Sciweavers

823 search results - page 112 / 165
» Building Semantic Mappings from Databases to Ontologies
Sort
View
ISI
2006
Springer
13 years 8 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
MOBIDE
2003
ACM
14 years 2 months ago
Semantically driven service interoperability for pervasive computing
The common vision of pervasive computing environments requires a very large range of devices and software components to interoperate seamlessly. From the assumption that these dev...
Declan O'Sullivan, David Lewis
CIVR
2004
Springer
118views Image Analysis» more  CIVR 2004»
14 years 2 months ago
Use of Image Subset Features in Image Retrieval with Self-Organizing Maps
In content-based image retrieval (CBIR), the images in a database are indexed on the basis of low-level statistical features that can be automatically derived from the images. Due ...
Markus Koskela, Jorma Laaksonen, Erkki Oja
LREC
2010
141views Education» more  LREC 2010»
13 years 10 months ago
Evaluating Semantic Relations and Distances in the Associative Concept Dictionary using NIRS-imaging
In this study, we extracted brain activities related to semantic relations and distances to improve the precision of distance calculation among concepts in the Associated Concept ...
Nao Tatsumi, Jun Okamoto, Shun Ishizaki
WWW
2004
ACM
14 years 9 months ago
Towards the composition of Ad Hoc B2B Applications: Semantics, Properties and Complexity Management
The goal is to build a general framework for ad hoc applications over large networks using semantics and complex systems analysis. The first part deals with semantics because appl...
Jaime Delgado, Rosa Gil, Zièd Choukair