Sciweavers

1778 search results - page 162 / 356
» Building a Knowledge Base: An Example
Sort
View
132
Voted
NDSS
2007
IEEE
15 years 9 months ago
Attribute-Based Publishing with Hidden Credentials and Hidden Policies
With Hidden Credentials Alice can send policyencrypted data to Bob in such a way that he can decrypt the data only with the right combination of credentials. Alice gains no knowle...
Apu Kapadia, Patrick P. Tsang, Sean W. Smith
128
Voted
BMCBI
2006
147views more  BMCBI 2006»
15 years 3 months ago
The NeuARt II system: a viewing tool for neuroanatomical data based on published neuroanatomical atlases
Background: Anatomical studies of neural circuitry describing the basic wiring diagram of the brain produce intrinsically spatial, highly complex data of great value to the neuros...
Gully A. P. C. Burns, Wei-Cheng Cheng, Richard H. ...
COMSWARE
2007
IEEE
15 years 9 months ago
Smaller Connected Dominating Sets in Ad Hoc and Sensor Networks based on Coverage by Two-Hop Neighbors
— In this paper, we focus on the construction of an efficient dominating set in ad hoc and sensor networks. A set of nodes is said to be dominating if each node is either itself...
François Ingelrest, David Simplot-Ryl, Ivan...
141
Voted
ESAW
2008
Springer
15 years 5 months ago
Coping with Exceptions in Agent-Based Workflow Enactments
A workflow involves the coordinated execution of multiple operations and can be used to capture business processes. Typical workflow management systems are centralised and rigid; t...
Joey Sik Chun Lam, Frank Guerin, Wamberto Weber Va...
ICCBR
2003
Springer
15 years 8 months ago
Soft Interchangeability for Case Adaptation
In [1] we propose interchangeability based algorithms as methods for solving the case adaptation for the domain of problems which can be expressed as Constraint Satisfaction Proble...
Nicoleta Neagu, Boi Faltings