Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legiti...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
The performance of an ontology alignment technique largely depends on the amount of information that can be leveraged for the alignment task. On the Semantic Web, end-users may ex...
Successful information management implies the ability to design accurate representations of the real world of interest, in spite of the diversity of perceptions from the applicati...
An emerging trend in Web computing aims at collecting and integrating distributed data. For instance, community driven efforts recently have build ontological repositories made of...
This paper provides an experience report for researchers who are interested in integrating their tools with the new IBM WebSphere Studio Workbench. The Workbench (open source at w...
Derek Rayside, Marin Litoiu, Margaret-Anne D. Stor...