Sciweavers

55 search results - page 6 / 11
» What Happened in CLEF 2008
Sort
View
DEON
2008
Springer
13 years 10 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...
GECON
2008
Springer
121views Business» more  GECON 2008»
13 years 10 months ago
Monitoring and Reputation Mechanisms for Service Level Agreements
A Service Level Agreement (SLA) is an electronic contract between a service user and a provider, and specifies the service to be provided, Quality of Service (QoS) properties that...
Omer F. Rana, Martijn Warnier, Thomas B. Quillinan...
LREC
2008
94views Education» more  LREC 2008»
13 years 10 months ago
LX-Service: Web Services of Language Technology for Portuguese
In the present paper we report on the development of a cluster of web services of language technology for Portuguese that we named as LXService. These web services permit the dire...
António Branco, Francisco Costa, Pedro Mart...
NLUCS
2004
13 years 10 months ago
Making Cognitive Summarization Agents Work In A Real-World Domain
The advantage of cognitively motivated automatic summarizing is that human users can better understand what happens. This improves acceptability. The basic empirical finding in hum...
Brigitte Endres-Niggemeyer, Elisabeth Wansorra
IANDC
2008
128views more  IANDC 2008»
13 years 9 months ago
Rule-based static analysis of network protocol implementations
Today's software systems communicate over the Internet using standard protocols that have been heavily scrutinized, providing some assurance of resistance to malicious attack...
Octavian Udrea, Cristian Lumezanu, Jeffrey S. Fost...