Sciweavers

3197 search results - page 590 / 640
» Web Engineering Revisited
Sort
View
WS
2010
ACM
13 years 8 months ago
Anomalies in ontologies with rules
For the development of practical semantic applications, ontologies are commonly used with rule extensions. Prominent examples of semantic applications are Semantic Wikis, Semantic...
Joachim Baumeister, Dietmar Seipel
CIKM
2010
Springer
13 years 7 months ago
Utilizing re-finding for personalized information retrieval
Individuals often use search engines to return to web pages they have previously visited. This behaviour, called refinding, accounts for about 38% of all queries. While researcher...
Sarah K. Tyler, Jian Wang, Yi Zhang 0001
IPAW
2010
13 years 7 months ago
Integrating Provenance Data from Distributed Workflow Systems with ProvManager
Abstract. Running scientific workflows in distributed environments is motivating the definition of provenance gathering approaches that are loosely coupled to the workflow executio...
Anderson Marinho, Leonardo Gresta Paulino Murta, C...
DEXA
2009
Springer
176views Database» more  DEXA 2009»
13 years 7 months ago
Analyzing Document Retrievability in Patent Retrieval Settings
Most information retrieval settings, such as web search, are typically precision-oriented, i.e. they focus on retrieving a small number of highly relevant documents. However, in sp...
Shariq Bashir, Andreas Rauber
FIW
2009
120views Communications» more  FIW 2009»
13 years 7 months ago
Software Security Vulnerabilities Seen As Feature Interactions
The security of software applications is an important domain, and one that mixes formalisms (e.g. when dealing with cryptography and security protocols) with very ad hoc, low level...
Guy-Vincent Jourdan