Sciweavers

3096 search results - page 76 / 620
» Ontology: Use and Abuse
Sort
View
CISC
2007
Springer
98views Cryptology» more  CISC 2007»
14 years 4 months ago
Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM
Abstract. The Trusted Computing Group (TCG) defines the specifications for the Trusted Platform Module (TPM) and corresponding trust mechanisms that allow a TPM-enabled platform ...
Yongdong Wu, Feng Bao, Robert H. Deng, Marc Mouffr...
BTW
2007
Springer
191views Database» more  BTW 2007»
14 years 4 months ago
The Information Integrator: Using Semantic Technology to provide a single view to distributed data
: For the integration of data that resides in autonomous data sources Software AG uses ontologies. Data source ontologies describe the data sources themselves. Business ontologies ...
Jürgen Angele, Michael Gesmann
IAT
2005
IEEE
14 years 3 months ago
Using Similarity Measures for an Efficient Business Information-Exchange
Several problems are involved in the Virtual Enterprise (VE) formation process. One of the most important problems is the lack of understanding that may arise during agents’ int...
Andreia Malucelli, Eugénio C. Oliveira
ECAI
2006
Springer
14 years 1 months ago
A Redundancy-Based Method for Relation Instantiation from the Web
The Semantic Web requires automatic ontology population methods. We developed an approach, that given existing ontologies, extracts instances of ontology relations, a specific subt...
Viktor de Boer, Maarten van Someren, Bob J. Wielin...
EDBTW
2006
Springer
14 years 1 months ago
Summa Contra Ontologiam
This paper is a critical analysis of the concept of ontology thus as it is used in computing science. It identifies three main problems with such a concept, two of which are intri...
Simone Santini