Sciweavers

1466 search results - page 198 / 294
» Completeness of the Authentication Tests
Sort
View
SEMWEB
2009
Springer
14 years 2 months ago
Learning Semantic Query Suggestions
An important application of semantic web technology is recognizing human-defined concepts in text. Query transformation is a strategy often used in search engines to derive querie...
Edgar Meij, Marc Bron, Laura Hollink, Bouke Huurni...
SEMWEB
2009
Springer
14 years 2 months ago
ASMOV: Results for OAEI 2009
The Automated Semantic Mapping of Ontologies with Validation (ASMOV) algorithm for ontology alignment was one of the top performing algorithms in the 2007 and 2008 Ontology Alignme...
Yves R. Jean-Mary, E. Patrick Shironoshita, Mansur...
ASSETS
2009
ACM
14 years 2 months ago
Accessible videodescription On-Demand
Providing blind and visually impaired people with the descriptions of key visual elements can greatly improve the accessibility of video, film and television. This project present...
Claude Chapdelaine, Langis Gagnon
EICS
2009
ACM
14 years 2 months ago
How usable are operational digital libraries: a usability evaluation of system interactions
This paper reports a usability evaluation of three operational digital libraries (DLs): the ACM DL, the IEEE Computer Society DL, and the IEEE Xplore DL. An experiment was conduct...
Xiangmin Zhang, Jingjing Liu, Yuelin Li, Ying Zhan...
SOUPS
2009
ACM
14 years 2 months ago
Games for extracting randomness
Randomness is a necessary ingredient in various computational tasks and especially in Cryptography, yet many existing mechanisms for obtaining randomness suffer from numerous pro...
Ran Halprin, Moni Naor