Sciweavers

651 search results - page 73 / 131
» Decisions in thesaurus construction and use
Sort
View
OTM
2004
Springer
15 years 5 months ago
Engineering an Ontology of Financial Securities Fraud
Abstract. This paper discusses the approach of ontology-based knowledge engineering in FF POIROT, a project to explore the use of ontology technology in information systems against...
Gang Zhao, John Kingston, Koen Kerremans, Frederic...
ECWEB
2000
Springer
77views ECommerce» more  ECWEB 2000»
15 years 4 months ago
Selling Bits: A Matter of Creating Consumer Value
Abstract. Digital goods such as music are vulnerable to illegal use over the internet. Technology-driven IT solutions to protection are useful but limited. Instead, we suggest that...
Jaap Gordijn, Hans Akkermans, Hans van Vliet, Edwi...
ICALP
1995
Springer
15 years 3 months ago
Parallel Algorithms with Optimal Speedup for Bounded Treewidth
We describe the rst parallel algorithm with optimal speedup for constructing minimum-width tree decompositions of graphs of bounded treewidth. On n-vertex input graphs, the algori...
Hans L. Bodlaender, Torben Hagerup
CANS
2008
Springer
198views Cryptology» more  CANS 2008»
15 years 1 months ago
3D: A Three-Dimensional Block Cipher
Abstract. The main contribution of this paper is a new iterated secretkey block cipher called 3D, inspired by the AES cipher. The 3D cipher has an SPN design, operates on 512-bit b...
Jorge Nakahara Jr.
NIPS
2007
15 years 1 months ago
Markov Chain Monte Carlo with People
Many formal models of cognition implicitly use subjective probability distributions to capture the assumptions of human learners. Most applications of these models determine these...
Adam Sanborn, Thomas L. Griffiths