Sciweavers

2799 search results - page 468 / 560
» Ontological technologies for user modelling
Sort
View
IH
1998
Springer
14 years 1 months ago
Stop-and-Go-MIXes Providing Probabilistic Anonymity in an Open System
Abstract. Currently knownbasic anonymitytechniques dependon identity veri cation. If veri cation of user identities is not possible due to the related management overhead or a gene...
Dogan Kesdogan, Jan Egner, Roland Büschkes
FSKD
2007
Springer
157views Fuzzy Logic» more  FSKD 2007»
13 years 10 months ago
Semantics-Based Art Image Retrieval Using Linguistic Variable
More and more digitized art images are accumulated and expanded in our daily life and techniques need to be established on how to organize and retrieval them. Though content-based...
Qingyong Li, Siwei Luo, Zhongzhi Shi
ESAW
2008
Springer
13 years 10 months ago
Sensitive Data Transaction in Hippocratic Multi-Agent Systems
The current evolution of Information Technology leads to the increase of automatic data processing over multiple information systems. The data we deal with concerns sensitive infor...
Ludivine Crépin, Yves Demazeau, Olivier Boi...
IFIP12
2004
13 years 10 months ago
Component Retrieval Using Conversational Case-Based Reasoning
: Component retrieval, about how to locate and identify appropriate components, is one of the major problems in component reuse. It becomes more critical as more reusable component...
Mingyang Gu, Agnar Aamodt, Xin Tong
JMM
2007
107views more  JMM 2007»
13 years 8 months ago
Using a Spatial Context Authentication Proxy for Establishing Secure Wireless Connections
Spontaneous interaction in wireless ad-hoc networks is often desirable not only between users or devices in direct contact, but also with devices that are accessible only via a wi...
Rene Mayrhofer, Roswitha Gostner