Sciweavers

1645 search results - page 226 / 329
» Conceptual modelling: Knowledge acquisition and model abstra...
Sort
View
CRYPTO
2000
Springer
134views Cryptology» more  CRYPTO 2000»
15 years 2 months ago
Taming the Adversary
Abstract. While there is a great deal of sophistication in modern cryptology, simple (and simplistic) explanations of cryptography remain useful and perhaps necessary. Many of the ...
Martín Abadi
AI
2010
Springer
14 years 8 months ago
Agent decision-making in open mixed networks
Computer systems increasingly carry out tasks in mixed networks, that is in group settings in which they interact both with other computer systems and with people. Participants in...
Ya'akov Gal, Barbara J. Grosz, Sarit Kraus, Avi Pf...
CIKM
2010
Springer
14 years 8 months ago
Collaborative Dual-PLSA: mining distinction and commonality across multiple domains for text classification
:  Collaborative Dual-PLSA: Mining Distinction and Commonality across Multiple Domains for Text Classification Fuzhen Zhuang, Ping Luo, Zhiyong Shen, Qing He, Yuhong Xiong, Zhon...
Fuzhen Zhuang, Ping Luo, Zhiyong Shen, Qing He, Yu...
SEMWEB
2004
Springer
15 years 3 months ago
A Semantic Approach for Designing E-Business Protocols
Abstract— Business processes involve interactions among autonomous partners. We propose that these interactions be specified modularly as protocols. Protocols can be published, ...
Ashok U. Mallya, Munindar P. Singh
CCR
2010
131views more  CCR 2010»
14 years 10 months ago
DECOR: DEClarative network management and OpeRation
Network management operations are complicated, tedious and error-prone, requiring significant human involvement and expert knowledge. In this paper, we first examine the fundament...
Xu Chen, Yun Mao, Zhuoqing Morley Mao, Jacobus E. ...