Sciweavers

786 search results - page 89 / 158
» Task Representation and Retrieval in an Ontology-Guided Mode...
Sort
View
JCP
2008
116views more  JCP 2008»
14 years 9 months ago
Formal Verification and Visualization of Security Policies
Verified and validated security policies are essential components of high assurance computer systems. The design and implementation of security policies are fundamental processes i...
Luay A. Wahsheh, Daniel Conte de Leon, Jim Alves-F...
SIGIR
2010
ACM
15 years 1 months ago
Entity information management in complex networks
Entity information management (EIM) is a nascent IR research area that investigates the information management process about entities instead of documents. It is motivated by the ...
Yi Fang
INEX
2007
Springer
15 years 3 months ago
Using and Detecting Links in Wikipedia
In this paper, we document our efforts at INEX 2007 where we participated in the Ad Hoc Track, the Link the Wiki Track, and the Interactive Track that continued from INEX 2006. Ou...
Khairun Nisa Fachry, Jaap Kamps, Marijn Koolen, Ju...
SIGIR
2009
ACM
15 years 4 months ago
Predicting user interests from contextual information
Search and recommendation systems must include contextual information to effectively model users’ interests. In this paper, we present a systematic study of the effectiveness of...
Ryen W. White, Peter Bailey, Liwei Chen
EKAW
2004
Springer
15 years 3 months ago
KATS: A Knowledge Acquisition Tool Based on Electronic Document Processing
This paper describes a particular knowledge acquisition tool for the construction and maintenance of the knowledge model of an intelligent system for emergency management in the fi...
Martín Molina, Gemma Blasco