Loading...
Search for: world-wide-web
0.006 seconds
Total 48 records

    Utilizing mixed methods research in analyzing Iranian researchers' informarion search behaviour in the web and presenting the current pattern

    , Article Iranian Journal of Information Processing Management ; Volume 31, Issue 1 , 2015 , Pages 27-57 ; 22518223 (ISSN) Asadi, M ; Hariri, N ; Sharif University of Technology
    Iranian Research Institute for Scientific Information and Documentation  2015
    Abstract
    Using mixed method research the current study has analyzed Iranian researchers' information searching behavior on the Web. Based on extracted concepts, the model of their information searching behavior was revealed. Forty-four participants, including academic staff from universities and research centers were recruited for this study selected by purposive sampling. Data were gathered from questionnaires including ten questions and semi-structured interview. Each participant's memos were analyzed using grounded theory methods adapted from Strauss & Corbin (1998). Results showed that the main objectives of subjects were doing a research, writing a paper, studying, doing assignments, downloading... 

    Trust inference in web-based social networks using resistive networks

    , Article Proceedings- 3rd International Conference on Internet and Web Applications and Services, ICIW 2008, Athens, 8 June 2008 through 13 June 2008 ; 2008 , Pages 233-238 ; 9780769531632 (ISBN) Taherian, M ; Amini, M ; Jalili, R ; Sharif University of Technology
    2008
    Abstract
    By the immense growth of the Web-Based Social Networks (WBSNs), the role of trust in connecting people together through WBSNs is getting more important than ever. In other words, since the probability of malicious behavior in WBSNs is increasing, it is necessary to evaluate the reliability of a person before trying to communicate with. Hence, it is desirable to find out how much a person should trust another one in a network. The approach to answer this question is usually called trust inference. In this paper, we propose a new trust inference algorithm (Called RN-Trust) based on the resistive networks concept. The algorithm, in addition to being simple, resolves some problems of previously... 

    Attaining higher quality for density based algorithms

    , Article 1st International Conference on Web Reasoning and Rule Systems, RR 2007, Innsbruck, 7 June 2007 through 8 June 2007 ; Volume 4524 LNCS , 2007 , Pages 329-338 ; 03029743 (ISSN); 354072981X (ISBN); 9783540729815 (ISBN) Haghir Chehreghani, M ; Abolhassani, H ; Haghir Chehreghani, M ; Sharif University of Technology
    Springer Verlag  2007
    Abstract
    So far several methods have been proposed for clustering the web. On the other hand, many algorithms have been developed for clustering the relational data, but their usage for the Web is to be investigated. One main category of such algorithms is density based methods providing high quality results. In this paper first, a new density based algorithm is introduced and then it is compared with other algorithms of this category. The proposed algorithm has some interesting properties and capabilities such as hierarchical clustering and sampling, making it suitable for clustering the web data. © Springer-Verlag Berlin Heidelberg 2007  

    Web page classification using social tags

    , Article 2009 IEEE International Conference on Social Computing, 29 August 2009 through 31 August 2009 ; Volume 4 , 2009 , Pages 588-593 ; 9780769538235 (ISBN) Aliakbary, S ; Abolhassani, H ; Rahmani, H ; Nobakht, B ; Sharif University of Technology
    Abstract
    Social tagging is a process in which many users add metadata to a shared content. Through the past few years, the popularity of social tagging has grown on the web. In this paper we investigated the use of social tags for web page classification: adding new web pages to an existing web directory. A web directory is a general human-edited directory of web pages. It classifies a collection of pages into a wide range of hierarchical categories. The problem with manual construction and maintenance of web directories is the significant need of time and effort by human experts. Our proposed method is based on applying different automatic approaches of using social tags for extending web... 

    A study of employees' views of strategic information systems in Iranian banks: The case of internet banking

    , Article International Journal of Information and Communication Technology ; Volume 7, Issue 1 , 2015 , Pages 52-72 ; 14666642 (ISSN) Farzaneh, M ; Najafloo, F ; Rasouli, H ; Sharif University of Technology
    Inderscience Enterprises Ltd  2015
    Abstract
    Internet banking is a tool to achieve competitive advantage and its usage has been spreading rapidly in recent years. This paper strives to identify a comprehensive study of the major internet banking quality measurements, which covers a wide range of literature relevant to international papers and scholars and then evaluate them through using a precise method, Shannon entropy. At the last stage the validated criteria were exploited to survey in Iranian banks. The empirical research consists of a quantitative study of internet banking by a sample of employees in two banks of Iran. In this regard, the raised question is about whether or not the internet banking is a strategic information... 

    Towards a goal-driven method for web service choreography validation

    , Article 2016 2nd International Conference on Web Research, ICWR 2016, 27 April 2016 through 28 April 2016 ; 2016 , Pages 66-71 ; 9781509021666 (ISBN) Parsa, S ; Ebrahimifard, A ; Amiri, M. J ; Khoramabadi Arani, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    Nowadays web services composition that presents capabilities in response to customers' complex requirements has a special importance in real businesses. However, service choreography as a form of service composition, still faces many challenges. One of the most important challenges of the choreography domain is how to validate the model based on the corresponding requirements. To this end, in this paper processes choreographies are modeled using the interaction view of BPMN 2.0 standard. Then, goal modeling is suggested to extract the requirements. For each requirement all possible valid scenarios are considered and finally using Savara tool, the requirements' scenarios are modeled and the... 

    Externalities and fairness

    , Article 2019 World Wide Web Conference, WWW 2019, 13 May 2019 through 17 May 2019 ; 2019 , Pages 538-548 ; 9781450366748 (ISBN) Seddighin, M ; Saleh, H ; Ghodsi, M ; Amazon; Bloomberg; Criteo AI Lab; et al.; Google; Microsoft ; Sharif University of Technology
    Association for Computing Machinery, Inc  2019
    Abstract
    One of the important yet insufficiently studied subjects in fair allocation is the externality effect among agents. For a resource allocation problem, externalities imply that the share allocated to an agent may affect the utilities of other agents. In this paper, we conduct a study of fair allocation of indivisible goods when the externalities are not negligible. Inspired by the models in the context of network diffusion, we present a simple and natural model, namely network externalities, to capture the externalities. To evaluate fairness in the network externalities model, we generalize the idea behind the notion of maximin-share (MMS) to achieve a new criterion, namely,... 

    Centrality-based group formation in group recommender systems

    , Article 26th International World Wide Web Conference, WWW 2017 Companion, 3 April 2017 through 7 April 2017 ; 2019 , Pages 1187-1196 ; 9781450349147 (ISBN) Mahyar, H ; Khalili, S ; Elahe Ghalebi, K ; Grosu, R ; Mojde Morshedi, S ; Movaghar, A ; Sharif University of Technology
    International World Wide Web Conferences Steering Committee  2019
    Abstract
    Recommender Systems have become an attractive field within the recent decade because they facilitate users' selection process within limited time. Conventional recommender systems have proposed numerous methods focusing on recommendations to individual users. Recently, due to a significant increase in the number of users, studies in this field have shifted to properly identify groups of people with similar preferences and provide a list of recommendations for each group. Offering a recommendations list to each individual requires significant computational cost and it is therefore often not efficient. So far, most of the studies impose four restrictive assumptions: (1) limited number of... 

    ROSE: Role-based Signed Network Embedding

    , Article 29th International World Wide Web Conference, WWW 2020, 20 April 2020 through 24 April 2020 ; 2020 , Pages 2782-2788 Javari, A ; Derr, T ; Esmailian, P ; Tang, J ; Kevin Chen-C. C ; Chunghwa Telecom; et al.; Microsoft; Quanta Computer; Taiwan Mobile; ZOOM ; Sharif University of Technology
    Association for Computing Machinery, Inc  2020
    Abstract
    In real-world networks, nodes might have more than one type of relationship. Signed networks are an important class of such networks consisting of two types of relations: positive and negative. Recently, embedding signed networks has attracted increasing attention and is more challenging than classic networks since nodes are connected by paths with multi-types of links. Existing works capture the complex relationships by relying on social theories. However, this approach has major drawbacks, including the incompleteness/inaccurateness of such theories. Thus, we propose network transformation based embedding to address these shortcomings. The core idea is that rather than directly finding the... 

    An architecture for context-aware semantic Web services

    , Article IEEE International Conference on Web Services, ICWS 2008, Beijing, 23 September 2008 through 26 September 2008 ; 2008 , Pages 779-780 ; 9780769533100 (ISBN) Keivanloo, I ; Abolhassani, H ; Technical Committee on Services Computing ; Sharif University of Technology
    2008
    Abstract
    Context awareness in Web services is gaining momentum. Since it is not a trivial task, it suffers from lack of a general solution. In this paper, we introduce a novel approach for context-aware Semantic Web Services which is applicable for any environment. It is established based on composition of context provider Web Services and other context-aware Semantic Web Services. In addition, an extended version of the Semantic Web Service Ontology Language for Semantic Web services is introduced, in order to make it possible to find appropriate context-aware Semantic Web services based on available context information. So as to make it applicable for any environment, the solution does not hold any... 

    Identifying child users: Is it possible?

    , Article SICE Annual Conference 2008 - International Conference on Instrumentation, Control and Information Technology, Tokyo, 20 August 2008 through 22 August 2008 ; October , 2008 , Pages 3241-3244 ; 9784907764296 (ISBN) Shirali Shahreza, S ; Shirali Shahreza, M ; IEEE ; Sharif University of Technology
    2008
    Abstract
    There are many websites on the Internet which are for adult users and we want to restrict access to them for adults only. Adult content filtering programs on client computers are the current available solutions. But if we can identify the child users at server side, we can protect the children more. In this paper, we try to answer the question that whether it is possible to identify child users or not? © 2008 SICE  

    CAPTCHA systems for disabled people

    , Article 2008 IEEE 4th International Conference on Intelligent Computer Communication and Processing, ICCP 2008, Cluj-Napoca, 28 August 2008 through 30 August 2008 ; October , 2008 , Pages 319-322 ; 9781424426737 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, S ; Sharif University of Technology
    2008
    Abstract
    Nowadays the Internet users are from different ages and groups. The disabled people also use the Internet. Some websites are especially created for disabled people. Many Internet sites offers services for human users, but unfortunately some computer programs are designed to abuse these services. To solve this problem, some systems named CAPTCHA (Completely Automated Public Turing test to tell Computers and Human Apart) have been introduced to distinguish between human users and computer programs. CAPTCHA methods are mainly based on the weaknesses of OCR systems while using them is undesirable for human users, especially for disabled people. Therefore some CAPTCHA methods are designed... 

    Clustering search engine log for query recommendation

    , Article 13th International Computer Society of Iran Computer Conference on Advances in Computer Science and Engineering, CSICC 2008, Kish Island, 9 March 2008 through 11 March 2008 ; Volume 6 CCIS , 2008 , Pages 380-387 ; 18650929 (ISSN); 3540899847 (ISBN); 9783540899846 (ISBN) Hosseini, M ; Abolhassani, H ; Sharif University of Technology
    2008
    Abstract
    As web contents grow, the importance of search engines became more critical and at the same time user satisfaction decreased. Query recommendation is a new approach to improve search results in web. In this paper we represent a method to help search engine users in attaining required information. Such facility could be provided by offering some queries associated with queries submitted by users in order to direct them toward their target. At first, all previous query contained in a query log should be clustered, therefore, all queries that are semantically similar will be detected. Then all queries that are similar to user's queries are ranked according to a relevance criterion. The method... 

    Encouraging persons with hearing problem to learn sign language by Internet websites

    , Article 8th IEEE International Conference on Advanced Learning Technologies, ICALT 2008, Santander, 1 July 2008 through 5 July 2008 ; 2008 , Pages 1036-1037 ; 9780769531670 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, S ; Sharif University of Technology
    2008
    Abstract
    Nowadays the Internet users are from different ages and groups. Disabled people are a group of the Internet users. Some websites are especially created for these people. One group of the disabled people are deaf persons. They have a special talking language which is named sign language. Here we present a method to encourage them, esp. children, to learn the sign language. In this method, when a deaf person wants to enter a website which is created for deaf persons, a word is shown as a movie using a sign language. The user should recognize the word and select it from a list. If the user understands the sign language and recognizes the word, he/she can enter the website. This project has been... 

    A geographical question answering system

    , Article 3rd International Conference on Web Information Systems and Technologies, Webist 2007, Barcelona, 3 March 2007 through 6 March 2007 ; Volume WIA , 2007 , Pages 308-314 Behrangi, E ; Ghasemzadeh, H ; Sheykh Esmaili, K ; Minaei Bidgoli, B ; Sharif University of Technology
    2007
    Abstract
    Question Answering systems are one of the hot topics in context of information retrieval. In this paper, we develop an open-domain Question Answering system for spatial queries. We use Google for gathering raw data from the Web and then in a few iterations density of potential answers will be increased, finally based on a couple of evaluators the best answers are selected to be returned to user. Our proposed algorithm uses fuzzy methods to be more precise. Some experiments have been designed in order to evaluate the performance of our algorithm and results are totally promising. We will describe that how this algorithm can be applied to other type of questions as well  

    Coincidence based mapping extraction with genetic algorithms

    , Article 3rd International Conference on Web Information Systems and Technologies, Webist 2007, Barcelona, 3 March 2007 through 6 March 2007 ; Volume WIA , 2007 , Pages 176-183 Qazvinian, V ; Abolhassani, H ; Haeri, S. H ; Sharif University of Technology
    2007
    Abstract
    Ontology Aligning is an answer to the problem of handling heterogenous information on different domains. After application of some measures, one reaches a set of similarity values. The final goal is to extract mappings. Our contribution is to introduce a new genetic algorithm (GA) based extraction method. The GA, employs a structured based weighting model, named "coincidence based model", as its fitness function. In the first part of the paper, some preliminaries and notations are given and then we introduce the coincidence based weighting. In the second part the paper discusses the details of the devised GA with the evaluation results for a sample dataset  

    Semantic composability measure for semantic web services

    , Article 1st Asia International Conference on Modelling and Simulation - Asia Modelling Symposium 2007, AMS 2007, 27 March 2007 through 30 March 2007 ; 2007 , Pages 88-93 ; 0769528457 (ISBN); 9780769528458 (ISBN) Paikari, E ; Habibi, J ; Yeganeh, S. H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2007
    Abstract
    Motivated by the problem of automatically composing network accessible services, such as those on the World Wide Web, this paper proposes an approach to exploit all semantic information available for semantic web services to complete this task. For semantic web services, we propose a prioritized and limited list of other web services, with composability measure value based on feasibility of being succeeding service in a composition to fulfill the request. Due to the fact that in semantic web services, semantic information- all description and signatures- is defined by ontology language, we use some of the mapping rules to estimate a correlation between services for composability. Then we... 

    NeSReC: A news meta-search engines result clustering tool

    , Article 2006 International Conference on Systems, Computing Sciences and Software Engineering, SCSS 2006, Part of the International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering, CISSE 2006, 4 December 2006 through 14 December 2006 ; 2007 , Pages 173-178 ; 9781402062636 (ISBN) Sayyadi, H ; Salehi, S ; Abolhassani, H ; Sharif University of Technology
    2007
    Abstract
    Recent years have witnessed an explosion in the availability of news articles on the World Wide Web. In addition, organizing the results of a news search facilitates the user(s) in overviewing the returned news. In this work, we have focused on the label-based clustering approaches for news meta-search engines, and which clusters news articles based on their topics. Furthermore, our engine for NEws meta-Search REsult Clustering (NeSReC) is implemented along. NeSReC takes queries from the users and collect the snippets of news which are retrieved by The Altavista News Search Engine for the queries. Afterwards, it performs the hierarchical clustering and labeling based on news snippets in a... 

    Web driven alert verification

    , Article 2014 11th International ISC Conference on Information Security and Cryptology, ISCISC 2014 ; Sep , 2014 , p. 180-185 Najafi, A ; Sepahi, A ; Jalili, R ; Sharif University of Technology
    Abstract
    A web attack is an attack against a web server through the HTTP Protocol. By analyzing known web attacks, we find out that each one has its own behavior. Vestiges of their behavior could be detected in non-body parts of the HTTP Protocol. Such information can be used to verify web alerts generated by Web Application Firewalls (WAFs) and Web Intrusion Detection Systems (Web IDSs). In this paper, we propose a method to verify web alerts generated by mentioned sensors. The goal of the alert verification component is to eliminate or tag alerts that do not represent successful attacks. Our approach is based on analyzing HTTP Transaction metadata, including Request method, Request Headers, Status... 

    Network reconstruction under compressive sensing

    , Article Proceedings of the 2012 ASE International Conference on Social Informatics, SocialInformatics ; 2013 , Pages 19-25 ; 9780769550152 (ISBN) Siyari, P ; Rabiee, H. R ; Salehi, M ; Mehdiabadi, M. E ; Academy of Science and Engineering (ASE) ; Sharif University of Technology
    2013
    Abstract
    Many real-world systems and applications such as World Wide Web, and social interactions can be modeled as networks of interacting nodes. However, in many cases, one encounters the situation where the pattern of the node-to-node interactions (i.e., edges) or the structure of a network is unknown. We address this issue by studying the Network Reconstruction Problem: Given a network with missing edges, how is it possible to uncover the network structure based on certain observable quantities extracted from partial measurements? We propose a novel framework called CS-NetRec based on a newly emerged paradigm in sparse signal recovery called Compressive Sensing (CS). The results demonstrate that...