Sciweavers

578 search results - page 105 / 116
» Deriving Semantic Models from Privacy Policies
Sort
View
ACL
2003
13 years 10 months ago
An Intelligent Procedure Assistant Built Using REGULUS 2 and ALTERF
We will demonstrate the latest version of an ongoing project to create an intelligent procedure assistant for use by astronauts on the International Space Station (ISS). The syste...
Manny Rayner, Beth Ann Hockey, James Hieronymus, J...
FC
2010
Springer
181views Cryptology» more  FC 2010»
14 years 26 days ago
Design and Implementation of a Key-Lifecycle Management System
Key management is the Achilles’ heel of cryptography. This work presents a novel Key-Lifecycle Management System (KLMS), which addresses two issues that have not been addressed ...
Mathias Björkqvist, Christian Cachin, Robert ...
SEMWEB
2010
Springer
13 years 6 months ago
Linking and Building Ontologies of Linked Data
The Web of Linked Data is characterized by linking structured data from different sources using equivalence statements, such as owl:sameAs, as well as other types of linked propert...
Rahul Parundekar, Craig A. Knoblock, José L...
COGSCI
2004
105views more  COGSCI 2004»
13 years 8 months ago
Intention, interpretation and the computational structure of language
I show how a conversational process that takes simple, intuitively meaningful steps may be understood as a sophisticated computation that derives the richly detailed, complex repr...
Matthew Stone
CCS
2003
ACM
14 years 2 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson