Title :
Valuation of Information security concept methods
Author_Institution :
Sch. of Math. & Comput. Sci., Ningxia Univ., Yinchuan, China
Abstract :
Information security concept methods are popular and attract much attention because they´re foundation for realizing the Information security Semantic Web. a redundant concept of information security methods can be listed, such as inference engines, annotation tools, information security -based crawlers, and information mining tools, not to mention concepts themselves. Information security concept´ key benefit is interoperability, so it should be fairly easy, for example, to create an information security concept with one editor, store it, and upload it again to another editor for further work. computer scientists defend the lack of experimentation with a wide range of arguments. The field is wide open for information security concept experiments. We will find statements from different perspectives. A common distinction exists between evaluating information security concept tools and information security concept content.In the end, ordinary users will decide if they´re happy using information security concept methods (at all) and whether the information security Semantic Web will become a truly global success. This will occur only if information security concept methods really work.
Keywords :
data mining; inference mechanisms; security of data; semantic Web; annotation tools; inference engines; information mining tools; information security-based crawlers; interoperability; semantic Web; Analytical models; Electronic mail; Information security; Manuals; OWL; Resource description framework; Information security concept; Valuation; coverage; inference engines; logical language;
Conference_Titel :
Computer and Communication Technologies in Agriculture Engineering (CCTAE), 2010 International Conference On
Conference_Location :
Chengdu
Print_ISBN :
978-1-4244-6944-4
DOI :
10.1109/CCTAE.2010.5545260