Sciweavers

3581 search results - page 627 / 717
» Modeling the Internet
Sort
View
CEAS
2004
Springer
14 years 3 months ago
Extracting social networks and contact information from email and the Web
We present an end-to-end system that extracts a user’s social network and its members’ contact information given the user’s email inbox. The system identifies unique people...
Aron Culotta, Ron Bekkerman, Andrew McCallum
CEAS
2004
Springer
14 years 3 months ago
Shall We Stop All Unsolicited Email Messages?
Spam is commonly defined as unsolicited email messages, and the goal of spam filtering is to eliminate these messages. In this paper, we argue that not all unsolicited email messag...
Rui Dai, Kang Li
DRM
2004
Springer
14 years 3 months ago
Tamper detection and localization for categorical data using fragile watermarks
Today, database relations are widely used and distributed over the Internet. Since these data can be easily tampered with, it is critical to ensure the integrity of these data. In...
Yingjiu Li, Huiping Guo, Sushil Jajodia
ICWL
2004
Springer
14 years 3 months ago
CDAL: A Scalable Scheme for Digital Resource Reorganization
Abstract. In many circumstances, including e-learning, there is a need to reorganize digital resources, scattered in many places, into a coherently accessible repository. This pape...
Chong Chen, Hongfei Yan, Xiaoming Li
RULEML
2004
Springer
14 years 3 months ago
A Defeasible Logic Reasoner for the Semantic Web
Abstract. Defeasible reasoning is a rule-based approach for efficient reasoning with incomplete and inconsistent information. Such reasoning is, among others, useful for ontology i...
Nick Bassiliades, Grigoris Antoniou, Ioannis P. Vl...