Sciweavers

12836 search results - page 2210 / 2568
» Generalization Methods in Bioinformatics
Sort
View
WWW
2003
ACM
16 years 5 months ago
On deep annotation
The success of the Semantic Web crucially depends on the easy creation, integration and use of semantic data. For this purpose, we consider an integration scenario that defies cor...
Siegfried Handschuh, Steffen Staab, Raphael Volz
WWW
2003
ACM
16 years 5 months ago
Adaptive ranking of web pages
In this paper, we consider the possibility of altering the PageRank of web pages, from an administrator's point of view, through the modification of the PageRank equation. It...
Ah Chung Tsoi, Gianni Morini, Franco Scarselli, Ma...
ECOOP
2009
Springer
16 years 5 months ago
Featherweight Jigsaw: A Minimal Core Calculus for Modular Composition of Classes
We present FJig, a simple calculus where basic building blocks are classes in the style of Featherweight Java, declaring elds, methods and one constructor. However, inheritance has...
Giovanni Lagorio, Marco Servetto, Elena Zucca
CAV
2009
Springer
206views Hardware» more  CAV 2009»
16 years 5 months ago
D-Finder: A Tool for Compositional Deadlock Detection and Verification
D-Finder tool implements a compositional method for the verification of component-based systems described in BIP language encompassing multi-party interaction. For deadlock detecti...
Saddek Bensalem, Marius Bozga, Thanh-Hung Nguyen, ...
141
Voted
KDD
2009
ACM
174views Data Mining» more  KDD 2009»
16 years 5 months ago
Audience selection for on-line brand advertising: privacy-friendly social network targeting
This paper describes and evaluates privacy-friendly methods for extracting quasi-social networks from browser behavior on user-generated content sites, for the purpose of finding ...
Foster J. Provost, Brian Dalessandro, Rod Hook, Xi...
« Prev « First page 2210 / 2568 Last » Next »