Sciweavers

578 search results - page 70 / 116
» Deriving Semantic Models from Privacy Policies
Sort
View
CICLING
2004
Springer
14 years 18 days ago
Extracting Domain Knowledge for Dialogue Model Adaptation
Domain shift is a challenging issue in dialogue management. This paper shows how to extract domain knowledge for dialogue model adaptation. The basic semantic concepts are derived ...
Kuei-Kuang Lin, Hsin-Hsi Chen
ICML
1999
IEEE
14 years 9 months ago
Least-Squares Temporal Difference Learning
Excerpted from: Boyan, Justin. Learning Evaluation Functions for Global Optimization. Ph.D. thesis, Carnegie Mellon University, August 1998. (Available as Technical Report CMU-CS-...
Justin A. Boyan
HIPEAC
2005
Springer
14 years 2 months ago
Memory-Centric Security Architecture
Abstract. This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for ...
Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee
CSFW
2012
IEEE
11 years 11 months ago
Measuring Information Leakage Using Generalized Gain Functions
Abstract—This paper introduces g-leakage, a rich generalization of the min-entropy model of quantitative information flow. In g-leakage, the benefit that an adversary derives f...
Mário S. Alvim, Konstantinos Chatzikokolaki...
CCS
2006
ACM
14 years 18 days ago
RoleMiner: mining roles using subset enumeration
Role engineering, the task of defining roles and associating permissions to them, is essential to realize the full benefits of the role-based access control paradigm. Essentially,...
Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warne...