Sciweavers

1943 search results - page 222 / 389
» Web application security engineering
Sort
View
125
Voted
AAAI
2007
15 years 5 months ago
On Capturing Semantics in Ontology Mapping
Ontology mapping is a complex and necessary task for many Semantic Web (SW) applications. The perspective users are faced with a number of challenges including the difficulties o...
Bo Hu, Srinandan Dasmahapatra, Paul H. Lewis, Nige...
146
Voted
ISMIR
2000
Springer
146views Music» more  ISMIR 2000»
15 years 7 months ago
Perceptual and Cognitive Applications in Music Information Retrieval
Music librarians and cataloguers have traditionally created indexes that allow users to access musical works using standard reference information, such as the name of the composer...
David Huron
132
Voted
WSDM
2009
ACM
178views Data Mining» more  WSDM 2009»
15 years 10 months ago
User Browsing Graph: Structure, Evolution and Application
This paper focuses on ‘user browsing graph’ which is constructed with users’ click-through behavior modeled with Web access logs. User browsing graph has recently been adopt...
Yiqun Liu, Min Zhang, Shaoping Ma, Liyun Ru
MM
2009
ACM
203views Multimedia» more  MM 2009»
15 years 8 months ago
Distance metric learning from uncertain side information with application to automated photo tagging
Automated photo tagging is essential to make massive unlabeled photos searchable by text search engines. Conventional image annotation approaches, though working reasonably well o...
Lei Wu, Steven C. H. Hoi, Rong Jin, Jianke Zhu, Ne...
114
Voted
STEP
2003
IEEE
15 years 8 months ago
Using Grid Technologies for Web-Enabling Legacy Systems
The adoption of the Internet technologies favors the diffusion of Web and Grid-based applications. However, the development of new applications exploiting the modern interfaces an...
Thierry Bodhuin, Maria Tortorella