Sciweavers

3196 search results - page 180 / 640
» Knowledge Acquisition for Knowledge Management
Sort
View
IPPS
2007
IEEE
14 years 3 months ago
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer’s ide...
Li Lu, Jinsong Han, Lei Hu, Jinpeng Huai, Yunhao L...
TPDS
2008
116views more  TPDS 2008»
13 years 9 months ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
CLEF
2007
Springer
14 years 1 months ago
On the Application of Lexical-Syntactic Knowledge to the Answer Validation Exercise
Abstract. This paper presents a system that applies Textual Entailment recognition techniques to the AVE task. This is performed comparing representations of text snippets by means...
Óscar Ferrández, Daniel Micol, Rafae...
EKAW
2008
Springer
13 years 11 months ago
Principles for Knowledge Engineering on the Web
With the advent of the Web and the efforts towards a Semantic Web the nature of knowledge engineering has changed drastically. In this position paper we propose four principles fo...
Guus Schreiber
NOMS
2006
IEEE
119views Communications» more  NOMS 2006»
14 years 3 months ago
Runtime Semantic Interoperability for Gathering Ontology-based Network Context
—The trends for pushing more operational intelligence towards network elements to achieve more context-aware and self-managing behavior often requires elements to gather network ...
John Keeney, David Lewis, Declan O'Sullivan, Antoi...