Sciweavers

542 search results - page 103 / 109
» Enabling the Semantic Web with Ready-to-Use Web Widgets
Sort
View
AVI
2008
13 years 8 months ago
Query-through-drilldown: data-oriented extensional queries
Traditional database query formulation is intensional: at the level of schemas, table and column names. Previous work has shown that filters can be created using a query paradigm ...
Alan J. Dix, Damon Oram
SP
2008
IEEE
162views Security Privacy» more  SP 2008»
13 years 7 months ago
Fable: A Language for Enforcing User-defined Security Policies
This paper presents FABLE, a core formalism for a programming language in which programmers may specify security policies and reason that these policies are properly enforced. In ...
Nikhil Swamy, Brian J. Corcoran, Michael Hicks
IMCS
2007
78views more  IMCS 2007»
13 years 7 months ago
Usable set-up of runtime security policies
Setting up runtime security policies as required for firewalls or as envisioned by policy languages for the Semantic Web is a difficult task, especially for lay users who have l...
Almut Herzog, Nahid Shahmehri
SAC
2008
ACM
13 years 6 months ago
Towards a complete SCM ontology: the case of ontologising RosettaNet
This paper presents a methodology to derive a Supply Chain Management Ontology based on the RosettaNet specification framework. A prototype to mechanically derive a core ontology ...
Armin Haller, Jedrzej Gontarczyk, Paavo Kotinurmi
PKDD
2010
Springer
168views Data Mining» more  PKDD 2010»
13 years 5 months ago
Bayesian Knowledge Corroboration with Logical Rules and User Feedback
Current knowledge bases suffer from either low coverage or low accuracy. The underlying hypothesis of this work is that user feedback can greatly improve the quality of automatica...
Gjergji Kasneci, Jurgen Van Gael, Ralf Herbrich, T...