Sciweavers

578 search results - page 104 / 116
» Deriving Semantic Models from Privacy Policies
Sort
View
CCS
2010
ACM
13 years 7 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...
ACL
2006
13 years 10 months ago
Learning to Predict Case Markers in Japanese
Japanese case markers, which indicate the grammatical relation of the complement NP to the predicate, often pose challenges to the generation of Japanese text, be it done by a for...
Hisami Suzuki, Kristina Toutanova
AGTIVE
2007
Springer
14 years 29 days ago
Domain Specific Languages with Graphical and Textual Views
We show our approach for the definition of Domain Specific Languages integrating both graphical and textual views. The approach is based on the meta-modelling concepts provided by ...
Francisco Pérez Andrés, Juan de Lara...
CORR
2008
Springer
123views Education» more  CORR 2008»
13 years 9 months ago
Provenance Traces
Provenance is information about the origin, derivation, ownership, or history of an object. It has recently been studied extensively in scientific databases and other settings due...
James Cheney, Umut A. Acar, Amal Ahmed
GIS
1999
ACM
14 years 1 months ago
Specifying Analysis Patterns for Geographic Databases on the Basis of a Conceptual Framework
Frameworks and Patterns are important instruments that enable the reuse of successful software solutions in recurrent problems. Geographic information systems, on the other hand, ...
Jugurta Lisboa Filho, Cirano Iochpe