default search action
ACM Transactions on the Web, Volume 2
Volume 2, Number 1, February 2008
- Marc Najork, Brian D. Davison:
Introduction to special section on adversarial issues in Web search. 1:1-1:2 - Luca Becchetti, Carlos Castillo, Debora Donato, Ricardo Baeza-Yates, Stefano Leonardi:
Link analysis for Web spam detection. 2:1-2:42 - Tanguy Urvoy, Emmanuel Chauveau, Pascal Filoche, Thomas Lavergne:
Tracking Web spam with HTML style similarities. 3:1-3:28 - Yu-Ru Lin, Hari Sundaram, Yun Chi, Jun'ichi Tatemura, Belle L. Tseng:
Detecting splogs via temporal dynamics using self-similarity analysis. 4:1-4:35 - Harald Weinreich, Hartmut Obendorf, Eelco Herder, Matthias Mayer:
Not quite the average: An empirical study of Web use. 5:1-5:31 - Qi Yu, Athman Bouguettaya:
Framework for Web service query algebra and optimization. 6:1-6:35 - Boanerges Aleman-Meza, Meenakshi Nagarajan, Li Ding, Amit P. Sheth, Ismailcem Budak Arpinar, Anupam Joshi, Timothy W. Finin:
Scalable semantic analytics on social networks for addressing the problem of conflict of interest detection. 7:1-7:29 - Daniel Gmach, Stefan Krompass, Andreas Scholz, Martin Wimmer, Alfons Kemper:
Adaptive quality of service management for enterprise services. 8:1-8:46 - Bo Yang, Jiming Liu:
Discovering global network communities based on local centralities. 9:1-9:32
Volume 2, Number 2, April 2008
- Schahram Dustdar, Bernd J. Krämer:
Introduction to special issue on service oriented computing (SOC). 10:1-10:2 - Khalid Belhajjame, Suzanne M. Embury, Norman W. Paton, Robert Stevens, Carole A. Goble:
Automatic annotation of Web services based on workflow definitions. 11:1-11:34 - Islam Elgedawy, Zahir Tari, James A. Thom:
Correctness-aware high-level functional matching approaches for semantic Web services. 12:1-12:40 - Seung Hwan Ryu, Fabio Casati, Halvard Skogsrud, Boualem Benatallah, Régis Saint-Paul:
Supporting the dynamic evolution of Web service protocols in service-oriented architectures. 13:1-13:46 - Michael Schäfer, Peter Dolog, Wolfgang Nejdl:
An environment for flexible advanced compensations of Web service transactions. 14:1-14:36
Volume 2, Number 3, July 2008
- Mudhakar Srivatsa, Arun Iyengar, Jian Yin, Ling Liu:
Mitigating application-level denial of service attacks on Web servers: A client-transparent approach. 15:1-15:49 - Ryen W. White, Mikhail Bilenko, Silviu Cucerzan:
Leveraging popular destinations to enhance Web search interaction. 16:1-16:30 - Mauro Andreolini, Sara Casolari, Michele Colajanni:
Models and framework for supporting runtime decisions in Web-based systems. 17:1-17:43
Volume 2, Number 4, October 2008
- Einat Amitay, Andrei Z. Broder:
Introduction to special issue on query log analysis: Technology and ethics. 18:1-18:2 - Alissa Cooper:
A survey of query log privacy-enhancing techniques from a policy perspective. 19:1-19:27 - Ricardo Baeza-Yates, Aristides Gionis, Flavio Junqueira, Vanessa Murdock, Vassilis Plachouras, Fabrizio Silvestri:
Design trade-offs for search engine caching. 20:1-20:28 - Matthew Richardson:
Learning about the world through long-term query logs. 21:1-21:27 - Georgia Koutrika, Frans Adjie Effendi, Zoltán Gyöngyi, Paul Heymann, Hector Garcia-Molina:
Combating spam in tagging systems: An evaluation. 22:1-22:34
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.