Sciweavers

1235 search results - page 92 / 247
» Formalizing information security knowledge
Sort
View
TSMC
2010
13 years 2 months ago
A Model for the Integration of Prioritized Knowledge Bases Through Subjective Belief Games
Belief merging is concerned with the integration of several belief bases such that a coherent belief base is developed. Various belief merging models have been developed that use a...
Ebrahim Bagheri, Ali A. Ghorbani
ACSAC
2004
IEEE
13 years 11 months ago
PEACE: A Policy-Based Establishment of Ad-hoc Communities
Ad-hoc networks are perceived as communities of autonomous devices that interconnect with each other. Typically, they have dynamic topologies and cannot rely on a continuous conne...
Sye Loong Keoh, Emil Lupu, Morris Sloman
SAC
2003
ACM
14 years 1 months ago
Semantic Matchmaking in a P-2-P Electronic Marketplace
Matchmaking is the problem of matching offers and requests, such as supply and demand in a marketplace, services and customers in a service agency, etc., where both partners are ...
Tommaso Di Noia, Eugenio Di Sciascio, Francesco M....
DILS
2009
Springer
13 years 5 months ago
Slicing through the Scientific Literature
Abstract. Success in the life sciences depends on access to information in knowledge bases and literature. Finding and extracting the relevant information depends on a user's ...
Christopher J. O. Baker, Patrick Lambrix, Jonas La...
FUIN
2006
69views more  FUIN 2006»
13 years 8 months ago
An Efficient and Secure Cryptosystem for Encrypting Long Messages
Traditionally, due to efficiency considerations, when encrypting long messages using an asymmtric cryptosystem, one needs to use a symmetric cryptosystem in addition. To eliminate ...
Sheng Zhong