Sciweavers

3096 search results - page 4 / 620
» Ontology: Use and Abuse
Sort
View
NDSS
2003
IEEE
14 years 7 days ago
Moderately Hard, Memory-Bound Functions
A resource may be abused if its users incur little or no cost. For example, e-mail abuse is rampant because sending an e-mail has negligible cost for the sender. It has been sugge...
Martín Abadi, Michael Burrows, Ted Wobber
PAM
2012
Springer
12 years 2 months ago
Detecting Pedophile Activity in BitTorrent Networks
Abstract. The wide spread of Peer-to-Peer networks makes multimedia files available to users all around the world. However, Peer-to-Peer networks are often used to spread illegal ...
Moshe Rutgaizer, Yuval Shavitt, Omer Vertman, Noa ...
DKE
2010
144views more  DKE 2010»
13 years 7 months ago
Reusing ontologies and language components for ontology generation
Realizing the Semantic Web involves creating ontologies, a tedious and costly challenge. Reuse can reduce the cost of ontology engineering. Semantic Web ontologies can provide use...
Deryle W. Lonsdale, David W. Embley, Yihong Ding, ...
SEMWEB
2007
Springer
14 years 1 months ago
Semi-automatic Ontology Engineering Using Patterns
Many enterprise systems face the same kind of information processing problems that exist on the web in general, and creating semantic solutions often involve constructing an enterp...
Eva Blomqvist
KCAP
2005
ACM
14 years 16 days ago
Searching Web Resources Using Ontology Mappings
This paper proposes an ontology mapping based framerowk that allows searching for web resources using multiple ontologies. The proposed solution uses a mapping ontology that is a ...
Dragan Gasevic, Marek Hatala