Sciweavers

701 search results - page 37 / 141
» Comments on
Sort
View
138
Voted
CSFW
2008
IEEE
15 years 10 months ago
An Authorization Logic With Explicit Time
We present an authorization logic that permits reasoning with explicit time. Following a proof-theoretic approach, we study the meta-theory of the logic, including cut elimination...
Henry DeYoung, Deepak Garg, Frank Pfenning
92
Voted
JSAI
2005
Springer
15 years 9 months ago
Analysis of User's Relation and Reading Activity in Weblogs
In a blog network, there are many relations such as comment, trackback, and so on. We consider that if the relations are related to user’s reading activity, we can extract useful...
Tadanobu Furukawa, Tomofumi Matsuzawa, Yutaka Mats...
101
Voted
UM
2005
Springer
15 years 9 months ago
Temporal Blurring: A Privacy Model for OMS Users
Stereotypes and clustering are some techniques for creating user models from user behavior. Yet, they possess important risks as users actions could be misinterpreted or users coul...
Rosa Alarcón, Luis A. Guerrero, José...
107
Voted
SIGIR
2004
ACM
15 years 9 months ago
Context-based question-answering evaluation
In this poster, we will present the results of efforts we have undertaken to conduct evaluations of a QA system in a real world environment and to understand the nature of the dim...
Elizabeth D. Liddy, Anne Diekema, Ozgur Yilmazel
IFIP
2004
Springer
15 years 9 months ago
Dependability and its threats - A taxonomy
: This paper gives the main definitions relating to dependability, a generic concept including as special case such attributes as reliability, availability, safety, confidentiality...
Algirdas Avizienis, Jean-Claude Laprie, Brian Rand...