Sciweavers

433 search results - page 55 / 87
» Using Description Logics in Relation Based Access Control
Sort
View
APWEB
2006
Springer
13 years 11 months ago
Named Graphs as a Mechanism for Reasoning About Provenance
Named Graphs is a simple, compatible extension to the RDF syntax that enables statements to be made about RDF graphs. This approach is in contrast to earlier attempts such as RDF r...
E. Rowland Watkins, Denis A. Nicole
FLAIRS
2006
13 years 9 months ago
Verbalization Enhanced Tutoring
Intelligent Tutoring Systems (ITS) typically contain elements of instruction, assessment, feedback and guidance for the trainee. Most of the time, the ITS is controlling the dialo...
Christel Kemke, Shamima Mithun
DLOG
2004
13 years 9 months ago
A Uniform Tableaux-Based Approach to Concept Abduction and Contraction in ALN
We present algorithms based on truth-prefixed tableaux to solve both Concept Abduction and Contraction in ALN DL. We also analyze the computational complexity of the problems, sho...
Simona Colucci, Tommaso Di Noia, Eugenio Di Sciasc...
CCS
2008
ACM
13 years 10 months ago
Towards automatic reverse engineering of software security configurations
The specifications of an application's security configuration are crucial for understanding its security policies, which can be very helpful in security-related contexts such...
Rui Wang 0010, XiaoFeng Wang, Kehuan Zhang, Zhuowe...
DLOG
2009
13 years 5 months ago
What Happened to Bob? Semantic Data Mining of Context Histories
We report on event recognition within the life logging application IYOUIT for the automatic creation of static diary-like Blogs. Based on the qualitative context histories produced...
Michael Wessel, Marko Luther, Ralf Möller