Sciweavers

1943 search results - page 319 / 389
» Web application security engineering
Sort
View
JUCS
2010
179views more  JUCS 2010»
15 years 1 months ago
Ontology Visualization: Tools and Techniques for Visual Representation of Semi-Structured Meta-Data
: Ontologies are used to represent a variety of domain knowledge and data collections, scopes, viewpoints and linked heterogeneous information sources. They range from simple topol...
Monika Lanzenberger, Jennifer Sampson, Markus Rest...
WWW
2009
ACM
16 years 3 months ago
idMesh: graph-based disambiguation of linked data
We tackle the problem of disambiguating entities on the Web. We propose a user-driven scheme where graphs of entities ? represented by globally identifiable declarative artifacts ...
Hermann de Meer, Karl Aberer, Michael Jost, Parisa...
KDD
2009
ACM
190views Data Mining» more  KDD 2009»
16 years 3 months ago
Named entity mining from click-through data using weakly supervised latent dirichlet allocation
This paper addresses Named Entity Mining (NEM), in which we mine knowledge about named entities such as movies, games, and books from a huge amount of data. NEM is potentially use...
Gu Xu, Shuang-Hong Yang, Hang Li
ACMIDC
2009
15 years 7 months ago
How children search the internet with keyword interfaces
Children are among the most frequent users of the Internet, yet searching and browsing the web can present many challenges. Studies over the past two decades on how children searc...
Allison Druin, Elizabeth Foss, Leshell Hatley, Eva...
SIGSOFT
2007
ACM
16 years 3 months ago
Model checking service compositions under resource constraints
When enacting a web service orchestration defined using the Business Process Execution Language (BPEL) we observed various safety property violations. This surprised us considerab...
David S. Rosenblum, Howard Foster, Jeff Kramer, Je...