Sciweavers

WEBI
2009
Springer
14 years 6 months ago
Adapting Reinforcement Learning for Trust: Effective Modeling in Dynamic Environments
—In open multiagent systems, agents need to model their environments in order to identify trustworthy agents. Models of the environment should be accurate so that decisions about...
Özgür Kafali, Pinar Yolum
WEBI
2009
Springer
14 years 6 months ago
Reasoning in Pervasive Environments: An Implementation of Concept Abduction with Mobile OODBMS
The paper focuses on an implementation of concept abduction with an Object-oriented Database Management System (OODBMS). OWL-DL Knowledge Bases have been translated to an OO versi...
Michele Ruta, Floriano Scioscia, Tommaso Di Noia, ...
WEBI
2009
Springer
14 years 6 months ago
Towards Bridging the Web and the Semantic Web
The World Wide Web (WWW) has provided us with a plethora of information. However, given its unstructured format, this information is useful mainly to humans and cannot be effectiv...
Swarnim Kulkarni, Doina Caragea
WEBI
2009
Springer
14 years 6 months ago
Rigorous Probabilistic Trust-Inference with Applications to Clustering
The World Wide Web has transformed into an environment where users both produce and consume information. In order to judge the validity of information, it is important to know how...
Thomas DuBois, Jennifer Golbeck, Aravind Srinivasa...
WEBI
2009
Springer
14 years 6 months ago
Zero-Sum Reward and Punishment Collaborative Filtering Recommendation Algorithm
In this paper, we propose a novel memory-based collaborative filtering recommendation algorithm. Our algorithm use a new metric named influence weight, which is adjusted with ze...
Nan Li, Chunping Li
WEBI
2009
Springer
14 years 6 months ago
From "Dango" to "Japanese Cakes": Query Reformulation Models and Patterns
Understanding query reformulation patterns is a key step towards next generation web search engines: it can help improving users’ web-search experience by predicting their inten...
Paolo Boldi, Francesco Bonchi, Carlos Castillo, Se...
WEBI
2009
Springer
14 years 6 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
WEBI
2009
Springer
14 years 6 months ago
An Empirical Study on Maximum Latency Saving in Web Prefetching
—This paper presents an empirical study to investigate the maximum benefits that web users can expect from prefetching techniques in the current web. To this end a perfect web p...
B. de la Ossa, Julio Sahuquillo, Ana Pont, Jos&eac...
WEBI
2009
Springer
14 years 6 months ago
Deriving Customized Integrated Web Query Interfaces
— Given a set of query interfaces from providers in the same domain (e.g., car rental), the goal is to build automatically an integrated interface that makes the access to indivi...
Eduard Constantin Dragut, Fang Fang, Clement T. Yu...
WEBI
2009
Springer
14 years 6 months ago
Rank Aggregation Based Text Feature Selection
Filtering feature selection method (filtering method, for short) is a well-known feature selection strategy in pattern recognition and data mining. Filtering method outperforms ot...
Ou Wu, Haiqiang Zuo, Mingliang Zhu, Weiming Hu, Ju...