Sciweavers

1783 search results - page 117 / 357
» Provenance and Data Synchronization
Sort
View
SDM
2007
SIAM
190views Data Mining» more  SDM 2007»
15 years 5 months ago
AC-Framework for Privacy-Preserving Collaboration
The secure multi-party computation (SMC) model provides means for balancing the use and confidentiality of distributed data. Increasing security concerns have led to a surge in w...
Wei Jiang, Chris Clifton
IJWMC
2006
112views more  IJWMC 2006»
15 years 4 months ago
Security mechanisms, attacks and security enhancements for the IEEE 802.11 WLANs
: Wired Equivalent Privacy (WEP) protocol was adopted to protect authorised users from unauthorised access and eavesdropping in the IEEE 802.11 wireless LANs. It has been proven th...
Yang Xiao, Chaitanya Bandela, Xiaojiang Du, Yi Pan...
JAR
2007
142views more  JAR 2007»
15 years 3 months ago
Reasoning in Description Logics by a Reduction to Disjunctive Datalog
As applications of description logics proliferate, efficient reasoning with knowledge bases containing many assertions becomes ever more important. For such cases, we developed a n...
Ullrich Hustadt, Boris Motik, Ulrike Sattler
EKAW
2010
Springer
15 years 2 months ago
RDFauthor: Employing RDFa for Collaborative Knowledge Engineering
Abstract. In this paper we present RDFauthor, an approach for authoring information that adheres to the RDF data model. RDFauthor completely hides syntax as well as RDF and ontolog...
Sebastian Tramp, Norman Heino, Sören Auer, Ph...
ICASSP
2009
IEEE
15 years 10 months ago
Combining discriminative re-ranking and co-training for parsing Mandarin speech transcripts
Discriminative reranking has been able to significantly improve parsing performance, and co-training has proven to be an effective weakly supervised learning algorithm to bootstr...
Wen Wang