Sciweavers

5544 search results - page 929 / 1109
» Three Inadequate Models
Sort
View
174
Voted
WWW
2010
ACM
15 years 1 months ago
A framework for trust establishment and assessment on the web of data
With the enormous and still growing amount of data and user interaction on the Web, it becomes more and more necessary for data consumers to be able to assess the trustworthiness ...
Qi Gao, Geert-Jan Houben
125
Voted
CORR
2010
Springer
114views Education» more  CORR 2010»
15 years 1 months ago
Efficiently Discovering Hammock Paths from Induced Similarity Networks
ty networks are important abstractions in many information management applications such as recommender systems, corpora analysis, and medical informatics. For instance, in a recom...
M. Shahriar Hossain, Michael Narayan, Naren Ramakr...
163
Voted
ADAEUROPE
2010
Springer
15 years 1 months ago
Scheduling Configuration of Real-Time Component-Based Applications
Abstract: This paper proposes a strategy to manage the schedulability of realtime component-based applications that is fully compatible with the concept of component viewed as a re...
Patricia López Martínez, Laura Barro...
131
Voted
CEC
2010
IEEE
15 years 1 months ago
Active Learning Genetic programming for record deduplication
The great majority of genetic programming (GP) algorithms that deal with the classification problem follow a supervised approach, i.e., they consider that all fitness cases availab...
Junio de Freitas, Gisele L. Pappa, Altigran Soares...
129
Voted
CLOUDCOM
2010
Springer
15 years 1 months ago
A Token-Based Access Control System for RDF Data in the Clouds
The Semantic Web is gaining immense popularity-and with it, the Resource Description Framework (RDF) broadly used to model Semantic Web content. However, access control on RDF sto...
Arindam Khaled, Mohammad Farhan Husain, Latifur Kh...