Sciweavers

1276 search results - page 225 / 256
» Vetting the links of the web
Sort
View
JCDL
2010
ACM
126views Education» more  JCDL 2010»
13 years 9 months ago
Discovering Australia's research data
Access to data crucial to research is often slow and difficult. When research problems cross disciplinary boundaries, problems are exacerbated. This paper argues that it is import...
Stefanie Kethers, Xiaobin Shen, Andrew E. Treloar,...
AIL
2007
96views more  AIL 2007»
13 years 9 months ago
Legal ontology of sales law application to ecommerce
Legal codes, such as the Uniform Commercial Code (UCC) examined in this article, are good points of entry for AI and ontology work because of their more straightforward adaptabili...
John W. Bagby, Tracy Mullen
CORR
2006
Springer
100views Education» more  CORR 2006»
13 years 9 months ago
Automatic annotation of multilingual text collections with a conceptual thesaurus
Automatic annotation of documents with controlled vocabulary terms (descriptors) from a conceptual thesaurus is not only useful for document indexing and retrieval. The mapping of...
Bruno Pouliquen, Ralf Steinberger, Camelia Ignat
ENVSOFT
2006
76views more  ENVSOFT 2006»
13 years 9 months ago
LQGraph: A software package for optimizing connectivity in conservation planning
LQGraph implements methods for optimizing the connectivity of sites administered to protect biodiversity (a conservation area network). The methods are suitable for existing prote...
Trevon Fuller, Sahotra Sarkar
CN
2007
80views more  CN 2007»
13 years 9 months ago
Receiver-centric congestion control with a misbehaving receiver: Vulnerabilities and end-point solutions
Receiver-driven TCP protocols delegate key congestion control functions to receivers. Their goal is to exploit information available only at receivers in order to improve latency ...
Aleksandar Kuzmanovic, Edward W. Knightly