Sciweavers

1393 search results - page 207 / 279
» Using AI in Knowledge Management: Knowledge Bases and Ontolo...
Sort
View
ADHOCNOW
2004
Springer
14 years 2 months ago
Weathering the Storm: Managing Redundancy and Security in Ad Hoc Networks
Many ad hoc routing algorithms rely on broadcast flooding for location discovery or more generally for secure routing applications, particularly when dealing with Byzantine threat...
Mike Burmester, Tri Van Le, Alec Yasinsac
BIS
2007
173views Business» more  BIS 2007»
13 years 10 months ago
Natural Language Technology for Information Integration in Business Intelligence
Business intelligence requires the collecting and merging of information from many different sources, both structured and unstructured, in order to analyse for example financial ...
Diana Maynard, Horacio Saggion, Milena Yankova, Ka...
IS
1998
13 years 8 months ago
Information Modeling in the Time of the Revolution
Information modeling is concerned with the construction of computer-based symbol structures which capture the meaning of information and organize it in ways that make it understan...
John Mylopoulos
WWW
2004
ACM
14 years 9 months ago
CS AKTive space: representing computer science in the semantic web
We present a Semantic Web application that we call CS AKTive Space1 . The application exploits a wide range of semantically heterogeneous and distributed content relating to Compu...
Monica M. C. Schraefel, Nigel R. Shadbolt, Nichola...
EDBTW
2010
Springer
14 years 9 days ago
The benefits of the interaction between data warehouses and question answering
Business Intelligence (BI) applications allow their users to query, understand, and analyze existing data within their organizations in order to acquire useful knowledge, thus mak...
Antonio Ferrández, Jesús Peral