Sciweavers

1235 search results - page 125 / 247
» Formalizing information security knowledge
Sort
View
WS
2005
ACM
14 years 1 months ago
Group-based key pre-distribution in wireless sensor networks
Many key pre-distribution techniques have been developed recently to establish pairwise keys for wireless sensor networks. To further improve these schemes, researchers have propo...
Donggang Liu, Peng Ning, Wenliang Du
KCAP
2003
ACM
14 years 1 months ago
Collecting commonsense experiences
Humans naturally share knowledge by telling stories. This is a form of knowledge exchange we engage in right from early childhood, and over time we learn to recall, order and orga...
Push Singh, Barbara Barry
ESWS
2009
Springer
14 years 2 months ago
Controlled Natural Language for Semantic Annotation
Knowledge Acquisition through Semantic Annotation is vital to the evolution, growth and success of the Semantic Web. Both Semiautomatic and Manual Annotation are constricted by a ...
Brian Davis, Pradeep Varma, Siegfried Handschuh, L...
KCAP
2003
ACM
14 years 1 months ago
Using transformations to improve semantic matching
Many AI tasks require determining whether two knowledge representations encode the same knowledge. Solving this matching problem is hard because representations may encode the sam...
Peter Z. Yeh, Bruce W. Porter, Ken Barker
CRYPTO
2000
Springer
134views Cryptology» more  CRYPTO 2000»
14 years 8 days ago
Taming the Adversary
Abstract. While there is a great deal of sophistication in modern cryptology, simple (and simplistic) explanations of cryptography remain useful and perhaps necessary. Many of the ...
Martín Abadi