To anticipate and prevent acts of terrorism, Indications and Warnings analysts try to connect clues gleaned from massive quantities of complex data. Multi-agent approaches to suppo...
Peter Weinstein, H. Van Dyke Parunak, Paul Chiusan...
Signature-driven spam detection provides an alternative to machine learning approaches and can be very effective when near-duplicates of essentially the same message are sent in h...
Aleksander Kolcz, Abdur Chowdhury, Joshua Alspecto...
Ontologies in current computer science parlance are computer based resources that represent agreed domain semantics. This paper first introduces ontologies in general and subseque...
Marie-Laure Reinberger, Peter Spyns, Walter Daelem...
Implicit information embedded in semantic web graphs, such as topography, clusters, and disconnected subgraphs is difficult to extract from text files. Visualizations of the graph...
Abstract. In the paper we present a method that allows an extraction of singleword terms for a specific domain. At the next stage these terms can be used as candidates for multi-wo...
Alexander F. Gelbukh, Grigori Sidorov, Eduardo Lav...