Sciweavers

3309 search results - page 192 / 662
» Unit Knowledge Management
Sort
View
138
Voted
ICISS
2007
Springer
15 years 7 months ago
A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks
Phishing attack is a kind of identity theft trying to steal confidential data. Existing approaches against phishing attacks cannot prevent real-time phishing attacks. This paper pr...
Mohsen Sharifi, Alireza Saberi, Mojtaba Vahidi, Mo...
163
Voted
DLOG
2011
14 years 7 months ago
Reasoning in Resource-Constrained Environments: a Matchmaking Engine over Relational Knowledge Bases
We present a framework for logic-based matchmaking on ALN ABoxes stored in a relational database. The proposed approach allows both non-standard reasoning and subsumption check be ...
Eufemia Tinelli, Francesco M. Donini, Michele Ruta...
122
Voted
OOIS
2001
Springer
15 years 8 months ago
Ontology Modeling Using UML
Ontology is a comprehensive knowledge model which enables the developer to practice a “higher” level of reuse of knowledge. Typically, different modeling languages are employe...
Xin Wang, Christine W. Chan
123
Voted
EKAW
1997
Springer
15 years 7 months ago
The Notion of Role in Conceptual Modeling
: In this article we analyse the notion of knowledge role. First of all, we present how the relationship between problem solving methods and domain models is tackled in different a...
Chantal Reynaud, Nathalie Aussenac-Gilles, Pierre ...
145
Voted
UAI
2007
15 years 4 months ago
Library-style Ontologies to Support Varying Model Views
The next development in building Bayesian networks will most likely entail constructing multipurpose models that can be employed for varying tasks and by different types of user. ...
Hermina J. M. Tabachneck-Schijf, Linda C. van der ...