Sciweavers

3096 search results - page 7 / 620
» Ontology: Use and Abuse
Sort
View
LREC
2008
162views Education» more  LREC 2008»
13 years 9 months ago
Semiotic-based Ontology Evaluation Tool (S-OntoEval)
The objective of the Semiotic-based Ontology Evaluation Tool (S-OntoEval) is to evaluate and propose improvements to a given ontological model. The evaluation aims at assessing th...
Renata Dividino, Massimo Romanelli, Daniel Sonntag
ACSAC
2000
IEEE
14 years 5 days ago
Security Against Compelled Disclosure
Various existing and pending legislation can be used to force individuals and organisations to disclose confidential information. Courts may order a wide variety of data to be tu...
Ian Brown, B. Laurie
AAAI
1997
13 years 9 months ago
Smokey: Automatic Recognition of Hostile Messages
Abusive messages (flames) can be both a source of frustration and a waste of time for Internet users. This paper describes some approaches to flame recognition, including a protot...
Ellen Spertus
IJMSO
2010
118views more  IJMSO 2010»
13 years 6 months ago
Dependencies between ontology design parameters
: Development and use of ontologies is increasing, but hampered by new challenges, such as determining which ontologies to reuse and which language to use. Ontology development met...
C. Maria Keet
FOIS
2010
13 years 9 months ago
Ontology Verification with Repositories
Abstract. In this paper we show how the relationships between first-order ontologies within a repository can be used to support ontology verification. We discuss the use of represe...
Michael Grüninger, Torsten Hahmann, Ali Hashe...