Sciweavers

1533 search results - page 221 / 307
» Semantic Matching: Algorithms and Implementation
Sort
View
ESORICS
2006
Springer
14 years 1 months ago
A Formal Model of Access Control for Mobile Interactive Devices
Abstract. This paper presents an access control model for programming applications in which the access control to resources can employ user interaction to obtain the necessary perm...
Frédéric Besson, Guillaume Dufay, Th...
ATAL
2008
Springer
14 years 4 days ago
Verifying Social Expectations by Model Checking Truncated Paths
One approach to moderating the expected behaviour of agents in open societies is the use of explicit languages for defining norms, conditional commitments and/or social expectation...
Stephen Cranefield, Michael Winikoff
FEWS
2007
13 years 11 months ago
Finding Experts Using Wikipedia
When we want to find experts on the Web we might want to search where the knowledge is created by the users. One of such knowledge repository is Wikipedia. People expertises are d...
Gianluca Demartini
MKWI
2008
142views Business» more  MKWI 2008»
13 years 11 months ago
A Decentralized and Ontology-Based Approach to Infrastructure Monitoring
: We introduce infrastructure monitoring as an application domain that demands decentralized system designs. This is motivated by the large scale of these systems, the heterogeneit...
Florian Fuchs, Michael Berger
ENTCS
2006
151views more  ENTCS 2006»
13 years 10 months ago
Extending C for Checking Shape Safety
The project Safe Pointers by Graph Transformation at the University of York has developed a method for specifying the shape of pointer-data structures by graph reduction, and a st...
Mike Dodds, Detlef Plump