Sciweavers

545 search results - page 59 / 109
» Trust Networks on the Semantic Web
Sort
View
NDSS
2009
IEEE
15 years 8 months ago
Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense
Cross-site scripting (or XSS) has been the most dominant class of web vulnerabilities in 2007. The main underlying reason for XSS vulnerabilities is that web markup and client-sid...
Yacin Nadji, Prateek Saxena, Dawn Song
ESWS
2010
Springer
15 years 6 months ago
Mobile Semantic-Based Matchmaking: A Fuzzy DL Approach
Novel wireless handheld devices allow the adoption of revised and adapted discovery approaches originally devised for the Semantic Web in mobile ad-hoc networks. Nevertheless, capa...
Michele Ruta, Floriano Scioscia, Eugenio Di Sciasc...
WEBI
2007
Springer
15 years 8 months ago
Semantic Convergence of Wikipedia Articles
Social networking, distributed problem solving and human computation have gained high visibility. Wikipedia is a well established service that incorporates aspects of these three ...
Christopher Thomas, Amit P. Sheth
ASWC
2009
Springer
15 years 3 months ago
Semantic Rules on Drug Discovery Data
Aggregating and presenting a wide variety of information pertinent to the biological and pharmacological effects of chemical compounds will be a critical part of 21st century drug ...
Sashikiran Challa, David J. Wild, Ying Ding, Qian ...
113
Voted
OSDI
2002
ACM
16 years 2 months ago
Ivy: A Read/Write Peer-to-Peer File System
Ivy is a multi-user read/write peer-to-peer file system. Ivy has no centralized or dedicated components, and it provides useful integrity properties without requiring users to ful...
Athicha Muthitacharoen, Robert Morris, Thomer M. G...