Sciweavers

425 search results - page 58 / 85
» adhoc 2007
Sort
View
ICCS
2007
Springer
14 years 4 months ago
A Privacy-Aware Identity Design for Exploring Ubiquitous Collaborative Wisdom
Privacy and security has been considered as the top criterion for the acceptance of e-service adoption. In this paper, we proposed a privacy aware identity protection design that i...
Yuanchu Hwang, Soe-Tsyr Yuan
ODBIS
2007
Springer
127views Database» more  ODBIS 2007»
14 years 4 months ago
On RDF/S Ontology Evolution
Abstract. The algorithms dealing with the incorporation of new knowledge in an ontology (ontology evolution) often share a rather standard process of dealing with changes. This pro...
George Konstantinidis, Giorgos Flouris, Grigoris A...
PKDD
2007
Springer
121views Data Mining» more  PKDD 2007»
14 years 4 months ago
Improved Algorithms for Univariate Discretization of Continuous Features
In discretization of a continuous variable its numerical value range is divided into a few intervals that are used in classification. For example, Na¨ıve Bayes can benefit from...
Jussi Kujala, Tapio Elomaa
PROVSEC
2007
Springer
14 years 4 months ago
CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts
In a threshold broadcast encryption scheme, a sender chooses (ad-hoc) a set of n receivers and a threshold t, and then encrypts a message by using the public keys of all the recei...
Vanesa Daza, Javier Herranz, Paz Morillo, Carla R&...
VVEIS
2007
13 years 11 months ago
Checking Complex Compositions of Web Services Against Policy Constraints
Research in web services has allowed reusable, distributed, loosely coupled components which can easily be composed to build systems or to produce more complex services. Compositio...
Andrew Dingwall-Smith, Anthony Finkelstein