Sciweavers

792 search results - page 126 / 159
» Knowledge Engineering: Principles and Methods
Sort
View
COMPSAC
2008
IEEE
13 years 10 months ago
Fabrication of Ontology for Security in Health Care Systems
Given the widespread intimidation state of affairs, there is a gripping want to enlarge architectures, algorithms, and protocols to apprehend a trustworthy network infrastructure....
J. Indumathi, G. V. Uma
ISEMANTICS
2010
13 years 9 months ago
STEX+: a system for flexible formalization of linked data
We present the STEX system, a semantic extension of LATEX, that allows for producing high-quality PDF documents for (proof)reading and printing, as well as semantic XML/OMDoc docu...
Andrea Kohlhase, Michael Kohlhase, Christoph Lange...
AVI
2006
13 years 9 months ago
Design and evaluation of a shoulder-surfing resistant graphical password scheme
When users input their passwords in a public place, they may be at risk of attackers stealing their password. An attacker can capture a password by direct observation or by record...
Susan Wiedenbeck, Jim Waters, Leonardo Sobrado, Je...
RE
2008
Springer
13 years 7 months ago
Legal Requirements, Compliance and Practice: An Industry Case Study in Accessibility
U.S. laws and regulations are designed to support broad societal goals, such as accessibility, privacy and safety. To demonstrate that a product complies with these goals, busines...
Travis D. Breaux, Annie I. Antón, Kent Bouc...
WWW
2009
ACM
14 years 8 months ago
Understanding user's query intent with wikipedia
Understanding the intent behind a user's query can help search engine to automatically route the query to some corresponding vertical search engines to obtain particularly re...
Jian Hu, Gang Wang, Frederick H. Lochovsky, Jian-T...