Sciweavers

1235 search results - page 182 / 247
» Formalizing information security knowledge
Sort
View
SIGIR
2002
ACM
13 years 7 months ago
A new family of online algorithms for category ranking
We describe a new family of topic-ranking algorithms for multi-labeled documents. The motivation for the algorithms stems from recent advances in online learning algorithms. The a...
Koby Crammer, Yoram Singer
TKDE
2010
164views more  TKDE 2010»
13 years 6 months ago
Defeasible Contextual Reasoning with Arguments in Ambient Intelligence
Abstract—The imperfect nature of context in Ambient Intelligence environments and the special characteristics of the entities that possess and share the available context informa...
Antonis Bikakis, Grigoris Antoniou
ICALP
2007
Springer
14 years 1 months ago
Private Locally Decodable Codes
We consider the problem of constructing efficient locally decodable codes in the presence of a computationally bounded adversary. Assuming the existence of one-way functions, we c...
Rafail Ostrovsky, Omkant Pandey, Amit Sahai
SAFECOMP
2005
Springer
14 years 1 months ago
Justification of Smart Sensors for Nuclear Applications
This paper describes the results of a research study sponsored by the UK nuclear industry into methods of justifying smart sensors. Smart sensors are increasingly being used in the...
Peter G. Bishop, Robin E. Bloomfield, Sofia Guerra...
SAC
2010
ACM
14 years 2 months ago
Web-based graphical querying of databases through an ontology: the Wonder system
Biological scientists have made large amounts of data available on the Web, which can be accessed by canned or precomputed queries presented via web forms. To satisfy further info...
Diego Calvanese, C. Maria Keet, Werner Nutt, Maria...