Sciweavers

2386 search results - page 469 / 478
» Representing and Reasoning with Preferences
Sort
View
IDT
2008
123views more  IDT 2008»
13 years 7 months ago
A rich semantic model of track as a foundation for sharing beliefs regarding dynamic objects and events
: Many defense, homeland security, and commercial security objectives require continuous tracking of mobile entities such as aircraft. The systems that perform these functions prod...
Frederick Hayes-Roth, Curtis L. Blais
ISCI
2008
108views more  ISCI 2008»
13 years 7 months ago
Modeling and manipulating the structure of hierarchical schemas for the web
The Semantic Web is the next step of the current Web where information will become more machine-understandable to support effective data discovery and integration. Hierarchical sc...
Theodore Dalamagas, Alexandra Meliou, Timos K. Sel...
IJNSEC
2006
96views more  IJNSEC 2006»
13 years 7 months ago
A Memory Symptom-based Virus Detection Approach
The widespread use of the Internet has caused computer security to become an important issue. Currently, antivirus software is the primary mechanism that prevents computers from t...
Hsien-Chou Liao, Yi-Hsiang Wang
IJSWIS
2006
168views more  IJSWIS 2006»
13 years 7 months ago
Unraveling the Taste Fabric of Social Networks
Popular online social networks such as Friendster and MySpace do more than simply reveal the superficial structure of social connectedness--the rich meanings bottled within social...
Hugo Liu, Pattie Maes, Glorianna Davenport
ISI
2006
Springer
13 years 7 months ago
Measures to Detect Word Substitution in Intercepted Communication
Abstract. Those who want to conceal the content of their communications can do so by replacing words that might trigger attention by other words or locutions that seem more ordinar...
SzeWang Fong, David B. Skillicorn, Dmitri Roussino...