Sciweavers

1792 search results - page 249 / 359
» Software Architecture Knowledge Management
Sort
View
SAC
2004
ACM
15 years 10 months ago
Using mobile agents as roaming security guards to test and improve security of hosts and networks
1 This paper discusses the design and implementation details of MAST (Mobile Agent-based Security Tool), a new mobile agentbased network security approach. MAST has been designed t...
Marco M. Carvalho, Thomas B. Cowin, Niranjan Suri,...
132
Voted
CTRSA
2004
Springer
89views Cryptology» more  CTRSA 2004»
15 years 10 months ago
Universal Re-encryption for Mixnets
We introduce a new cryptographic technique that we call universal re-encryption. A conventional cryptosystem that permits reencryption, such as ElGamal, does so only for a player w...
Philippe Golle, Markus Jakobsson, Ari Juels, Paul ...
SWAP
2007
15 years 6 months ago
Some Experiments on the Usage of a Deductive Database for RDFS Querying and Reasoning
Abstract. Ontologies are pervading many areas of knowledge representation and management. To date, most research efforts have been spent on the development of sufficiently express...
Giovambattista Ianni, Alessandra Martello, Claudio...
IJHCI
2002
90views more  IJHCI 2002»
15 years 4 months ago
Awareness of Organizational Expertise
This article describes automated tools for increasing organizational awareness within a global enterprise. The MITRE Corporation is the context for the current work, however the t...
Mark T. Maybury, Raymond J. D'Amore, David House
SEMWEB
2010
Springer
15 years 2 months ago
Experience of Using OWL Ontologies for Automated Inference of Routine Pre-operative Screening Tests
We describe our experience of designing and implementing a knowledge-based pre-operative assessment decision support system. We developed the system using semantic web technology, ...
Matt-Mouley Bouamrane, Alan L. Rector, Martin Hurr...