Sciweavers

3514 search results - page 395 / 703
» Software Process Modeling: Principles of Entity Process Mode...
Sort
View
126
Voted
WWW
2007
ACM
16 years 4 months ago
The largest scholarly semantic network...ever
Scholarly entities, such as articles, journals, authors and institutions, are now mostly ranked according to expert opinion and citation data. The Andrew W. Mellon Foundation fund...
Johan Bollen, Marko A. Rodriguez, Herbert Van de S...
140
Voted
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
16 years 3 months ago
Transforming data to satisfy privacy constraints
Data on individuals and entities are being collected widely. These data can contain information that explicitly identifies the individual (e.g., social security number). Data can ...
Vijay S. Iyengar
110
Voted
ENVSOFT
2006
72views more  ENVSOFT 2006»
15 years 3 months ago
Integrating legacy components into a software system for storm sewer simulation
This paper presents an approach that integrates a legacy component into a software system for storm sewer simulation. The legacy component employed here is the Storm Water Managem...
Shiu-Shin Lin, Shang-Hsien Hsieh, Jan-Tai Kuo, Yin...
IJSWIS
2006
83views more  IJSWIS 2006»
15 years 3 months ago
Semantic Enrichment in Ontologies for Matching
Ontology matching (or mapping)--finding correspondences between semantically related entities of heterogeneous ontologies--becomes crucial for interoperability in distributed and ...
Nwe Ni Tun, Satoshi Tojo
133
Voted
JCP
2008
116views more  JCP 2008»
15 years 3 months ago
Formal Verification and Visualization of Security Policies
Verified and validated security policies are essential components of high assurance computer systems. The design and implementation of security policies are fundamental processes i...
Luay A. Wahsheh, Daniel Conte de Leon, Jim Alves-F...