Sciweavers

629 search results - page 79 / 126
» Providing Justifications in Recommender Systems
Sort
View
HICSS
2011
IEEE
190views Biometrics» more  HICSS 2011»
13 years 23 days ago
Validating Cyber Security Requirements: A Case Study
Vulnerabilities in a system may have widely varying impacts on system security. In practice, security should not be defined as the absence of vulnerabilities. In practice, securit...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
GIS
2002
ACM
13 years 8 months ago
A WFS-based mediation system for GIS interoperability
The proliferation of spatial data on the Internet is beginning to allow a much wider access to data currently available in various Geographic Information Systems (GIS). In order t...
Omar Boucelma, Mehdi Essid, Zoé Lacroix
TABLEAUX
2005
Springer
14 years 2 months ago
Description Logics in Ontology Applications
Abstract. Description Logics (DLs) are a family of logic based knowledge representation formalisms. Although they have a range of applications (e.g., configuration and information...
Ian Horrocks
ECIR
2010
Springer
13 years 10 months ago
Tripartite Hidden Topic Models for Personalised Tag Suggestion
Abstract. Social tagging systems provide methods for users to categorise resources using their own choice of keywords (or "tags") without being bound to a restrictive set...
Morgan Harvey, Mark Baillie, Ian Ruthven, Mark Jam...
KDD
2008
ACM
199views Data Mining» more  KDD 2008»
14 years 9 months ago
Efficient computation of personal aggregate queries on blogs
There is an exploding amount of user-generated content on the Web due to the emergence of "Web 2.0" services, such as Blogger, MySpace, Flickr, and del.icio.us. The part...
Ka Cheung Sia, Junghoo Cho, Yun Chi, Belle L. Tsen...