Sciweavers

2084 search results - page 322 / 417
» Knowledge Exploitation from the Web
Sort
View
WETICE
2009
IEEE
14 years 4 months ago
A Gossip-Based Distributed Social Networking System
—Social networking web sites, which allow users to create identities and link them to friends who have also created identities, are highly popular. Systems such as Facebook and M...
S. M. A. Abbas, Johan A. Pouwelse, Dick H. J. Epem...
SEMWEB
2009
Springer
14 years 3 months ago
ASMOV: Results for OAEI 2009
The Automated Semantic Mapping of Ontologies with Validation (ASMOV) algorithm for ontology alignment was one of the top performing algorithms in the 2007 and 2008 Ontology Alignme...
Yves R. Jean-Mary, E. Patrick Shironoshita, Mansur...
ACSAC
2008
IEEE
14 years 3 months ago
Please Permit Me: Stateless Delegated Authorization in Mashups
Mashups have emerged as a Web 2.0 phenomenon, connecting disjoint applications together to provide unified services. However, scalable access control for mashups is difficult. T...
Ragib Hasan, Marianne Winslett, Richard M. Conlan,...
HUC
2007
Springer
14 years 3 months ago
Addressing Mobile Phone Diversity in Ubicomp Experience Development
Mobile phones are a widely-available class of device with supporting communications infrastructure which can be appropriated and exploited to support ubicomp experiences. However m...
Chris Greenhalgh, Steve Benford, Adam Drozd, Marti...
LAMAS
2005
Springer
14 years 2 months ago
Multi-agent Relational Reinforcement Learning
In this paper we report on using a relational state space in multi-agent reinforcement learning. There is growing evidence in the Reinforcement Learning research community that a r...
Tom Croonenborghs, Karl Tuyls, Jan Ramon, Maurice ...