Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 11, Issue 4November 2017
Reflects downloads up to 09 Nov 2024Bibliometrics
Skip Table Of Content Section
research-article
LDoW-PaN: Linked Data on the Web—Presentation and Navigation
Article No.: 20, Pages 1–42https://doi.org/10.1145/2983643

This work aimed to propose LDoW-PaN, a Linked Data presentation and navigation model focused on the average user. The LDoW-PaN model is an extension of the Dexter Hypertext Reference Model. Through the LDoW-PaN model, ordinary people—who have no ...

research-article
Public Access
Clickstream User Behavior Models
Article No.: 21, Pages 1–37https://doi.org/10.1145/3068332

The next generation of Internet services is driven by users and user-generated content. The complex nature of user behavior makes it highly challenging to manage and secure online services. On one hand, service providers cannot effectively prevent ...

research-article
Canonical Forms for Isomorphic and Equivalent RDF Graphs: Algorithms for Leaning and Labelling Blank Nodes
Article No.: 22, Pages 1–62https://doi.org/10.1145/3068333

Existential blank nodes greatly complicate a number of fundamental operations on Resource Description Framework (RDF) graphs. In particular, the problems of determining if two RDF graphs have the same structure modulo blank node labels (i.e., if they ...

research-article
A Study of Web Print: What People Print in the Digital Era
Article No.: 23, Pages 1–26https://doi.org/10.1145/3068331

This article analyzes a proprietary log of printed web pages and aims at answering questions regarding the content people print (what), the reasons they print (why), as well as attributes of their print profile (who). We present a classification of ...

research-article
Exploring and Analyzing the Tor Hidden Services Graph
Article No.: 24, Pages 1–26https://doi.org/10.1145/3008662

The exploration and analysis of Web graphs has flourished in the recent past, producing a large number of relevant and interesting research results. However, the unique characteristics of the Tor network limit the applicability of standard techniques ...

research-article
Collusive Opinion Fraud Detection in Online Reviews: A Probabilistic Modeling Approach
Article No.: 25, Pages 1–28https://doi.org/10.1145/3098859

We address the collusive opinion fraud problem in online review portals, where groups of people work together to deliver deceptive reviews for manipulating the reputations of targeted items. Such collusive fraud is considered much harder to defend ...

research-article
A Fast and Scalable Mechanism for Web Service Composition
Article No.: 26, Pages 1–36https://doi.org/10.1145/3098884

In recent times, automated business processes and web services have become ubiquitous in diverse application spaces. Efficient composition of web services in real time while providing necessary Quality of Service (QoS) guarantees is a computationally ...

Subjects

Comments