Sciweavers

2084 search results - page 323 / 417
» Knowledge Exploitation from the Web
Sort
View
MKM
2004
Springer
14 years 2 months ago
A Graph-Based Approach Towards Discerning Inherent Structures in a Digital Library of Formal Mathematics
As the amount of online formal mathematical content grows, for example through active efforts such as the Mathweb [21], MOWGLI [4], Formal Digital Library, or FDL [1], and others, ...
Lori Lorigo, Jon M. Kleinberg, Richard Eaton, Robe...
DISCEX
2003
IEEE
14 years 2 months ago
Dynamic Authorization and Intrusion Response in Distributed Systems
This paper¢ presents an authorization framework for supporting fine-grained access control policies enhanced with light-weight intrusion/misuse detectors and response capabiliti...
Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim
INFOCOM
2002
IEEE
14 years 2 months ago
Multicast Scheduling for List Requests
—Advances in wireless and optical communication, as well as in Internet multicast protocols, make broadcast and multicast methods an effective solution to disseminate data. In pa...
Vincenzo Liberatore
CCGRID
2004
IEEE
14 years 1 months ago
Cache replacement policies revisited: the case of P2P traffic
Peer-to-peer (P2P) file-sharing applications generate a large part if not most of today's Internet traffic. The large volume of this traffic (thus the high potential benefits...
Adam Wierzbicki, Nathaniel Leibowitz, Matei Ripean...
LREC
2010
168views Education» more  LREC 2010»
13 years 10 months ago
Formal Description of Resources for Ontology-based Semantic Annotation
Ontology-based semantic annotation aims at putting fragments of a text in correspondence with proper elements of an ontology such that the formal semantics encoded by the ontology...
Yue Ma, Adeline Nazarenko, Laurent Audibert