Sciweavers

1746 search results - page 246 / 350
» Understanding Semantic Web Applications
Sort
View
SOUPS
2006
ACM
15 years 9 months ago
Decision strategies and susceptibility to phishing
Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legiti...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
307
Voted
IEAAIE
2011
Springer
14 years 7 months ago
Informative Sentence Retrieval for Domain Specific Terminologies
Domain specific terminologies represent important concepts when students study a subject. If the sentences which describe important concepts related to a terminology can be accesse...
Jia-Ling Koh, Chin-Wei Cho
117
Voted
SKG
2005
IEEE
15 years 9 months ago
Converting the Industry Foundation Classes to the Web Ontology Language
The upcoming next generation of the internet, often referred to as the Semantic Web, will bring a lot of new technologies, one of which is the Web Ontology Language (OWL). One fea...
Hans Schevers, Robin Drogemuller
220
Voted
ICDE
2007
IEEE
173views Database» more  ICDE 2007»
16 years 4 months ago
Annotating Structured Data of the Deep Web
An increasing number of databases have become Web accessible through HTML form-based search interfaces. The data units returned from the underlying database are usually encoded in...
Yiyao Lu, Hai He, Hongkun Zhao, Weiyi Meng, Clemen...
122
Voted
SIGIR
2010
ACM
15 years 7 months ago
Prototype hierarchy based clustering for the categorization and navigation of web collections
This paper presents a novel prototype hierarchy based clustering (PHC) framework for the organization of web collections. It solves simultaneously the problem of categorizing web ...
Zhaoyan Ming, Kai Wang, Tat-Seng Chua