Sciweavers

342 search results - page 57 / 69
» Semantic Web Techniques for Personalization of eGovernment S...
Sort
View
JUCS
2006
225views more  JUCS 2006»
14 years 11 months ago
Restricting the View and Connecting the Dots - Dangers of a Web Search Engine Monopoly
: Everyone realizes how powerful the few big Web search engine companies have become, both in terms of financial resources due to soaring stock quotes and in terms of the still hid...
Narayanan Kulathuramaiyer, Wolf-Tilo Balke
WS
2010
ACM
14 years 10 months ago
Anomalies in ontologies with rules
For the development of practical semantic applications, ontologies are commonly used with rule extensions. Prominent examples of semantic applications are Semantic Wikis, Semantic...
Joachim Baumeister, Dietmar Seipel
78
Voted
LREC
2008
158views Education» more  LREC 2008»
15 years 1 months ago
Semi-automatic Building Method for a Multidimensional Affect Dictionary for a New Language
Detecting the tone or emotive content of a text message is increasingly important in many natural language processing applications. Examples of such applications are rating new bo...
Guillaume Pitel, Gregory Grefenstette
SIGMETRICS
2006
ACM
174views Hardware» more  SIGMETRICS 2006»
15 years 5 months ago
Understanding the management of client perceived response time
Understanding and managing the response time of web services is of key importance as dependence on the World Wide Web continues to grow. We present Remote Latency-based Management...
David P. Olshefski, Jason Nieh
CCS
2011
ACM
13 years 11 months ago
Cloak and dagger: dynamics of web search cloaking
Cloaking is a common “bait-and-switch” technique used to hide the true nature of a Web site by delivering blatantly different semantic content to different user segments. It i...
David Y. Wang, Stefan Savage, Geoffrey M. Voelker