Sciweavers

2176 search results - page 145 / 436
» Refactoring Methods for Knowledge Bases
Sort
View
CSFW
2005
IEEE
15 years 9 months ago
An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols
Authentication and secrecy properties are proved by very different methods: the former by local reasoning, leading to matching knowledge of all principals about the order of their...
Iliano Cervesato, Catherine Meadows, Dusko Pavlovi...
EUROCAST
2009
Springer
116views Hardware» more  EUROCAST 2009»
15 years 7 months ago
Complete Sets of Hamiltonian Circuits for Classification of Documents
The calculation of Hamiltonian Circuits is an NP-complete task. This paper uses slightly modified complete sets of Hamiltonian circuits for the classification of documents. The sol...
Bernd Steinbach, Christian Posthoff
135
Voted
CSL
2010
Springer
15 years 2 months ago
Voice activity detection based on statistical models and machine learning approaches
The voice activity detectors (VADs) based on statistical models have shown impressive performances especially when fairly precise statistical models are employed. Moreover, the ac...
Jong Won Shin, Joon-Hyuk Chang, Nam Soo Kim
128
Voted
DASFAA
2007
IEEE
240views Database» more  DASFAA 2007»
15 years 9 months ago
A Comparative Study of Ontology Based Term Similarity Measures on PubMed Document Clustering
Recent research shows that ontology as background knowledge can improve document clustering quality with its concept hierarchy knowledge. Previous studies take term semantic simila...
Xiaodan Zhang, Liping Jing, Xiaohua Hu, Michael K....
94
Voted
IEEECIT
2006
IEEE
15 years 9 months ago
A Service Retrieval Model with Enhanced Dominance-Based Rough Sets
As an important part of service-oriented software engineering, service retrieval receives much attention from industry and academia, but which still leaves much to be expected: ho...
Bin Tang, Leqiu Qian, Ruzhi Xu, Yunjiao Xue, Hui T...