Sciweavers

1893 search results - page 223 / 379
» Eliciting and Validating Knowledge in Knowledge Management S...
Sort
View
SFM
2011
Springer
253views Formal Methods» more  SFM 2011»
12 years 11 months ago
Application-Layer Connector Synthesis
The heterogeneity characterizing the systems populating the Ubiquitous Computing environment prevents their seamless interoperability. Heterogeneous protocols may be willing to coo...
Paola Inverardi, Romina Spalazzese, Massimo Tivoli
PAKDD
2005
ACM
132views Data Mining» more  PAKDD 2005»
14 years 1 months ago
On Multiple Query Optimization in Data Mining
Traditional multiple query optimization methods focus on identifying common subexpressions in sets of relational queries and on constructing their global execution plans. In this p...
Marek Wojciechowski, Maciej Zakrzewicz
CR
2001
173views Education» more  CR 2001»
13 years 9 months ago
Constructing an Ontology for WWW Summarization in Bone Marrow Transplantation (BMT)
We describe an ontology for WWW summarization in Bone Marrow Transplantation that is currently under construction. It is text-based and qualifies as a grounded ontology. In additi...
Brigitte Endres-Niggemeyer, Bernd Hertenstein, Cla...
DL
1998
Springer
114views Digital Library» more  DL 1998»
14 years 17 days ago
Collaborative Information Agents on the World Wide Web
In this paper, we present DIAMS, a system of distributed,collaborative information agents which help users access, collect, organize and exchange information on the World Wide Web...
James R. Chen, Nathalie Mathe, Shawn R. Wolfe
IH
1998
Springer
14 years 16 days ago
An Information-Theoretic Model for Steganography
An information-theoretic model for steganography with passive adversaries is proposed. The adversary's task of distinguishing between an innocent cover message C and a modi e...
Christian Cachin