Sciweavers

4047 search results - page 662 / 810
» The Discrete Basis Problem
Sort
View
ACIIDS
2010
IEEE
172views Database» more  ACIIDS 2010»
15 years 9 months ago
Automatic Lexical Annotation Applied to the SCARLET Ontology Matcher
This paper proposes lexical annotation as an effective method to solve the ambiguity problems that affect ontology matchers. Lexical annotation associates to each ontology elemen...
Laura Po, Sonia Bergamaschi
ACSAC
2002
IEEE
15 years 9 months ago
Protecting Data from Malicious Software
Corruption or disclosure of sensitive user documents can be among the most lasting and costly effects of malicious software attacks. Many malicious programs specifically target fi...
Matthew Schmid, Frank Hill, Anup K. Ghosh
CSMR
2002
IEEE
15 years 9 months ago
Reengineering to the Web: A Reference Architecture
Reengineering existing (large-scale) applications to the web is a complex and highly challenging task. This is due to a variety of mostly demanding requirements for interactive we...
Uwe Zdun
EDOC
2002
IEEE
15 years 9 months ago
On Expressing and Monitoring Behaviour in Contracts
This paper addresses the problem of transforming natural language descriptions of contracts into a form that is suitable for automating various contract management functions. We i...
Zoran Milosevic, R. Geoff Dromey
HICSS
2002
IEEE
90views Biometrics» more  HICSS 2002»
15 years 9 months ago
Legitimate by Design: Towards Trusted Virtual Community Environments
Legitimacy is a key part of the social requirements specification for a trusted virtual community environment (VCE). If an environment is not seen as legitimate, social conflicts m...
Brian Whitworth, Aldo de Moor