Sciweavers

2084 search results - page 361 / 417
» Knowledge Exploitation from the Web
Sort
View
SP
2008
IEEE
162views Security Privacy» more  SP 2008»
13 years 9 months ago
Fable: A Language for Enforcing User-defined Security Policies
This paper presents FABLE, a core formalism for a programming language in which programmers may specify security policies and reason that these policies are properly enforced. In ...
Nikhil Swamy, Brian J. Corcoran, Michael Hicks
IM
2007
13 years 9 months ago
Inverted Index Support for Numeric Search
Today’s search engines are increasingly required to broaden their capabilities beyond free-text search. More complex features, such as supporting range constraints over numeric ...
Marcus Fontoura, Ronny Lempel, Runping Qi, Jason Y...
IMCS
2007
78views more  IMCS 2007»
13 years 9 months ago
Usable set-up of runtime security policies
Setting up runtime security policies as required for firewalls or as envisioned by policy languages for the Semantic Web is a difficult task, especially for lay users who have l...
Almut Herzog, Nahid Shahmehri
CORR
2000
Springer
230views Education» more  CORR 2000»
13 years 9 months ago
Integrating E-Commerce and Data Mining: Architecture and Challenges
We show that the e-commerce domain can provide all the right ingredients for successful data mining. We describe an integrated architecture for supporting this integration. The ar...
Suhail Ansari, Ron Kohavi, Llew Mason, Zijian Zhen...
CORR
1999
Springer
93views Education» more  CORR 1999»
13 years 8 months ago
Empirically Evaluating an Adaptable Spoken Dialogue System
Abstract. Recent technological advances have made it possible to build real-time, interactive spoken dialogue systems for a wide variety of applications. However, when users do not...
Diane J. Litman, Shimei Pan