Sciweavers

3096 search results - page 20 / 620
» Ontology: Use and Abuse
Sort
View
CHES
2001
Springer
98views Cryptology» more  CHES 2001»
14 years 1 months ago
Attacks on Cryptoprocessor Transaction Sets
Attacks are presented on the IBM 4758 CCA and the Visa Security Module. Two new attack principles are demonstrated. Related key attacks use known or chosen differences between two...
Mike Bond
USS
2008
13 years 11 months ago
Exploitable Redirects on the Web: Identification, Prevalence, and Defense
Web sites on the Internet often use redirection. Unfortunately, without additional security, many of the redirection links can be manipulated and abused to mask phishing attacks. ...
Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta
SEMWEB
2005
Springer
14 years 2 months ago
Ontology Change Detection Using a Version Log
In this article, we propose a new ontology evolution approach that combines a top-down and a bottom-up approach. This means that the manual request for changes (top-down) by the on...
Peter Plessers, Olga De Troyer
COGSR
2010
132views more  COGSR 2010»
13 years 4 months ago
Ontologies and the brain: Using spreading activation through ontologies to support personal interaction
Ontologies, as knowledge engineering tools, allow information to be modelled in ways resembling to those used by the human brain, and may be very useful in the context of personal...
Akrivi Katifori, Costas Vassilakis, Alan J. Dix
CHI
2008
ACM
14 years 9 months ago
aSister: scheduling for homeless women with special needs
Homeless women need special care and attention especially during pregnancy or while trying to overcome substance abuse. We present a solution to help counselors working with these...
Kshitij Gupta, Adwait Joshi, Jamie Allison McAtee,...