Sciweavers

941 search results - page 167 / 189
» Mathematics on the (Semantic) NET
Sort
View
89
Voted
MOBICOM
2010
ACM
14 years 9 months ago
Privacy vulnerability of published anonymous mobility traces
Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban sensing networks. Althou...
Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip, Na...
KDD
2009
ACM
243views Data Mining» more  KDD 2009»
15 years 10 months ago
Exploiting Wikipedia as external knowledge for document clustering
In traditional text clustering methods, documents are represented as "bags of words" without considering the semantic information of each document. For instance, if two ...
Xiaohua Hu, Xiaodan Zhang, Caimei Lu, E. K. Park, ...
77
Voted
CHI
2006
ACM
15 years 10 months ago
A goal-oriented web browser
Many users are familiar with the interesting but limited functionality of Data Detector interfaces like Microsoft's Smart Tags and Google's AutoLink. In this paper we si...
Alexander Faaborg, Henry Lieberman
79
Voted
ICALT
2005
IEEE
15 years 3 months ago
Empirical Validation of Concept Maps: Preliminary Methodological Considerations
For their usage in the semantic web, valid ontologies are required for a given domain. Here we focus on ontologies represented as concept maps (semantic nets). For one and the sam...
Dietrich Albert, Christina M. Steiner
99
Voted
IEEESCC
2005
IEEE
15 years 3 months ago
Web Services Composition: A Story of Models, Automata, and Logics
eal world”, represented abstractly using (time-varying) first-order logic predicates and terms. A representative composition result [11] here uses a translation into Petri nets. ...
Richard Hull