default search action
ACM Transactions on the Web, Volume 13
Volume 13, Number 1, February 2019
- Shomir Wilson, Florian Schaub, Frederick Liu, Kanthashree Mysore Sathyendra, Daniel Smullen, Sebastian Zimmeck, Rohan Ramanath, Peter Story, Fei Liu, Norman M. Sadeh, Noah A. Smith:
Analyzing Privacy Policies at Scale: From Crowdsourcing to Automated Annotations. 1:1-1:29 - Dionysis Athanasopoulos, Apostolos V. Zarras:
Mining Abstract XML Data-Types. 2:1-2:37 - Marco Anisetti, Claudio A. Ardagna, Ernesto Damiani, Gianluca Polegri:
Test-Based Security Certification of Composite Services. 3:1-3:43 - Elissa M. Redmiles, Eszter Hargittai:
New Phone, Who Dis? Modeling Millennials' Backup Behavior. 4:1-4:14 - Patrice Calégari, Marc Levrier, Pawel Balczynski:
Web Portals for High-performance Computing: A Survey. 5:1-5:36 - Daniel M. Romero, Brian Uzzi, Jon M. Kleinberg:
Social Networks under Stress: Specialized Team Roles and Their Communication Structure. 6:1-6:24 - Zafar Gilani, Reza Farahbakhsh, Gareth Tyson, Jon Crowcroft:
A Large-scale Behavioural Analysis of Bots and Humans on Twitter. 7:1-7:23
Volume 13, Number 2, April 2019
- Steffen Thoma, Andreas Thalhammer, Andreas Harth, Rudi Studer:
FusE: Entity-Centric Data Fusion on Linked Data. 8:1-8:36 - Julián Alarte, Josep Silva, Salvador Tamarit:
What Web Template Extractor Should I Use? A Benchmarking and Comparison for Five Template Extractors. 9:1-9:19 - Michela Del Vicario, Walter Quattrociocchi, Antonio Scala, Fabiana Zollo:
Polarization and Fake News: Early Warning of Potential Misinformation Targets. 10:1-10:22 - Stefano Cresci, Fabrizio Lillo, Daniele Regoli, Serena Tardelli, Maurizio Tesconi:
Cashtag Piggybacking: Uncovering Spam and Bot Activity in Stock Microblogs on Twitter. 11:1-11:27 - Willian Massami Watanabe, Giovana Lázaro Amêndola, Fagner Christian Paes:
Layout Cross-Platform and Cross-Browser Incompatibilities Detection using Classification of DOM Elements. 12:1-12:27 - Stephan Sigg, Eemil Lagerspetz, Ella Peltonen, Petteri Nurmi, Sasu Tarkoma:
Exploiting Usage to Predict Instantaneous App Popularity: Trend Filters and Retention Rates. 13:1-13:25
Volume 13, Number 3, November 2019
- Wafa Alorainy, Pete Burnap, Han Liu, Matthew L. Williams:
"The Enemy Among Us": Detecting Cyber Hate Speech with Threats-based Othering Language Embeddings. 14:1-14:26 - Liping Zhao, Pericles Loucopoulos, Evangelia Kavakli, Keletso Letsholo:
User Studies on End-User Service Composition: A Literature Review and a Design Framework. 15:1-15:46 - Abir De, Sourangshu Bhattacharya, Parantapa Bhattacharya, Niloy Ganguly, Soumen Chakrabarti:
Learning Linear Influence Models in Social Networks from Transient Opinion Dynamics. 16:1-16:33 - Despoina Chatzakou, Ilias Leontiadis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Athena Vakali, Nicolas Kourtellis:
Detecting Cyberbullying and Cyberaggression in Social Media. 17:1-17:51
Volume 13, Number 4, December 2019
- Diego Perino, Matteo Varvello, Claudio Soriente:
Long-term Measurement and Analysis of the Free Proxy Ecosystem. 18:1-18:22 - Daxin Liu, Gong Cheng, Qingxia Liu, Yuzhong Qu:
Fast and Practical Snippet Generation for RDF Datasets. 19:1-19:38 - Edimar Manica, Carina Friedrich Dorneles, Renata Galante:
Combining URL and HTML Features for Entity Discovery in the Web. 20:1-20:27 - Weiren Yu, Julie A. McCann, Chengyuan Zhang:
Efficient Pairwise Penetrating-rank Similarity Retrieval. 21:1-21:52
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.