Sciweavers

481 search results - page 70 / 97
» Validity of First-Order Knowledge Bases
Sort
View
WEBI
2009
Springer
14 years 2 months ago
Rigorous Probabilistic Trust-Inference with Applications to Clustering
The World Wide Web has transformed into an environment where users both produce and consume information. In order to judge the validity of information, it is important to know how...
Thomas DuBois, Jennifer Golbeck, Aravind Srinivasa...
ICISS
2009
Springer
14 years 2 months ago
Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles
Many peer-assisted content-distribution systems reward a peer based on the amount of data that this peer serves to others. However, validating that a peer did so is, to our knowled...
Michael K. Reiter, Vyas Sekar, Chad Spensky, Zheng...
ISMIS
2009
Springer
14 years 2 months ago
Relational Sequence Clustering for Aggregating Similar Agents
Many clustering methods are based on flat descriptions, while data regarding real-world domains include heterogeneous objects related to each other in multiple ways. For instance,...
Grazia Bombini, Nicola Di Mauro, Stefano Ferilli, ...
SPIN
2009
Springer
14 years 2 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...
AUTOMOTIVEUI
2009
ACM
14 years 2 months ago
A cognitive schema approach to diagnose intuitiveness: an application to onboard computers
Intuitive use is met when prior knowledge is transferred to new task environments. The empirical fact that transfer relies on schemas led us to diagnose intuitiveness based on sch...
Sandrine Fischer, Makoto Itoh, Toshiyuki Inagaki