Sciweavers

3096 search results - page 501 / 620
» Ontology: Use and Abuse
Sort
View
IDEAL
2010
Springer
13 years 7 months ago
Typed Linear Chain Conditional Random Fields and Their Application to Intrusion Detection
Intrusion detection in computer networks faces the problem of a large number of both false alarms and unrecognized attacks. To improve the precision of detection, various machine l...
Carsten Elfers, Mirko Horstmann, Karsten Sohr, Ott...
IJMSO
2010
90views more  IJMSO 2010»
13 years 7 months ago
Measuring intrinsic quality of semantic search based on feature vectors
: Search is probably the most frequent activity on the Web. Yet it is not effortless, mainly due to heterogeneous information resources. Semantic search is a means to tackle the pr...
Stein L. Tomassen, Darijus Strasunskas
LPAR
2010
Springer
13 years 7 months ago
SAT Encoding of Unification in EL
Unification in Description Logics has been proposed as a novel inference service that can, for example, be used to detect redundancies in ontologies. In a recent paper, we have sho...
Franz Baader, Barbara Morawska
DLOG
2009
13 years 7 months ago
What Happened to Bob? Semantic Data Mining of Context Histories
We report on event recognition within the life logging application IYOUIT for the automatic creation of static diary-like Blogs. Based on the qualitative context histories produced...
Michael Wessel, Marko Luther, Ralf Möller
SEMWEB
2010
Springer
13 years 4 months ago
The role of space and time for knowledge organization on the Semantic Web
Space and time have not received much attention on the Semantic Web so far. While their importance has been recognized recently, existing work reduces them to simple latitude-longi...
Krzysztof Janowicz