Sciweavers

3096 search results - page 66 / 620
» Ontology: Use and Abuse
Sort
View
DMKD
2003
ACM
151views Data Mining» more  DMKD 2003»
14 years 3 months ago
Assuring privacy when big brother is watching
Homeland security measures are increasing the amount of data collected, processed and mined. At the same time, owners of the data raised legitimate concern about their privacy and...
Murat Kantarcioglu, Chris Clifton
HICSS
2000
IEEE
139views Biometrics» more  HICSS 2000»
14 years 2 months ago
Capacity Payments and the Pricing of Reliability in Competitive Generation Markets
: In restructured electric power industries around the world, power pool designers have enabled generators to earn revenues consisting of energy and capacity payments. This paper d...
Angela S. Chuang, Felix F. Wu
VIROLOGY
2008
95views more  VIROLOGY 2008»
13 years 10 months ago
On JavaScript Malware and related threats
The term JavaScript Malware describes attacks that abuse the web browser's capabilities to execute malicious script-code within the victim's local execution context. Unli...
Martin Johns
SEMWEB
2004
Springer
14 years 3 months ago
Working with Multiple Ontologies on the Semantic Web
The standardization of the second generation Web Ontology Language, OWL, leaves a crucial issue for Web-based ontologies unsatisfactorily resolved: how to represent and reason with...
Bernardo Cuenca Grau, Bijan Parsia, Evren Sirin
ER
2006
Springer
118views Database» more  ER 2006»
14 years 1 months ago
Towards a Reference Ontology for Business Models
Ontologies are viewed as increasingly important tools for structuring domains of intrests. In this paper we propose a reference ontology of business models using concepts from thre...
Birger Andersson, Maria Bergholtz, Ananda Edirisur...