• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 2,809
Next 10 →

Authoritative Sources in a Hyperlinked Environment

by Jon M. Kleinberg - JOURNAL OF THE ACM , 1999
"... The network structure of a hyperlinked environment can be a rich source of information about the content of the environment, provided we have effective means for understanding it. We develop a set of algorithmic tools for extracting information from the link structures of such environments, and repo ..."
Abstract - Cited by 3632 (12 self) - Add to MetaCart
, and report on experiments that demonstrate their effectiveness in a variety of contexts on the World Wide Web. The central issue we address within our framework is the distillation of broad search topics, through the discovery of “authoritative ” information sources on such topics. We propose and test

Data Mining: Concepts and Techniques

by Jiawei Han, Micheline Kamber , 2000
"... Our capabilities of both generating and collecting data have been increasing rapidly in the last several decades. Contributing factors include the widespread use of bar codes for most commercial products, the computerization of many business, scientific and government transactions and managements, a ..."
Abstract - Cited by 3142 (23 self) - Add to MetaCart
, and advances in data collection tools ranging from scanned texture and image platforms, to on-line instrumentation in manufacturing and shopping, and to satellite remote sensing systems. In addition, popular use of the World Wide Web as a global information system has flooded us with a tremendous amount

Combating web spam with trustrank

by Zoltán Gyöngyi, Hector Garcia-molina, Jan Pedersen - In VLDB , 2004
"... Web spam pages use various techniques to achieve higher-than-deserved rankings in a search engine’s results. While human experts can identify spam, it is too expensive to manually evaluate a large number of pages. Instead, we propose techniques to semi-automatically separate reputable, good pages fr ..."
Abstract - Cited by 413 (3 self) - Add to MetaCart
and the discovery of good pages. We present results of experiments run on the World Wide Web indexed by AltaVista and evaluate the performance of our techniques. Our results show that we can effectively filter out spam from a significant fraction of the web, based on a good seed set of less than 200 sites. 1

A software framework for matchmaking based on semantic web technology

by Lei Li, Ian Horrocks , 2003
"... An important objective of the Semantic Web is to make Electronic Commerce interactions more flexible and automated. To achieve this, standardisation of ontologies, message content and message protocols will be necessary. In this paper we investigate how Semantic and Web Services technologies can be ..."
Abstract - Cited by 398 (5 self) - Add to MetaCart
be used to support service advertisement and discovery in ecommerce. In particular, we describe the design and implementation of a service matchmaking prototype which uses a DAML-S based ontology and a Description Logic reasoner to compare ontology based service descriptions. By representing the semantics

Negative Electronic Word-of-Mouth Online Consumer Reviews: Does Negative Electronic Word-of-Mouth Hurt More?

by Christy M. K. Cheung, Matthew K. O. Lee, Christy M. K. Cheung, Matthew K. O. Lee
"... Web-based technologies have created numerous opportunities for electronic word-of-mouth (eWOM) communication. This phenomenon impacts retailers as this easily accessible information could greatly affect consumer purchasing decision. The connectivity of the Web allows one-to-many and many-to-many com ..."
Abstract - Add to MetaCart
Web-based technologies have created numerous opportunities for electronic word-of-mouth (eWOM) communication. This phenomenon impacts retailers as this easily accessible information could greatly affect consumer purchasing decision. The connectivity of the Web allows one-to-many and many

Computing Word-of-Mouth Trust Relationships in Social Networks from Semantic Web and Web2.0 Data Sources

by Tom Heath, Enrico Motta, Marian Petre
"... Abstract. Social networks can serve as both a rich source of new information and as a filter to identify the information most relevant to our specific needs. In this paper we present a methodology and algorithms that, by exploiting existing Semantic Web and Web2.0 data sources, help individuals iden ..."
Abstract - Cited by 6 (2 self) - Add to MetaCart
Abstract. Social networks can serve as both a rich source of new information and as a filter to identify the information most relevant to our specific needs. In this paper we present a methodology and algorithms that, by exploiting existing Semantic Web and Web2.0 data sources, help individuals

SPAND: Shared Passive Network Performance Discovery

by Srinivasan Seshan, Mark Stemm, Randy H. Katz - IN USENIX SYMPOSIUM ON INTERNET TECHNOLOGIES AND SYSTEMS , 1997
"... In the Internet today, users and applications must often make decisions based on the performance they expect to receive from other Internet hosts. For example, users can often view many Web pages in low-bandwidth or high-bandwidth versions, while other pages present users with long lists of mirror s ..."
Abstract - Cited by 221 (8 self) - Add to MetaCart
In the Internet today, users and applications must often make decisions based on the performance they expect to receive from other Internet hosts. For example, users can often view many Web pages in low-bandwidth or high-bandwidth versions, while other pages present users with long lists of mirror

Knowledge Discovery from Users Web-Page Navigation

by Cyrus Shahabi, Amir M. Zarkesh, Jafar Adibi, Vishal Shah - in Proceedings of workshop on research issues in Data engineering , 1997
"... We propose to detect users navigationpaths to the advantage of web-site owners. First, we explain the design and implementationof a profiler which captures client’s selected links and pages order, accurate page viewing time and cache references, using a Java based remote agent. The information captu ..."
Abstract - Cited by 177 (10 self) - Add to MetaCart
We propose to detect users navigationpaths to the advantage of web-site owners. First, we explain the design and implementationof a profiler which captures client’s selected links and pages order, accurate page viewing time and cache references, using a Java based remote agent. The information

Online Consumer Reviews: Does Negative Electronic Word-of-Mouth Hurt More?

by Christy M. K, Cheung Matthew, K. O. Lee, Christy M. K. Cheung, Matthew K. O. Lee
"... Web-based technologies have created numerous opportunities for electronic word-of-mouth (eWOM) communication. This phenomenon impacts retailers as this easily accessible information could greatly affect consumer purchasing decision. The connectivity of the Web allows one-to-many and many-to-many com ..."
Abstract - Add to MetaCart
Web-based technologies have created numerous opportunities for electronic word-of-mouth (eWOM) communication. This phenomenon impacts retailers as this easily accessible information could greatly affect consumer purchasing decision. The connectivity of the Web allows one-to-many and many

Record-Boundary Discovery In Web Documents

by Yuan Jiang , 1998
"... Extraction of information from unstructured or semistructured Web documents often requires a recognition and delimitation of records. (By "record" we mean a group of information relevant to some entity.) Without first chunking documents that contain multiple records according to record bou ..."
Abstract - Cited by 127 (20 self) - Add to MetaCart
Extraction of information from unstructured or semistructured Web documents often requires a recognition and delimitation of records. (By "record" we mean a group of information relevant to some entity.) Without first chunking documents that contain multiple records according to record
Next 10 →
Results 1 - 10 of 2,809
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University