With the proliferation of applications sharing information represented in multiple ontologies, the development of automatic methods for robust and accurate ontology matching will ...
Montse Cuadros, Egoitz Laparra, German Rigau, Piek...
Many organizations face every day the problem of effectively managing their contacts (customers, suppliers, partners, etc.), in terms of communication, clustering, networking, ana...
Irene Celino, Francesco Corcoglioniti, Emanuele De...
The goal of the LILA project was the collection of speech databases over cellular telephone networks of five languages in three Asian countries. Three languages were recorded in I...
Identity theft is an emerging threat in our networked world and more individuals and companies fall victim to this type of fraud. User training is an important part of ICT security...
In the conventional Peer-to-Peer (P2P) networks, many research projects or practical applications still use the keyword-based retrieval methods in the information searching compon...