Sciweavers

2176 search results - page 406 / 436
» Refactoring Methods for Knowledge Bases
Sort
View
89
Voted
ADC
2009
Springer
122views Database» more  ADC 2009»
15 years 4 months ago
What is Required in Business Collaboration?
Access control has been studied for sometime, and there are a number of theories and techniques for handling access control for single or centralised systems; however, unique and ...
Daisy Daiqin He, Michael Compton, Kerry Taylor, Ji...
73
Voted
SEMWEB
2009
Springer
15 years 4 months ago
Processing OWL2 Ontologies using Thea: An Application of Logic Programming
Traditional object-oriented programming languages can be difficult to use when working with ontologies, leading to the creation of domain-specific languages designed specifically...
Vangelis Vassiliadis, Jan Wielemaker, Chris Mungal...
ACSAC
2008
IEEE
15 years 4 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
GIR
2006
ACM
15 years 3 months ago
Detecting Geographical Serving Area of Web Resources
Most human activities occur around where the user is physically located. Knowing the geographical serving area of web resources, therefore, is very important for many web applicat...
Qi Zhang, Xing Xie, Lee Wang, Lihua Yue, Wei-Ying ...
ICPP
2005
IEEE
15 years 3 months ago
A Hybrid Searching Scheme in Unstructured P2P Networks
The existing searching schemes in Peer-to-Peer (P2P) networks are either forwarding-based or non-forwarding based. In forwarding-based schemes, queries are forwarded from the quer...
Xiuqi Li, Jie Wu