𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Modular Ontologies: Concepts, Theories and Techniques for Knowledge Modularization

✍ Scribed by Heiner Stuckenschmidt, Christine Parent, Stefano Spaccapietra (auth.), Heiner Stuckenschmidt, Christine Parent, Stefano Spaccapietra (eds.)


Publisher
Springer-Verlag Berlin Heidelberg
Year
2009
Tongue
English
Leaves
372
Series
Lecture Notes in Computer Science 5445 : Theoretical Computer Science and General Issues
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Subjects


Information Systems Applications (incl.Internet); Information Storage and Retrieval; Database Management; Software Engineering; Data Mining and Knowledge Discovery; Data Structures


πŸ“œ SIMILAR VOLUMES


Source Code Modularization: Theory and T
✍ Ayaz Isazadeh, Habib Izadkhah, Islam Elgedawy πŸ“‚ Library πŸ“… 2017 πŸ› Springer International Publishing 🌐 English

<p><p>This book presents source code modularization as a key activity in reverse engineering to extract the software architecture from the existing source code. To this end, it provides detailed techniques for source code modularization and discusses their effects on different software quality attri

Concepts, Ontologies, and Knowledge Repr
✍ Grega Jakus, Veljko MilutinoviΔ‡, Sanida OmeroviΔ‡, SaΕ‘o TomaΕΎič (auth.) πŸ“‚ Library πŸ“… 2013 πŸ› Springer-Verlag New York 🌐 English

<p><p>Recording knowledge in a common framework that would make it possible to seamlessly share global knowledge remains an important challenge for researchers. This brief examines several ideas about the representation of knowledge addressing this challenge. A widespread general agreement is follow

Energy-Efficient Modular Exponential Tec
✍ Satyanarayana Vollala, N. Ramasubramanian, Utkarsh Tiwari πŸ“‚ Library πŸ“… 2021 πŸ› Springer 🌐 English

<div><div>Cryptographic applications, such as RSA algorithm, ElGamal cryptography, elliptic curve cryptography, Rabin cryptosystem, Diffie -Hellmann key exchange algorithm, and the Digital Signature Standard, use modular exponentiation extensively. The performance of all these applications strongly

Energy-Efficient Modular Exponential Tec
✍ Satyanarayana Vollala, N. Ramasubramanian, Utkarsh Tiwari πŸ“‚ Library πŸ“… 2021 πŸ› Springer 🌐 English

<div><div>Cryptographic applications, such as RSA algorithm, ElGamal cryptography, elliptic curve cryptography, Rabin cryptosystem, Diffie -Hellmann key exchange algorithm, and the Digital Signature Standard, use modular exponentiation extensively. The performance of all these applications strongly

Energy-Efficient Modular Exponential Tec
✍ Satyanarayana Vollala, N. Ramasubramanian, Utkarsh Tiwari πŸ“‚ Library πŸ“… 2021 πŸ› Springer 🌐 English

<div><div>Cryptographic applications, such as RSA algorithm, ElGamal cryptography, elliptic curve cryptography, Rabin cryptosystem, Diffie -Hellmann key exchange algorithm, and the Digital Signature Standard, use modular exponentiation extensively. The performance of all these applications strongly