Sciweavers

5748 search results - page 1071 / 1150
» Contexts for the Semantic Web
Sort
View
ECIR
2010
Springer
14 years 8 months ago
Biometric Response as a Source of Query Independent Scoring in Lifelog Retrieval
Personal lifelog archives contain digital records captured from an individual’s daily life, e.g. emails, web pages downloaded and SMSs sent or received. While capturing this info...
Liadh Kelly, Gareth J. F. Jones
IAJIT
2010
133views more  IAJIT 2010»
14 years 8 months ago
Mediation Queries Adaptation After the Removal of a Data Source
: A broad variety of data is available in distinct heterogeneous sources, stored under different formats: database formats (in relational and object-oriented models), document form...
Latifa Baba-hamed
ICWS
2010
IEEE
14 years 8 months ago
User Experience in Added Value Location-Based Mobile Music Service
— In this paper, the user experience in added value location-based mobile music service called the City Night Life (CNL) is evaluated and analyzed. The CNL service provides recom...
Timo Koskela, Sari Järvinen, Meirong Liu, Mik...
PVLDB
2010
120views more  PVLDB 2010»
14 years 8 months ago
Sampling the Repairs of Functional Dependency Violations under Hard Constraints
Violations of functional dependencies (FDs) are common in practice, often arising in the context of data integration or Web data extraction. Resolving these violations is known to...
George Beskales, Ihab F. Ilyas, Lukasz Golab
EMNLP
2010
14 years 7 months ago
Practical Linguistic Steganography Using Contextual Synonym Substitution and Vertex Colour Coding
Linguistic Steganography is concerned with hiding information in natural language text. One of the major transformations used in Linguistic Steganography is synonym substitution. ...
Ching-Yun Chang, Stephen Clark
« Prev « First page 1071 / 1150 Last » Next »