Sciweavers

APWEB
2008
Springer
13 years 9 months ago
An Energy-Efficient Multi-agent Based Architecture in Wireless Sensor Network
Wireless sensor network (WSN) containing thousands of tiny and low-power nodes can be used to monitor environment. An energy-efficient and reliable wireless communication architect...
Yi-Ying Zhang, WenCheng Yang, Kee-Bum Kim, Min-Yu ...
APWEB
2008
Springer
13 years 9 months ago
Traceable P2P Record Exchange Based on Database Technologies
Information exchanges in P2P networks have become very popular in recent years. However, tracing how data circulates between peers and how data modifications are performed during t...
Fengrong Li, Yoshiharu Ishikawa
APWEB
2008
Springer
13 years 9 months ago
A Method for Web Information Extraction
The Word Wide Web has becoming one of the most important information repositories. However, information in web pages is free of standards in presentation, without being organized i...
Man I. Lam, Zhiguo Gong, Maybin K. Muyeba
APWEB
2008
Springer
13 years 9 months ago
On the Complexity of Restricted k-anonymity Problem
Abstract. One of the emerging concepts in microdata protection is kanonymity, introduced by Samarati and Sweeney. k-anonymity provides a simple and efficient approach to protect pr...
Xiaoxun Sun, Hua Wang, Jiuyong Li
ESWS
2010
Springer
13 years 9 months ago
An Unsupervised Approach for Acquiring Ontologies and RDF Data from Online Life Science Databases
In the Linked Open Data cloud one of the largest data sets, comprising of 2.5 billion triples, is derived from the Life Science domain. Yet this represents a small fraction of the ...
Saqib Mir, Steffen Staab, Isabel Rojas
ESWS
2010
Springer
13 years 9 months ago
Dealing with Inconsistency When Combining Ontologies and Rules Using DL-Programs
Abstract. Description Logic Programs (DL-programs) have been introduced to combine ontological and rule-based reasoning in the context of the Semantic Web. A DL-program loosely com...
Jörg Pührer, Stijn Heymans, Thomas Eiter
ALPIT
2008
IEEE
13 years 9 months ago
Using Semantic Roles for Coreference Resolution
In this paper, we systematically explore the use of semantic roles in coreference resolution. Here, the semantic roles are automatically determined using a state-of-the-art SRL sy...
Fang Kong, Yancui Li, Guodong Zhou, Qiaoming Zhu, ...
AIRWEB
2008
Springer
13 years 9 months ago
The anti-social tagger: detecting spam in social bookmarking systems
The annotation of web sites in social bookmarking systems has become a popular way to manage and find information on the web. The community structure of such systems attracts spam...
Beate Krause, Christoph Schmitz, Andreas Hotho, Ge...
AIRWEB
2008
Springer
13 years 9 months ago
A few bad votes too many?: towards robust ranking in social media
Online social media draws heavily on active reader participation, such as voting or rating of news stories, articles, or responses to a question. This user feedback is invaluable ...
Jiang Bian, Yandong Liu, Eugene Agichtein, Hongyua...
AIRWEB
2008
Springer
13 years 9 months ago
Exploring linguistic features for web spam detection: a preliminary study
We study the usability of linguistic features in the Web spam classification task. The features were computed on two Web spam corpora: Webspam-Uk2006 and Webspam-Uk2007, we make t...
Jakub Piskorski, Marcin Sydow, Dawid Weiss