Sciweavers

2468 search results - page 223 / 494
» Aggregation operators 2003
Sort
View
KCAP
2003
ACM
14 years 4 months ago
FONTE: factorizing ONTology engineering complexity
Because it is difficult to engineer a complex ontology with time, we here consider a method that allows for factorizing the complexity of the engineering process, FONTE (Factoriz...
Jorge Santos, Steffen Staab
PPPJ
2003
ACM
14 years 4 months ago
Multi-tiered distributed computing platform
A simple programmable Java platform-independent distributed computation system has been developed to exploit the free resources on computers linked together by a network. It is a ...
Andrew J. Page, Thomas M. Keane, Richard Allen, Th...
BPM
2003
Springer
91views Business» more  BPM 2003»
14 years 4 months ago
Business Process Management: A Survey
Abstract. Business Process Management (BPM) includes methods, techniques, and tools to support the design, enactment, management, and analysis of operational business processes. It...
Wil M. P. van der Aalst, Arthur H. M. ter Hofstede...
CHES
2003
Springer
88views Cryptology» more  CHES 2003»
14 years 4 months ago
A New Algorithm for Switching from Arithmetic to Boolean Masking
To protect a cryptographic algorithm against Differential Power Analysis, a general method consists in masking all intermediate data with a random value. When a cryptographic algo...
Jean-Sébastien Coron, Alexei Tchulkine
CHES
2003
Springer
115views Cryptology» more  CHES 2003»
14 years 4 months ago
The Doubling Attack - Why Upwards Is Better than Downwards
The recent developments of side channel attacks have lead implementers to use more and more sophisticated countermeasures in critical operations such as modular exponentiation, or ...
Pierre-Alain Fouque, Frédéric Valett...