<p><p>This book presents source code modularization as a key activity in reverse engineering to extract the software architecture from the existing source code. To this end, it provides detailed techniques for source code modularization and discusses their effects on different software quality attri
Modular Ontologies: Concepts, Theories and Techniques for Knowledge Modularization
β Scribed by Heiner Stuckenschmidt, Christine Parent, Stefano Spaccapietra (auth.), Heiner Stuckenschmidt, Christine Parent, Stefano Spaccapietra (eds.)
- Publisher
- Springer-Verlag Berlin Heidelberg
- Year
- 2009
- Tongue
- English
- Leaves
- 372
- Series
- Lecture Notes in Computer Science 5445 : Theoretical Computer Science and General Issues
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Subjects
Information Systems Applications (incl.Internet); Information Storage and Retrieval; Database Management; Software Engineering; Data Mining and Knowledge Discovery; Data Structures
π SIMILAR VOLUMES
<p><p>Recording knowledge in a common framework that would make it possible to seamlessly share global knowledge remains an important challenge for researchers. This brief examines several ideas about the representation of knowledge addressing this challenge. A widespread general agreement is follow
<div><div>Cryptographic applications, such as RSA algorithm, ElGamal cryptography, elliptic curve cryptography, Rabin cryptosystem, Diffie -Hellmann key exchange algorithm, and the Digital Signature Standard, use modular exponentiation extensively. The performance of all these applications strongly
<div><div>Cryptographic applications, such as RSA algorithm, ElGamal cryptography, elliptic curve cryptography, Rabin cryptosystem, Diffie -Hellmann key exchange algorithm, and the Digital Signature Standard, use modular exponentiation extensively. The performance of all these applications strongly
<div><div>Cryptographic applications, such as RSA algorithm, ElGamal cryptography, elliptic curve cryptography, Rabin cryptosystem, Diffie -Hellmann key exchange algorithm, and the Digital Signature Standard, use modular exponentiation extensively. The performance of all these applications strongly