Sciweavers

2097 search results - page 47 / 420
» Distributed user modelling for universal information access
Sort
View
CIKM
2007
Springer
15 years 10 months ago
Reusing relational sources for semantic information access
The rapid growth of available data arises the need for more sophisticated techniques for semantic access to information. It has been proved that using conceptual model or ontology...
Lina Lubyte
CHI
2011
ACM
14 years 7 months ago
Modeling users of intelligent systems
While many devices today increasingly have the ability to predict human activities, it is still difficult to build accurate personalized machine learning models. As users today wi...
Stephanie Rosenthal
134
Voted
SP
1996
IEEE
121views Security Privacy» more  SP 1996»
15 years 8 months ago
A Security Policy Model for Clinical Information Systems
The protection of personal health information has become a live issue in a number of countries including the USA, Canada, Britain and Germany. The debate has shown that there is w...
Ross J. Anderson
250
Voted
NPC
2004
Springer
15 years 9 months ago
LEAPS: A Location Estimation and Action Prediction System in a Wireless LAN Environment
Abstract. Location estimation and user behavior recognition are research issues that go hand in hand. In the past, these two issues have been investigated separately. In this paper...
Qiang Yang, Yiqiang Chen, Jie Yin, Xiaoyong Chai
IFIP
2005
Springer
15 years 9 months ago
Type-Based Distributed Access Control vs. Untyped Attackers
This paper considers the effect of untyped attackers inside a distributed system where security is enforced by the type system. In previous work we introduced the Key-Based Decentr...
Tom Chothia, Dominic Duggan