Sciweavers

813 search results - page 13 / 163
» Pipeline-centric provenance model
Sort
View
WWW
2004
ACM
14 years 8 months ago
Interpreting distributed ontologies
Semantic Web is challenged by the URI meaning issues arising from putting ontologies in open and distributed environments. As a try to clarify some of the meaning issues, this pap...
Yuzhong Qu, Zhiqiang Gao
DASFAA
2009
IEEE
151views Database» more  DASFAA 2009»
14 years 2 months ago
The Challenge of Assuring Data Trustworthiness
Abstract. With the increased need of data sharing among multiple organizations, such as government organizations, financial corporations, medical hospitals and academic institution...
Elisa Bertino, Chenyun Dai, Murat Kantarcioglu
ACISP
2006
Springer
13 years 11 months ago
Efficient Identity-Based Signatures Secure in the Standard Model
The only known construction of identity-based signatures that can be proven secure in the standard model is based on the approach of attaching certificates to non-identity-based si...
Kenneth G. Paterson, Jacob C. N. Schuldt
JOT
2007
113views more  JOT 2007»
13 years 7 months ago
Pattern-Oriented Design for Multi-Agent System: A Conceptual Model
Design patterns represent solutions to specific problem of developing one application that have evolved over time. They leverage the reuse level to the design phase by providing a...
Radziah Mohamad, Safaai Deris, Hany H. Ammar
CJ
2010
114views more  CJ 2010»
13 years 7 months ago
Using the Relational Model to Capture Topological Information of Spaces
Abstract. Motivated by research on how topology may be a helpful foundation for building information modeling (BIM), a relational database version of the notions of chain complex a...
Patrick Erik Bradley, Norbert Paul