Sciweavers

1365 search results - page 195 / 273
» Simple authentication for the web
Sort
View
IUI
2000
ACM
15 years 2 months ago
SUITOR: an attentive information system
Attentive systems pay attention to what users do so that they can attend to what users need. Such systems track user behavior, model user interests, and anticipate user desires an...
Paul P. Maglio, Rob Barrett, Christopher S. Campbe...
DL
2000
Springer
164views Digital Library» more  DL 2000»
15 years 2 months ago
Scalable browsing for large collections: a case study
Phrase browsing techniques use phrases extracted automatically from a large information collection as a basis for browsing and accessing it. This paper describes a case study that...
Gordon W. Paynter, Ian H. Witten, Sally Jo Cunning...
ICSE
1997
IEEE-ACM
15 years 2 months ago
Reuse of Off-the-Shelf Components in C2-Style Architectures
-- Reuse of large-grain software components offers the potential for significant savings in application development cost and time. Successful component reuse and substitutability ...
Nenad Medvidovic, Peyman Oreizy, Richard N. Taylor
ATAL
2006
Springer
15 years 1 months ago
Deriving axioms across ontologies
Ontologies play a key role in agent communication and the emerging Semantic Web. Axioms are an important component of ontologies to describe the relationships among the concepts. ...
Dejing Dou, Drew V. McDermott
EKAW
2006
Springer
15 years 1 months ago
Capturing Quantified Constraints in FOL, Through Interaction with a Relationship Graph
As new semantic web standards evolve to allow quantified rules in FOL, we need new ways to capture them from end users. We show how to do this against a graphic view of entities an...
Peter M. D. Gray, Graham J. L. Kemp