Results 31 to 40 of about 1,665,774 (176)

Web Page Summarization for Just-in-Time Contextual Advertising

open access: yesTIST, 2011
Contextual advertising is a type of Web advertising, which, given the URL of a Web page, aims to embed into the page the most relevant textual ads available.
A. Anagnostopoulos   +4 more
semanticscholar   +1 more source

Web 3.0: The Future of Internet [PDF]

open access: yesarXiv, 2023
With the rapid growth of the Internet, human daily life has become deeply bound to the Internet. To take advantage of massive amounts of data and information on the internet, the Web architecture is continuously being reinvented and upgraded. From the static informative characteristics of Web 1.0 to the dynamic interactive features of Web 2.0, scholars
arxiv  

Implications of Edge Computing for Static Site Generation [PDF]

open access: yesarXiv, 2023
Static site generation (SSG) is a common technique in the web development space to create performant websites that are easy to host. Numerous SSG tools exist, and the approach has been complemented by newer approaches, such as Jamstack, that extend its usability. Edge computing represents a new option to extend the usefulness of SSG further by allowing
arxiv  

MichelaNglo: sculpting protein views on web pages without coding

open access: yesBioinform., 2020
Motivation The sharing of macromolecular structural information online by scientists is predominantly performed via 2D static images, since the embedding of interactive 3D structures in webpages is non-trivial.
Matteo P. Ferla   +4 more
semanticscholar   +1 more source

Anomaly Detection in the Dynamics of Web and Social Networks Using Associative Memory [PDF]

open access: yesThe Web Conference, 2019
In this work, we propose a new, fast and scalable method for anomaly detection in large time-evolving graphs. It may be a static graph with dynamic node attributes (e.g. time-series), or a graph evolving in time, such as a temporal network.
Volodymyr Miz   +3 more
semanticscholar   +1 more source

Predicate based Algorithm for Malicious Web Page Detection using Genetic Fuzzy Systems and Support Vector Machine

open access: yes, 2012
In the era of internet, users are keen to discover more in the web. As the number of web pages increases day-by-day malicious web pages are also increasing proportionally.
S. Chitra   +10 more
semanticscholar   +1 more source

Navigation Objects Extraction for Better Content Structure Understanding [PDF]

open access: yes, 2017
Existing works for extracting navigation objects from webpages focus on navigation menus, so as to reveal the information architecture of the site. However, web 2.0 sites such as social networks, e-commerce portals etc. are making the understanding of the content structure in a web site increasingly difficult.
arxiv   +1 more source

WebCrack: Dynamic Dictionary Adjustment for Web Weak Password Detection based on Blasting Response Event Discrimination [PDF]

open access: yesarXiv, 2022
The feature diversity of different web systems in page elements, submission contents and return information makes it difficult to detect weak password automatically. To solve this problem, multi-factor correlation detection method as integrated in the DBKER algorithm is proposed to achieve automatic detection of web weak passwords and universal ...
arxiv  

Comparison of Web Page Rendering Methods Based on Next.js Framework Using Page Loading Time Test

open access: yesTeknika
In the rapidly developing digital age, websites have become indispensable for interaction, information dissemination and transaction. To improve the performance of web applications, choosing the right rendering technology is critical.
Roy Hanafi, Abd Haq, Ninik Agustin
doaj   +1 more source

SteP: Stacked LLM Policies for Web Actions [PDF]

open access: yesarXiv, 2023
Performing tasks on the web presents fundamental challenges to large language models (LLMs), including combinatorially large open-world tasks and variations across web interfaces. Simply specifying a large prompt to handle all possible behaviors and states is extremely complex, and results in behavior leaks between unrelated behaviors. Decomposition to
arxiv  

Home - About - Disclaimer - Privacy