Sciweavers

718 search results - page 128 / 144
» On Defaults in Action Theories
Sort
View
CSFW
2011
IEEE
12 years 8 months ago
Regret Minimizing Audits: A Learning-Theoretic Basis for Privacy Protection
Abstract—Audit mechanisms are essential for privacy protection in permissive access control regimes, such as in hospitals where denying legitimate access requests can adversely a...
Jeremiah Blocki, Nicolas Christin, Anupam Datta, A...
CORR
2012
Springer
202views Education» more  CORR 2012»
12 years 4 months ago
Mining Flipping Correlations from Large Datasets with Taxonomies
In this paper we introduce a new type of pattern – a flipping correlation pattern. The flipping patterns are obtained from contrasting the correlations between items at diffe...
Marina Barsky, Sangkyum Kim, Tim Weninger, Jiawei ...
PLDI
2005
ACM
14 years 2 months ago
Composing security policies with polymer
We introduce a language and system that supports definition and composition of complex run-time security policies for Java applications. Our policies are comprised of two sorts o...
Lujo Bauer, Jay Ligatti, David Walker
ATAL
2005
Springer
14 years 2 months ago
Knowledge and social laws
In this paper we combine existing work in the area of social laws with a framework for reasoning about knowledge in multi-agent systems. The unifying framework in which this is do...
Wiebe van der Hoek, Mark Roberts, Michael Wooldrid...
OOPSLA
2005
Springer
14 years 1 months ago
Adding trace matching with free variables to AspectJ
An aspect observes the execution of a base program; when certain actions occur, the aspect runs some extra code of its own. In the AspectJ language, the observations that an aspec...
Chris Allan, Pavel Avgustinov, Aske Simon Christen...