Sciweavers

445 search results - page 46 / 89
» Anomalies in ontologies with rules
Sort
View
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
14 years 2 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
SEMWEB
2009
Springer
14 years 4 months ago
Recommendations for Qualitative Ontology Matching Evaluations
This paper suggests appropriate rules to set up ontology matching evaluations and for golden standard construction and use which can significantly improve the quality of the preci...
Aliaksandr Autayeu, Vincenzo Maltese, Pierre Andre...
ER
2005
Springer
146views Database» more  ER 2005»
14 years 3 months ago
Kuaba Ontology: Design Rationale Representation and Reuse in Model-Based Designs
This paper presents the Kuaba Ontology, a knowledge representation model for Design Rationale described in an ontology definition language. The representation of this model in a sp...
Adriana Pereira de Medeiros, Daniel Schwabe, Bruno...
COMPSAC
2008
IEEE
13 years 11 months ago
Fabrication of Ontology for Security in Health Care Systems
Given the widespread intimidation state of affairs, there is a gripping want to enlarge architectures, algorithms, and protocols to apprehend a trustworthy network infrastructure....
J. Indumathi, G. V. Uma
GIR
2007
ACM
14 years 1 months ago
Building place ontologies for the semantic web: : issues and approaches
Place geo-ontologies have a key role to play in the development of the geospatial-semantic web, with regard to facilitating the search for geographical information and resources. ...
Alia I. Abdelmoty, Philip D. Smart, Christopher B....