Sciweavers

2926 search results - page 473 / 586
» Document Analysis
Sort
View
GRC
2007
IEEE
15 years 10 months ago
Secure Similarity Search
— One of the most substantial ways to protect users’ sensitive information is encryption. This paper is about the keyword index search system on encrypted documents. It has bee...
Hyun-A Park, Bum Han Kim, Dong Hoon Lee, Yon Dohn ...
AIIA
2007
Springer
15 years 10 months ago
Harvesting Relational and Structured Knowledge for Ontology Building in the WPro Architecture
We present two algorithms for supporting semi-automatic ontology building, integrated in WPro, a new architecture for ontology learning from Web documents. The first algorithm auto...
Daniele Bagni, Marco Cappella, Maria Teresa Pazien...
HT
2006
ACM
15 years 9 months ago
Harvesting social knowledge from folksonomies
Collaborative tagging systems, or folksonomies, have the potential of becoming technological infrastructure to support knowledge management activities in an organization or a soci...
Harris Wu, Mohammad Zubair, Kurt Maly
JCDL
2006
ACM
152views Education» more  JCDL 2006»
15 years 9 months ago
Also by the same author: AKTiveAuthor, a citation graph approach to name disambiguation
The desire for definitive data and the semantic web drive for inference over heterogeneous data sources requires co-reference resolution to be performed on those data. In particul...
Duncan M. McRae-Spencer, Nigel R. Shadbolt
HICSS
2005
IEEE
133views Biometrics» more  HICSS 2005»
15 years 9 months ago
User-Oriented Relevance Judgment: A Conceptual Model
The concept of relevance has been heatedly debated in last decade. Not satisfied with the narrow and technical definition of system relevance, researchers turn to the subjective a...
Zhiwei Chen, Yunjie Xu