We present an authorization logic that permits reasoning with explicit time. Following a proof-theoretic approach, we study the meta-theory of the logic, including cut elimination...
In a blog network, there are many relations such as comment, trackback, and so on. We consider that if the relations are related to user’s reading activity, we can extract useful...
Stereotypes and clustering are some techniques for creating user models from user behavior. Yet, they possess important risks as users actions could be misinterpreted or users coul...
In this poster, we will present the results of efforts we have undertaken to conduct evaluations of a QA system in a real world environment and to understand the nature of the dim...
: This paper gives the main definitions relating to dependability, a generic concept including as special case such attributes as reliability, availability, safety, confidentiality...
Algirdas Avizienis, Jean-Claude Laprie, Brian Rand...