Sciweavers

224 search results - page 25 / 45
» Practical approaches to comforting users with relational age...
Sort
View
ISSA
2004
13 years 9 months ago
A Framework For Monitoring Insider Misuse Of It Applications
Many security incidents involve legitimate users who misuse their existing privileges, such that they have the system-level right to perform an action, but not the moral or ethica...
Aung Htike Phyo
AAAI
2008
13 years 10 months ago
Exploiting Causal Independence Using Weighted Model Counting
Previous studies have demonstrated that encoding a Bayesian network into a SAT-CNF formula and then performing weighted model counting using a backtracking search algorithm can be...
Wei Li 0002, Pascal Poupart, Peter van Beek
SEMWEB
2010
Springer
13 years 5 months ago
Semantic Need: Guiding Metadata Annotations by Questions People #ask
Abstract. In its core, the Semantic Web is about the creation, collection and interlinking of metadata on which agents can perform tasks for human users. While many tools and appro...
Hans-Jörg Happel
AC
1998
Springer
13 years 7 months ago
Natural Language Processing: A Human-Computer Interaction Perspective
Natural language processing has been in existence for more than fifty years. During this time, it has significantly contributed to the field of human-computer interaction in terms...
Bill Z. Manaris
ACSAC
2003
IEEE
14 years 29 days ago
Making Secure TCP Connections Resistant to Server Failures
Methods are presented to increase resiliency to server failures by migrating long running, secure TCP-based connections to backup servers, thus mitigating damage from servers disa...
Hailin Wu, Andrew Burt, Ramki Thurimella