Sciweavers

2520 search results - page 383 / 504
» Knowledge Management Challenges in Knowledge Discovery Syste...
Sort
View
SEMWEB
2009
Springer
15 years 11 months ago
The OWLlink Protocol
A semantic application typically is a heterogenous system of interconnected components, most notably a reasoner. OWLlink is an implementation-neutral protocol for communication bet...
Thorsten Liebig, Marko Luther, Olaf Noppens
SECURWARE
2008
IEEE
15 years 11 months ago
Security Patterns for Capturing Encryption-Based Access Control to Sensor Data
—A security pattern describes a particular recurring security problem that arises in specific contexts, and presents a well-proven generic solution for it [1]. This paper descri...
Ángel Cuevas, Paul El Khoury, Laurent Gomez...
HICSS
2007
IEEE
150views Biometrics» more  HICSS 2007»
15 years 10 months ago
Security Ontologies: Improving Quantitative Risk Analysis
— IT-security has become a much diversified field and small and medium sized enterprises (SMEs), in particular, do not have the financial ability to implement a holistic IT-se...
Andreas Ekelhart, Stefan Fenz, Markus D. Klemen, E...
GEOS
2007
Springer
15 years 10 months ago
Applying Spatial Reasoning to Topographical Data with a Grounded Geographical Ontology
Abstract. Grounding an ontology upon geographical data has been proposed as a method of handling the vagueness in the domain more effectively. In order to do this, we require meth...
David Mallenby, Brandon Bennett
ICCS
2007
Springer
15 years 10 months ago
Construction of Ontology-Based Software Repositories by Text Mining
Software document repositories store artifacts produced in the course of developing software products. But most repositories are simply archives of documents. It is not unusual to ...
Yan Wu, Harvey P. Siy, Mansour Zand, Victor L. Win...