ACM DL

the Web (TWEB)

Menu

Search Issue
enter search term and/or author name

Archive


ACM Transactions on the Web (TWEB), Volume 9 Issue 3, June 2015

A UI-Centric Approach for the End-User Development of Multidevice Mashups
Cinzia Cappiello, Maristella Matera, Matteo Picozzi
Article No.: 11
DOI: 10.1145/2735632

In recent years, models, composition paradigms, and tools for mashup development have been proposed to support the integration of information sources, services and APIs available on the Web. The challenge is to provide a gate to a...

Sampling Content from Online Social Networks: Comparing Random vs. Expert Sampling of the Twitter Stream
Muhammad Bilal Zafar, Parantapa Bhattacharya, Niloy Ganguly, Krishna P. Gummadi, Saptarshi Ghosh
Article No.: 12
DOI: 10.1145/2743023

Analysis of content streams gathered from social networking sites such as Twitter has several applications ranging from content search and recommendation, news detection to business analytics. However, processing large amounts of data generated on...

Should We Use the Sample? Analyzing Datasets Sampled from Twitter’s Stream API
Yazhe Wang, Jamie Callan, Baihua Zheng
Article No.: 13
DOI: 10.1145/2746366

Researchers have begun studying content obtained from microblogging services such as Twitter to address a variety of technological, social, and commercial research questions. The large number of Twitter users and even larger volume of tweets often...

Reliable and Resilient Trust Management in Distributed Service Provision Networks
Zhiyuan Su, Ling Liu, Mingchu Li, Xinxin Fan, Yang Zhou
Article No.: 14
DOI: 10.1145/2754934

Distributed service networks are popular platforms for service providers to offer services to consumers and for service consumers to acquire services from unknown parties. eBay and Amazon are two well-known examples of enabling and hosting such...

A Supervised Learning Approach to Protect Client Authentication on the Web
Stefano Calzavara, Gabriele Tolomei, Andrea Casini, Michele Bugliesi, Salvatore Orlando
Article No.: 15
DOI: 10.1145/2754933

Browser-based defenses have recently been advocated as an effective mechanism to protect potentially insecure web applications against the threats of session hijacking, fixation, and related attacks. In existing approaches, all such defenses...

Detection of Political Manipulation in Online Communities through Measures of Effort and Collaboration
Sihyung Lee
Article No.: 16
DOI: 10.1145/2767134

Online social media allow users to interact with one another by sharing opinions, and these opinions have a critical impact on the way readers think and behave. Accordingly, an increasing number of <i>manipulators</i> deliberately...