Sciweavers

772 search results - page 78 / 155
» Back to the Future: From Knowledge Management to Data Manage...
Sort
View
ICEIS
2002
IEEE
14 years 29 days ago
DIDAFIT: Detecting Intrusions in Databases Through Fingerprinting Transactions
: The most valuable information assets of an organization are often stored in databases and it is pertinent for such organizations to ensure the integrity and confidentiality of t...
Wai Lup Low, Joseph Lee, Peter Teoh
ICSM
2007
IEEE
14 years 2 months ago
On the prediction of the evolution of libre software projects
Libre (free / open source) software development is a complex phenomenon. Many actors (core developers, casual contributors, bug reporters, patch submitters, users, etc.), in many ...
Israel Herraiz, Jesús M. González-Ba...
GEOS
2007
Springer
14 years 2 months ago
The Gravity Data Ontology: Laying the Foundation for Workflow-Driven Ontologies
Abstract. A workflow-driven ontology is an ontology that encodes disciplinespecific knowledge in the form of concepts and relationships and that facilitates the composition of serv...
Ann Q. Gates, G. Randy Keller, Leonardo Salayandia...
COOPIS
1998
IEEE
13 years 11 months ago
Wrapper Generation for Web Accessible Data Sources
There is an increase in the number of data sources that can be queried across the WWW. Such sources typically support HTML forms-based interfaces and search engines query collecti...
Jean-Robert Gruser, Louiqa Raschid, Maria-Esther V...
ISI
2008
Springer
13 years 8 months ago
Data mining for social network analysis
A social network is defined as a social structure of individuals, who are related (directly or indirectly to each other) based on a common relation of interest, e.g. friendship, t...
J. Srivastava