Sciweavers

107 search results - page 20 / 22
» Independence from obfuscation: A semantic framework for dive...
Sort
View
ESORICS
2009
Springer
13 years 10 months ago
Declassification with Explicit Reference Points
Noninterference requires that public outputs of a program must be completely independent from secrets. While this ensures that secrets cannot be leaked, it is too restrictive for m...
Alexander Lux, Heiko Mantel
DLOG
1997
13 years 8 months ago
Action Hierarchies in Description Logics
Our project aims at the automatic generation of multilingual text for product maintenance and documentation from a structured knowledge representation formalized by means of plans...
Thorsten Liebig, Dietmar Rösner
AAMAS
2007
Springer
13 years 6 months ago
Modeling conversation policies using permissions and obligations
We describe our preliminary work in modeling conversation specifications and policies as positive/negative permissions and obligations. Our model is generic as it is independent o...
Lalana Kagal, Tim Finin
PVLDB
2010
117views more  PVLDB 2010»
13 years 5 months ago
Distance-Based Outlier Detection: Consolidation and Renewed Bearing
Detecting outliers in data is an important problem with interesting applications in a myriad of domains ranging from data cleaning to financial fraud detection and from network i...
Gustavo Henrique Orair, Carlos Teixeira, Ye Wang, ...
ICDM
2010
IEEE
115views Data Mining» more  ICDM 2010»
13 years 4 months ago
Polishing the Right Apple: Anytime Classification Also Benefits Data Streams with Constant Arrival Times
Classification of items taken from data streams requires algorithms that operate in time sensitive and computationally constrained environments. Often, the available time for class...
Jin Shieh, Eamonn J. Keogh