


default search action
ACM Transactions on the Web, Volume 13
Volume 13, Number 1, February 2019
- Shomir Wilson, Florian Schaub, Frederick Liu, Kanthashree Mysore Sathyendra, Daniel Smullen, Sebastian Zimmeck, Rohan Ramanath, Peter Story

, Fei Liu, Norman M. Sadeh, Noah A. Smith:
Analyzing Privacy Policies at Scale: From Crowdsourcing to Automated Annotations. 1:1-1:29 - Dionysis Athanasopoulos

, Apostolos V. Zarras:
Mining Abstract XML Data-Types. 2:1-2:37 - Marco Anisetti, Claudio A. Ardagna

, Ernesto Damiani, Gianluca Polegri:
Test-Based Security Certification of Composite Services. 3:1-3:43 - Elissa M. Redmiles, Eszter Hargittai

:
New Phone, Who Dis? Modeling Millennials' Backup Behavior. 4:1-4:14 - Patrice Calégari

, Marc Levrier, Pawel Balczynski:
Web Portals for High-performance Computing: A Survey. 5:1-5:36 - Daniel M. Romero, Brian Uzzi

, Jon M. Kleinberg:
Social Networks under Stress: Specialized Team Roles and Their Communication Structure. 6:1-6:24 - Zafar Gilani, Reza Farahbakhsh, Gareth Tyson, Jon Crowcroft:

A Large-scale Behavioural Analysis of Bots and Humans on Twitter. 7:1-7:23
Volume 13, Number 2, April 2019
- Steffen Thoma

, Andreas Thalhammer, Andreas Harth, Rudi Studer:
FusE: Entity-Centric Data Fusion on Linked Data. 8:1-8:36 - Julián Alarte

, Josep Silva
, Salvador Tamarit:
What Web Template Extractor Should I Use? A Benchmarking and Comparison for Five Template Extractors. 9:1-9:19 - Michela Del Vicario, Walter Quattrociocchi

, Antonio Scala
, Fabiana Zollo
:
Polarization and Fake News: Early Warning of Potential Misinformation Targets. 10:1-10:22 - Stefano Cresci

, Fabrizio Lillo, Daniele Regoli
, Serena Tardelli
, Maurizio Tesconi:
Cashtag Piggybacking: Uncovering Spam and Bot Activity in Stock Microblogs on Twitter. 11:1-11:27 - Willian Massami Watanabe

, Giovana Lázaro Amêndola, Fagner Christian Paes:
Layout Cross-Platform and Cross-Browser Incompatibilities Detection using Classification of DOM Elements. 12:1-12:27 - Stephan Sigg

, Eemil Lagerspetz
, Ella Peltonen
, Petteri Nurmi
, Sasu Tarkoma
:
Exploiting Usage to Predict Instantaneous App Popularity: Trend Filters and Retention Rates. 13:1-13:25
Volume 13, Number 3, November 2019
- Wafa Alorainy, Pete Burnap, Han Liu, Matthew L. Williams:

"The Enemy Among Us": Detecting Cyber Hate Speech with Threats-based Othering Language Embeddings. 14:1-14:26 - Liping Zhao

, Pericles Loucopoulos, Evangelia Kavakli, Keletso Letsholo
:
User Studies on End-User Service Composition: A Literature Review and a Design Framework. 15:1-15:46 - Abir De

, Sourangshu Bhattacharya
, Parantapa Bhattacharya
, Niloy Ganguly
, Soumen Chakrabarti:
Learning Linear Influence Models in Social Networks from Transient Opinion Dynamics. 16:1-16:33 - Despoina Chatzakou

, Ilias Leontiadis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Athena Vakali, Nicolas Kourtellis:
Detecting Cyberbullying and Cyberaggression in Social Media. 17:1-17:51
Volume 13, Number 4, December 2019
- Diego Perino, Matteo Varvello, Claudio Soriente:

Long-term Measurement and Analysis of the Free Proxy Ecosystem. 18:1-18:22 - Daxin Liu

, Gong Cheng, Qingxia Liu, Yuzhong Qu:
Fast and Practical Snippet Generation for RDF Datasets. 19:1-19:38 - Edimar Manica, Carina Friedrich Dorneles

, Renata Galante:
Combining URL and HTML Features for Entity Discovery in the Web. 20:1-20:27 - Weiren Yu, Julie A. McCann, Chengyuan Zhang:

Efficient Pairwise Penetrating-rank Similarity Retrieval. 21:1-21:52

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














