Sciweavers

2259 search results - page 88 / 452
» Separation and information hiding
Sort
View
CISSE
2008
Springer
13 years 11 months ago
Anonymity Leakage Reduction in Network Latency
Each Internet communication leaves trails here or there, that can be followed back to the user. Notably, anonymous communication schemes are purposed to hide users' identity ...
Longy O. Anyanwu, Jared Keengwe, Gladys A. Arome
WONTO
2008
13 years 10 months ago
ModOnto: A Tool for Modularizing Ontologies
During the last three years there has been growing interest and consequently active research on ontology modularization. This paper presents a concrete tool that incorporates an ap...
Camila Bezerra, Frederico Luiz Gonçalves de...
CLA
2006
13 years 10 months ago
Towards Concise Representation for Taxonomies of Epistemic Communities
We present an application of formal concept analysis aimed at creating and representing a meaningful structure of knowledge communities under the form of a lattice-based taxonomy ...
Camille Roth, Sergei A. Obiedkov, Derrick G. Kouri...
CSREASAM
2003
13 years 10 months ago
Defending Against Denial of Service Attacks Using Secure Name Resolution
This paper proposes a technique to foil DoS (Denial of Service) attacks. The proposed technique converts a static service to a relocating service and provides information of the n...
Prashant Dewan, Partha Dasgupta, Vijay Karamcheti
SERP
2004
13 years 10 months ago
Keeping Secrets within a Family: Rediscovering Parnas
David Parnas wrote several papers in the 1970's and 1980's that are now considered classics. The concepts he advocated such as information hiding and bstract interfaces ...
H. Conrad Cunningham, Cuihua Zhang, Yi Liu