Sciweavers

1549 search results - page 158 / 310
» On the rules of intermediate logics
Sort
View
CCS
2011
ACM
12 years 9 months ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta
DEXA
2005
Springer
98views Database» more  DEXA 2005»
14 years 2 months ago
Transforming Software Package Classification Hierarchies into Goal-Based Taxonomies
Software package selection is an activity that plays an increasingly crucial role in the delivery of software systems. One of its main open issues is how to structure the knowledge...
Claudia P. Ayala, Xavier Franch
SIGIR
2003
ACM
14 years 2 months ago
Fuzzy translation of cross-lingual spelling variants
We will present a novel two-step fuzzy translation technique for cross-lingual spelling variants. In the first stage, transformation rules are applied to source words to render th...
Ari Pirkola, Jarmo Toivonen, Heikki Keskustalo, Ka...
SEMWEB
2001
Springer
14 years 1 months ago
A Scalable Framework for the Interoperation of Information Sources
Resolving heterogeneity among information systems is a crucial necessity if we wish to gain value from the many distributed resources available to us. Problems of heterogeneity in ...
Prasenjit Mitra, Gio Wiederhold, Stefan Decker
ARTMED
1999
92views more  ARTMED 1999»
13 years 9 months ago
Two-Stage Machine Learning model for guideline development
We present a Two-Stage Machine Learning (ML) model as a data mining method to develop practice guidelines and apply it to the problem of dementia staging. Dementia staging in clin...
Subramani Mani, William Rodman Shankle, Malcolm B....