Sciweavers

3451 search results - page 152 / 691
» Collaborative attack modeling
Sort
View
151
Voted
EKAW
2010
Springer
15 years 1 months ago
RDFauthor: Employing RDFa for Collaborative Knowledge Engineering
Abstract. In this paper we present RDFauthor, an approach for authoring information that adheres to the RDF data model. RDFauthor completely hides syntax as well as RDF and ontolog...
Sebastian Tramp, Norman Heino, Sören Auer, Ph...
107
Voted
ACL
2010
15 years 19 days ago
Incorporating Extra-Linguistic Information into Reference Resolution in Collaborative Task Dialogue
This paper proposes an approach to reference resolution in situated dialogues by exploiting extra-linguistic information. Recently, investigations of referential behaviours involv...
Ryu Iida, Syumpei Kobayashi, Takenobu Tokunaga
120
Voted
CCS
2009
ACM
15 years 9 months ago
Learning your identity and disease from research papers: information leaks in genome wide association study
Genome-wide association studies (GWAS) aim at discovering the association between genetic variations, particularly single-nucleotide polymorphism (SNP), and common diseases, which...
Rui Wang, Yong Fuga Li, XiaoFeng Wang, Haixu Tang,...
133
Voted
COLLABORATION
1999
Springer
15 years 6 months ago
A Service-Oriented Negotiation Model between Autonomous Agents
Abstract. We present a formal model of negotiation between autonomous agents. The purpose of the negotiation is to reach an agreement about the provision of a service by one agent ...
Carles Sierra, Peyman Faratin, Nicholas R. Jenning...
124
Voted
SEC
2008
15 years 4 months ago
Hiding in Groups: On the Expressiveness of Privacy Distributions
Many applications inherently disclose information because perfect privacy protection is prohibitively expensive. RFID tags, for example, cannot be equipped with the cryptographic p...
Karsten Nohl, David Evans