Sciweavers

762 search results - page 115 / 153
» Two Approaches to Merging Knowledge Bases
Sort
View
92
Voted
BMCBI
2008
126views more  BMCBI 2008»
15 years 21 days ago
ISOL@: an Italian SOLAnaceae genomics resource
Background: Present-day `-omics' technologies produce overwhelming amounts of data which include genome sequences, information on gene expression (transcripts and proteins) a...
Maria Luisa Chiusano, Nunzio D'Agostino, Alessandr...
99
Voted
CIKM
2006
Springer
15 years 4 months ago
CP/CV: concept similarity mining without frequency information from domain describing taxonomies
Domain specific ontologies are heavily used in many applications. For instance, these form the bases on which similarity/dissimilarity between keywords are extracted for various k...
Jong Wook Kim, K. Selçuk Candan
93
Voted
ICSE
2007
IEEE-ACM
16 years 20 days ago
Modeling in Software Engineering
A data model is a plan for building a database and is comparable to an architect's building plans. There are two major methodologies used to create a data model: the EntityRe...
Joanne M. Atlee, Robert B. France, Geri Georg, Ana...
KAIS
2010
132views more  KAIS 2010»
14 years 11 months ago
Integrating multiple document features in language models for expert finding
We argue that expert finding is sensitive to multiple document features in an organizational intranet. These document features include multiple levels of associations between expe...
Jianhan Zhu, Xiangji Huang, Dawei Song, Stefan M. ...
109
Voted
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
15 years 4 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...