Sciweavers

950 search results - page 162 / 190
» Pin-pointing concept descriptions
Sort
View
CHES
2006
Springer
205views Cryptology» more  CHES 2006»
15 years 8 months ago
Automated Design of Cryptographic Devices Resistant to Multiple Side-Channel Attacks
Balanced dynamic dual-rail gates and asynchronous circuits have been shown, if implemented correctly, to have natural and efficient resistance to side-channel attacks. Despite thei...
Konrad J. Kulikowski, Alexander B. Smirnov, Alexan...
EKAW
2006
Springer
15 years 8 months ago
Matching Unstructured Vocabularies Using a Background Ontology
Existing ontology matching algorithms use a combination of lexical and structural correspondance between source and target ontologies. We present a realistic case-study where both ...
Zharko Aleksovski, Michel C. A. Klein, Warner ten ...
167
Voted
ESWS
2006
Springer
15 years 8 months ago
Ontology Engineering Revisited: An Iterative Case Study
Existing mature ontology engineering approaches are based on some basic assumptions that are often violated in practice, in particular in the Semantic Web. Ontologies often need to...
Christoph Tempich, Helena Sofia Pinto, Steffen Sta...
MMM
2010
Springer
183views Multimedia» more  MMM 2010»
15 years 8 months ago
Mediapedia: Mining Web Knowledge to Construct Multimedia Encyclopedia
In recent years, we have witnessed the blooming of Web 2.0 content such as Wikipedia, Flickr and YouTube, etc. How might we benefit from such rich media resources available on the...
Richang Hong, Jinhui Tang, Zheng-Jun Zha, Zhiping ...
129
Voted
ICSE
2000
IEEE-ACM
15 years 8 months ago
Requirements engineering in the year 00: a research perspective
Requirements engineering (RE) is concerned with the identification of the goals to be achieved by the envisioned system, the operationalization of such goals into services and con...
Axel van Lamsweerde