Author of the publication

Deriving similarity for Semantic Web using similarity graph.

, , , , and . J. Intell. Inf. Syst., 26 (2): 149-166 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EAFoC: Enterprise Architecture Framework Based on Commonality., , , , , and . J. Comput. Sci. Technol., 21 (6): 952-964 (2006)RGSN Model for Database Integration., , and . ACIS-ICIS, page 74-79. IEEE Computer Society, (2005)An Inter-Domain Authentication Mechanism for XMPP/Jabber., , , , and . SERA, page 268-275. IEEE Computer Society, (2006)Visual modeling and formal specification of constraints of RBAC using semantic web technology., and . Knowl.-Based Syst., 20 (4): 350-356 (2007)Intelligent Semantic Concept Mapping For Semantic Query Rewriting/Optimization In Ontology-Based Information Integration System., , , and . International Journal of Software Engineering and Knowledge Engineering, 14 (5): 519-542 (2004)Measuring Semantic Similarity Based on Weighting Attributes of Edge Counting., , , and . AIS, volume 3397 of Lecture Notes in Computer Science, page 470-480. Springer, (2004)An enterprise architecture framework based on a common information technology domain (EAFIT) for improving interoperability among heterogeneous information systems., , , , , and . SERA, page 198-205. IEEE Computer Society, (2005)The Conflict Detection Between Permission Assignment Constraints in Role-Based Access Control., , , and . CISC, volume 3822 of Lecture Notes in Computer Science, page 265-278. Springer, (2005)Deriving similarity for Semantic Web using similarity graph., , , , and . J. Intell. Inf. Syst., 26 (2): 149-166 (2006)Bridging Real World Semantics to Model World Semantics for Taxonomy Based Knowledge Representation System., , , and . J. Comput. Sci. Technol., 20 (3): 296-308 (2005)