Sciweavers

255 search results - page 32 / 51
» Principles for Entity Authentication
Sort
View
ICCS
2005
Springer
14 years 28 days ago
Language Technologies Meet Ontology Acquisition
This paper overviews and analyses the on-going research attempts to apply language technologies to automatic ontology acquisition. At first glance there are many successful approac...
Galia Angelova
OTM
2005
Springer
14 years 27 days ago
Inferring Complex Semantic Mappings Between Relational Tables and Ontologies from Simple Correspondences
There are many problems requiring a semantic account of a database schema. At its best, such an account consists of mapping formulas between the schema and a formal conceptual mode...
Yuan An, Alexander Borgida, John Mylopoulos
HICSS
2003
IEEE
123views Biometrics» more  HICSS 2003»
14 years 21 days ago
Structuring Business Models in a Web Representation
In the context of knowledge-intensive work, making the relevant knowledge available to the people needing it for their work is a key issue. One approach is to capture such knowled...
Hermann Kaindl
DMIN
2007
110views Data Mining» more  DMIN 2007»
13 years 8 months ago
Mining for Structural Anomalies in Graph-based Data
—In this paper we present graph-based approaches to mining for anomalies in domains where the anomalies consist of unexpected entity/relationship alterations that closely resembl...
William Eberle, Lawrence B. Holder
CIIT
2004
13 years 8 months ago
Optimisation of BFWA networks using emergent intelligence
This paper presents a detailed account of a novel scheme for finding profit optimal BFWA networks, extending an existing network optimisation tool, and using the principles of eme...
Archie A. Wade, Steve Hurley, Stuart M. Allen, Ric...