Sciweavers

744 search results - page 91 / 149
» Studying Knowledge Management System Success in System Admin...
Sort
View
DSN
2008
IEEE
13 years 9 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
ASWC
2008
Springer
13 years 9 months ago
Deep Semantic Mapping between Functional Taxonomies for Interoperable Semantic Search
This paper discusses ontology mapping between two taxonomies of functions of artifacts for the engineering knowledge management. The mapping is of two ways and has been manually es...
Yoshinobu Kitamura, Sho Segawa, Munehiko Sasajima,...
SAC
2010
ACM
14 years 2 months ago
Background knowledge in formal concept analysis: constraints via closure operators
The aim of this short paper is to present a general method of using background knowledge to impose constraints in conceptual clustering of object-attribute relational data. The pr...
Radim Belohlávek, Vilém Vychodil
SIGMOD
2010
ACM
217views Database» more  SIGMOD 2010»
14 years 18 days ago
Mining knowledge from databases: an information network analysis approach
Most people consider a database is merely a data repository that supports data storage and retrieval. Actually, a database contains rich, inter-related, multi-typed data and infor...
Jiawei Han, Yizhou Sun, Xifeng Yan, Philip S. Yu
ICC
2007
IEEE
162views Communications» more  ICC 2007»
14 years 2 months ago
Ontology-Based Reasoning for Supporting Context-Aware Services on Autonomic Networks
- Ontology engineering has been proposed as a formal mechanism for both reducing the complexity of managing the information needed in network management and autonomic systems and f...
Jaime Martín Serrano, Joan Serrat, John Str...