Pages: pp. 769-770
Within the past decade, the World Wide Web has emerged as a critically important mechanism for information dissemination, retrieval, and electronic commerce. Research and development of the Web has been occurring at a rate that has rarely, if ever, been matched in other technological fields. The rapid development of the Web has been enabled by continuous breakthroughs in several areas including information retrieval and searching techniques, Web browsers, languages for representing information, and security. Efficient techniques for serving Web data, caching, load balancing, and replication have allowed Web sites to handle ever increasing amounts of traffic with reasonably high availability.
This special section includes seven papers on research which is laying the foundations for the future of the Web. The papers included in this issue are enhanced versions of seven of the best papers from the Eleventh International World Wide Web Conference (WWW2002) held 7-11 May, 2002, in Honolulu, Hawaii. These papers were selected from 72 papers accepted by the main refereed paper track of the conference out of a total pool of 454 submissions.
The first paper, entitled "Specifying and Enforcing Application-Level Web Security Policies," addresses vulnerabilities inherent in the code of a Web application itself. Several examples of common application-level attacks are presented. The authors present a scalable structuring mechanism for abstracting security policies from large Web applications developed in heterogeneous environments. They also describe tools they have built for programmers to develop secure applications, which are resilient to a wide range of common attacks.
The second paper, entitled "Topic-Sensitive PageRank: A Context-Sensitive Ranking Algorithm for Web Search," is geared to improving the ranking of search-query results. The author proposes computing a set of PageRank vectors, biased using a set of representative topics, to capture importance more accurately with respect to a particular topic. This contrasts with previous approaches, which only compute a single vector. The author shows that using multiple vectors in this fashion generates more accurate results than using a single vector.
The third paper, entitled "The Yin/Yang Web: A Unified Model for XML Syntax and RDF Semantics," provides a unified model for the Extensible Markup Language (XML) and the Resource Description Framework (RDF). These two standards from the World Wide Web Consortium underpin the Semantic Web: XML is used to write and exchange information, while RDF is used to describe the semantics of the information and to reason about it. The paper argues that the syntax and semantics of information need to work together in order to lead the Semantic Web to its full potential, and demonstrates the unified model through an information integration scenario.
The fourth paper, entitled "Scalable Consistency Maintenance in Content Distribution Networks Using Cooperative Leases," addresses cache consistency in content distribution networks. This important application area requires consistency maintenance across a large number of Web caches, with consistency guarantees that can be tailored to meet requirements. The paper introduces the notion of cooperative consistency, in which proxies cooperate with one another to reduce the overheads of consistency maintenance, and a single lease may be shared among multiple caches.
The fifth paper, entitled "Query Expansion by Mining User Logs," proposes a new method for query expansion based on user interactions recorded in the user logs. Queries to search engines are often too short to provide sufficient information for effectively selecting relevant documents, motivating query expansion. The authors' approach extracts correlations between query terms and document terms from user logs. The correlations are then used to select high-quality expansion terms for new queries.
The sixth paper, entitled "Managing and Sharing Servents' Reputations in P2P Systems," proposes an approach to peer-to-peer security in which servents can keep track of, and share with others, information about the reputation of their peers. Shared reputations are based on a distributed polling algorithm in which resource requestors can assess the reliability of providers before initiating downloads. The approach complements existing peer-to-peer protocols and maintains the current level of anonymity of requestors, providers, and other parties sharing views on reputations.
The seventh paper, entitled "Searching with Numbers," addresses an inadequacy in the handling of numbers in current search engines, which typically treat them as strings. It focuses on documents which largely consist of name-number pairs embedded in text, as exemplified by product information. The paper defines a notion called reflectivity, and shows that for low reflectivity data, it is possible to conduct an effective search even if the values in the data have not been assigned attribute names and the user has omitted attribute names in the query. It also addresses techniques for high reflectivity data and validates the approach using real data sets.
We would like to thank the many authors, program committee members, and other organizers who contributed to the success of the Eleventh International World Wide Web Conference (WWW2002).
Arun K. Iyengar and David De Roure