Sciweavers

762 search results - page 68 / 153
» Using Web Data Provenance for Quality Assessment
Sort
View
AI
2005
Springer
15 years 1 months ago
Integrating Web Content Clustering into Web Log Association Rule Mining
Abstract. One of the effects of the general Internet growth is an immense number of user accesses to WWW resources. These accesses are recorded in the web server log files, which...
Jiayun Guo, Vlado Keselj, Qigang Gao
CAISE
2006
Springer
15 years 3 months ago
An Infrastructure for Building Semantic Web Portals
One important task of semantic web portals is to offer both end users and applications a seamless access to knowledge contained in heterogeneous data sources in specific user commu...
Yuangui Lei, Vanessa Lopez, Enrico Motta
INTERNET
2008
175views more  INTERNET 2008»
14 years 11 months ago
Mashing Up Search Services
through suitable abstractions and tools is a viable option for improving servicebased computations. T he past few years have witnessed end users' increasing involve ment in th...
Daniele Braga, Stefano Ceri, Florian Daniel, David...
SP
2008
IEEE
162views Security Privacy» more  SP 2008»
14 years 11 months ago
Fable: A Language for Enforcing User-defined Security Policies
This paper presents FABLE, a core formalism for a programming language in which programmers may specify security policies and reason that these policies are properly enforced. In ...
Nikhil Swamy, Brian J. Corcoran, Michael Hicks
GANDC
2011
105views more  GANDC 2011»
13 years 11 months ago
Adjacent versus coincident representations of geospatial uncertainty: Which promote better decisions?
3D geological models commonly built to manage natural resources are much affected by uncertainty because most of the subsurface is inaccessible to direct observation. Appropriate ...
Thomas Viard, Guillaume Caumon, Bruno Lévy