Sciweavers

2189 search results - page 368 / 438
» A Graded Applicability of Rules
Sort
View
DBSEC
2010
162views Database» more  DBSEC 2010»
13 years 9 months ago
Distributed and Secure Access Control in P2P Databases
The intent of peer data management systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to...
Angela Bonifati, Ruilin Liu, Hui (Wendy) Wang
CLIMA
2007
13 years 9 months ago
Fuzzy Argumentation for Trust
In an open Multi-Agent System, the goals of agents acting on behalf of their owners often conflict with each other. Therefore, a personal agent protecting the interest of a single...
Ruben Stranders, Mathijs de Weerdt, Cees Witteveen
ISEMANTICS
2010
13 years 9 months ago
SESAME demonstrator: ontologies, services and policies for energy efficiency
The project SESAME uses semantic modeling and reasoning to support home owners and building managers in saving energy and in optimizing their energy costs while maintaining their ...
Slobodanka Tomic, Anna Fensel, Tassilo Pellegrini
LREC
2010
175views Education» more  LREC 2010»
13 years 9 months ago
Adapting a resource-light highly multilingual Named Entity Recognition system to Arabic
We present a working Arabic information extraction (IE) system that is used to analyze large volumes of news texts every day to extract the named entity (NE) types person, organiz...
Wajdi Zaghouani, Bruno Pouliquen, Mohamed Ebrahim,...
ICMLA
2008
13 years 9 months ago
Highly Scalable SVM Modeling with Random Granulation for Spam Sender Detection
Spam sender detection based on email subject data is a complex large-scale text mining task. The dataset consists of email subject lines and the corresponding IP address of the em...
Yuchun Tang, Yuanchen He, Sven Krasser