Sciweavers

1573 search results - page 205 / 315
» Signs and Formal Concepts
Sort
View
GFKL
2007
Springer
164views Data Mining» more  GFKL 2007»
15 years 5 months ago
Classification with Invariant Distance Substitution Kernels
Kernel methods offer a flexible toolbox for pattern analysis and machine learning. A general class of kernel functions which incorporates known pattern invariances are invariant d...
Bernard Haasdonk, Hans Burkhardt
AINA
2006
IEEE
15 years 5 months ago
Efficient Authentication for Reactive Routing Protocols
Ad hoc networks are dynamic networks formed "on the fly" by a set of nodes. Achieving secure routing in such networks is a big challenge. Asymmetric signature schemes pr...
Raghav Bhaskar, Javier Herranz, Fabien Laguillaumi...
ESWS
2006
Springer
15 years 5 months ago
An Environment for Semi-automatic Annotation of Ontological Knowledge with Linguistic Content
Both the multilingual aspects which characterize the (Semantic) Web and the demand for more easy-to-share forms of knowledge representation, being equally accessible by humans and ...
Maria Teresa Pazienza, Armando Stellato
ESWS
2006
Springer
15 years 5 months ago
Toward Multi-viewpoint Reasoning with OWL Ontologies
Abstract. Despite of their advertisement as task independent representations, the reuse of ontologies in different contexts is difficult. An explanation for this is that when devel...
Heiner Stuckenschmidt
FC
2006
Springer
147views Cryptology» more  FC 2006»
15 years 5 months ago
Timed-Release and Key-Insulated Public Key Encryption
In this paper we consider two security notions related to Identity Based Encryption: Key-insulated public key encryption, introduced by Dodis, Katz, Xu and Yung; and Timed-Release ...
Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan...