Sciweavers

578 search results - page 93 / 116
» Deriving Semantic Models from Privacy Policies
Sort
View
CCS
2008
ACM
13 years 11 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
ECSCW
2003
13 years 10 months ago
Discovery of Implicit and Explicit Connections Between People Using Email Utterance
This paper is about finding explicit and implicit connections between people by mining semantic associations from their email communications. Following from a sociocognitive stance...
Robert McArthur, Peter Bruza
CCS
2009
ACM
14 years 3 months ago
A metadata calculus for secure information sharing
In both commercial and defense sectors a compelling need is emerging for rapid, yet secure, dissemination of information to the concerned actors. Traditional approaches to informa...
Mudhakar Srivatsa, Dakshi Agrawal, Steffen Reidt
ICMCS
2000
IEEE
110views Multimedia» more  ICMCS 2000»
14 years 15 days ago
Video Scene Segmentation using Video and Audio Features
In this paper we present a novel algorithm for video scene segmentation. We model a scene as a semantically consistent chunk of audio-visual data. Central to the segmentation fram...
Hari Sundaram, Shih-Fu Chang
ICMAS
2000
13 years 10 months ago
Architecture-Centric Object-Oriented Design Method for Multi-Agent Systems
s This paper introduces an architecture-centric object-oriented design method for MAS (Multi-Agent Systems) using the extended UML (Unified Modeling Language). The UML extension is...
Hongsoon Yim, Kyehyun Cho, Sung Joo Park, Jongwoo ...