نتایج جستجو برای: foaf

تعداد نتایج: 195  

2005
Elena García Barriocanal Miguel-Ángel Sicilia

Several current approaches to information filtering in Web search engines implement models that use backlinks as a metric of subjective value that complements information retrieval techniques based on the content of the documents. Nonetheless, these models are somewhat “blind” to the reputation or trustworthiness of the creators of the links. The growing increase in interest in applications of ...

2005
Stefania Costache Wolfgang Nejdl Raluca Paiu

Recommender algorithms have been quite successfully employed in a variety of scenarios from filtering applications to recommendations of movies and books at Amazon.com. However, all these algorithms focus on single item recommendations and do not consider any more complex recommendation structures. This paper explores how semantically rich complex recommendation structures, represented as RDF g...

2007
Boanerges Aleman-Meza Uldis Bojars Harold Boley John G. Breslin Malgorzata Mochól Lyndon J. B. Nixon Axel Polleres Anna Fensel

This paper presents a framework for the reuse and extension of existing, established vocabularies in the Semantic Web. Driven by the primary application of expert finding, we will explore the reuse of vocabularies that have attracted a considerable user community already (FOAF, SIOC, etc.) or are derived from de facto standards used in tools or industrial practice (such as vCard, iCal and Dubli...

2012
Sebastian Tramp Henry Story Andrei Vlad Sambra Philipp Frischmuth Michael Martin Sören Auer

The WebID protocol enables the global identi cation and authentication of agents in a distributed manner by combining asymmetric cryptography and Linked Data. In order to decide whether access should be granted or denied to a particular WebID, the authenticating web server may need to retrieve other pro les and linked resources to work out e.g. if the requesting agent is member of an authorized...

2008
Gunnar Aastrand Grimnes Peter Edwards Alun D. Preece

The original Semantic Web vision was explicit in the need for intelligent autonomous agents that would represent users and help them navigate the Semantic Web. We argue that an essential feature for such agents is the capability to analyse data and learn. In this paper we outline the challenges and issues surrounding the application of clustering algorithms to Semantic Web data. We present seve...

2014
João Rocha da Silva João Aguiar Castro Cristina Ribeiro João P. Honrado Ângela Lomba João Gonçalves

Managing research data often requires the creation or reuse of specialised metadata schemas to satisfy the metadata requirements of each research group. Ontologies present several advantages over metadata schemas. In particular, they can be shared and improved upon more easily, providing the flexibility required to establish relationships between datasets and concepts from distinct domains. In ...

2010
Robert Isele Anja Jentzsch Christian Bizer

The Web of Linked Data is built upon the idea that data items on the Web are connected by RDF links. Sadly, the reality on the Web shows that Linked Data sources set some RDF links pointing at data items in related data sources, but they clearly do not set RDF links to all data sources that provide related data. In this paper, we present Silk Server, an identity resolution component, which can ...

2013
Sobha Rani K V S V N Raju V. Valli Kumari Shunichi Hattori Jie Tang Jing Zhang Limin Yao Juanzi Li Li Zhang Zhong Su

In order to analyze large scale social networks, different strategies are being implemented. The traditional methods of data mining are getting transformed to be suitable to the requirements of the web based information available in different structured and unstructured formats. The process of web mining, a versatile methodology of data mining, involves modified mining techniques applied on doc...

Journal: :JoWUA 2015
Gökhan Kul Shambhu J. Upadhyaya

Insider attack has become a major threat in financial sector. Currently, there is no insider threat ontology in this domain and such an ontology is critical to developing countermeasures against insider attacks which are very serious and pervasive security problems. In this paper, we offer a methodology to categorize insider attack suspicions using an ontology we create, which focuses on inside...

2012
María de Lourdes Martínez-Villaseñor Miguel González-Mendoza Neil Hernández-Gress

People interact with systems and applications through several devices and are willing to share information about preferences, interests and characteristics. Social networking profiles, data from advanced sensors attached to personal gadgets, and semantic web technologies such as FOAF and microformats are valuable sources of personal information that could provide a fair understanding of the use...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید