Sciweavers

1358 search results - page 175 / 272
» Information elicitation for decision making
Sort
View
ADVAI
2010
110views more  ADVAI 2010»
13 years 4 months ago
Using Genetic Algorithms to Represent Higher-Level Planning in Simulation Models of Conflict
The focus of warfare has shifted from the Industrial Age to the Information Age, as encapsulated by the term Network Enabled Capability. This emphasises information sharing, comma...
James Moffat, Susan Fellows
CHI
2004
ACM
14 years 10 months ago
Affective sensors, privacy, and ethical contracts
Sensing affect raises critical privacy concerns, which are examined here using ethical theory, and with a study that illuminates the connection between ethical theory and privacy....
Carson Reynolds, Rosalind W. Picard
SACMAT
2009
ACM
14 years 4 months ago
Ensuring spatio-temporal access control for real-world applications
Traditional access control models, such as Role-Based Access Control (RBAC), do not take into account contextual information, such as location and time, for making access decision...
Manachai Toahchoodee, Indrakshi Ray, Kyriakos Anas...
PVLDB
2010
161views more  PVLDB 2010»
13 years 8 months ago
Annotating and Searching Web Tables Using Entities, Types and Relationships
Tables are a universal idiom to present relational data. Billions of tables on Web pages express entity references, attributes and relationships. This representation of relational...
Girija Limaye, Sunita Sarawagi, Soumen Chakrabarti
CCS
2005
ACM
14 years 3 months ago
Automated trust negotiation using cryptographic credentials
In automated trust negotiation (ATN), two parties exchange digitally signed credentials that contain attribute information to establish trust and make access control decisions. Be...
Jiangtao Li, Ninghui Li, William H. Winsborough