Sciweavers

CIKM
2008
Springer
13 years 9 months ago
Cost-effective spam detection in p2p file-sharing systems
Spam is highly pervasive in P2P file-sharing systems and is difficult to detect automatically before actually downloading a file due to the insufficient and biased description of ...
Dongmei Jia
CIKM
2008
Springer
13 years 9 months ago
Social tags: meaning and suggestions
This paper aims to quantify two common assumptions about social tagging: (1) that tags are “meaningful” and (2) that the tagging process is influenced by tag suggestions. For...
Fabian M. Suchanek, Milan Vojnovic, Dinan Gunaward...
CIKM
2008
Springer
13 years 9 months ago
Protecting location privacy against location-dependent attack in mobile services
Privacy preservation has recently received considerable attention for location-based mobile services. In this paper, we present location-dependent attack resulting from continuous...
Xiao Pan, Jianliang Xu, Xiaofeng Meng
CAISE
2010
Springer
13 years 9 months ago
Probabilistic Models to Reconcile Complex Data from Inaccurate Data Sources
There is a large amount of data that is published on the Web and several techniques have been developed to extract and integrate data from Web sources. However, Web data are inhere...
Lorenzo Blanco, Valter Crescenzi, Paolo Merialdo, ...
CAISE
2010
Springer
13 years 9 months ago
Modeling and Reasoning about Service-Oriented Applications via Goals and Commitments
Abstract. Service-oriented applications facilitate the exchange of business services among participants. Existing modeling approaches either apply at a lower of abstraction than re...
Amit K. Chopra, Fabiano Dalpiaz, Paolo Giorgini, J...
CAISE
2010
Springer
13 years 9 months ago
Supporting Semantic Search on Heterogeneous Semi-structured Documents
This paper presents SHIRI-Querying 3 , an approach for semantic search on semi-structured documents. We propose a solution to tackle incompleteness and imprecision of semantic anno...
Yassine Mrabet, Nacéra Bennacer, Nathalie P...
CAISE
2010
Springer
13 years 9 months ago
Design and Verification of Instantiable Compliance Rule Graphs in Process-Aware Information Systems
For enterprises it has become crucial to check compliance of their business processes with certain rules such as medical guidelines or financial regulations. When automating compli...
Linh Thao Ly, Stefanie Rinderle-Ma, Peter Dadam
CAISE
2010
Springer
13 years 9 months ago
From Web Data to Entities and Back
We present the Entity Name System (ENS), an enabling infrastructure, which can host descriptions of named entities and provide unique identifiers, on large-scale. In this way, it o...
Zoltán Miklós, Nicolas Bonvin, Paolo...
CAISE
2010
Springer
13 years 9 months ago
Interaction-Driven Self-adaptation of Service Ensembles
Abstract. The emergence of large-scale online collaboration requires current information systems to be apprehended as service ensembles comprising human and software service entiti...
Christoph Dorn, Schahram Dustdar