Sciweavers

2084 search results - page 72 / 417
» Knowledge Exploitation from the Web
Sort
View
COMPSAC
1998
IEEE
14 years 2 months ago
Tools for the Knowledge Analyst: An Information Superiority Visionary Demonstration
This paper describes the application of a suite of innovative information processing and analytic support tools developed at The MITRE Corporation, in some cases as extensions of ...
Mark T. Maybury
WWW
2006
ACM
14 years 11 months ago
SecuBat: a web vulnerability scanner
As the popularity of the web increases and web applications become tools of everyday use, the role of web security has been gaining importance as well. The last years have shown a...
Christopher Krügel, Engin Kirda, Nenad Jovano...
MATES
2005
Springer
14 years 3 months ago
An Agent-Based Knowledge Acquisition Platform
Accessing up-to-date information in a fast and easy way implies the necessity of information management tools to explore and analyse the huge number of available electronic resourc...
David Sánchez, David Isern, Antonio Moreno
WWW
2008
ACM
14 years 11 months ago
Querying for meta knowledge
The Semantic Web is based on accessing and reusing RDF data from many different sources, which one may assign different levels of authority and credibility. Existing Semantic Web ...
Bernhard Schueler, Sergej Sizov, Steffen Staab, Du...
CASES
2004
ACM
14 years 3 months ago
Safely exploiting multithreaded processors to tolerate memory latency in real-time systems
A coarse-grain multithreaded processor can effectively hide long memory latencies by quickly switching to an alternate task when the active task issues a memory request, improving...
Ali El-Haj-Mahmoud, Eric Rotenberg