A Semantics-based Approach to Large-Scale Mobile Social Networking
暂无分享,去创建一个
Hui Wang | Juan Li | Samee Ullah Khan | Wendy Hui Wang | S. Khan | Juan Li | Hui Wang
[1] Juan Li,et al. Grid resource discovery based on semantic P2P communities , 2006, SAC.
[2] Fred L. Templin,et al. Topology Dissemination Based on Reverse-Path Forwarding (TBRPF) , 2004, RFC.
[3] Yu-Chee Tseng,et al. The Broadcast Storm Problem in a Mobile Ad Hoc Network , 1999, Wirel. Networks.
[4] David W. Conrath,et al. Semantic Similarity Based on Corpus Statistics and Lexical Taxonomy , 1997, ROCLING/IJCLCLP.
[5] D. Song,et al. Private and threshold set-intersection , 2004 .
[6] Christian Wagner,et al. The Spatial Node Distribution of the Random Waypoint Mobility Model , 2002, WMAN.
[7] Martha Palmer,et al. Verb Semantics and Lexical Selection , 1994, ACL.
[8] Juan Li,et al. Building Distributed Index for Semantic Web Data , 2009, 2009 International Conference on Advanced Information Networking and Applications.
[9] C C. Chiang,et al. Routing in Clustered Multihop, Mobile Wireless Networks With Fading Channel , 1997 .
[10] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[11] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[12] Ram Ramanathan,et al. Making link-state routing scale for ad hoc networks , 2001, MobiHoc '01.
[13] Jinyang Li,et al. Cluster Based Routing Protocol(CBRP) Functional Specification , 1999 .
[14] Gunnar Karlsson,et al. A System Architecture for Delay-Tolerant Content Distribution , 2007 .
[15] Wenliang Du,et al. Privacy-preserving cooperative statistical analysis , 2001, Seventeenth Annual Computer Security Applications Conference.
[16] Rebecca Montanari,et al. Context-Aware Middleware for Anytime, Anywhere Social Networks , 2007, IEEE Intelligent Systems.
[17] Mario Joa-Ng,et al. A peer-to-peer zone-based two-level link state routing for mobile ad hoc networks , 1999, IEEE J. Sel. Areas Commun..
[18] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[19] Andreas von Hessling. Semantic User Profiles and their Applications in a Mobile Environment , 2004 .
[20] Benny Pinkas,et al. Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.
[21] Thomas R. Gruber,et al. Toward principles for the design of ontologies used for knowledge sharing? , 1995, Int. J. Hum. Comput. Stud..
[22] Nigel Shadbolt,et al. Resource Description Framework (RDF) , 2009 .
[23] Vincent Park,et al. Temporally-Ordered Routing Algorithm (TORA) Version 1 Functional Specification , 2001 .
[24] Russell Beale,et al. Supporting social interaction with smart phones , 2005, IEEE Pervasive Computing.
[25] Sean Bechhofer,et al. OWL: Web Ontology Language , 2009, Encyclopedia of Database Systems.
[26] Charles E. Perkins,et al. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.
[27] Chris Clifton,et al. Privacy-preserving distributed mining of association rules on horizontally partitioned data , 2004, IEEE Transactions on Knowledge and Data Engineering.
[28] Joseph Y. Halpern,et al. Gossip-based ad hoc routing , 2002, IEEE/ACM Transactions on Networking.
[29] J. J. Garcia-Luna-Aceves,et al. A routing protocol for packet radio networks , 1995, MobiCom '95.
[30] Philippe Jacquet,et al. Optimized Link State Routing Protocol (OLSR) , 2003, RFC.
[31] R GruberThomas. Toward principles for the design of ontologies used for knowledge sharing , 1995 .
[32] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[33] Bernhard Plattner,et al. Service discovery in mobile ad hoc networks: a field theoretic approach , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.
[34] J. Broach,et al. The dynamic source routing protocol for mobile ad-hoc networks , 1998 .
[35] Ted Pedersen,et al. WordNet::Similarity - Measuring the Relatedness of Concepts , 2004, NAACL.
[36] J. C. Boudreaux,et al. Intelligent Manufacturing: Programming Environments for CIM , 1993 .
[37] Ivan Damgård,et al. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System , 2001, Public Key Cryptography.
[38] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[39] Zygmunt J. Haas,et al. The zone routing protocol (zrp) for ad hoc networks" intemet draft , 2002 .
[40] Wenliang Du,et al. Secure Multi-party Computational Geometry , 2001, WADS.
[41] Diego Calvanese,et al. The Description Logic Handbook: Theory, Implementation, and Applications , 2003, Description Logic Handbook.
[42] Juan Li,et al. SOON: A Scalable Self-organized Overlay Network for Distributed Information Retrieval , 2008, DSOM.
[43] Myoung-Ho Kim,et al. Information Retrieval Based on Conceptual Distance in is-a Hierarchies , 1993, J. Documentation.
[44] Vesa A. Korhonen,et al. Creating context as you go , 2009, MindTrek '09.
[45] Roy Rada,et al. Development and application of a metric on semantic nets , 1989, IEEE Trans. Syst. Man Cybern..