Sciweavers

578 search results - page 47 / 116
» Deriving Semantic Models from Privacy Policies
Sort
View
IJCAI
1989
13 years 10 months ago
On the Semantics of Counterfactuals
It is argued that Ginsberg's Possible Worlds Approach to counterfactual implication suffers from a number of defects which are the result of confusing proof theory and model ...
Peter Jackson
CORR
1999
Springer
81views Education» more  CORR 1999»
13 years 8 months ago
Inducing a Semantically Annotated Lexicon via EM-Based Clustering
We present a technique for automatic induction of slot annotations for subcategorization frames, based on induction of hidden classes in the EM framework of statistical estimation...
Mats Rooth, Stefan Riezler, Detlef Prescher, Glenn...
ESORICS
2009
Springer
14 years 20 days ago
Declassification with Explicit Reference Points
Noninterference requires that public outputs of a program must be completely independent from secrets. While this ensures that secrets cannot be leaked, it is too restrictive for m...
Alexander Lux, Heiko Mantel
SCAM
2002
IEEE
14 years 1 months ago
Semantics Guided Filtering of Combinatorial Graph Transformations in Declarative Equation-Based Languages
This paper concerns the use of static analysis for debugging purposes of declarative object-oriented equation-based modeling languages. We propose a framework where over- and unde...
Peter Bunus, Peter Fritzson
IACR
2011
73views more  IACR 2011»
12 years 8 months ago
Secure Authentication from a Weak Key, Without Leaking Information
We study the problem of authentication based on a weak key in the information-theoretic setting. A key is weak if its min-entropy is an arbitrary small fraction of its bit length. ...
Niek J. Bouman, Serge Fehr