Sciweavers

762 search results - page 115 / 153
» Two Approaches to Merging Knowledge Bases
Sort
View
BMCBI
2008
126views more  BMCBI 2008»
13 years 11 months ago
ISOL@: an Italian SOLAnaceae genomics resource
Background: Present-day `-omics' technologies produce overwhelming amounts of data which include genome sequences, information on gene expression (transcripts and proteins) a...
Maria Luisa Chiusano, Nunzio D'Agostino, Alessandr...
CIKM
2006
Springer
14 years 2 months ago
CP/CV: concept similarity mining without frequency information from domain describing taxonomies
Domain specific ontologies are heavily used in many applications. For instance, these form the bases on which similarity/dissimilarity between keywords are extracted for various k...
Jong Wook Kim, K. Selçuk Candan
ICSE
2007
IEEE-ACM
14 years 11 months ago
Modeling in Software Engineering
A data model is a plan for building a database and is comparable to an architect's building plans. There are two major methodologies used to create a data model: the EntityRe...
Joanne M. Atlee, Robert B. France, Geri Georg, Ana...
KAIS
2010
132views more  KAIS 2010»
13 years 9 months ago
Integrating multiple document features in language models for expert finding
We argue that expert finding is sensitive to multiple document features in an organizational intranet. These document features include multiple levels of associations between expe...
Jianhan Zhu, Xiangji Huang, Dawei Song, Stefan M. ...
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
14 years 2 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...