Sciweavers

614 search results - page 53 / 123
» Information Integrity Technology Product Structure
Sort
View
ITCC
2005
IEEE
15 years 3 months ago
ASIC Implementation of a Unified Hardware Architecture for Non-Key Based Cryptographic Hash Primitives
Hash algorithms are a class of cryptographic primitives used for fulfilling the requirements of integrity and authentication in cryptography. In this paper, we propose and present...
T. S. Ganesh, T. S. B. Sudarshan
103
Voted
P2P
2006
IEEE
229views Communications» more  P2P 2006»
15 years 3 months ago
Cost-Aware Processing of Similarity Queries in Structured Overlays
Large-scale distributed data management with P2P systems requires the existence of similarity operators for queries as we cannot assume that all users will agree on exactly the sa...
Marcel Karnstedt, Kai-Uwe Sattler, Manfred Hauswir...
AMKM
2003
Springer
15 years 3 months ago
Integrating External Sources in a Corporate Semantic Web Managed by a Multi-agent System
We first describe a multi-agent system managing a corporate memory in the form of a corporate semantic web. We then focus on a newly introduced society of agents in charge of wrap...
Tuan-Dung Cao, Fabien Gandon
OTM
2005
Springer
15 years 3 months ago
Hybrid Model for Semantic Similarity Measurement
Expressive knowledge representations with flexible semantic similarity measures are central for the functioning of semantic information retrieval, information integration, matchmak...
Angela Schwering
OTM
2010
Springer
14 years 8 months ago
A Hybrid Approach to Constructing Tag Hierarchies
Abstract. Folksonomies are becoming increasingly popular. They contain large amounts of data which can be mined and utilized for many tasks like visualization, browsing, informatio...
Geir Solskinnsbakk, Jon Atle Gulla