Sciweavers

7329 search results - page 6 / 1466
» Network Extractor Protocols
Sort
View
SEMWEB
2007
Springer
14 years 1 months ago
Using the Dempster-Shafer Theory of Evidence to Resolve ABox Inconsistencies
Abstract. Automated ontology population using information extraction algorithms can produce inconsistent knowledge bases. Confidence values assigned by the extraction algorithms m...
Andriy Nikolov, Victoria S. Uren, Enrico Motta, An...
NETWORKS
2006
13 years 7 months ago
An improved deniable authentication protocol
Jun Shao, Zhenfu Cao, Rongxing Lu
ICNP
2003
IEEE
14 years 1 months ago
Network Time Synchronization Using Clock Offset Optimization
Omer Gurewitz, Israel Cidon, Moshe Sidi
CHES
2007
Springer
165views Cryptology» more  CHES 2007»
14 years 2 months ago
FPGA Intrinsic PUFs and Their Use for IP Protection
In recent years, IP protection of FPGA hardware designs has become a requirement for many IP vendors. In [34], Simpson and Schaumont proposed a fundamentally different approach to...
Jorge Guajardo, Sandeep S. Kumar, Geert Jan Schrij...