Sciweavers

11538 search results - page 2240 / 2308
» From Text to Knowledge
Sort
View
LISA
2008
15 years 6 months ago
Concord: A Secure Mobile Data Authorization Framework for Regulatory Compliance
With the increasing adoption of mobile computing devices that carry confidential data, organizations need to secure data in an ever-changing environment. Critical organizational d...
Gautam Singaraju, Brent Hoon Kang
148
Voted
ASWC
2008
Springer
15 years 6 months ago
ROC: A Method for Proto-ontology Construction by Domain Experts
Abstract. Ontology construction is a labour-intensive and costly process. Even though many formal and semi-formal vocabularies are available, creating an ontology for a specific ap...
Nicole J. J. P. Koenderink, Mark van Assem, J. Lar...
ATAL
2008
Springer
15 years 6 months ago
Simultaneously modeling humans' preferences and their beliefs about others' preferences
In strategic multiagent decision making, it is often the case that a strategic reasoner must hold beliefs about other agents and use these beliefs to inform its decision making. T...
Sevan G. Ficici, Avi Pfeffer
ATAL
2008
Springer
15 years 6 months ago
A tractable and expressive class of marginal contribution nets and its applications
Coalitional games raise a number of important questions from the point of view of computer science, key among them being how to represent such games compactly, and how to efficien...
Edith Elkind, Leslie Ann Goldberg, Paul W. Goldber...
CARDIS
2008
Springer
153views Hardware» more  CARDIS 2008»
15 years 6 months ago
Ultra-Lightweight Implementations for Smart Devices - Security for 1000 Gate Equivalents
In recent years more and more security sensitive applications use passive smart devices such as contactless smart cards and RFID tags. Cost constraints imply a small hardware footp...
Carsten Rolfes, Axel Poschmann, Gregor Leander, Ch...
« Prev « First page 2240 / 2308 Last » Next »