sniffing in the context of phishing attacks, and detail an approach that neutralizes the threat by means of URL person...
Markus Jakobsson, Sid Stamm
WWW
2006
ACM
15 years 6 days ago
Designing ethical phishing experiments: a study of (ROT13) rOnl query features
We study how to design experiments to measure the success rates of phishing attacks that are ethical and accurate, which are two requirements of contradictory forces. Namely, an e...
Markus Jakobsson, Jacob Ratkiewicz
WWW
2006
ACM
15 years 6 days ago
Text-based video blogging
Narichika Hamaguchi, Mamoru Doke, Masaki Hayashi, ...