Sciweavers

1006 search results - page 82 / 202
» What is this page known for
Sort
View
APVIS
2007
13 years 10 months ago
Visualization of sanitized email logs for spam analysis
Email has become an integral method of communication. However, it is still plagued by vast amounts of spam. Many statistical techniques, such as Bayesian filtering, have been app...
Chris Muelder, Kwan-Liu Ma
JURIX
2008
13 years 10 months ago
About the logical relations between cases and rules
The two main types of law are legislation and precedents. Both types have a corresponding reasoning pattern determining legal consequences: legislation can be applied and precedent...
Bart Verheij
AAAI
2006
13 years 10 months ago
AI Support for Building Cognitive Models
Cognitive modeling techniques provide a way of evaluating user interface designs, based on what is known about human cognitive strengths and limitations. Cognitive modelers face a...
Robert St. Amant, Sean P. McBride, Frank E. Ritter
AAAI
2004
13 years 10 months ago
Tractable Tree Convex Constraint Networks
A binary constraint network is tree convex if we can construct a tree for the domain of the variables so that for any constraint, no matter what value one variable takes, all the ...
Yuanlin Zhang, Eugene C. Freuder
EGCDMAS
2004
147views ECommerce» more  EGCDMAS 2004»
13 years 10 months ago
Should We Prove Security Policies Correct?
Security policies are abstract descriptions of how a system should behave to be secure. They typically express what is obligatory, permitted, or forbidden in the system. When the s...
Sebastiano Battiato, Giampaolo Bella, Salvatore Ri...