


default search action
ACM Transactions on the Web, Volume 2
Volume 2, Number 1, February 2008
- Marc Najork

, Brian D. Davison
:
Introduction to special section on adversarial issues in Web search. 1:1-1:2 - Luca Becchetti

, Carlos Castillo
, Debora Donato, Ricardo Baeza-Yates
, Stefano Leonardi:
Link analysis for Web spam detection. 2:1-2:42 - Tanguy Urvoy, Emmanuel Chauveau, Pascal Filoche, Thomas Lavergne:

Tracking Web spam with HTML style similarities. 3:1-3:28 - Yu-Ru Lin, Hari Sundaram

, Yun Chi, Jun'ichi Tatemura, Belle L. Tseng:
Detecting splogs via temporal dynamics using self-similarity analysis. 4:1-4:35 - Harald Weinreich, Hartmut Obendorf, Eelco Herder, Matthias Mayer:

Not quite the average: An empirical study of Web use. 5:1-5:31 - Qi Yu

, Athman Bouguettaya
:
Framework for Web service query algebra and optimization. 6:1-6:35 - Boanerges Aleman-Meza, Meenakshi Nagarajan, Li Ding, Amit P. Sheth, Ismailcem Budak Arpinar, Anupam Joshi

, Timothy W. Finin
:
Scalable semantic analytics on social networks for addressing the problem of conflict of interest detection. 7:1-7:29 - Daniel Gmach, Stefan Krompass, Andreas Scholz, Martin Wimmer, Alfons Kemper:

Adaptive quality of service management for enterprise services. 8:1-8:46 - Bo Yang, Jiming Liu:

Discovering global network communities based on local centralities. 9:1-9:32
Volume 2, Number 2, April 2008
- Schahram Dustdar

, Bernd J. Krämer
:
Introduction to special issue on service oriented computing (SOC). 10:1-10:2 - Khalid Belhajjame

, Suzanne M. Embury, Norman W. Paton, Robert Stevens, Carole A. Goble:
Automatic annotation of Web services based on workflow definitions. 11:1-11:34 - Islam Elgedawy

, Zahir Tari
, James A. Thom:
Correctness-aware high-level functional matching approaches for semantic Web services. 12:1-12:40 - Seung Hwan Ryu, Fabio Casati, Halvard Skogsrud, Boualem Benatallah, Régis Saint-Paul:

Supporting the dynamic evolution of Web service protocols in service-oriented architectures. 13:1-13:46 - Michael Schäfer, Peter Dolog

, Wolfgang Nejdl
:
An environment for flexible advanced compensations of Web service transactions. 14:1-14:36
Volume 2, Number 3, July 2008
- Mudhakar Srivatsa, Arun Iyengar, Jian Yin, Ling Liu:

Mitigating application-level denial of service attacks on Web servers: A client-transparent approach. 15:1-15:49 - Ryen W. White, Mikhail Bilenko, Silviu Cucerzan:

Leveraging popular destinations to enhance Web search interaction. 16:1-16:30 - Mauro Andreolini

, Sara Casolari, Michele Colajanni
:
Models and framework for supporting runtime decisions in Web-based systems. 17:1-17:43
Volume 2, Number 4, October 2008
- Einat Amitay, Andrei Z. Broder:

Introduction to special issue on query log analysis: Technology and ethics. 18:1-18:2 - Alissa Cooper:

A survey of query log privacy-enhancing techniques from a policy perspective. 19:1-19:27 - Ricardo Baeza-Yates

, Aristides Gionis, Flavio Junqueira, Vanessa Murdock, Vassilis Plachouras, Fabrizio Silvestri
:
Design trade-offs for search engine caching. 20:1-20:28 - Matthew Richardson:

Learning about the world through long-term query logs. 21:1-21:27 - Georgia Koutrika, Frans Adjie Effendi, Zoltán Gyöngyi, Paul Heymann, Hector Garcia-Molina:

Combating spam in tagging systems: An evaluation. 22:1-22:34

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














