Sciweavers

1914 search results - page 326 / 383
» Web Data Management Practices - Emerging Techniques and Tech...
Sort
View
ECIR
2010
Springer
13 years 6 months ago
Biometric Response as a Source of Query Independent Scoring in Lifelog Retrieval
Personal lifelog archives contain digital records captured from an individual’s daily life, e.g. emails, web pages downloaded and SMSs sent or received. While capturing this info...
Liadh Kelly, Gareth J. F. Jones
SEMWEB
2010
Springer
13 years 5 months ago
Forgetting Fragments from Evolving Ontologies
Abstract. Ontologies underpin the semantic web; they define the concepts and their relationships contained in a data source. An increasing number of ontologies are available on-lin...
Heather S. Packer, Nicholas Gibbins, Nicholas R. J...
IH
2007
Springer
14 years 1 months ago
YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis
Abstract. A new, simple, approach for active steganography is proposed in this paper that can successfully resist recent blind steganalysis methods, in addition to surviving distor...
Kaushal Solanki, Anindya Sarkar, B. S. Manjunath
RULEML
2005
Springer
14 years 1 months ago
Extending the SweetDeal Approach for e-Procurement Using SweetRules and RuleML
We show the first detailed realistic e-business application scenario that uses and exploits capabilities of the SweetRules V2.1 toolset for e-contracting using the SweetDeal approa...
Sumit Bhansali, Benjamin N. Grosof
AAAI
2008
13 years 10 months ago
Existentially Quantified Values for Queries and Updates of Facts in Transaction Logic Programs
In several applications of logic programming and Transaction Logic, such as, planning, trust management and independent Semantic Web Services, an action might produce incomplete f...
Paul Fodor