Sciweavers

1235 search results - page 63 / 247
» Formalizing information security knowledge
Sort
View
SPATIALCOGNITION
2000
Springer
13 years 11 months ago
Schematic Maps for Robot Navigation
An approach to high-level interaction with autonomous robots by means of schematic maps is outlined. Schematic maps are knowledge representation structures to encode qualitative s...
Christian Freksa, Reinhard Moratz, Thomas Barkowsk...
EUROISI
2008
13 years 10 months ago
An Information Theory Approach to Identify Sets of Key Players
This paper presents an application of information theory to identify sets of key players in social networks. First, we define two entropy measures that we use to analyze the struct...
Daniel Ortiz Arroyo, Dil Muhammad Akbar Hussain
PPDP
2005
Springer
14 years 1 months ago
Security policy in a declarative style
We address the problem of controlling information leakage in a concurrent declarative programming setting. Our aim is to define verification tools in order to distinguish betwee...
Rachid Echahed, Frédéric Prost
ICDS
2007
IEEE
14 years 2 months ago
Automatic Acquisition of Translation Knowledge Using Structural Matching Between Parse Trees
— In this paper we present a rule-based formalism for the representation, acquisition, and application of translation knowledge. The formalism is being used successfully in a Jap...
Werner Winiwarter
CIS
2005
Springer
14 years 1 months ago
A New Conceptual Framework Within Information Privacy: Meta Privacy
When considering information security and privacy issues most of the attention has previously focussed on data protection and the privacy of personally identifiable information (PI...
Geoff Skinner, Song Han, Elizabeth Chang