Sciweavers

1288 search results - page 180 / 258
» Understanding the Hidden Web
Sort
View
COMPSAC
2009
IEEE
13 years 11 months ago
On a Classification Approach for SOA Vulnerabilities
Abstract--Vulnerabilities in operating systems and web applications have been and are being put into various classifications, leading to a better understanding of their causes and ...
Lutz Lowis, Rafael Accorsi
ASWEC
2004
IEEE
13 years 11 months ago
UML Documentation Support for XML Schema
With the proliferation of XML as the lingua franca of internet information exchange, engineering XML documents and maintaining their databases becomes a major challenge. In this c...
Flora Dilys Salim, Rosanne Price, Shonali Krishnas...
ASWC
2006
Springer
13 years 11 months ago
Transformation from OWL Description to Resource Space Model
Abstract. Semantics shows diversity in real world, document world, mental abstraction world and machine world. Transformation between semantics pursues the uniformity in the divers...
Hai Zhuge, Peng Shi, Yunpeng Xing, Chao He
ASWC
2006
Springer
13 years 11 months ago
Finding Important Vocabulary Within Ontology
In current Semantic Web community, some researches have been done on ranking ontologies, while very little is paid to ranking vocabularies within ontology. However, finding importa...
Xiang Zhang, Hongda Li, Yuzhong Qu
WLP
2000
Springer
13 years 11 months ago
Attempto Controlled English
Attempto Controlled English (ACE) is a controlled natural language, i.e. a precisely defined subset of English that can automatically and unambiguously be translated into first-ord...
Norbert E. Fuchs