Sciweavers

255 search results - page 20 / 51
» Principles for Entity Authentication
Sort
View
KCAP
2005
ACM
14 years 29 days ago
OLA in the OAEI 2005 Alignment Contest
Among the variety of alignment approaches (e.g., using machine learning, subsumption computation, formal concept analysis, etc.) similarity-based ones rely on a quantitative asses...
Jérôme Euzenat, Philippe Guéga...
DIM
2005
ACM
13 years 9 months ago
A delegation framework for federated identity management
Identity federation is a powerful scheme that links accounts of users maintained distinctly by different business partners. The concept of network identity is a driver for accele...
Hidehito Gomi, Makoto Hatakeyama, Shigeru Hosono, ...
INFOCOM
2010
IEEE
13 years 5 months ago
A Self-Organized Mechanism for Thwarting Malicious Access in Ad Hoc Networks
—This paper introduces a self-organized mechanism to control user access in ad hoc networks without requiring any infrastructure or a central administration entity. The proposed ...
Natalia Castro Fernandes, Marcelo D. D. Moreira, O...
SDM
2007
SIAM
177views Data Mining» more  SDM 2007»
13 years 8 months ago
Multi-way Clustering on Relation Graphs
A number of real-world domains such as social networks and e-commerce involve heterogeneous data that describes relations between multiple classes of entities. Understanding the n...
Arindam Banerjee, Sugato Basu, Srujana Merugu
ER
1997
Springer
102views Database» more  ER 1997»
13 years 11 months ago
From Ancient Egyptian Language to Future Conceptual Modeling
This paper discusses the construction principles of ancient Egyptian hieroglyphs from the point of view of conceptual modeling. The paper starts with a summary of author’s previo...
Peter P. Chen