Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Urls'
Urls published presentations and documents on DocSlides.
Time is of Essence: Improving Recency Ranking Using Twitter
by olivia-moreira
Anlei Dong Ruiqiang Zhang Pranam Kolari Jing B...
Models for
by jane-oiler
adaptive. -streaming-aware . CDNI. -. Request Rou...
Click Trajectories: End-to-End Analysis of the Spam Value C
by sherrill-nordquist
Author : Kirill . Levchenko. , Andreas . Pitsilli...
web crawling in
by marina-yarberry
CiteSeerX. Jian Wu. IST 441 (Spring 2016) invited...
Web Crawling David Kauchak
by thomas
cs160. Fall 2009. adapted from:. http://www.stanfo...
Due to rapidly changing information check out att URLs for more details on the following
by natalia-silvester
ATTENTION Contact IT Telecommunications 44719 to ...
Finding Information on the Internet URLs The URL Uniform Resource Locator is the Internet address of a file stored on a host computer connected to the Internet
by sherrill-nordquist
Every web page has a unique address and often beg...
I Know the Shortened URLs You Clicked on Twitter Infer
by giovanna-bartolotta
of CSE POSTECH Pohang Republic of Korea freestarp...
Detecting and Characterizing Social Spam Campaigns
by yoshiko-marsland
Hongyu . Gao. , . Jun Hu. , . Christo . Wilson. ,...
Web Archive Content Analysis: Disaster Events Case
by sherrill-nordquist
Study. IIPC 2015 . General Assembly. . Stanford ...
Cloak and Dagger: Dynamics of Web Search Cloaking
by tatyana-admore
David Y. Wang, Stefan Savage, . and . Geoffrey M....
December 1966, published 6, doi: 10.1098/rspa.1966.0242295 1966 Proc.
by liane-varnes
References http://rspa.royalsocietypublishing.org/...
Suspended Accounts in Retrospect: An Analysis of Twitter Sp
by trish-goza
Kurt Thomas. , Chris Grier, . Vern Paxson, Dawn S...
WARNINGBIRD: A Near Real-time Detection System for Suspicio
by pamella-moone
Abstract. Twitter is prone to malicious tweets co...
Lecture 7 : Web Search & Mining (2)
by olivia-moreira
楊立偉教授. 台灣科大資管系. wyang@ntu...
DURING YOUR NEXT
by mitsue-stanley
WEBSITE. REDESIGN. 10 . SEO. MISTAKES TO AVOID. ...
Social Streams Blog Crawler
by lois-ondreau
Matthew Hurst. Alexey Maykov. Live Labs, Microsof...
Parallel Crawlers
by ellena-manuel
Efficient URL Caching for World Wide Web Crawling...
3.02 – Part
by olivia-moreira
B. Characteristics of a good brand name.. The nam...
From Links to Citation?
by conchita-marotz
Data Citation and Linked Open Data. Paul Groth @....
The Language that Gets People to Give:
by conchita-marotz
Phrases that Predict Success on . Kickstarter. ....
Data Quality of AIRS
by test
Level 2 Standard Products*. Not all L2 data value...
Web-Based Malware
by lindy-dunigan
Jason . Ganzhorn. 5-12-2010. 1. Background. A lar...
Web Canary
by pasty-toler
-- client honey pot. UTSA. Architecture of Web...
Output URL Bidding
by lindy-dunigan
Panagiotis Papadimitriou. , Hector Garcia-Molina,...
Genre-driven vs. Topic-driven
by luanne-stotts
BootCaT. corpora: building and evaluating a corp...
Crawlers
by tawny-fly
Padmini Srinivasan . Computer Science Department ...
Hinrich
by kittie-lecroy
. Schütze. and Christina . Lioma. Lecture . 20...
Lecture 7 : Web Search & Mining (2)
by tatiana-dople
楊立偉教授. 台灣科大資管系. wyang@ntu...
Maura
by lindy-dunigan
Barone. TEB meeting – 13 Jan 2012. Forge useful...
Managing Vast Sources of Information
by briana-ranney
We are inundated with information. News sites are...
The Koobface
by test
Botnet. and the Rise of Social Malware. Kurt Tho...
Ruby: An introduction -
by cheryl-pisano
Who. . am. I?. Maciej Mensfeld. 1/23. Presented...
Spam Campaign Cluster Detection Using Redirected URLs and R
by debby-jeon
Authors. Abu Awal Md Shoeb, Dibya Mukhopadhyay, S...
Spiders, crawlers, harvesters, bots
by calandra-battersby
Thanks to . B. Arms. R. Mooney. P. Baldi. P. Fras...
Jim Barton
by debby-jeon
Librarian. Glenside Public Library District. Web ...
Scalable URL Matching with Small Memory Footprint
by tawny-fly
David Hay . With . Anat Bremler-Barr, Daniel . Kr...
Robin Mullinix Systems Analyst
by ellena-manuel
GeorgiaFIRST. . Financials. PeopleSoft Query: Th...
Web Servers and URLs And Domain Names
by tatiana-dople
WWW vs. Internet. World Wide Web. An application ...
Web Security Defense Against The Dark Arts
by conchita-marotz
Cedric Cochin 1 TBD. Intel Security - McAfee La...
Load More...