Sciweavers

2084 search results - page 239 / 417
» Knowledge Exploitation from the Web
Sort
View
104
Voted
MMMACNS
2005
Springer
15 years 6 months ago
A Passive External Web Surveillance Technique for Private Networks
The variety and richness of what users browse on the Internet has made the communications of web-browsing hosts an attractive target for surveillance. We show that passive external...
Constantine Daicos, Scott Knight
129
Voted
IJMSO
2007
201views more  IJMSO 2007»
15 years 15 days ago
A context-aware meeting alert using semantic web and rule technology
This paper describes work in progress developing a context-aware meeting alert. This application integrates semantic web technology in RDF (for representing calendars), semantic we...
Grigoris Antoniou, Antonis Bikakis, Anna Karamoleg...
111
Voted
IJCNN
2007
IEEE
15 years 7 months ago
An Associative Memory for Association Rule Mining
— Association Rule Mining is a thoroughly studied problem in Data Mining. Its solution has been aimed for by approaches based on different strategies involving, for instance, the...
Vicente O. Baez-Monroy, Simon O'Keefe
203
Voted
ICDE
2000
IEEE
99views Database» more  ICDE 2000»
16 years 1 months ago
XWRAP: An XML-Enabled Wrapper Construction System for Web Information Sources
This paper describes the methodology and the software development of XWRAP, an XML-enabled wrapper construction system for semi-automatic generation of wrapper programs. By XML-ena...
Ling Liu, Calton Pu, Wei Han
125
Voted
NCA
2003
IEEE
15 years 5 months ago
Web Proxy Cache Replacement: Do's, Don'ts, and Expectations
Numerous research efforts have produced a large number of algorithms and mechanisms for web proxy caches. In order to build powerful web proxies and understand their performance, ...
Peter Triantafillou, Ioannis Aekaterinidis