Sciweavers

7681 search results - page 1383 / 1537
» Typed Membrane Systems
Sort
View
INFOCOM
2010
IEEE
15 years 2 months ago
A Node-failure-resilient Anonymous Communication Protocol through Commutative Path Hopping
Abstract—With rising concerns on user privacy over the Internet, anonymous communication systems that hide the identity of a participant from its partner or third parties are hig...
Fengjun Li, Bo Luo, Peng Liu, Chao-Hsien Chu
144
Voted
JTAER
2010
109views more  JTAER 2010»
15 years 2 months ago
A Flexible Architecture for Privacy-Aware Trust Management
In service-oriented systems a constellation of services cooperate, sharing potentially sensitive information and responsibilities. Cooperation is only possible if the different pa...
Klemens Böhm, Sandro Etalle, Jerry den Hartog...
149
Voted
OIR
2010
101views more  OIR 2010»
15 years 2 months ago
Supporting information access in e-learning by integrating digital libraries and ontology
Purpose – The purpose of this paper is to examine the integration of digital library (DL) technologies with ontology-based knowledge representation in providing semantic rich in...
Daqing He, Yefei Peng, Ming Mao, Dan Wu
SIGMOD
2010
ACM
308views Database» more  SIGMOD 2010»
15 years 2 months ago
GBLENDER: towards blending visual query formulation and query processing in graph databases
Given a graph database D and a query graph g, an exact subgraph matching query asks for the set S of graphs in D that contain g as a subgraph. This type of queries find important...
Changjiu Jin, Sourav S. Bhowmick, Xiaokui Xiao, Ja...
ACL
2010
15 years 2 months ago
Hunting for the Black Swan: Risk Mining from Text
In the business world, analyzing and dealing with risk permeates all decisions and actions. However, to date, risk identification, the first step in the risk management cycle, has...
Jochen L. Leidner, Frank Schilder
« Prev « First page 1383 / 1537 Last » Next »