Ontology languages to represent ontologies exist in large numbers, and users who want to access or reuse ontologies can often be confronted with a language they do not know. Theref...
Patrick Ziegler, Christoph Sturm, Klaus R. Dittric...
As a severe threat in anonymized data publication, proximity breach is gaining increasing attention. Such breach occurs when an attacker learns with high confidence that the sensit...
Abstract. Despite the recent emergence of many large-scale networks in different application domains, an important measure that captures a participant’s diversity in the network ...
Lu Liu, Feida Zhu, Chen Chen, Xifeng Yan, Jiawei H...
Autism Spectrum Disorder is an inherently complex phenomenon requiring large studies of many different types to further understanding of its causes. The National Database for Auti...
Lynn Young, Samson W. Tu, Lakshika Tennakoon, Davi...
As the size of scientific and commercial datasets grows, it becomes imperative that an expressive metadata framework to be developed to facilitate access to the semantics of the d...