Sciweavers

3096 search results - page 6 / 620
» Ontology: Use and Abuse
Sort
View
SEMCO
2007
IEEE
14 years 1 months ago
Ontology Evaluation and Ranking using OntoQA
Ontologies form the cornerstone of the Semantic Web and are intended to help researchers to analyze and share knowledge, and as more ontologies are being introduced, it is difficu...
Samir Tartir, I. Budak Arpinar
CEAS
2008
Springer
13 years 9 months ago
A Campaign-based Characterization of Spamming Strategies
This paper presents a methodology for the characterization of spamming strategies based on the identification of spam campaigns. To deeply understand how spammers abuse network re...
Pedro Calais, Douglas Pires, Dorgival Olavo Guedes...
TDSC
2011
13 years 1 months ago
Nymble: Blocking Misbehaving Users in Anonymizing Networks
—Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client’s IP address from the server. The success of...
Patrick P. Tsang, Apu Kapadia, Cory Cornelius, Sea...
CRIWG
2009
13 years 8 months ago
MobMaps: Towards a Shared Environment for Collaborative Social Activism
Nowadays it is possible to disseminate information to the all world in real time using current communication tools supported mostly by the Internet. The work of several organizatio...
Luís Gens, Hugo Paredes, Paulo Martins, Ben...
NLDB
2007
Springer
14 years 1 months ago
Generating Ontologies Via Language Components and Ontology Reuse
Realizing the Semantic Web involves creating ontologies, a tedious and costly challenge. Reuse can reduce the cost of ontology engineering. Ontologies already created in recent Sem...
Yihong Ding, Deryle W. Lonsdale, David W. Embley, ...