Sciweavers

371 search results - page 21 / 75
» Template Based Semantic Similarity for Security Applications
Sort
View
WOLLIC
2009
Springer
15 years 4 months ago
Ludics and Its Applications to Natural Language Semantics
Abstract. Proofs in Ludics, have an interpretation provided by their counter-proofs, that is the objects they interact with. We shall follow the same idea by proposing that sentenc...
Alain Lecomte, Myriam Quatrini
BPM
2005
Springer
102views Business» more  BPM 2005»
15 years 3 months ago
Integrating Process Learning and Process Evolution - A Semantics Based Approach
Companies are developing a growing interest in aligning their information systems in a process-oriented way. However, current processaware information systems (PAIS) fail to meet p...
Stefanie Rinderle, Barbara Weber, Manfred Reichert...
WSDM
2012
ACM
304views Data Mining» more  WSDM 2012»
13 years 5 months ago
Beyond co-occurrence: discovering and visualizing tag relationships from geo-spatial and temporal similarities
Studying relationships between keyword tags on social sharing websites has become a popular topic of research, both to improve tag suggestion systems and to discover connections b...
Haipeng Zhang, Mohammed Korayem, Erkang You, David...
FC
2004
Springer
120views Cryptology» more  FC 2004»
15 years 3 months ago
Identity-Based Chameleon Hash and Applications
Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm, and similar in efficiency to regular signatures. The distinguishing characteristic of chamel...
Giuseppe Ateniese, Breno de Medeiros
ESWS
2008
Springer
14 years 11 months ago
Instance Based Clustering of Semantic Web Resources
Abstract. The original Semantic Web vision was explicit in the need for intelligent autonomous agents that would represent users and help them navigate the Semantic Web. We argue t...
Gunnar Aastrand Grimnes, Peter Edwards, Alun D. Pr...