Identity theft through phishing attacks has become a major concern for Internet users. Typically, phishing attacks aim at luring the user to a faked web site to disclose personal ...
Sebastian Gajek, Ahmad-Reza Sadeghi, Christian St&...
: The Open Grid Service Infrastructure (OGSI) has been designed to facilitate the creation of multiple, interoperable Grid Service hosting environments, but to date only one fully ...
Glenn S. Wasson, Norm Beekwilder, Mark M. Morgan, ...
Linked Data semantic sources, in particular DBpedia, can be used to answer many user queries. PowerAqua is an open multi-ontology Question Answering (QA) system for the Semantic We...
Vanessa Lopez, Andriy Nikolov, Marta Sabou, Victor...
Contemporary use of the term ’intension’ derives from the traditional logical doctrine that an idea has both an extension and an intension. In this paper we introduce an intens...
Depending on a web searcher’s familiarity with a query’s target topic, it may be more appropriate to show her introductory or advanced documents. The TREC HARD [1] track defi...