会议专题

Valuation of Information security concept Methods

Information security concept methods are popular and attract much attention because theyre foundation for realizing the Information security Semantic Web. a redundant concept of information security methods can be listed, such as inference engines, annotation tools, information security -based crawlers, and information mining tools, not to mention concepts themselves. Information security concept key benefit is interoperability, so it should be fairly easy, for example, to create an information security concept with one editor, store it, and upload it again to another editor for further work, computer scientists defend the lack of experimentation with a wide range of arguments. The field is wide open for information security concept experiments. We will find statements from different perspectives. A common distinction exists between evaluating information security concept tools and information security concept content.In the end, ordinary users will decide if theyre happy using information security concept methods (at all) and whether the information security Semantic Web will become a truly global success. This will occur only if information security concept methods really work.

Information security concept Valuation inference engines logical language coverage

HuHua

School of Mathematics and Computer Science, Ningxia University , Yinchuan City 750021 ,China

国际会议

2010 International Conference on Computer and Communication Technologies in Agriculture Engineering(计算机与通信技术在农业工程国际会议 CCTAE 2010)

成都

英文

230-233

2010-06-12(万方平台首次上网日期,不代表论文的发表时间)