Sciweavers

578 search results - page 81 / 116
» Deriving Semantic Models from Privacy Policies
Sort
View
ACL
1997
13 years 10 months ago
Approximating Context-Free Grammars with a Finite-State Calculus
Although adequate models of human language for syntactic analysis and semantic interpretation are of at least contextfree complexity, for applications such as speech processing in...
Edmund Grimley-Evans
AIPS
2008
13 years 11 months ago
Stochastic Enforced Hill-Climbing
Enforced hill-climbing is an effective deterministic hillclimbing technique that deals with local optima using breadth-first search (a process called "basin flooding"). ...
Jia-Hong Wu, Rajesh Kalyanam, Robert Givan
PERCOM
2007
ACM
14 years 8 months ago
Middleware Support for Quality of Context in Pervasive Context-Aware Systems
Middleware support for pervasive context-aware systems relieves context-aware applications from dealing with the complexity of context-specific operations such as context acquisit...
Kamran Sheikh, Maarten Wegdam, Marten van Sinderen
ICETE
2004
253views Business» more  ICETE 2004»
13 years 10 months ago
BLAZE: A Mobile Agent Paradigm for VoIP Intrusion Detection Systems
ser provides abstraction for supporting flexible security policies that can be developed using the low-level primitives of the browser. We believe our browser architecture will be ...
Kapil Singh, Son T. Vuong
OTM
2010
Springer
13 years 7 months ago
A Process View Framework for Artifact-Centric Business Processes
Over the past several years, the artifact-centric approach to workflow has emerged as a new paradigm of business process modelling. It provides a robust structure of workflow and s...
Sira Yongchareon, Chengfei Liu