Sciweavers

1235 search results - page 66 / 247
» Formalizing information security knowledge
Sort
View
CCS
2010
ACM
14 years 2 months ago
Secure provenance: the essential of bread and butter of data forensics in cloud computing
Secure provenance that records ownership and process history of data objects is vital to the success of data forensics in cloud computing, yet it is still a challenging issue toda...
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (...
CCS
2009
ACM
14 years 2 months ago
Mixed-initiative security agents
Security decision-making is hard for both humans and machines. This is because security decisions are context-dependent, require highly dynamic, specialized knowledge, and require...
Rachel Greenstadt, Sadia Afroz, Michael Brennan
VIP
2000
13 years 9 months ago
Graphically Defining Articulable Tacit Knowledge
Although codified knowledge and its capture is commonplace, tacit knowledge has up until recent years proved elusive in its inclusion within the organisation's knowledge base...
Peter Busch, Debbie Richards
NAACL
1994
13 years 9 months ago
Information Based Intonation Synthesis
This paper presents a model for generating prosodically appropriate synthesized responses to database queries using Combinatory Categorial Grammar (CCG - cf. [22]), a formalism wh...
Scott Prevost, Mark Steedman
KCAP
2011
ACM
12 years 11 months ago
Integrating knowledge capture and supervised learning through a human-computer interface
Some supervised-learning algorithms can make effective use of domain knowledge in addition to the input-output pairs commonly used in machine learning. However, formulating this a...
Trevor Walker, Gautam Kunapuli, Noah Larsen, David...