Sciweavers

2084 search results - page 239 / 417
» Knowledge Exploitation from the Web
Sort
View
MMMACNS
2005
Springer
15 years 9 months ago
A Passive External Web Surveillance Technique for Private Networks
The variety and richness of what users browse on the Internet has made the communications of web-browsing hosts an attractive target for surveillance. We show that passive external...
Constantine Daicos, Scott Knight
IJMSO
2007
201views more  IJMSO 2007»
15 years 4 months ago
A context-aware meeting alert using semantic web and rule technology
This paper describes work in progress developing a context-aware meeting alert. This application integrates semantic web technology in RDF (for representing calendars), semantic we...
Grigoris Antoniou, Antonis Bikakis, Anna Karamoleg...
IJCNN
2007
IEEE
15 years 10 months ago
An Associative Memory for Association Rule Mining
— Association Rule Mining is a thoroughly studied problem in Data Mining. Its solution has been aimed for by approaches based on different strategies involving, for instance, the...
Vicente O. Baez-Monroy, Simon O'Keefe
ICDE
2000
IEEE
99views Database» more  ICDE 2000»
16 years 5 months ago
XWRAP: An XML-Enabled Wrapper Construction System for Web Information Sources
This paper describes the methodology and the software development of XWRAP, an XML-enabled wrapper construction system for semi-automatic generation of wrapper programs. By XML-ena...
Ling Liu, Calton Pu, Wei Han
NCA
2003
IEEE
15 years 9 months ago
Web Proxy Cache Replacement: Do's, Don'ts, and Expectations
Numerous research efforts have produced a large number of algorithms and mechanisms for web proxy caches. In order to build powerful web proxies and understand their performance, ...
Peter Triantafillou, Ioannis Aekaterinidis