Sciweavers

342 search results - page 57 / 69
» Semantic Web Techniques for Personalization of eGovernment S...
Sort
View
JUCS
2006
225views more  JUCS 2006»
15 years 1 months ago
Restricting the View and Connecting the Dots - Dangers of a Web Search Engine Monopoly
: Everyone realizes how powerful the few big Web search engine companies have become, both in terms of financial resources due to soaring stock quotes and in terms of the still hid...
Narayanan Kulathuramaiyer, Wolf-Tilo Balke
WS
2010
ACM
15 years 4 days ago
Anomalies in ontologies with rules
For the development of practical semantic applications, ontologies are commonly used with rule extensions. Prominent examples of semantic applications are Semantic Wikis, Semantic...
Joachim Baumeister, Dietmar Seipel
LREC
2008
158views Education» more  LREC 2008»
15 years 3 months ago
Semi-automatic Building Method for a Multidimensional Affect Dictionary for a New Language
Detecting the tone or emotive content of a text message is increasingly important in many natural language processing applications. Examples of such applications are rating new bo...
Guillaume Pitel, Gregory Grefenstette
151
Voted
SIGMETRICS
2006
ACM
174views Hardware» more  SIGMETRICS 2006»
15 years 7 months ago
Understanding the management of client perceived response time
Understanding and managing the response time of web services is of key importance as dependence on the World Wide Web continues to grow. We present Remote Latency-based Management...
David P. Olshefski, Jason Nieh
118
Voted
CCS
2011
ACM
14 years 1 months ago
Cloak and dagger: dynamics of web search cloaking
Cloaking is a common “bait-and-switch” technique used to hide the true nature of a Web site by delivering blatantly different semantic content to different user segments. It i...
David Y. Wang, Stefan Savage, Geoffrey M. Voelker