Sciweavers

1948 search results - page 77 / 390
» Formalizing Mirror Theory
Sort
View
IAT
2010
IEEE
13 years 8 months ago
Risk Analysis in Access Control Systems Based on Trust Theories
There is a need for research on the scientific base and engineering requirements for building trustworthy systems in dynamic environments. To address this need, we study risk analy...
J. Ma, Luigi Logrippo, Kamel Adi, Serge Mankovski
CADE
2002
Springer
14 years 10 months ago
Reasoning with Expressive Description Logics: Theory and Practice
Abstract. Description Logics are a family of class based knowledge representation formalisms characterised by the use of various constructors to build complex classes from simpler ...
Ian Horrocks
PODS
2003
ACM
151views Database» more  PODS 2003»
14 years 10 months ago
Feasible itemset distributions in data mining: theory and application
Computing frequent itemsets and maximally frequent itemsets in a database are classic problems in data mining. The resource requirements of all extant algorithms for both problems...
Ganesh Ramesh, William Maniatty, Mohammed Javeed Z...
ECTEL
2009
Springer
14 years 4 months ago
Towards a Theory of Socio-technical Interactions
Technology enhanced learning environments are characterized by socio-technical interactions. Socio-technical interactions involve individuals interacting with (a) technologies, and...
Ravi K. Vatrapu
TARK
2009
Springer
14 years 4 months ago
A computational theory of awareness and decision making
We exhibit a new computational-based definition of awareness, informally that our level of unawareness of an object is the amount of time needed to generate that object within a ...
Nikhil R. Devanur, Lance Fortnow