Sciweavers

578 search results - page 38 / 116
» Deriving Semantic Models from Privacy Policies
Sort
View
SIGDIAL
2010
13 years 6 months ago
Learning Dialogue Strategies from Older and Younger Simulated Users
Older adults are a challenging user group because their behaviour can be highly variable. To the best of our knowledge, this is the first study where dialogue strategies are learn...
Kallirroi Georgila, Maria Wolters, Johanna D. Moor...
PCI
2005
Springer
14 years 2 months ago
A Graphical Rule Authoring Tool for Defeasible Reasoning in the Semantic Web
Defeasible reasoning is a rule-based approach for efficient reasoning with incomplete and inconsistent information. Such reasoning is useful for many applications in the Semantic W...
Nick Bassiliades, Efstratios Kontopoulos, Grigoris...
RBAC
1997
234views more  RBAC 1997»
13 years 10 months ago
Comparing simple role based access control models and access control lists
The RBAC metaphor is powerful in its ability to express access control policy in terms of the way in which administrators view organizations. The functionality of simple Role Base...
John F. Barkley
JDM
2008
112views more  JDM 2008»
13 years 8 months ago
Reverse Engineering from an XML Document into an Extended DTD Graph
The extensible markup language (XML) has become a standard for persistent storage and data interchange via the Internet due to its openness, self-descriptiveness, and flexibility....
Herbert Shiu, Joseph Fong
ICMCS
2006
IEEE
139views Multimedia» more  ICMCS 2006»
14 years 2 months ago
Automatic Semantic Annotation of Images using Spatial Hidden Markov Model
This paper presents a new spatial-HMM(SHMM)for automatically classifying and annotating natural images. Our model is a 2D generalization of the traditional HMM in the sense that b...
Feiyang Yu, Horace Ho-Shing Ip