Sciweavers

16218 search results - page 42 / 3244
» Standards
Sort
View
78
Voted
AIME
2009
Springer
14 years 11 months ago
Sharable Appropriateness Criteria in GLIF3 Using Standards and the Knowledge-Data Ontology Mapper
Abstract. Creating computer-interpretable guidelines (CIGs) requires much effort. This effort would be leveraged by sharing CIGs with more than one implementing institution. Sharin...
Mor Peleg
IJMTM
2007
123views more  IJMTM 2007»
14 years 9 months ago
Semantic enterprise application integration standards
Large, industry-wide interoperability projects use syntax-based standards approaches to accomplish interoperable data exchange among enterprise applications. We are investigating S...
Nenad Anicic, Zoran Marjanovic, Nenad Ivezic, Albe...
DPD
2002
120views more  DPD 2002»
14 years 9 months ago
An Overview of Standards and Related Technology in Web Services
The Internet is revolutionizing business by providing an affordable and efficient way to link companies with their partners as well as customers. Nevertheless, there are problems t...
Aphrodite Tsalgatidou, Thomi Pilioura
INFORMATICALT
2010
92views more  INFORMATICALT 2010»
14 years 8 months ago
New Fuzzy Identity-Based Encryption in the Standard Model
In a fuzzy identity-based encryption (IBE) scheme, a user with the secret key for an identity ID is able to decrypt a ciphertext encrypted with another identity ID if and only if I...
Yanli Ren, Dawu Gu, Shuozhong Wang, Xinpeng Zhang
CORR
2010
Springer
427views Education» more  CORR 2010»
14 years 8 months ago
A Comparison between Memetic algorithm and Genetic algorithm for the cryptanalysis of Simplified Data Encryption Standard algori
Genetic algorithms are a population-based Meta heuristics. They have been successfully applied to many optimization problems. However, premature convergence is an inherent charact...
Poonam Garg