Sciweavers

1179 search results - page 212 / 236
» Semantic Labeling of Data by Using the Web
Sort
View
102
Voted
SOUPS
2006
ACM
15 years 6 months ago
Decision strategies and susceptibility to phishing
Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legiti...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
ACL
2012
13 years 2 months ago
Collective Generation of Natural Image Descriptions
We present a holistic data-driven approach to image description generation, exploiting the vast amount of (noisy) parallel image data and associated natural language descriptions ...
Polina Kuznetsova, Vicente Ordonez, Alexander C. B...
SEMWEB
2009
Springer
15 years 7 months ago
Ontologies for User Interface Integration
There are different strategies to integrate software systems: integration on the data layer, on the business logic layer, and on the user interface layer. The latter area, recent...
Heiko Paulheim
SEMWEB
2009
Springer
15 years 7 months ago
An Algorithm for Learning with Probabilistic Description Logics
Probabilistic Description Logics are the basis of ontologies in the Semantic Web. Knowledge representation and reasoning for these logics have been extensively explored in the last...
José Eduardo Ochoa Luna, Fabio Gagliardi Co...
ICCSA
2007
Springer
15 years 6 months ago
ontoX - A Method for Ontology-Driven Information Extraction
Information Extraction (IE) is an important research field within the Artificial Intelligence community, for it tries to extract relevant information out of vast amounts of data....
Burcu Yildiz, Silvia Miksch