Sciweavers

1778 search results - page 132 / 356
» Building a Knowledge Base: An Example
Sort
View
106
Voted
IMA
2005
Springer
126views Cryptology» more  IMA 2005»
15 years 6 months ago
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme
Abstract. Identity-based encryption (IBE) is a special asymmetric encryption method where a public encryption key can be an arbitrary identifier and the corresponding private decr...
Liqun Chen, Zhaohui Cheng
111
Voted
RULEML
2005
Springer
15 years 6 months ago
A Visual Environment for Developing Defeasible Rule Bases for the Semantic Web
Defeasible reasoning is a rule-based approach for efficient reasoning with incomplete and inconsistent information. Such reasoning is useful for many applications in the Semantic W...
Nick Bassiliades, Efstratios Kontopoulos, Grigoris...
105
Voted
CAISE
2003
Springer
15 years 6 months ago
Towards the Automation of Data Warehouse Logical Design: a Rule-Based Approach
Data Warehouse logical design involves the definition of structures that enable an efficient access to information. The designer builds relational or multidimensional structures ta...
Verónika Peralta, Alvaro Illarze, Raul Rugg...
ICCBR
1999
Springer
15 years 5 months ago
REMEX - A Case-Based Approach for Reusing Software Measurement Experienceware
Abstract. For the improvement of software quality and productivity, organizations need to systematically build up and reuse software engineering know-how, promoting organizational ...
Christiane Gresse von Wangenheim
123
Voted
CEC
2009
IEEE
15 years 4 months ago
Automatic system identification based on coevolution of models and tests
In evolutionary robotics, controllers are often designed in simulation, then transferred onto the real system. Nevertheless, when no accurate model is available, controller transfe...
Sylvain Koos, Jean-Baptiste Mouret, Stéphan...