Sciweavers

255 search results - page 32 / 51
» Principles for Entity Authentication
Sort
View
74
Voted
ICCS
2005
Springer
15 years 3 months ago
Language Technologies Meet Ontology Acquisition
This paper overviews and analyses the on-going research attempts to apply language technologies to automatic ontology acquisition. At first glance there are many successful approac...
Galia Angelova
OTM
2005
Springer
15 years 3 months ago
Inferring Complex Semantic Mappings Between Relational Tables and Ontologies from Simple Correspondences
There are many problems requiring a semantic account of a database schema. At its best, such an account consists of mapping formulas between the schema and a formal conceptual mode...
Yuan An, Alexander Borgida, John Mylopoulos
70
Voted
HICSS
2003
IEEE
123views Biometrics» more  HICSS 2003»
15 years 3 months ago
Structuring Business Models in a Web Representation
In the context of knowledge-intensive work, making the relevant knowledge available to the people needing it for their work is a key issue. One approach is to capture such knowled...
Hermann Kaindl
DMIN
2007
110views Data Mining» more  DMIN 2007»
14 years 11 months ago
Mining for Structural Anomalies in Graph-based Data
—In this paper we present graph-based approaches to mining for anomalies in domains where the anomalies consist of unexpected entity/relationship alterations that closely resembl...
William Eberle, Lawrence B. Holder
CIIT
2004
14 years 11 months ago
Optimisation of BFWA networks using emergent intelligence
This paper presents a detailed account of a novel scheme for finding profit optimal BFWA networks, extending an existing network optimisation tool, and using the principles of eme...
Archie A. Wade, Steve Hurley, Stuart M. Allen, Ric...