Sciweavers

157 search results - page 28 / 32
» Detecting semantic cloaking on the web
Sort
View
ICASSP
2008
IEEE
14 years 2 months ago
Automatic lecture transcription by exploiting presentation slide information for language model adaptation
The paper addresses language model adaptation for automatic lecture transcription by fully exploiting presentation slide information used in the lecture. As the text in the presen...
Tatsuya Kawahara, Yusuke Nemoto, Yuya Akita
SACMAT
2006
ACM
14 years 1 months ago
Secure resource description framework: an access control model
In this paper we propose an access control model for the Resource Description Framework (RDF). We argue that existing access control models, like the ones developed for securing e...
Amit Jain, Csilla Farkas
OTM
2004
Springer
14 years 27 days ago
Towards a Peer-to-Peer Event Broker Grid in a Hybrid Network Environment
Peer-to-peer networks and grids offer promising paradigms for developing efficient distributed systems and applications. Event-based middleware is becoming a core architectural el...
Eiko Yoneki, Jean Bacon
ESWS
2008
Springer
13 years 9 months ago
Entity Identifiers for Lineage Preservation
Abstract. The generation of entity identifiers is a key issue in the context of semantic web technologies. Entity identifiers are needed when we perform any kind of operation (e.g....
Julien Gaugaz, Gianluca Demartini
IRCDL
2008
13 years 9 months ago
Video Event Annotation using Ontologies with Temporal Reasoning
Annotation and retrieval tools for multimedia digital libraries have to cope with the complexity of multimedia content. In particular, when dealing with video content, annotation ...
Marco Bertini, Alberto Del Bimbo, Giuseppe Serra