Sciweavers

223 search results - page 9 / 45
» How Much Semantic Data on Small Devices
Sort
View
SEMWEB
2009
Springer
14 years 3 months ago
Investigating the Semantic Gap through Query Log Analysis
Significant efforts have focused in the past years on bringing large amounts of metadata online and the success of these efforts can be seen by the impressive number of web site...
Peter Mika, Edgar Meij, Hugo Zaragoza
CSFW
1998
IEEE
14 years 27 days ago
Proving Security Protocols with Model Checkers by Data Independence Techniques
Model checkers such as FDR have been extremely e ective in checking for, and nding, attacks on cryptographic protocols { see, for example 11, 12, 14] and many of the papers in 3]....
A. W. Roscoe
CCS
2007
ACM
14 years 2 months ago
Protecting users from "themselves"
Computer usage and threat models have changed drastically since the advent of access control systems in the 1960s. Instead of multiple users sharing a single file system, each us...
William Enck, Sandra Rueda, Joshua Schiffman, Yoge...
KCAP
2011
ACM
12 years 11 months ago
An analysis of open information extraction based on semantic role labeling
Open Information Extraction extracts relations from text without requiring a pre-specified domain or vocabulary. While existing techniques have used only shallow syntactic featur...
Janara Christensen, Mausam, Stephen Soderland, Ore...
PET
2012
Springer
11 years 11 months ago
Practical Privacy Preserving Cloud Resource-Payment for Constrained Clients
The continuing advancements in microprocessor technologies are putting more and more computing power into small devices. Today smartphones are especially popular. Nevertheless, for...
Martin Pirker, Daniel Slamanig, Johannes Winter