Sciweavers

165 search results - page 23 / 33
» Reasoning about the Role of Information Systems in Trusting ...
Sort
View
CSL
2002
Springer
13 years 7 months ago
Recognition confidence scoring and its use in speech understanding systems
In this paper we present an approach to recognition confidence scoring and a set of techniques for integrating confidence scores into the understanding and dialogue components of ...
Timothy J. Hazen, Stephanie Seneff, Joseph Polifro...
SIGSOFT
2008
ACM
14 years 8 months ago
Effective blame for information-flow violations
Programs trusted with secure information should not release that information in ways contrary to system policy. However, when a program contains an illegal flow of information, cu...
Dave King 0002, Trent Jaeger, Somesh Jha, Sanjit A...
ICFP
2009
ACM
14 years 8 months ago
Effective interactive proofs for higher-order imperative programs
We present a new approach for constructing and verifying higherorder, imperative programs using the Coq proof assistant. We build on the past work on the Ynot system, which is bas...
Adam J. Chlipala, J. Gregory Malecha, Greg Morrise...
CORR
2010
Springer
157views Education» more  CORR 2010»
13 years 5 months ago
Using Semantic Wikis for Structured Argument in Medical Domain
This research applies ideas from argumentation theory in the context of semantic wikis, aiming to provide support for structured-large scale argumentation between human agents. The...
Adrian Groza, Radu Balaj
AAAI
2011
12 years 7 months ago
Recommendation Sets and Choice Queries: There Is No Exploration/Exploitation Tradeoff!
Utility elicitation is an important component of many applications, such as decision support systems and recommender systems. Such systems query users about their preferences and ...
Paolo Viappiani, Craig Boutilier