Sciweavers

1171 search results - page 220 / 235
» I18n of Semantic Web Applications
Sort
View
IMCS
2007
78views more  IMCS 2007»
14 years 9 months ago
Usable set-up of runtime security policies
Setting up runtime security policies as required for firewalls or as envisioned by policy languages for the Semantic Web is a difficult task, especially for lay users who have l...
Almut Herzog, Nahid Shahmehri
CIKM
2010
Springer
14 years 8 months ago
Visual cube and on-line analytical processing of images
On-Line Analytical Processing (OLAP) has shown great success in many industry applications, including sales, marketing, management, financial data analysis, etc. In this paper, w...
Xin Jin, Jiawei Han, Liangliang Cao, Jiebo Luo, Bo...
JBCS
2010
85views more  JBCS 2010»
14 years 4 months ago
OWL schema matching
Schema matching is a fundamental issue to many database applications, such as query mediation and data warehousing. It becomes a challenge when different vocabularies are used to r...
Luiz André P. Paes Leme, Marco A. Casanova,...
ML
2010
ACM
175views Machine Learning» more  ML 2010»
14 years 4 months ago
Concept learning in description logics using refinement operators
With the advent of the Semantic Web, description logics have become one of the most prominent paradigms for knowledge representation and reasoning. Progress in research and applica...
Jens Lehmann, Pascal Hitzler
CIKM
2011
Springer
13 years 9 months ago
Keyword search over RDF graphs
Large knowledge bases consisting of entities and relationships between them have become vital sources of information for many applications. Most of these knowledge bases adopt the...
Shady Elbassuoni, Roi Blanco