Sciweavers

SCHOLARPEDIA
2010
80views more  SCHOLARPEDIA 2010»
13 years 2 months ago
Working memory
—Studies of attention and working memory address the fundamental limits in our ability to encode and maintain behaviorally relevant information, processes that are critical for g...
Alan Baddeley
SAC
2010
ACM
13 years 2 months ago
Cooperation enablement for centralistic early warning systems
From large-scale acquisition of information on security incidents by early warning systems (EWS) arises the opportunity to draw up a situation picture that allows detection of tre...
Ulrich Flegel, Johannes Hoffmann, Michael Meier
RR
2010
Springer
13 years 2 months ago
Query-Based Access Control for Ontologies
Role-based access control is a standard mechanism in information systems. Based on the role a user has, certain information is kept from the user even if requested. For ontologies ...
Martin Knechtel, Heiner Stuckenschmidt
PVLDB
2010
81views more  PVLDB 2010»
13 years 2 months ago
SOLOMON: Seeking the Truth Via Copying Detection
We live in the Information Era, with access to a huge amount of information from a variety of data sources. However, data sources are of different qualities, often providing conï¬...
Xin Dong, Laure Berti-Equille, Yifan Hu, Divesh Sr...
PVLDB
2010
115views more  PVLDB 2010»
13 years 2 months ago
ROXXI: Reviving witness dOcuments to eXplore eXtracted Information
In recent years, there has been considerable research on information extraction and constructing RDF knowledge bases. In general, the goal is to extract all relevant information f...
Shady Elbassuoni, Katja Hose, Steffen Metzger, Ral...
PERCOM
2010
ACM
13 years 2 months ago
Exploring ambient visualizations of context information
— In this paper we investigate how ambient displays can be used to share context information. Currently, many personal devices provide context information, such as location or ac...
Florian Alt, Alireza Sahami Shirazi, Andreas Kaise...
P2P
2010
IEEE
207views Communications» more  P2P 2010»
13 years 2 months ago
Local Access to Sparse and Large Global Information in P2P Networks: A Case for Compressive Sensing
—In this paper we face the following problem: how to provide each peer local access to the full information (not just a summary) that is distributed over all edges of an overlay ...
Rossano Gaeta, Marco Grangetto, Matteo Sereno
MODELS
2010
Springer
13 years 2 months ago
Concern-Based (de)composition of Model-Driven Software Development Processes
An MDSD process is often organised as transformation chain. This can threaten the Separation of Concerns (SoC) principle, because information is replicated in, scattered over, and ...
Jendrik Johannes, Uwe Aßmann
KES
2010
Springer
13 years 2 months ago
From Information to Sense-Making: Fetching and Querying Semantic Repositories
Information, its gathering, sharing, and storage, is growing at a very rapid rate. Information turned into knowledge leads to sensemaking. Ontologies, and their representations in ...
Tope Omitola, Ian Millard, Hugh Glaser, Nicholas G...
KDD
2010
ACM
300views Data Mining» more  KDD 2010»
13 years 2 months ago
Using data mining techniques to address critical information exchange needs in disaster affected public-private networks
Crisis Management and Disaster Recovery have gained immense importance in the wake of recent man and nature inflicted calamities. A critical problem in a crisis situation is how t...
Li Zheng, Chao Shen, Liang Tang, Tao Li, Steven Lu...