Sciweavers

371 search results - page 66 / 75
» Template Based Semantic Similarity for Security Applications
Sort
View
PODC
2010
ACM
15 years 1 months ago
Brief announcement: improving social-network-based sybil-resilient node admission control
We present Gatekeeper, a decentralized protocol that performs Sybil-resilient node admission control based on a social network. Gatekeeper can admit most honest nodes while limiti...
Nguyen Tran, Jinyang Li, Lakshminarayanan Subraman...
EDBT
2008
ACM
202views Database» more  EDBT 2008»
15 years 9 months ago
BeMatch: a platform for matchmaking service behavior models
The capability to easily find useful services (software applications, software components, scientific computations) becomes increasingly critical in several fields. Current approa...
Juan Carlos Corrales, Daniela Grigori, Mokrane Bou...
ICDM
2005
IEEE
190views Data Mining» more  ICDM 2005»
15 years 3 months ago
Neighborhood Formation and Anomaly Detection in Bipartite Graphs
Many real applications can be modeled using bipartite graphs, such as users vs. files in a P2P system, traders vs. stocks in a financial trading system, conferences vs. authors ...
Jimeng Sun, Huiming Qu, Deepayan Chakrabarti, Chri...
COOPIS
2003
IEEE
15 years 2 months ago
A Fuzzy Model for Representing Uncertain, Subjective, and Vague Temporal Knowledge in Ontologies
Abstract. Time modeling is a crucial feature in many application domains. However, temporal information often is not crisp, but is uncertain, subjective and vague. This is particul...
Gábor Nagypál, Boris Motik
IIWAS
2008
14 years 11 months ago
Cross-domain information and service interoperability
The growing trends towards integrating legacy applications with new systems in a network-centric environment has introduced yet another level of complexity beyond those we witness...
Kamran Sartipi, Azin Dehmoobad