Sciweavers

164 search results - page 28 / 33
» Evaluating Performance and Quality of XML-Based Similarity J...
Sort
View
74
Voted
COMPSAC
2006
IEEE
15 years 3 months ago
Consensus Ontology Generation in a Socially Interacting MultiAgent System
This paper presents an approach for building consensus ontologies from the individual ontologies of a network of socially interacting agents. Each agent has its own conceptualizat...
Ergun Biçici
ICDM
2005
IEEE
190views Data Mining» more  ICDM 2005»
15 years 3 months ago
Neighborhood Formation and Anomaly Detection in Bipartite Graphs
Many real applications can be modeled using bipartite graphs, such as users vs. files in a P2P system, traders vs. stocks in a financial trading system, conferences vs. authors ...
Jimeng Sun, Huiming Qu, Deepayan Chakrabarti, Chri...
99
Voted
ACNS
2009
Springer
150views Cryptology» more  ACNS 2009»
15 years 1 months ago
How to Compare Profiled Side-Channel Attacks?
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this s...
François-Xavier Standaert, François ...
ESWS
2008
Springer
14 years 11 months ago
Enriching an Ontology with Multilingual Information
Organizations working in a multilingual environment demand multilingual ontologies. To solve this problem we propose LabelTranslator, a system that automatically localizes ontologi...
Mauricio Espinoza, Asunción Gómez-P&...
ICWS
2007
IEEE
14 years 11 months ago
Reputation-Enhanced QoS-based Web Services Discovery
With an increasing number of Web services providing similar functionalities, Quality of Service (QoS) is becoming an important criterion for selection of the best available servic...
Ziqiang Xu, Patrick Martin, Wendy Powley, Farhana ...